last executing test programs: 7m12.762854896s ago: executing program 0 (id=2355): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000e02800850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000400)='locks_get_lock_context\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000400)='locks_get_lock_context\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='blkio.bfq.avg_queue_size\x00', 0x275a, 0x0) fcntl$lock(r2, 0x26, &(0x7f0000000000)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000180)={'tunl0\x00', &(0x7f0000000280)={'sit0\x00', 0x0, 0x1, 0x700, 0x6, 0x9, {{0x24, 0x4, 0x3, 0x8, 0x90, 0x66, 0x0, 0x8, 0x29, 0x0, @rand_addr=0x64010100, @multicast2, {[@generic={0x94, 0xb, "5480c22c26c41ecdfb"}, @rr={0x7, 0xb, 0xd3, [@loopback, @rand_addr=0x64010100]}, @timestamp_addr={0x44, 0xc, 0x45, 0x1, 0x7, [{@broadcast, 0x1}]}, @timestamp_addr={0x44, 0x34, 0xbb, 0x1, 0x6, [{@local, 0x10000}, {@private=0xa010102, 0x4}, {@dev={0xac, 0x14, 0x14, 0x2d}, 0x7}, {@local, 0x8}, {@multicast1, 0x7}, {@multicast1, 0x9}]}, @noop, @end, @timestamp={0x44, 0x24, 0x67, 0x0, 0x8, [0x6, 0x1, 0xa54b, 0x0, 0x7f, 0x3, 0xffffffff, 0x1000]}]}}}}}) sendmsg$nl_route(r2, &(0x7f0000000540)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f00000004c0)=@bridge_dellink={0x44, 0x11, 0x300, 0x70bd2b, 0x25dfdbfb, {0x7, 0x0, 0x0, r4, 0x80, 0x2c}, [@IFLA_MTU={0x8, 0x4, 0x7}, @IFLA_LINK={0x8}, @IFLA_IFALIASn={0x4}, @IFLA_EVENT={0x8}, @IFLA_LINK_NETNSID={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x20040000}, 0x40010) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r3}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newqdisc={0x34, 0x24, 0x4ee4e6a52ff56541, 0x100, 0x0, {0x0, 0x0, 0x0, r7, {0xf, 0xc}, {0x5, 0x4}, {0xfff3}}, [@qdisc_kind_options=@q_codel={{0xa}, {0x4}}]}, 0x34}}, 0x0) 7m12.128726579s ago: executing program 0 (id=2357): syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x1000040, &(0x7f0000000100), 0x1, 0x599, &(0x7f0000000540)="$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") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xe9) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x246}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000f0000000000000c00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000200b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2008002, &(0x7f0000000080), 0x1, 0x55f, &(0x7f0000000d00)="$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") syz_open_dev$usbfs(&(0x7f0000000100), 0x4, 0x70f2ab559d7b8da2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x28000, 0x40) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r5, 0x80083314, &(0x7f00000003c0)) ioctl$KDSKBMODE(r5, 0x4b45, &(0x7f0000000280)=0xcc) poll(&(0x7f0000000340)=[{r1, 0x1020}], 0x1, 0x1) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001640)={@cgroup=r5, 0x8, 0x0, 0xdaf, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0], &(0x7f0000001600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000071101800000000009501000700004fe6"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$UHID_INPUT(r6, &(0x7f00000005c0)={0x9, {"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", 0x1000}}, 0x1006) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) 7m8.052681241s ago: executing program 0 (id=2363): prlimit64(0x0, 0xb, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x4, 0x2ffffffff}, 0x2e) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000280)={0xa, 0x1, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x2}, 0x1c) listen(r1, 0xfffffff8) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x2, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=ANY=[@ANYBLOB="fc000000190001002dbd70000000000000000000000000000000000000000000ac14143b00000000000000000000000000000000000000000a0000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000c00000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000000000000000000000000000000a000000000000feffffffff7f400002000000000000080000000000000000010000010000000044000500ac1414aa003100000000000000000000000000003200000002000000ac1414aa0000000000000000000000000600000004"], 0xfc}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r4, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x54, r5, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x348}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r6}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xffff63db}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x20008000}, 0x3633605e2b309296) getsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@private2, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, r5, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xd}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x38}, 0x1, 0x0, 0x0, 0x20004000}, 0x40) r8 = socket$inet_tcp(0x2, 0x1, 0x0) gettid() connect$inet(r8, &(0x7f0000000040)={0x2, 0x2, @local}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='sys_enter\x00', r10}, 0x10) getgroups(0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 7m6.548774049s ago: executing program 0 (id=2368): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x18) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="440000002000010000000000fcdbdf250a405f00000000031a00030014000200fcf5a10000000000000000000000000114000100200100"], 0x44}}, 0x40000) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000340)=@newlink={0x5c, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x3c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x2c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @private2}]}}}]}, 0x5c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a500850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000000000000000004b84ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x40, 0x9, 0x7ffc2001}]}) time(0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@getchain={0x24, 0x11, 0x1, 0x70bd25, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xfff3}}}, 0x24}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f00000002c0)='sched_kthread_work_queue_work\x00', r1}, 0x10) shutdown(r0, 0x1) r6 = socket(0x10, 0x3, 0x0) connect$netlink(r6, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) sendmsg$nl_route(r6, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3400000012000100000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001400350077673000ff0300"/28], 0x34}}, 0x0) 7m5.684771274s ago: executing program 0 (id=2370): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback, 0x7}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000280)=':=', 0x2, 0x20000045, &(0x7f00000001c0)={0xa, 0x2, 0xb, @empty}, 0x1c) shutdown(r0, 0x1) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000001080)=""/4096, 0x1000, 0x0, 0x0}, &(0x7f0000000100)=0x40) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0x437, 0x0, 0xffffffff, {0x0, 0x0, 0x0, r3, 0x5120b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ip6erspan={{0xe}, {0x8, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x48800}, 0x4000010) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000d40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r6}, &(0x7f00000003c0), &(0x7f0000000400)=r7}, 0x20) sendmsg$tipc(r5, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) close(r5) close(r4) sendmmsg$inet(r1, &(0x7f00000017c0)=[{{&(0x7f0000000040)={0x2, 0x4e1c, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @empty, @multicast1}}}], 0x20}}], 0x1, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000300)={{{@in=@empty, @in6=@private2, 0x4e23, 0x4, 0x4e20, 0xffff, 0xa, 0xa0, 0x80, 0x6c, r3, 0xffffffffffffffff}, {0x7, 0x0, 0x1, 0x4, 0x1, 0x3, 0x4, 0x2}, {0x7, 0x8, 0x4e, 0x100}, 0x4a0f, 0x6e6bb0, 0x0, 0x0, 0x2, 0x2}, {{@in6=@empty, 0x4d4, 0x6c}, 0xa, @in6=@local, 0x0, 0x3, 0x2, 0x7, 0x3, 0x8, 0xbffa}}, 0xe8) io_setup(0x9, &(0x7f00000000c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/power/sync_on_suspend', 0x20001, 0x0) open(&(0x7f0000000580)='./file0\x00', 0x30040, 0x145) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 7m5.645264558s ago: executing program 0 (id=2371): prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000400850000008200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = socket$nl_audit(0x10, 0x3, 0x9) bind$netlink(r5, &(0x7f0000000240), 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='mnt\x00', 0x0, &(0x7f0000000000), 0x0, 0x248, &(0x7f0000000940)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='mnt/encrypted_dir\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file1\x00', 0x42, 0x120) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) syz_mount_image$fuse(0x0, &(0x7f0000001040)='./file2\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f00000000c0)={[{@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file2'}}, {@metacopy_on}], [], 0x2c}) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) linkat(0xffffffffffffff9c, &(0x7f00000006c0)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file7\x00', 0x1000) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x8800, 0x8) syz_mount_image$fuse(0x0, &(0x7f0000000580)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x0, 0x0, 0x0) renameat2(r6, &(0x7f0000000380)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r7, 0x0, 0x2) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xa0, &(0x7f0000000700)=ANY=[], 0x1, 0x0, 0x0) 6m49.489924851s ago: executing program 32 (id=2371): prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000400850000008200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = socket$nl_audit(0x10, 0x3, 0x9) bind$netlink(r5, &(0x7f0000000240), 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='mnt\x00', 0x0, &(0x7f0000000000), 0x0, 0x248, &(0x7f0000000940)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='mnt/encrypted_dir\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file1\x00', 0x42, 0x120) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) syz_mount_image$fuse(0x0, &(0x7f0000001040)='./file2\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f00000000c0)={[{@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file2'}}, {@metacopy_on}], [], 0x2c}) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) linkat(0xffffffffffffff9c, &(0x7f00000006c0)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file7\x00', 0x1000) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x8800, 0x8) syz_mount_image$fuse(0x0, &(0x7f0000000580)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x0, 0x0, 0x0) renameat2(r6, &(0x7f0000000380)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r7, 0x0, 0x2) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xa0, &(0x7f0000000700)=ANY=[], 0x1, 0x0, 0x0) 6.593838854s ago: executing program 2 (id=4056): syz_mount_image$ext4(&(0x7f0000000bc0)='ext4\x00', &(0x7f0000000240)='./file1\x00', 0x4000, &(0x7f0000000400)={[{@usrjquota_path={'usrjquota', 0x3d, './file1'}}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x2}}, {@dax}, {@mblk_io_submit}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x4}}, {@user_xattr}, {@errors_remount}, {@user_xattr}]}, 0x2, 0xbc1, &(0x7f00000028c0)="$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") bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x4a6b297042c2cf06, 0x8, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000780)={0x9, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x9031, 0xffffffffffffffff, 0xe75f0000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x0, @none}, 0xe) listen(r3, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000380)={'geneve0\x00'}) r4 = io_uring_setup(0x7685, &(0x7f0000000580)={0x0, 0x1320, 0x0, 0x0, 0x26f}) io_uring_register$IORING_REGISTER_BUFFERS(r4, 0x0, &(0x7f0000000280)=[{&(0x7f0000000640)=""/68, 0x44}], 0x1) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000ed07447900000000000000", @ANYRES32, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r5}, 0x18) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f00000001c0)='./bus\x00', 0x1201060, &(0x7f0000000080), 0x67, 0x538, &(0x7f0000002380)="$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") ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000200)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x3f00, 0x0, &(0x7f0000000080)="c0"}) r6 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) getsockopt$inet_pktinfo(r6, 0x0, 0x8, 0x0, 0x0) r7 = open(&(0x7f0000000340)='./file1\x00', 0x185102, 0x38) linkat(0xffffffffffffff9c, &(0x7f00000006c0)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file7\x00', 0x1000) write$FUSE_GETXATTR(r7, &(0x7f0000000180)={0x18, 0xb3ab65e660794279, 0x0, {0x7ff}}, 0x18) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)={0x30, r9, 0x1, 0x0, 0x0, {{}, {}, {0x14, 0x19, {0x3, 0x1, 0x1}}}}, 0x30}}, 0x0) 4.560106463s ago: executing program 2 (id=4064): socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$uinput_user_dev(r1, &(0x7f0000000cc0)={'syz1\x00', {}, 0x3, [0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, 0x3, 0xe, 0x721a2d63, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x6], [0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x8, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x289, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xa46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0xfffffffe], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000008, 0xc7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x749, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x10000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400]}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) readv(r1, &(0x7f0000001900)=[{&(0x7f0000000040)=""/65, 0x41}], 0x1) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_DISALLOCATE(r2, 0x5608) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) 4.219522017s ago: executing program 1 (id=4069): prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/11], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000040085000000820000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = socket$nl_audit(0x10, 0x3, 0x9) bind$netlink(r5, &(0x7f0000000240), 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='mnt\x00', 0x0, &(0x7f0000000000), 0x0, 0x248, &(0x7f0000000940)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='mnt/encrypted_dir\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file1\x00', 0x42, 0x120) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) syz_mount_image$fuse(0x0, &(0x7f0000001040)='./file2\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f00000000c0)={[{@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file2'}}, {@metacopy_on}], [], 0x2c}) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) linkat(0xffffffffffffff9c, &(0x7f00000006c0)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file7\x00', 0x1000) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x8800, 0x8) syz_mount_image$fuse(0x0, &(0x7f0000000580)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x0, 0x0, 0x0) renameat2(r6, &(0x7f0000000380)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r7, &(0x7f0000000040)='./file1\x00', 0x2) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xa0, &(0x7f0000000700)=ANY=[], 0x1, 0x0, 0x0) 3.77661781s ago: executing program 2 (id=4071): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) syz_emit_ethernet(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x44, 0x86}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r1 = getpid() r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000005"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./bus\x00', 0x42, 0x0) pwrite64(r3, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000004200010400000000000000000000ffff", @ANYRES32=0x0, @ANYBLOB="421c0000000000001c001280090001007866726d000000000c0002800800020001000000140003007866726d3000"/56], 0x50}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) recvmmsg(r5, &(0x7f0000000480), 0x400034f, 0x2, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x0, 0x193, 0x9, 0x1401, 0xffffffffffffffff, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x0, 0x6}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) mount$incfs(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='./bus\x00', &(0x7f00000000c0), 0x0, 0x0) 3.558317311s ago: executing program 4 (id=4073): socket$inet6_tcp(0xa, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) utimes(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{r0, r1/1000+10000}, {0x77359400}}) socket(0x10, 0x803, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x40000}, 0x94) socket(0x1, 0x803, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000a00)=@newtaction={0x18, 0x30, 0xc96f2b0dc02612b1, 0x70bd2a, 0x25dfdbff, {}, [{0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4004000}, 0x50) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x8804, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r3, 0x0, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x1080000, 0x0, 0x0, 0x0, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r5, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x0, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x365}, {&(0x7f0000000280)=""/85, 0x7c}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000400)=""/106, 0x645}, {&(0x7f0000000980)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x334}, {&(0x7f00000007c0)=""/154, 0x2c}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) r7 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r7) r9 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r7) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, r9) keyctl$KEYCTL_MOVE(0x1e, r8, r8, r7, 0x0) 3.279034299s ago: executing program 1 (id=4075): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0xb8) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000940)=ANY=[@ANYBLOB="020000000000000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000002000000e00000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000064010102000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x310) r1 = syz_open_procfs(0x0, &(0x7f0000002180)='net/mcfilter\x00') preadv(r1, &(0x7f0000000300)=[{&(0x7f0000000000)=""/55, 0x37}], 0x1, 0xde, 0x20004) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="2000000010003b1500"/20, @ANYRES32=0x0], 0x20}}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='sched_switch\x00', r2}, 0x18) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x20800, 0x0) ioctl$RTC_UIE_ON(r3, 0x7003) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f00000000c0)={0x7, 0x21, 0x0, 0x17, 0x4, 0xc0, 0x5, 0x14c, 0x1}) 3.192639257s ago: executing program 1 (id=4076): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000002c0)={[{@noauto_da_alloc}, {@jqfmt_vfsold}, {@noquota}, {@norecovery}, {}]}, 0x1, 0x4be, &(0x7f0000000540)="$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") syz_mount_image$fuse(0x0, &(0x7f0000000300)='./file7\x00', 0x830000, 0x0, 0x0, 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000780)='./file7\x00', 0xffffffffffffff9c, &(0x7f00000007c0)='./file2\x00', 0x5) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='uni_xlate=1,iocharset=iso8859-5,shortname=winnt,nonumtail=0,uni_xlate=1,utf8=0,iocharset=maccroatian,iocharset=macgaelic,allow_utime=00000000000000000000527,nfs,nonumtail=0,iocharset=cp865,uid=', @ANYRESHEX=0xee00, @ANYBLOB="2c636f6465706167653d3835352c004c87a56b54e381762bf87fb98d86d772421a964d437fff01c5e125acb191c125f8030000000000009dba05feee081e91fc61a0fef5511251"], 0xff, 0x238, &(0x7f0000000500)="$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") bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r0 = socket$packet(0x11, 0xa, 0x300) socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'veth1_to_bridge\x00'}) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004000}, 0xc044) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000fdffffff850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000780)=""/73) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r4) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, &(0x7f0000000040)) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r4, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)={0x1c, r5, 0x200, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x20000054) 3.124101664s ago: executing program 4 (id=4077): r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000300), 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)=ANY=[@ANYRES32=0x0, @ANYRES8=r0, @ANYBLOB="03565fd11d4b91243947a709c177f37b9b358f82e7670cd71739da4e96b6ddb4c07133ddad91eefb5d", @ANYRESOCT=r1, @ANYRES8=r1], 0x50) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x101040, 0x0) sync_file_range(r3, 0x1, 0x4, 0x4) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4004550c, 0x0) 3.077302819s ago: executing program 4 (id=4078): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="020000000400000008000000"], 0x48) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r4 = fsopen(&(0x7f00000003c0)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) r5 = fsmount(r4, 0x0, 0x19) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={r5, r3}, 0xc) socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket$igmp(0x2, 0x3, 0x2) ioctl$sock_inet_SIOCSARP(r6, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @broadcast}, {0x0, @dev}, 0x8, {0x2, 0x0, @empty}, 'lo\x00'}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r8 = getpid() sched_setscheduler(r8, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r9, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r10, &(0x7f00000bd000), 0x318, 0x0) 2.926113253s ago: executing program 3 (id=4079): pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff097b00000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00"/11], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000340)='kmem_cache_free\x00', r4}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="b0"], 0xb0) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) open$dir(&(0x7f0000000140)='./file0\x00', 0x500, 0x40) 2.721700943s ago: executing program 3 (id=4080): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001000), r1) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000980)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010027bd7000fedbdf25140000001c0007800c0003000200000000000000040004"], 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x8004) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@deltfilter={0x24, 0x2d, 0x8894ad634ce14b71, 0x70bd28, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x8, 0xe}, {0xffe0, 0x3}, {0x4}}}, 0x24}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff81}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_STP_STATE={0x8, 0x5, 0x1}, @IFLA_BR_FORWARD_DELAY={0x8, 0x1, 0x1c}]}}}]}, 0x44}}, 0x0) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r0) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c00000024dda3d08f33fae856c4a50200e4df05e231f3f129f141be56a1b92c0d6e", @ANYRES16=r5, @ANYBLOB="01022dbd7000ffdbdf2521000000"], 0x14}, 0x1, 0x0, 0x0, 0x44801}, 0x0) 2.304755104s ago: executing program 1 (id=4081): bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x2800000, &(0x7f0000000380)={[{@debug}, {@delalloc}, {@journal_ioprio}, {@test_dummy_encryption}, {@nodiscard}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}, {@acl}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x40}}]}, 0x1, 0xbb4, &(0x7f00000017c0)="$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") syz_mount_image$fuse(0x0, &(0x7f00000000c0)='./bus\x00', 0x3000009, 0x0, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f00000000c0)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1a, &(0x7f00000002c0)=0x5, 0x4) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000180)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="01000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) r5 = io_uring_setup(0x198f, 0x0) io_uring_register$IORING_REGISTER_RESTRICTIONS(r5, 0xb, &(0x7f0000000080), 0x0) io_uring_register$IORING_REGISTER_RESTRICTIONS(r5, 0xb, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000100)='./bus\x00', &(0x7f0000000440), 0x8, &(0x7f0000000180)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file0'}}]}) 2.107626693s ago: executing program 2 (id=4083): pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff097b00000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="b0"], 0xb0) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c500000001f0ff"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) open$dir(&(0x7f0000000140)='./file0\x00', 0x500, 0x40) 2.107121654s ago: executing program 3 (id=4084): prctl$PR_SET_PDEATHSIG(0x8, 0xffffffffffffff01) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x17759a46a3398d5e) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec8500000075000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0xfd, 0x7ffc0002}]}) r3 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r4 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) dup2(r3, r4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb2, &(0x7f0000000040), 0x0, 0x10, &(0x7f00000003c0), &(0x7f00000004c0), 0x8, 0xfc, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=ANY=[@ANYBLOB="ff00009c32000000080000000600000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) socket$inet6(0xa, 0x80002, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, 0x0, 0x20048010) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 1.870697547s ago: executing program 4 (id=4085): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x2000000000000081, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r0}, 0x18) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'nr0\x00', 0x6132}) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfe3a) 1.864945577s ago: executing program 5 (id=4086): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0xb8) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000940)=ANY=[@ANYBLOB="020000000000000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000002000000e00000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000064010102000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x310) r1 = syz_open_procfs(0x0, &(0x7f0000002180)='net/mcfilter\x00') preadv(r1, &(0x7f0000000300)=[{&(0x7f0000000000)=""/55, 0x37}], 0x1, 0xde, 0x20004) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="2000000010003b1500"/20, @ANYRES32=0x0], 0x20}}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='sched_switch\x00', r2}, 0x18) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x20800, 0x0) ioctl$RTC_UIE_ON(r3, 0x7003) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f00000000c0)={0x7, 0x21, 0x0, 0x17, 0x4, 0xc0, 0x5, 0x14c, 0x1}) 1.826675821s ago: executing program 2 (id=4087): prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r3}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) pipe(&(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_CHECKPOINT(r5, 0x4004662b, &(0x7f0000000180)=0x4) r6 = socket$inet(0x2, 0x1, 0x0) sendmmsg$inet(r6, &(0x7f0000000bc0)=[{{&(0x7f0000000180)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10, 0x0}}], 0x1, 0x20004840) 1.790862944s ago: executing program 5 (id=4088): r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000300), 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)=ANY=[@ANYRES32=0x0, @ANYRES8=r0, @ANYBLOB="03565fd11d4b91243947a709c177f37b9b358f82e7670cd71739da4e96b6ddb4c07133ddad91eefb5d", @ANYRESOCT=r1, @ANYRES8=r1], 0x50) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x101040, 0x0) sync_file_range(r3, 0x1, 0x4, 0x4) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4004550c, 0x0) 1.515479701s ago: executing program 5 (id=4089): pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff097b00000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="b0"], 0xb0) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c500000001f0ff"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) open$dir(&(0x7f0000000140)='./file0\x00', 0x500, 0x40) 1.514956031s ago: executing program 4 (id=4090): pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff097b00000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00"/13], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000340)='kmem_cache_free\x00', r4}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="b0"], 0xb0) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) open$dir(&(0x7f0000000140)='./file0\x00', 0x500, 0x40) 1.483774365s ago: executing program 5 (id=4091): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2c}}, 0x10) connect$inet(r1, &(0x7f0000000280)={0x2, 0x4, @multicast1}, 0x10) sendmmsg$inet(r1, &(0x7f0000004540)=[{{&(0x7f0000000040)={0x2, 0x4e22, @multicast1}, 0xb87, 0x0}, 0xee0000b0}, {{0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f0000001100)="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", 0xc3}, {&(0x7f0000000d80)="7d68e6de85f9b0cbc9d710267f321ec64eab043ecad9af7e01e9463218ec45924a99867163e468d36a682fadd749caa325e685d75559a87139e02fae7271be8f55671cfd32a09896278d1941370174720838039d0989bc3394b8a4c4f4a30f0496be313d6d60fe47966c634a3ee1f659e8ef310647725bda0130d5de5028220a4cf5fc808a75694738ee26cb21302b4bba4265b845a5d5dce706d9820c6936b122f9658446d74a9016b94424971dd443a6907eb5c73b6b200e92b23f2c36a214729b0bc231511e4c", 0xc8}, {&(0x7f0000000380)="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", 0x9fd}], 0x3}}, {{0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000001700)="a6", 0x1}], 0x300}}], 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) ptrace$peek(0xffffffffffffffff, r2, &(0x7f0000000180)) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) socket$nl_route(0x10, 0x3, 0x0) timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r7, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) setreuid(0x0, 0xee00) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) 1.480816905s ago: executing program 4 (id=4092): r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x1) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/icmp\x00') read$FUSE(r3, &(0x7f0000002840)={0x2020}, 0x2020) pread64(r3, &(0x7f000001a240)=""/102400, 0x19000, 0x100008) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r2}, 0x10) r4 = socket(0x10, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) syz_usb_connect(0x5, 0x164, &(0x7f0000000000)=ANY=[@ANYBLOB="120100007af28810d30bf4055b000000000109025201010000000009044000000e0100008c2406bb98971edc8199d0b55e0d487d476f1a4c94d1206f62ed668d9615e79c1604c3b0b70966268f2d199e32129178c8072df7e551a8d5f3cffd243e0455969fc42ccd91dc7c858a42261cd74ef8fcec94f51a9492664d755dcfea1154d8410ab077a5be47f12bfffbf75b35a919cf65376ebfab", @ANYBLOB="c9df766ea4d7370fb649014b12a9963a8159038c0f75396a"], 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x40, 0x6, 0x4, 0xfe, 0x0, 0xfebb, 0x0}) 1.388424734s ago: executing program 1 (id=4093): r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x1) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/icmp\x00') read$FUSE(r3, &(0x7f0000002840)={0x2020}, 0x2020) pread64(r3, &(0x7f000001a240)=""/102400, 0x19000, 0x100008) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r2}, 0x10) r4 = socket(0x10, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) syz_usb_connect(0x5, 0x164, &(0x7f0000000000)=ANY=[@ANYBLOB="120100007af28810d30bf4055b000000000109025201010000000009044000000e0100008c2406bb98971edc8199d0b55e0d487d476f1a4c94d1206f62ed668d9615e79c1604c3b0b70966268f2d199e32129178c8072df7e551a8d5f3cffd243e0455969fc42ccd91dc7c858a42261cd74ef8fcec94f51a9492664d755dcfea1154d8410ab077a5be47f12bfffbf75b35a919cf65376ebfab", @ANYBLOB="c9df766ea4d7370fb649014b12a9963a8159038c0f75396a"], 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x40, 0x6, 0x4, 0xfe, 0x0, 0xfebb, 0x0}) 1.21857582s ago: executing program 3 (id=4094): socket$inet(0x2, 0x3, 0x6) socket$nl_route(0x10, 0x3, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x8) (async) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e22}, 0x6e) (async) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e22}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) creat(&(0x7f00000000c0)='./bus\x00', 0x182) (async) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x182) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x181242, 0x148) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0xc, r3, 0x0, 0x0, 0x0, 0xfffffffffdffffff}) getsockopt$TIPC_NODE_RECVQ_DEPTH(r4, 0x10f, 0x83, &(0x7f0000000000), &(0x7f0000000040)=0x4) (async) getsockopt$TIPC_NODE_RECVQ_DEPTH(r4, 0x10f, 0x83, &(0x7f0000000000), &(0x7f0000000040)=0x4) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) (async) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) r5 = syz_usb_connect(0x0, 0x36, &(0x7f0000000080)={{0x12, 0x1, 0x141, 0x48, 0x13, 0x44, 0x20, 0x424, 0x7500, 0x69ee, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x10, 0x0, [{{0x9, 0x4, 0xb8, 0x7, 0x2, 0x96, 0xd1, 0xca, 0x0, [], [{{0x9, 0x5, 0x6, 0x2, 0x200, 0xd, 0x0, 0x6}}, {{0x9, 0x5, 0x82, 0x2, 0x200, 0x0, 0x1, 0x10}}]}}]}}]}}, 0x0) syz_usb_control_io$uac1(r5, 0x0, 0x0) syz_usb_control_io(r5, 0x0, &(0x7f0000000900)={0x84, &(0x7f00000003c0)=ANY=[@ANYBLOB="0017042a0000abe763a8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ecm(r5, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r5, 0x0, &(0x7f0000000740)={0x44, &(0x7f0000000180)=ANY=[@ANYBLOB="601004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) syz_usb_control_io$cdc_ncm(r5, 0x0, &(0x7f0000000740)={0x44, &(0x7f0000000180)=ANY=[@ANYBLOB="601004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000010240)=r6, 0x5a) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[], &(0x7f0000001b80)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$inet6(0x10, 0x3, 0x0) (async) r8 = socket$inet6(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000380)='neigh_update\x00', r7}, 0x18) sendto$inet6(r8, &(0x7f0000000180)="900000001c001f4d154a817393278bff0a80a578020000000404840014000100ac1414bb0542d6401051a2d708f3fac8da1a297e0099c5ac0000c5b068d0bf46d3234565a0016466fcb78dcaaf6c3efed495a46215be0000766436c0c80cefd28581d158ba86c9d2896c6d3bca2d0000000b0015009e49a6560641263da4de1df32c1739d7fbee9aa241731ae9e0b390", 0x90, 0x20000000, 0x0, 0x0) 356.459275ms ago: executing program 3 (id=4095): bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0], 0x0, 0x0, 0x0, 0x0, 0x100, 0x2, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x275a, 0x0) fcntl$lock(r1, 0x24, &(0x7f0000000000)={0x1, 0x1, 0x2000008, 0xfffffffffffffffd}) 351.147665ms ago: executing program 2 (id=4096): prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r3}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) pipe(&(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_CHECKPOINT(r5, 0x4004662b, &(0x7f0000000180)=0x4) r6 = socket$inet(0x2, 0x1, 0x0) sendmmsg$inet(r6, &(0x7f0000000bc0)=[{{&(0x7f0000000180)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10, 0x0}}], 0x1, 0x20004840) (fail_nth: 3) 300.86345ms ago: executing program 3 (id=4097): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xc, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r2, 0x0, 0x7, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8, 0x40}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r3, 0x0, 0x0}, 0x20) 255.510665ms ago: executing program 5 (id=4098): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0xb8) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000940)=ANY=[@ANYBLOB="020000000000000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000002000000e00000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000064010102000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x310) r1 = syz_open_procfs(0x0, &(0x7f0000002180)='net/mcfilter\x00') preadv(r1, &(0x7f0000000300)=[{&(0x7f0000000000)=""/55, 0x37}], 0x1, 0xde, 0x20004) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="2000000010003b1500"/20, @ANYRES32=0x0], 0x20}}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='sched_switch\x00', r2}, 0x18) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x20800, 0x0) ioctl$RTC_UIE_ON(r3, 0x7003) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f00000000c0)={0x7, 0x21, 0x0, 0x17, 0x4, 0xc0, 0x5, 0x14c, 0x1}) 43.425145ms ago: executing program 5 (id=4099): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xc, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8, 0x40}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r4, 0x0, 0x0}, 0x20) 0s ago: executing program 1 (id=4100): r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000300), 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)=ANY=[@ANYRES32=0x0, @ANYRES8=r0, @ANYBLOB="03565fd11d4b91243947a709c177f37b9b358f82e7670cd71739da4e96b6ddb4c07133ddad91eefb5d", @ANYRESOCT=r1, @ANYRES8=r1], 0x50) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) open(&(0x7f0000000040)='./file0\x00', 0x101040, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x400000001fc, 0x301) ioctl$USBDEVFS_REAPURB(r3, 0x4004550c, 0x0) kernel console output (not intermixed with test programs): 7 compat=0 ip=0x7f83b84a7810 code=0x7ffc0000 [ 1066.528807][ T30] audit: type=1326 audit(1760811317.239:1961): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11635 comm="syz.3.3453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=308 compat=0 ip=0x7f83b84aa7f7 code=0x7ffc0000 [ 1066.555947][ T30] audit: type=1326 audit(1760811317.239:1962): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11635 comm="syz.3.3453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1069.534148][T11714] netlink: 624 bytes leftover after parsing attributes in process `syz.1.3477'. [ 1070.837759][T11715] incfs: Error accessing: ./bus. [ 1070.843318][T11715] incfs: mount failed -20 [ 1070.886147][T11747] FAULT_INJECTION: forcing a failure. [ 1070.886147][T11747] name failslab, interval 1, probability 0, space 0, times 0 [ 1070.899329][T11747] CPU: 1 PID: 11747 Comm: syz.4.3488 Not tainted syzkaller #0 [ 1070.906818][T11747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1070.916902][T11747] Call Trace: [ 1070.920295][T11747] [ 1070.923245][T11747] __dump_stack+0x21/0x30 [ 1070.928035][T11747] dump_stack_lvl+0xee/0x150 [ 1070.932817][T11747] ? show_regs_print_info+0x20/0x20 [ 1070.938135][T11747] ? avc_has_perm+0x158/0x240 [ 1070.944853][T11747] ? security_file_permission+0x79/0xa0 [ 1070.950643][T11747] dump_stack+0x15/0x20 [ 1070.954829][T11747] should_fail+0x3c1/0x510 [ 1070.959279][T11747] __should_failslab+0xa4/0xe0 [ 1070.964340][T11747] should_failslab+0x9/0x20 [ 1070.968900][T11747] slab_pre_alloc_hook+0x3b/0xe0 [ 1070.974050][T11747] ? sock_alloc_inode+0x1b/0xb0 [ 1070.979258][T11747] kmem_cache_alloc+0x44/0x260 [ 1070.984295][T11747] ? sockfs_init_fs_context+0xb0/0xb0 [ 1070.989703][T11747] sock_alloc_inode+0x1b/0xb0 [ 1070.994510][T11747] ? sockfs_init_fs_context+0xb0/0xb0 [ 1071.000102][T11747] new_inode_pseudo+0x62/0x210 [ 1071.004998][T11747] __sock_create+0x12c/0x7a0 [ 1071.009688][T11747] __sys_socketpair+0x1a1/0x590 [ 1071.014676][T11747] __x64_sys_socketpair+0x9b/0xb0 [ 1071.019933][T11747] x64_sys_call+0x36/0x9a0 [ 1071.024552][T11747] do_syscall_64+0x4c/0xa0 [ 1071.029004][T11747] ? clear_bhb_loop+0x50/0xa0 [ 1071.033804][T11747] ? clear_bhb_loop+0x50/0xa0 [ 1071.039312][T11747] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1071.045412][T11747] RIP: 0033:0x7fa85ff75fc9 [ 1071.049846][T11747] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1071.069993][T11747] RSP: 002b:00007fa85e9bd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 1071.078606][T11747] RAX: ffffffffffffffda RBX: 00007fa8601cd090 RCX: 00007fa85ff75fc9 [ 1071.086591][T11747] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000018 [ 1071.094655][T11747] RBP: 00007fa85e9bd090 R08: 0000000000000000 R09: 0000000000000000 [ 1071.102635][T11747] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1071.110636][T11747] R13: 00007fa8601cd128 R14: 00007fa8601cd090 R15: 00007ffdb1861468 [ 1071.118652][T11747] [ 1071.121945][T11747] socket: no more sockets [ 1072.015800][T11776] FAULT_INJECTION: forcing a failure. [ 1072.015800][T11776] name failslab, interval 1, probability 0, space 0, times 0 [ 1072.106067][T11776] CPU: 1 PID: 11776 Comm: syz.3.3493 Not tainted syzkaller #0 [ 1072.113942][T11776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1072.125079][T11776] Call Trace: [ 1072.128502][T11776] [ 1072.131561][T11776] __dump_stack+0x21/0x30 [ 1072.136016][T11776] dump_stack_lvl+0xee/0x150 [ 1072.140655][T11776] ? show_regs_print_info+0x20/0x20 [ 1072.146089][T11776] ? file_end_write+0x1b0/0x1b0 [ 1072.151297][T11776] dump_stack+0x15/0x20 [ 1072.155749][T11776] should_fail+0x3c1/0x510 [ 1072.160931][T11776] __should_failslab+0xa4/0xe0 [ 1072.165984][T11776] should_failslab+0x9/0x20 [ 1072.170683][T11776] slab_pre_alloc_hook+0x3b/0xe0 [ 1072.175753][T11776] ? getname_flags+0xb9/0x500 [ 1072.180649][T11776] kmem_cache_alloc+0x44/0x260 [ 1072.185609][T11776] getname_flags+0xb9/0x500 [ 1072.190416][T11776] __x64_sys_renameat2+0xb4/0xf0 [ 1072.195471][T11776] x64_sys_call+0x258/0x9a0 [ 1072.200091][T11776] do_syscall_64+0x4c/0xa0 [ 1072.204675][T11776] ? clear_bhb_loop+0x50/0xa0 [ 1072.209545][T11776] ? clear_bhb_loop+0x50/0xa0 [ 1072.214248][T11776] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1072.220273][T11776] RIP: 0033:0x7f83b84a8fc9 [ 1072.224986][T11776] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1072.245762][T11776] RSP: 002b:00007f83b6ecf038 EFLAGS: 00000246 ORIG_RAX: 000000000000013c [ 1072.254834][T11776] RAX: ffffffffffffffda RBX: 00007f83b8700180 RCX: 00007f83b84a8fc9 [ 1072.262853][T11776] RDX: ffffffffffffff9c RSI: 0000200000000440 RDI: ffffffffffffff9c [ 1072.270933][T11776] RBP: 00007f83b6ecf090 R08: 0000000000000000 R09: 0000000000000000 [ 1072.279299][T11776] R10: 0000200000000140 R11: 0000000000000246 R12: 0000000000000001 [ 1072.287825][T11776] R13: 00007f83b8700218 R14: 00007f83b8700180 R15: 00007ffcf75915c8 [ 1072.296124][T11776] [ 1072.438946][T11778] fuse: Unknown parameter 'grup_id' [ 1072.936526][T11779] overlayfs: './file0' not a directory [ 1073.024295][T11782] netlink: 32 bytes leftover after parsing attributes in process `syz.1.3497'. [ 1073.251397][T11790] FAULT_INJECTION: forcing a failure. [ 1073.251397][T11790] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1073.285399][T11790] CPU: 0 PID: 11790 Comm: syz.3.3501 Not tainted syzkaller #0 [ 1073.293435][T11790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1073.294120][T11799] overlayfs: failed to clone upperpath [ 1073.304038][T11790] Call Trace: [ 1073.304053][T11790] [ 1073.304061][T11790] __dump_stack+0x21/0x30 [ 1073.304088][T11790] dump_stack_lvl+0xee/0x150 [ 1073.304109][T11790] ? show_regs_print_info+0x20/0x20 [ 1073.330747][T11790] dump_stack+0x15/0x20 [ 1073.335085][T11790] should_fail+0x3c1/0x510 [ 1073.339618][T11790] should_fail_usercopy+0x1a/0x20 [ 1073.344770][T11790] _copy_to_user+0x20/0x90 [ 1073.349231][T11790] simple_read_from_buffer+0xe9/0x160 [ 1073.354648][T11790] proc_fail_nth_read+0x19a/0x210 [ 1073.359808][T11790] ? proc_fault_inject_write+0x2f0/0x2f0 [ 1073.365716][T11790] ? security_file_permission+0x83/0xa0 [ 1073.371447][T11790] ? proc_fault_inject_write+0x2f0/0x2f0 [ 1073.377216][T11790] vfs_read+0x282/0xbe0 [ 1073.381667][T11790] ? kernel_read+0x1f0/0x1f0 [ 1073.386396][T11790] ? __kasan_check_write+0x14/0x20 [ 1073.391649][T11790] ? mutex_lock+0x95/0x1a0 [ 1073.396247][T11790] ? wait_for_completion_killable_timeout+0x10/0x10 [ 1073.402896][T11790] ? __fget_files+0x2c4/0x320 [ 1073.407891][T11790] ? __fdget_pos+0x2d2/0x380 [ 1073.412861][T11790] ? ksys_read+0x71/0x240 [ 1073.417403][T11790] ksys_read+0x140/0x240 [ 1073.422350][T11790] ? vfs_write+0xf70/0xf70 [ 1073.426982][T11790] ? debug_smp_processor_id+0x17/0x20 [ 1073.432459][T11790] __x64_sys_read+0x7b/0x90 [ 1073.437008][T11790] x64_sys_call+0x96d/0x9a0 [ 1073.441807][T11790] do_syscall_64+0x4c/0xa0 [ 1073.446723][T11790] ? clear_bhb_loop+0x50/0xa0 [ 1073.451505][T11790] ? clear_bhb_loop+0x50/0xa0 [ 1073.456247][T11790] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1073.462176][T11790] RIP: 0033:0x7f83b84a79dc [ 1073.466884][T11790] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1073.486687][T11790] RSP: 002b:00007f83b6f11030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1073.495543][T11790] RAX: ffffffffffffffda RBX: 00007f83b86fffa0 RCX: 00007f83b84a79dc [ 1073.503955][T11790] RDX: 000000000000000f RSI: 00007f83b6f110a0 RDI: 0000000000000006 [ 1073.512095][T11790] RBP: 00007f83b6f11090 R08: 0000000000000000 R09: 0000000000000000 [ 1073.520091][T11790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1073.528533][T11790] R13: 00007f83b8700038 R14: 00007f83b86fffa0 R15: 00007ffcf75915c8 [ 1073.536962][T11790] [ 1073.583418][ T30] kauditd_printk_skb: 29 callbacks suppressed [ 1073.583435][ T30] audit: type=1400 audit(1760811324.449:1992): avc: denied { create } for pid=11803 comm="syz.2.3505" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1073.777210][T11810] FAULT_INJECTION: forcing a failure. [ 1073.777210][T11810] name failslab, interval 1, probability 0, space 0, times 0 [ 1073.790568][T11810] CPU: 1 PID: 11810 Comm: syz.2.3505 Not tainted syzkaller #0 [ 1073.798300][T11810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1073.808748][T11810] Call Trace: [ 1073.812143][T11810] [ 1073.815204][T11810] __dump_stack+0x21/0x30 [ 1073.819733][T11810] dump_stack_lvl+0xee/0x150 [ 1073.824350][T11810] ? show_regs_print_info+0x20/0x20 [ 1073.829756][T11810] ? __schedule+0xb76/0x14c0 [ 1073.834466][T11810] dump_stack+0x15/0x20 [ 1073.839196][T11810] should_fail+0x3c1/0x510 [ 1073.844262][T11810] __should_failslab+0xa4/0xe0 [ 1073.849408][T11810] should_failslab+0x9/0x20 [ 1073.854375][T11810] slab_pre_alloc_hook+0x3b/0xe0 [ 1073.859672][T11810] __kmalloc+0x6d/0x2c0 [ 1073.864088][T11810] ? kvmalloc_node+0x206/0x300 [ 1073.868995][T11810] kvmalloc_node+0x206/0x300 [ 1073.874050][T11810] ? asm_sysvec_reschedule_ipi+0x1b/0x20 [ 1073.880267][T11810] ? vm_mmap+0xb0/0xb0 [ 1073.884766][T11810] traverse+0xd6/0x510 [ 1073.889335][T11810] ? mutex_lock+0x95/0x1a0 [ 1073.894131][T11810] ? __schedule+0xb76/0x14c0 [ 1073.899278][T11810] seq_read_iter+0xc57/0xd30 [ 1073.903986][T11810] ? preempt_schedule_irq+0xbb/0x110 [ 1073.909607][T11810] ? memset+0x35/0x40 [ 1073.913716][T11810] seq_read+0x3cc/0x4d0 [ 1073.918957][T11810] ? seq_open+0x130/0x130 [ 1073.923900][T11810] ? avc_policy_seqno+0x1b/0x70 [ 1073.929518][T11810] ? __kasan_check_read+0x11/0x20 [ 1073.935044][T11810] ? seq_open+0x130/0x130 [ 1073.939604][T11810] proc_reg_read+0x1c4/0x2b0 [ 1073.944986][T11810] ? proc_reg_get_unmapped_area+0x390/0x390 [ 1073.951533][T11810] vfs_read+0x282/0xbe0 [ 1073.955984][T11810] ? kernel_read+0x1f0/0x1f0 [ 1073.961468][T11810] ? finish_task_switch+0x16b/0x780 [ 1073.966795][T11810] ? __switch_to_asm+0x3a/0x60 [ 1073.971618][T11810] ? __fget_files+0x2c4/0x320 [ 1073.976498][T11810] ? __fdget+0x1a1/0x230 [ 1073.981125][T11810] ? __x64_sys_pread64+0xec/0x220 [ 1073.986208][T11810] __x64_sys_pread64+0x191/0x220 [ 1073.991434][T11810] ? ksys_pread64+0x1b0/0x1b0 [ 1073.996418][T11810] ? __kasan_check_write+0x14/0x20 [ 1074.002011][T11810] ? switch_fpu_return+0x15d/0x2c0 [ 1074.007609][T11810] x64_sys_call+0x3a1/0x9a0 [ 1074.012287][T11810] do_syscall_64+0x4c/0xa0 [ 1074.016823][T11810] ? clear_bhb_loop+0x50/0xa0 [ 1074.021901][T11810] ? clear_bhb_loop+0x50/0xa0 [ 1074.026690][T11810] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1074.033090][T11810] RIP: 0033:0x7f7e9f6c8fc9 [ 1074.038218][T11810] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1074.060365][T11810] RSP: 002b:00007f7e9e0ef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 1074.069721][T11810] RAX: ffffffffffffffda RBX: 00007f7e9f920180 RCX: 00007f7e9f6c8fc9 [ 1074.078111][T11810] RDX: 000000000000003b RSI: 0000200000000c00 RDI: 0000000000000008 [ 1074.086586][T11810] RBP: 00007f7e9e0ef090 R08: 0000000000000000 R09: 0000000000000000 [ 1074.095041][T11810] R10: 0000000000000545 R11: 0000000000000246 R12: 0000000000000001 [ 1074.103233][T11810] R13: 00007f7e9f920218 R14: 00007f7e9f920180 R15: 00007ffd536344f8 [ 1074.111952][T11810] [ 1074.211233][T11816] netlink: 32 bytes leftover after parsing attributes in process `syz.1.3510'. [ 1074.794697][T11817] netlink: 76 bytes leftover after parsing attributes in process `syz.5.3509'. [ 1074.897989][T11817] netlink: 18 bytes leftover after parsing attributes in process `syz.5.3509'. [ 1074.907199][T11817] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1076.995134][T11856] overlayfs: failed to clone upperpath [ 1077.074686][T11859] netlink: 32 bytes leftover after parsing attributes in process `syz.2.3522'. [ 1078.734173][ T30] audit: type=1326 audit(1760811328.889:1993): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11872 comm="syz.4.3526" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa85ff75fc9 code=0x7ffc0000 [ 1078.871611][ T30] audit: type=1326 audit(1760811328.889:1994): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11872 comm="syz.4.3526" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa85ff75fc9 code=0x7ffc0000 [ 1078.905990][ T30] audit: type=1326 audit(1760811328.909:1995): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11872 comm="syz.4.3526" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fa85ff74810 code=0x7ffc0000 [ 1079.612421][ T30] audit: type=1326 audit(1760811328.919:1996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11872 comm="syz.4.3526" exe="/root/syz-executor" sig=0 arch=c000003e syscall=308 compat=0 ip=0x7fa85ff777f7 code=0x7ffc0000 [ 1079.688245][ T30] audit: type=1326 audit(1760811328.919:1997): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11872 comm="syz.4.3526" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fa85ff75fc9 code=0x7ffc0000 [ 1081.036406][ T30] audit: type=1326 audit(1760811328.929:1998): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11872 comm="syz.4.3526" exe="/root/syz-executor" sig=0 arch=c000003e syscall=308 compat=0 ip=0x7fa85ff777f7 code=0x7ffc0000 [ 1081.061238][ T30] audit: type=1326 audit(1760811328.929:1999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11872 comm="syz.4.3526" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7fa85ff74c2a code=0x7ffc0000 [ 1081.235780][ T30] audit: type=1326 audit(1760811328.929:2000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11872 comm="syz.4.3526" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa85ff75fc9 code=0x7ffc0000 [ 1081.271994][ T30] audit: type=1326 audit(1760811328.929:2001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11872 comm="syz.4.3526" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa85ff75fc9 code=0x7ffc0000 [ 1081.378733][ T30] audit: type=1326 audit(1760811328.999:2002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11872 comm="syz.4.3526" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fa85ff74810 code=0x7ffc0000 [ 1081.576182][T11896] 9pnet: p9_errstr2errno: server reported unknown error 1844674 [ 1082.560107][T11910] FAULT_INJECTION: forcing a failure. [ 1082.560107][T11910] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1082.625493][T11910] CPU: 1 PID: 11910 Comm: syz.4.3537 Not tainted syzkaller #0 [ 1082.633557][T11910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1082.644537][T11910] Call Trace: [ 1082.648126][T11910] [ 1082.651178][T11910] __dump_stack+0x21/0x30 [ 1082.655807][T11910] dump_stack_lvl+0xee/0x150 [ 1082.660637][T11910] ? show_regs_print_info+0x20/0x20 [ 1082.665910][T11910] ? avc_has_perm+0x158/0x240 [ 1082.671060][T11910] dump_stack+0x15/0x20 [ 1082.675839][T11910] should_fail+0x3c1/0x510 [ 1082.680564][T11910] should_fail_alloc_page+0x55/0x80 [ 1082.686184][T11910] prepare_alloc_pages+0x156/0x600 [ 1082.691353][T11910] ? __alloc_pages_bulk+0xab0/0xab0 [ 1082.696578][T11910] ? 0xffffffffa0028cd0 [ 1082.700910][T11910] ? is_bpf_text_address+0x177/0x190 [ 1082.706363][T11910] __alloc_pages+0x10a/0x440 [ 1082.711376][T11910] ? prep_new_page+0x110/0x110 [ 1082.716374][T11910] skb_page_frag_refill+0x202/0x3a0 [ 1082.721696][T11910] tun_get_user+0x785/0x33c0 [ 1082.726571][T11910] ? __kasan_poison_slab+0x40/0x70 [ 1082.731927][T11910] ? __kasan_check_write+0x14/0x20 [ 1082.737194][T11910] ? tun_do_read+0x1c40/0x1c40 [ 1082.742092][T11910] ? kstrtouint_from_user+0x1a0/0x200 [ 1082.748112][T11910] ? kstrtol_from_user+0x260/0x260 [ 1082.753272][T11910] ? putname+0x111/0x160 [ 1082.757641][T11910] ? avc_policy_seqno+0x1b/0x70 [ 1082.762707][T11910] ? selinux_file_permission+0x2aa/0x510 [ 1082.768642][T11910] tun_chr_write_iter+0x1eb/0x2e0 [ 1082.774176][T11910] vfs_write+0x802/0xf70 [ 1082.778920][T11910] ? file_end_write+0x1b0/0x1b0 [ 1082.783953][T11910] ? __fget_files+0x2c4/0x320 [ 1082.788972][T11910] ? __fdget_pos+0x1f7/0x380 [ 1082.793769][T11910] ? ksys_write+0x71/0x240 [ 1082.798396][T11910] ksys_write+0x140/0x240 [ 1082.803021][T11910] ? __ia32_sys_read+0x90/0x90 [ 1082.808081][T11910] ? debug_smp_processor_id+0x17/0x20 [ 1082.814117][T11910] __x64_sys_write+0x7b/0x90 [ 1082.818947][T11910] x64_sys_call+0x8ef/0x9a0 [ 1082.824602][T11910] do_syscall_64+0x4c/0xa0 [ 1082.829521][T11910] ? clear_bhb_loop+0x50/0xa0 [ 1082.834685][T11910] ? clear_bhb_loop+0x50/0xa0 [ 1082.839801][T11910] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1082.846276][T11910] RIP: 0033:0x7fa85ff74a7f [ 1082.850986][T11910] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 1082.871365][T11910] RSP: 002b:00007fa85e9de000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1082.879993][T11910] RAX: ffffffffffffffda RBX: 00007fa8601ccfa0 RCX: 00007fa85ff74a7f [ 1082.888078][T11910] RDX: 000000000000004a RSI: 0000200000000340 RDI: 00000000000000c8 [ 1082.896347][T11910] RBP: 00007fa85e9de090 R08: 0000000000000000 R09: 0000000000000000 [ 1082.904522][T11910] R10: 000000000000004a R11: 0000000000000293 R12: 0000000000000001 [ 1082.912777][T11910] R13: 00007fa8601cd038 R14: 00007fa8601ccfa0 R15: 00007ffdb1861468 [ 1082.921076][T11910] [ 1084.352320][ T30] kauditd_printk_skb: 24 callbacks suppressed [ 1084.352384][ T30] audit: type=1326 audit(1760811335.159:2027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11927 comm="syz.4.3542" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa85ff75fc9 code=0x7ffc0000 [ 1084.582195][ T30] audit: type=1326 audit(1760811335.159:2028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11927 comm="syz.4.3542" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa85ff75fc9 code=0x7ffc0000 [ 1084.617975][ T30] audit: type=1326 audit(1760811335.169:2029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11927 comm="syz.4.3542" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fa85ff74810 code=0x7ffc0000 [ 1084.659527][ T30] audit: type=1326 audit(1760811335.169:2030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11927 comm="syz.4.3542" exe="/root/syz-executor" sig=0 arch=c000003e syscall=308 compat=0 ip=0x7fa85ff777f7 code=0x7ffc0000 [ 1084.683934][ T30] audit: type=1326 audit(1760811335.169:2031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11927 comm="syz.4.3542" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fa85ff75fc9 code=0x7ffc0000 [ 1084.708572][ T30] audit: type=1326 audit(1760811335.169:2032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11927 comm="syz.4.3542" exe="/root/syz-executor" sig=0 arch=c000003e syscall=308 compat=0 ip=0x7fa85ff777f7 code=0x7ffc0000 [ 1084.826799][ T30] audit: type=1326 audit(1760811335.169:2033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11927 comm="syz.4.3542" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7fa85ff74c2a code=0x7ffc0000 [ 1084.905377][T11923] overlayfs: failed to clone upperpath [ 1084.975450][ T30] audit: type=1326 audit(1760811335.169:2034): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11927 comm="syz.4.3542" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa85ff75fc9 code=0x7ffc0000 [ 1085.087966][ T30] audit: type=1326 audit(1760811335.169:2035): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11927 comm="syz.4.3542" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa85ff75fc9 code=0x7ffc0000 [ 1086.828086][ T30] audit: type=1326 audit(1760811335.179:2036): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11927 comm="syz.4.3542" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fa85ff74810 code=0x7ffc0000 [ 1087.632228][ T615] usb 4-1: new high-speed USB device number 34 using dummy_hcd [ 1088.332794][ T615] usb 4-1: Using ep0 maxpacket: 32 [ 1088.403150][T11986] hub 9-0:1.0: USB hub found [ 1088.408663][T11986] hub 9-0:1.0: 1 port detected [ 1088.483163][ T615] usb 4-1: config 0 has an invalid interface number: 67 but max is 0 [ 1088.523950][ T615] usb 4-1: config 0 has no interface number 0 [ 1088.742869][ T615] usb 4-1: New USB device found, idVendor=0424, idProduct=9901, bcdDevice=c2.57 [ 1088.762790][ T615] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1088.771398][ T615] usb 4-1: Product: syz [ 1088.776273][ T615] usb 4-1: Manufacturer: syz [ 1088.781078][ T615] usb 4-1: SerialNumber: syz [ 1088.802901][ T615] usb 4-1: config 0 descriptor?? [ 1088.853237][ T615] smsc95xx v2.0.0 [ 1089.024800][T11996] netlink: 624 bytes leftover after parsing attributes in process `syz.5.3561'. [ 1089.282776][ T615] smsc95xx 4-1:0.67 (unnamed net_device) (uninitialized): Failed to read reg index 0x00000030: -32 [ 1089.302700][ T615] smsc95xx 4-1:0.67 (unnamed net_device) (uninitialized): Error reading E2P_CMD [ 1089.787405][ T30] kauditd_printk_skb: 92 callbacks suppressed [ 1089.787431][ T30] audit: type=1400 audit(1760811340.649:2129): avc: denied { validate_trans } for pid=11967 comm="syz.3.3555" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1089.797848][T11969] incfs: Can't find or create .index dir in ./file0 [ 1089.850221][T11969] incfs: mount failed -5 [ 1089.910373][ T615] smsc95xx 4-1:0.67 (unnamed net_device) (uninitialized): Failed to read reg index 0x00000014: -71 [ 1089.921732][ T615] smsc95xx: probe of 4-1:0.67 failed with error -71 [ 1089.930517][ T615] usb 4-1: USB disconnect, device number 34 [ 1090.057956][ T30] audit: type=1326 audit(1760811340.889:2130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12015 comm="syz.5.3568" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fce50ee3fc9 code=0x7ffc0000 [ 1090.373140][ T30] audit: type=1326 audit(1760811340.889:2131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12015 comm="syz.5.3568" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fce50ee3fc9 code=0x7ffc0000 [ 1090.398090][ T30] audit: type=1326 audit(1760811340.899:2132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12015 comm="syz.5.3568" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fce50ee2810 code=0x7ffc0000 [ 1090.424003][ T30] audit: type=1326 audit(1760811340.899:2133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12015 comm="syz.5.3568" exe="/root/syz-executor" sig=0 arch=c000003e syscall=308 compat=0 ip=0x7fce50ee57f7 code=0x7ffc0000 [ 1090.482295][ T30] audit: type=1326 audit(1760811340.899:2134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12015 comm="syz.5.3568" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fce50ee3fc9 code=0x7ffc0000 [ 1090.551808][ T30] audit: type=1326 audit(1760811340.899:2135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12015 comm="syz.5.3568" exe="/root/syz-executor" sig=0 arch=c000003e syscall=308 compat=0 ip=0x7fce50ee57f7 code=0x7ffc0000 [ 1091.533860][T12037] netlink: 52 bytes leftover after parsing attributes in process `syz.2.3576'. [ 1091.540417][ T30] audit: type=1326 audit(1760811340.899:2136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12015 comm="syz.5.3568" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7fce50ee2c2a code=0x7ffc0000 [ 1091.688408][ T30] audit: type=1326 audit(1760811340.899:2137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12015 comm="syz.5.3568" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fce50ee3fc9 code=0x7ffc0000 [ 1093.776009][ T30] audit: type=1326 audit(1760811340.899:2138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12015 comm="syz.5.3568" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fce50ee3fc9 code=0x7ffc0000 [ 1093.915879][T12049] netlink: 28 bytes leftover after parsing attributes in process `syz.3.3575'. [ 1095.616315][ T30] kauditd_printk_skb: 59 callbacks suppressed [ 1095.617126][ T30] audit: type=1326 audit(1760811346.479:2198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12064 comm="syz.4.3584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa85ff75fc9 code=0x7ffc0000 [ 1095.650570][ T30] audit: type=1326 audit(1760811346.479:2199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12064 comm="syz.4.3584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa85ff75fc9 code=0x7ffc0000 [ 1095.681399][T12082] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 1095.711705][ T30] audit: type=1326 audit(1760811346.479:2200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12064 comm="syz.4.3584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fa85ff74810 code=0x7ffc0000 [ 1095.763008][ T30] audit: type=1326 audit(1760811346.479:2201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12064 comm="syz.4.3584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=308 compat=0 ip=0x7fa85ff777f7 code=0x7ffc0000 [ 1095.790061][T12081] SELinux: failed to load policy [ 1095.802842][T12084] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12084 comm=syz.1.3588 [ 1095.806413][ T30] audit: type=1326 audit(1760811346.479:2202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12064 comm="syz.4.3584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fa85ff75fc9 code=0x7ffc0000 [ 1095.840629][ T30] audit: type=1326 audit(1760811346.479:2203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12064 comm="syz.4.3584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=308 compat=0 ip=0x7fa85ff777f7 code=0x7ffc0000 [ 1095.870166][ T30] audit: type=1326 audit(1760811346.479:2204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12064 comm="syz.4.3584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7fa85ff74c2a code=0x7ffc0000 [ 1095.900182][ T30] audit: type=1326 audit(1760811346.479:2205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12064 comm="syz.4.3584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa85ff75fc9 code=0x7ffc0000 [ 1096.020705][ T30] audit: type=1326 audit(1760811346.479:2206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12064 comm="syz.4.3584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa85ff75fc9 code=0x7ffc0000 [ 1096.052714][ T30] audit: type=1326 audit(1760811346.509:2207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12064 comm="syz.4.3584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fa85ff74810 code=0x7ffc0000 [ 1096.330874][T12101] netlink: 28 bytes leftover after parsing attributes in process `syz.5.3595'. [ 1097.290224][T12105] netlink: 1276 bytes leftover after parsing attributes in process `syz.3.3596'. [ 1097.374815][T12112] netlink: 624 bytes leftover after parsing attributes in process `syz.1.3597'. [ 1097.862410][T12124] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4624 sclass=netlink_route_socket pid=12124 comm=syz.2.3601 [ 1097.961423][T12125] FAULT_INJECTION: forcing a failure. [ 1097.961423][T12125] name failslab, interval 1, probability 0, space 0, times 0 [ 1098.056750][T12125] CPU: 1 PID: 12125 Comm: syz.2.3601 Not tainted syzkaller #0 [ 1098.064318][T12125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1098.074393][T12125] Call Trace: [ 1098.077781][T12125] [ 1098.080820][T12125] __dump_stack+0x21/0x30 [ 1098.085180][T12125] dump_stack_lvl+0xee/0x150 [ 1098.089885][T12125] ? show_regs_print_info+0x20/0x20 [ 1098.095104][T12125] dump_stack+0x15/0x20 [ 1098.099362][T12125] should_fail+0x3c1/0x510 [ 1098.104099][T12125] ? netlink_sendmsg+0x602/0xb70 [ 1098.109176][T12125] __should_failslab+0xa4/0xe0 [ 1098.114144][T12125] should_failslab+0x9/0x20 [ 1098.118765][T12125] slab_pre_alloc_hook+0x3b/0xe0 [ 1098.123894][T12125] ? netlink_sendmsg+0x602/0xb70 [ 1098.128938][T12125] ? netlink_sendmsg+0x602/0xb70 [ 1098.133894][T12125] __kmalloc_track_caller+0x6c/0x2c0 [ 1098.139292][T12125] ? netlink_sendmsg+0x602/0xb70 [ 1098.144249][T12125] ? netlink_sendmsg+0x602/0xb70 [ 1098.149499][T12125] __alloc_skb+0x21a/0x740 [ 1098.154191][T12125] netlink_sendmsg+0x602/0xb70 [ 1098.159352][T12125] ? netlink_getsockopt+0x530/0x530 [ 1098.164581][T12125] ? preempt_schedule_irq+0xbb/0x110 [ 1098.169997][T12125] ? security_socket_sendmsg+0x82/0xa0 [ 1098.175663][T12125] ? netlink_getsockopt+0x530/0x530 [ 1098.181077][T12125] ____sys_sendmsg+0x5a2/0x8c0 [ 1098.185956][T12125] ? __sys_sendmsg_sock+0x40/0x40 [ 1098.191091][T12125] ? import_iovec+0x7c/0xb0 [ 1098.195619][T12125] ___sys_sendmsg+0x1f0/0x260 [ 1098.200494][T12125] ? __sys_sendmsg+0x250/0x250 [ 1098.205293][T12125] ? __fdget+0x1a1/0x230 [ 1098.209789][T12125] __x64_sys_sendmsg+0x1e2/0x2a0 [ 1098.214840][T12125] ? ___sys_sendmsg+0x260/0x260 [ 1098.219794][T12125] ? ksys_write+0x1eb/0x240 [ 1098.224405][T12125] ? __kasan_check_write+0x14/0x20 [ 1098.229635][T12125] ? switch_fpu_return+0x15d/0x2c0 [ 1098.234955][T12125] x64_sys_call+0x4b/0x9a0 [ 1098.239411][T12125] do_syscall_64+0x4c/0xa0 [ 1098.243852][T12125] ? clear_bhb_loop+0x50/0xa0 [ 1098.248801][T12125] ? clear_bhb_loop+0x50/0xa0 [ 1098.253665][T12125] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1098.259818][T12125] RIP: 0033:0x7f7e9f6c8fc9 [ 1098.264446][T12125] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1098.284208][T12125] RSP: 002b:00007f7e9e110038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1098.292650][T12125] RAX: ffffffffffffffda RBX: 00007f7e9f920090 RCX: 00007f7e9f6c8fc9 [ 1098.300647][T12125] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 000000000000000a [ 1098.308908][T12125] RBP: 00007f7e9e110090 R08: 0000000000000000 R09: 0000000000000000 [ 1098.317094][T12125] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1098.325173][T12125] R13: 00007f7e9f920128 R14: 00007f7e9f920090 R15: 00007ffd536344f8 [ 1098.333234][T12125] [ 1099.164775][T12159] netlink: 624 bytes leftover after parsing attributes in process `syz.5.3610'. [ 1101.351480][ T30] kauditd_printk_skb: 31 callbacks suppressed [ 1101.351496][ T30] audit: type=1326 audit(1760811352.209:2239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12173 comm="syz.1.3614" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ed860dfc9 code=0x7ffc0000 [ 1101.836326][ T30] audit: type=1326 audit(1760811352.589:2240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12173 comm="syz.1.3614" exe="/root/syz-executor" sig=0 arch=c000003e syscall=188 compat=0 ip=0x7f8ed860dfc9 code=0x7ffc0000 [ 1101.862187][ T30] audit: type=1326 audit(1760811352.589:2241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12173 comm="syz.1.3614" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ed860dfc9 code=0x7ffc0000 [ 1101.889146][ T30] audit: type=1326 audit(1760811352.589:2242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12173 comm="syz.1.3614" exe="/root/syz-executor" sig=0 arch=c000003e syscall=191 compat=0 ip=0x7f8ed860dfc9 code=0x7ffc0000 [ 1101.913766][T12184] FAULT_INJECTION: forcing a failure. [ 1101.913766][T12184] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1101.937534][T12184] CPU: 0 PID: 12184 Comm: syz.2.3617 Not tainted syzkaller #0 [ 1101.945083][T12184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1101.955543][T12184] Call Trace: [ 1101.959119][T12184] [ 1101.962061][T12184] __dump_stack+0x21/0x30 [ 1101.966580][T12184] dump_stack_lvl+0xee/0x150 [ 1101.971175][T12184] ? show_regs_print_info+0x20/0x20 [ 1101.976594][T12184] dump_stack+0x15/0x20 [ 1101.980755][T12184] should_fail+0x3c1/0x510 [ 1101.985366][T12184] should_fail_usercopy+0x1a/0x20 [ 1101.990568][T12184] _copy_from_user+0x20/0xd0 [ 1101.995164][T12184] __se_sys_mount+0x176/0x380 [ 1101.999851][T12184] ? __x64_sys_mount+0xd0/0xd0 [ 1102.004619][T12184] ? __ia32_sys_read+0x90/0x90 [ 1102.009390][T12184] __x64_sys_mount+0xbf/0xd0 [ 1102.014264][T12184] x64_sys_call+0x6bf/0x9a0 [ 1102.018958][T12184] do_syscall_64+0x4c/0xa0 [ 1102.024449][T12184] ? clear_bhb_loop+0x50/0xa0 [ 1102.029233][T12184] ? clear_bhb_loop+0x50/0xa0 [ 1102.034109][T12184] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1102.040366][T12184] RIP: 0033:0x7f7e9f6c8fc9 [ 1102.044900][T12184] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1102.065482][T12184] RSP: 002b:00007f7e9e131038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1102.074163][T12184] RAX: ffffffffffffffda RBX: 00007f7e9f91ffa0 RCX: 00007f7e9f6c8fc9 [ 1102.082145][T12184] RDX: 0000200000000b80 RSI: 0000200000000040 RDI: 0000000000000000 [ 1102.090127][T12184] RBP: 00007f7e9e131090 R08: 0000200000000580 R09: 0000000000000000 [ 1102.098272][T12184] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1102.106429][T12184] R13: 00007f7e9f920038 R14: 00007f7e9f91ffa0 R15: 00007ffd536344f8 [ 1102.115095][T12184] [ 1102.124055][ T30] audit: type=1326 audit(1760811352.589:2243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12173 comm="syz.1.3614" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ed860dfc9 code=0x7ffc0000 [ 1102.157452][ T30] audit: type=1326 audit(1760811352.589:2244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12173 comm="syz.1.3614" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ed860dfc9 code=0x7ffc0000 [ 1102.472860][ T30] audit: type=1400 audit(1760811353.279:2245): avc: denied { map } for pid=12189 comm="syz.5.3619" path="socket:[58425]" dev="sockfs" ino=58425 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 1102.644264][T12203] netlink: 624 bytes leftover after parsing attributes in process `syz.1.3623'. [ 1103.343613][T12220] netlink: 20 bytes leftover after parsing attributes in process `syz.4.3625'. [ 1103.353071][T12220] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3625'. [ 1103.485610][T12219] 9pnet: Insufficient options for proto=fd [ 1105.248994][T12240] 9pnet: Insufficient options for proto=fd [ 1105.296281][T12237] SELinux: failed to load policy [ 1107.871925][T12260] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 1107.998486][T12281] netlink: 20 bytes leftover after parsing attributes in process `syz.2.3646'. [ 1108.008167][T12281] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3646'. [ 1108.125176][ T30] audit: type=1400 audit(1760811358.989:2246): avc: denied { mount } for pid=12282 comm="syz.5.3649" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 1108.151623][T12284] xt_hashlimit: max too large, truncated to 1048576 [ 1110.735931][T12330] netlink: 20 bytes leftover after parsing attributes in process `syz.1.3664'. [ 1110.745173][T12330] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3664'. [ 1111.576663][ T30] audit: type=1400 audit(1760811362.439:2247): avc: denied { shutdown } for pid=12344 comm="syz.2.3669" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1112.108316][ T30] audit: type=1400 audit(1760811362.849:2249): avc: denied { create } for pid=12344 comm="syz.2.3669" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1112.133449][ T30] audit: type=1326 audit(1760811362.489:2248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12344 comm="syz.2.3669" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1112.163699][ T30] audit: type=1326 audit(1760811362.889:2250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12344 comm="syz.2.3669" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1112.189179][ T30] audit: type=1326 audit(1760811362.889:2251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12344 comm="syz.2.3669" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1112.222952][ T30] audit: type=1400 audit(1760811362.889:2252): avc: denied { mounton } for pid=12344 comm="syz.2.3669" path="/123/file0" dev="tmpfs" ino=733 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1112.308914][ T30] audit: type=1400 audit(1760811362.919:2253): avc: denied { unlink } for pid=10078 comm="syz-executor" name="file0" dev="tmpfs" ino=733 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1112.435588][ T30] audit: type=1400 audit(1760811363.129:2254): avc: denied { append } for pid=12354 comm="syz.4.3672" name="file0" dev="incremental-fs" ino=527 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 1112.526787][ T30] audit: type=1400 audit(1760811363.129:2255): avc: denied { write } for pid=12354 comm="syz.4.3672" path="/87/file0/file0" dev="incremental-fs" ino=527 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 1113.431504][ T30] audit: type=1326 audit(1760811364.289:2256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12373 comm="syz.3.3678" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1113.527570][ T30] audit: type=1326 audit(1760811364.319:2257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12373 comm="syz.3.3678" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1113.654317][ T30] audit: type=1326 audit(1760811364.319:2258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12373 comm="syz.3.3678" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1113.680886][ T30] audit: type=1326 audit(1760811364.319:2259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12373 comm="syz.3.3678" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1113.720275][ T30] audit: type=1326 audit(1760811364.319:2260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12373 comm="syz.3.3678" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1113.747544][ T30] audit: type=1326 audit(1760811364.319:2261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12373 comm="syz.3.3678" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1113.771860][ T30] audit: type=1326 audit(1760811364.319:2262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12373 comm="syz.3.3678" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1113.880731][ T30] audit: type=1326 audit(1760811364.319:2263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12373 comm="syz.3.3678" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1113.927033][ T30] audit: type=1326 audit(1760811364.319:2264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12373 comm="syz.3.3678" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1113.955704][ T30] audit: type=1326 audit(1760811364.319:2265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12373 comm="syz.3.3678" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1115.723905][T10941] usb 5-1: new high-speed USB device number 47 using dummy_hcd [ 1119.246123][T10941] usb 5-1: device not accepting address 47, error -71 [ 1119.426208][T12450] netlink: 20 bytes leftover after parsing attributes in process `syz.3.3699'. [ 1121.122142][T12480] netlink: 624 bytes leftover after parsing attributes in process `syz.4.3708'. [ 1121.488039][ T9399] usb 6-1: new high-speed USB device number 9 using dummy_hcd [ 1122.032876][ T9399] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1122.050142][ T9399] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1122.140489][ T9399] usb 6-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1122.172706][ T9399] usb 6-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1122.181891][ T9399] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1122.203537][ T9399] usb 6-1: config 0 descriptor?? [ 1122.267052][T12505] netlink: 148 bytes leftover after parsing attributes in process `syz.1.3715'. [ 1122.276490][T12505] netlink: 116 bytes leftover after parsing attributes in process `syz.1.3715'. [ 1122.285709][T12505] netlink: 32 bytes leftover after parsing attributes in process `syz.1.3715'. [ 1122.684916][ T9399] plantronics 0003:047F:FFFF.0035: No inputs registered, leaving [ 1122.704922][ T30] kauditd_printk_skb: 117 callbacks suppressed [ 1122.704940][ T30] audit: type=1326 audit(1760811373.569:2383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12510 comm="syz.2.3717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1122.739649][ T9399] plantronics 0003:047F:FFFF.0035: hiddev96,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.5-1/input0 [ 1122.795804][ T30] audit: type=1326 audit(1760811373.569:2384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12510 comm="syz.2.3717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1122.841128][T12514] FAULT_INJECTION: forcing a failure. [ 1122.841128][T12514] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1122.855478][T12509] FAULT_INJECTION: forcing a failure. [ 1122.855478][T12509] name failslab, interval 1, probability 0, space 0, times 0 [ 1122.878793][T12514] CPU: 1 PID: 12514 Comm: syz.2.3718 Not tainted syzkaller #0 [ 1122.886503][T12514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1122.896750][T12514] Call Trace: [ 1122.900423][T12514] [ 1122.903376][T12514] __dump_stack+0x21/0x30 [ 1122.907732][T12514] dump_stack_lvl+0xee/0x150 [ 1122.912680][T12514] ? show_regs_print_info+0x20/0x20 [ 1122.918326][T12514] dump_stack+0x15/0x20 [ 1122.922506][T12514] should_fail+0x3c1/0x510 [ 1122.927169][T12514] should_fail_usercopy+0x1a/0x20 [ 1122.932307][T12514] strncpy_from_user+0x24/0x2e0 [ 1122.937164][T12514] ? kmem_cache_alloc+0xf7/0x260 [ 1122.942368][T12514] getname_flags+0xf4/0x500 [ 1122.947052][T12514] user_path_at_empty+0x30/0x1c0 [ 1122.952024][T12514] do_utimes+0x138/0x2a0 [ 1122.956381][T12514] ? vfs_utimes+0x570/0x570 [ 1122.960890][T12514] __x64_sys_utime+0x12a/0x1d0 [ 1122.965862][T12514] ? __ia32_sys_utimes+0x220/0x220 [ 1122.971068][T12514] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 1122.977543][T12514] x64_sys_call+0x8a2/0x9a0 [ 1122.982049][T12514] do_syscall_64+0x4c/0xa0 [ 1122.986558][T12514] ? clear_bhb_loop+0x50/0xa0 [ 1122.991448][T12514] ? clear_bhb_loop+0x50/0xa0 [ 1122.996130][T12514] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1123.002031][T12514] RIP: 0033:0x7f7e9f6c8fc9 [ 1123.006633][T12514] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1123.027663][T12514] RSP: 002b:00007f7e9e131038 EFLAGS: 00000246 ORIG_RAX: 0000000000000084 [ 1123.037240][T12514] RAX: ffffffffffffffda RBX: 00007f7e9f91ffa0 RCX: 00007f7e9f6c8fc9 [ 1123.045491][T12514] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000200 [ 1123.053724][T12514] RBP: 00007f7e9e131090 R08: 0000000000000000 R09: 0000000000000000 [ 1123.062422][T12514] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1123.070957][T12514] R13: 00007f7e9f920038 R14: 00007f7e9f91ffa0 R15: 00007ffd536344f8 [ 1123.078942][T12514] [ 1123.085177][ T30] audit: type=1326 audit(1760811373.599:2385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12510 comm="syz.2.3717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1123.111982][T12509] CPU: 1 PID: 12509 Comm: syz.3.3716 Not tainted syzkaller #0 [ 1123.119487][T12509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1123.130011][T12509] Call Trace: [ 1123.133312][T12509] [ 1123.136459][T12509] __dump_stack+0x21/0x30 [ 1123.140899][T12509] dump_stack_lvl+0xee/0x150 [ 1123.145598][T12509] ? show_regs_print_info+0x20/0x20 [ 1123.150923][T12509] dump_stack+0x15/0x20 [ 1123.155200][T12509] should_fail+0x3c1/0x510 [ 1123.159643][T12509] __should_failslab+0xa4/0xe0 [ 1123.164748][T12509] should_failslab+0x9/0x20 [ 1123.169427][T12509] slab_pre_alloc_hook+0x3b/0xe0 [ 1123.174451][T12509] kmem_cache_alloc_trace+0x48/0x270 [ 1123.179934][T12509] ? htab_map_alloc+0x9a/0x14f0 [ 1123.185071][T12509] htab_map_alloc+0x9a/0x14f0 [ 1123.189873][T12509] ? avc_has_perm_noaudit+0x460/0x460 [ 1123.195553][T12509] ? htab_map_alloc_check+0x3d8/0x4c0 [ 1123.201137][T12509] map_create+0x455/0x21b0 [ 1123.205686][T12509] __sys_bpf+0x2cf/0x730 [ 1123.210040][T12509] ? bpf_link_show_fdinfo+0x310/0x310 [ 1123.215615][T12509] ? debug_smp_processor_id+0x17/0x20 [ 1123.218461][ T30] audit: type=1326 audit(1760811373.599:2386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12510 comm="syz.2.3717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1123.221095][T12509] __x64_sys_bpf+0x7c/0x90 [ 1123.221121][T12509] x64_sys_call+0x4b9/0x9a0 [ 1123.254061][T12509] do_syscall_64+0x4c/0xa0 [ 1123.258626][T12509] ? clear_bhb_loop+0x50/0xa0 [ 1123.259240][ T30] audit: type=1326 audit(1760811373.599:2387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12510 comm="syz.2.3717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1123.263431][T12509] ? clear_bhb_loop+0x50/0xa0 [ 1123.263458][T12509] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1123.263482][T12509] RIP: 0033:0x7f83b84a8fc9 [ 1123.263500][T12509] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1123.287458][ T30] audit: type=1326 audit(1760811373.599:2388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12510 comm="syz.2.3717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1123.292001][T12509] RSP: 002b:00007f83b6f11038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1123.298114][ T30] audit: type=1326 audit(1760811373.599:2389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12510 comm="syz.2.3717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1123.302438][T12509] RAX: ffffffffffffffda RBX: 00007f83b86fffa0 RCX: 00007f83b84a8fc9 [ 1123.302455][T12509] RDX: 0000000000000050 RSI: 0000200000000380 RDI: 0004000000000000 [ 1123.322824][ T30] audit: type=1326 audit(1760811373.599:2390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12510 comm="syz.2.3717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1123.346214][T12509] RBP: 00007f83b6f11090 R08: 0000000000000000 R09: 0000000000000000 [ 1123.346233][T12509] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1123.346245][T12509] R13: 00007f83b8700038 R14: 00007f83b86fffa0 R15: 00007ffcf75915c8 [ 1123.346266][T12509] [ 1123.454722][ T30] audit: type=1326 audit(1760811373.599:2391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12510 comm="syz.2.3717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1123.482030][ T30] audit: type=1326 audit(1760811373.599:2392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12510 comm="syz.2.3717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1124.011013][T12527] incfs: Error accessing: ./bus. [ 1124.017556][T12527] incfs: mount failed -20 [ 1124.692812][T10941] usb 6-1: reset high-speed USB device number 9 using dummy_hcd [ 1127.041433][T12544] netlink: 20 bytes leftover after parsing attributes in process `syz.4.3727'. [ 1127.094661][T12547] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x800 phys_seg 1 prio class 0 [ 1127.283487][ T9399] usb 6-1: USB disconnect, device number 9 [ 1127.523429][T12568] FAULT_INJECTION: forcing a failure. [ 1127.523429][T12568] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1127.546653][T12568] CPU: 0 PID: 12568 Comm: syz.5.3738 Not tainted syzkaller #0 [ 1127.554551][T12568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1127.565141][T12568] Call Trace: [ 1127.568537][T12568] [ 1127.571490][T12568] __dump_stack+0x21/0x30 [ 1127.576274][T12568] dump_stack_lvl+0xee/0x150 [ 1127.581159][T12568] ? show_regs_print_info+0x20/0x20 [ 1127.586694][T12568] dump_stack+0x15/0x20 [ 1127.591001][T12568] should_fail+0x3c1/0x510 [ 1127.595558][T12568] should_fail_usercopy+0x1a/0x20 [ 1127.600841][T12568] strncpy_from_user+0x24/0x2e0 [ 1127.605996][T12568] ? kmem_cache_alloc+0xf7/0x260 [ 1127.611057][T12568] getname_flags+0xf4/0x500 [ 1127.615624][T12568] getname+0x19/0x20 [ 1127.619706][T12568] do_sys_openat2+0xd9/0x7b0 [ 1127.624329][T12568] ? __kasan_check_write+0x14/0x20 [ 1127.629665][T12568] ? fput_many+0x15a/0x1a0 [ 1127.634254][T12568] ? do_sys_open+0xe0/0xe0 [ 1127.638696][T12568] ? fput+0x1a/0x20 [ 1127.642616][T12568] ? ksys_write+0x1eb/0x240 [ 1127.647329][T12568] ? __ia32_sys_read+0x90/0x90 [ 1127.652110][T12568] __x64_sys_open+0x11c/0x140 [ 1127.656909][T12568] x64_sys_call+0x3fc/0x9a0 [ 1127.661695][T12568] do_syscall_64+0x4c/0xa0 [ 1127.666235][T12568] ? clear_bhb_loop+0x50/0xa0 [ 1127.671401][T12568] ? clear_bhb_loop+0x50/0xa0 [ 1127.676234][T12568] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1127.682321][T12568] RIP: 0033:0x7fce50ee3fc9 [ 1127.686833][T12568] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1127.706930][T12568] RSP: 002b:00007fce4f94c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1127.714804][T12571] netlink: 624 bytes leftover after parsing attributes in process `syz.1.3739'. [ 1127.715352][T12568] RAX: ffffffffffffffda RBX: 00007fce5113afa0 RCX: 00007fce50ee3fc9 [ 1127.732546][T12568] RDX: 0000000000000041 RSI: 0000000000040240 RDI: 0000200000000000 [ 1127.740560][T12568] RBP: 00007fce4f94c090 R08: 0000000000000000 R09: 0000000000000000 [ 1127.748564][T12568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1127.756541][T12568] R13: 00007fce5113b038 R14: 00007fce5113afa0 R15: 00007ffc0fb70bc8 [ 1127.764787][T12568] [ 1127.954765][T12574] overlayfs: failed to resolve './file0': -2 [ 1128.101048][ T30] kauditd_printk_skb: 34 callbacks suppressed [ 1128.101065][ T30] audit: type=1400 audit(1760811378.959:2427): avc: denied { write } for pid=12575 comm="syz.3.3740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1128.163367][T12578] kvm: apic: phys broadcast and lowest prio [ 1128.183461][ T30] audit: type=1326 audit(1760811379.049:2428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12580 comm="syz.3.3742" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1128.207379][ T30] audit: type=1326 audit(1760811379.059:2429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12580 comm="syz.3.3742" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1128.231472][ T30] audit: type=1326 audit(1760811379.059:2430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12580 comm="syz.3.3742" exe="/root/syz-executor" sig=0 arch=c000003e syscall=270 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1128.255798][ T30] audit: type=1326 audit(1760811379.059:2431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12580 comm="syz.3.3742" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1129.102683][ T9399] usb 5-1: new full-speed USB device number 49 using dummy_hcd [ 1129.142955][ T30] audit: type=1400 audit(1760811380.009:2432): avc: denied { getopt } for pid=12611 comm="syz.1.3752" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1129.288250][ T30] audit: type=1326 audit(1760811380.149:2433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12617 comm="syz.1.3754" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ed860dfc9 code=0x7ffc0000 [ 1129.323818][ T30] audit: type=1326 audit(1760811380.179:2434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12617 comm="syz.1.3754" exe="/root/syz-executor" sig=0 arch=c000003e syscall=270 compat=0 ip=0x7f8ed860dfc9 code=0x7ffc0000 [ 1130.206754][ T30] audit: type=1326 audit(1760811380.179:2435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12617 comm="syz.1.3754" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ed860dfc9 code=0x7ffc0000 [ 1130.471641][ T9399] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1130.482900][ T9399] usb 5-1: config 0 interface 0 altsetting 1 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 1130.494962][ T9399] usb 5-1: config 0 interface 0 altsetting 1 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1130.569291][ T9399] usb 5-1: config 0 interface 0 has no altsetting 0 [ 1131.374320][ T9399] usb 5-1: New USB device found, idVendor=0458, idProduct=5019, bcdDevice= 0.00 [ 1132.182976][ T9399] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1132.212975][ T9399] usb 5-1: config 0 descriptor?? [ 1132.232757][ T9399] usb 5-1: can't set config #0, error -71 [ 1132.239355][ T9399] usb 5-1: USB disconnect, device number 49 [ 1132.293795][ T30] audit: type=1326 audit(1760811383.159:2436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12647 comm="syz.3.3765" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1132.354080][T12651] netlink: 20 bytes leftover after parsing attributes in process `syz.1.3767'. [ 1134.489773][T12662] incfs: Error accessing: ./bus. [ 1134.495385][T12662] incfs: mount failed -20 [ 1134.620626][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 1134.620644][ T30] audit: type=1400 audit(1760811385.479:2440): avc: denied { nlmsg_write } for pid=12667 comm="syz.3.3770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1134.722732][ T30] audit: type=1400 audit(1760811385.509:2441): avc: denied { nlmsg_read } for pid=12667 comm="syz.3.3770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1135.060971][T12683] FAULT_INJECTION: forcing a failure. [ 1135.060971][T12683] name failslab, interval 1, probability 0, space 0, times 0 [ 1135.073664][T12683] CPU: 0 PID: 12683 Comm: syz.5.3774 Not tainted syzkaller #0 [ 1135.081331][T12683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1135.091757][T12683] Call Trace: [ 1135.095151][T12683] [ 1135.098267][T12683] __dump_stack+0x21/0x30 [ 1135.102722][T12683] dump_stack_lvl+0xee/0x150 [ 1135.107504][T12683] ? show_regs_print_info+0x20/0x20 [ 1135.112723][T12683] ? unwind_get_return_address+0x4d/0x90 [ 1135.118556][T12683] ? stack_trace_save+0xe0/0xe0 [ 1135.123511][T12683] dump_stack+0x15/0x20 [ 1135.127699][T12683] should_fail+0x3c1/0x510 [ 1135.132142][T12683] __should_failslab+0xa4/0xe0 [ 1135.136923][T12683] should_failslab+0x9/0x20 [ 1135.141442][T12683] slab_pre_alloc_hook+0x3b/0xe0 [ 1135.146400][T12683] ? sidtab_sid2str_get+0x120/0x2c0 [ 1135.151713][T12683] __kmalloc_track_caller+0x6c/0x2c0 [ 1135.157203][T12683] ? sidtab_sid2str_get+0x120/0x2c0 [ 1135.162590][T12683] ? kasan_set_free_info+0x23/0x40 [ 1135.167725][T12683] kmemdup+0x26/0x60 [ 1135.171727][T12683] sidtab_sid2str_get+0x120/0x2c0 [ 1135.176882][T12683] security_sid_to_context_core+0x2ac/0x480 [ 1135.182911][T12683] security_sid_to_context+0x33/0x40 [ 1135.188394][T12683] selinux_socket_getpeersec_stream+0x16b/0x2e0 [ 1135.194828][T12683] ? selinux_socket_sock_rcv_skb+0x7c0/0x7c0 [ 1135.200828][T12683] ? avc_has_perm+0x158/0x240 [ 1135.205518][T12683] security_socket_getpeersec_stream+0x62/0xd0 [ 1135.211697][T12683] sock_getsockopt+0x1220/0x1b10 [ 1135.216827][T12683] ? dst_negative_advice+0x150/0x150 [ 1135.222127][T12683] ? selinux_socket_getsockopt+0x208/0x2e0 [ 1135.228089][T12683] ? selinux_socket_getpeername+0x2e0/0x2e0 [ 1135.234007][T12683] ? __kasan_check_write+0x14/0x20 [ 1135.239268][T12683] ? mutex_unlock+0x89/0x220 [ 1135.243875][T12683] ? __fget_files+0x2c4/0x320 [ 1135.248615][T12683] ? security_socket_getsockopt+0x82/0xa0 [ 1135.254545][T12683] __sys_getsockopt+0x1a7/0x410 [ 1135.259509][T12683] __x64_sys_getsockopt+0xbf/0xd0 [ 1135.264570][T12683] x64_sys_call+0x6db/0x9a0 [ 1135.269179][T12683] do_syscall_64+0x4c/0xa0 [ 1135.273620][T12683] ? clear_bhb_loop+0x50/0xa0 [ 1135.278399][T12683] ? clear_bhb_loop+0x50/0xa0 [ 1135.283103][T12683] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1135.289130][T12683] RIP: 0033:0x7fce50ee3fc9 [ 1135.293804][T12683] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1135.314101][T12683] RSP: 002b:00007fce4f90a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 1135.322953][T12683] RAX: ffffffffffffffda RBX: 00007fce5113b180 RCX: 00007fce50ee3fc9 [ 1135.330988][T12683] RDX: 000000000000001f RSI: 0000000000000001 RDI: 0000000000000005 [ 1135.339518][T12683] RBP: 00007fce4f90a090 R08: 0000200000000040 R09: 0000000000000000 [ 1135.348267][T12683] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1135.356745][T12683] R13: 00007fce5113b218 R14: 00007fce5113b180 R15: 00007ffc0fb70bc8 [ 1135.364934][T12683] [ 1135.456103][ T30] audit: type=1400 audit(1760811386.319:2442): avc: denied { connect } for pid=12679 comm="syz.4.3776" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1135.615409][ T30] audit: type=1326 audit(1760811386.479:2443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12687 comm="syz.2.3777" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1135.640360][ T30] audit: type=1326 audit(1760811386.479:2444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12687 comm="syz.2.3777" exe="/root/syz-executor" sig=0 arch=c000003e syscall=270 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1135.772602][ T30] audit: type=1326 audit(1760811386.479:2445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12687 comm="syz.2.3777" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1136.056183][T12705] FAULT_INJECTION: forcing a failure. [ 1136.056183][T12705] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1136.070175][T12705] CPU: 1 PID: 12705 Comm: syz.2.3782 Not tainted syzkaller #0 [ 1136.077674][T12705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1136.087839][T12705] Call Trace: [ 1136.091155][T12705] [ 1136.094374][T12705] __dump_stack+0x21/0x30 [ 1136.098813][T12705] dump_stack_lvl+0xee/0x150 [ 1136.103786][T12705] ? show_regs_print_info+0x20/0x20 [ 1136.109021][T12705] dump_stack+0x15/0x20 [ 1136.113189][T12705] should_fail+0x3c1/0x510 [ 1136.117628][T12705] should_fail_usercopy+0x1a/0x20 [ 1136.122756][T12705] _copy_to_user+0x20/0x90 [ 1136.127188][T12705] simple_read_from_buffer+0xe9/0x160 [ 1136.132577][T12705] proc_fail_nth_read+0x19a/0x210 [ 1136.137722][T12705] ? proc_fault_inject_write+0x2f0/0x2f0 [ 1136.143377][T12705] ? security_file_permission+0x83/0xa0 [ 1136.149206][T12705] ? proc_fault_inject_write+0x2f0/0x2f0 [ 1136.154866][T12705] vfs_read+0x282/0xbe0 [ 1136.159300][T12705] ? kernel_read+0x1f0/0x1f0 [ 1136.163992][T12705] ? __kasan_check_write+0x14/0x20 [ 1136.169562][T12705] ? mutex_lock+0x95/0x1a0 [ 1136.174522][T12705] ? wait_for_completion_killable_timeout+0x10/0x10 [ 1136.181270][T12705] ? __fget_files+0x2c4/0x320 [ 1136.186347][T12705] ? __fdget_pos+0x2d2/0x380 [ 1136.190962][T12705] ? ksys_read+0x71/0x240 [ 1136.195313][T12705] ksys_read+0x140/0x240 [ 1136.199621][T12705] ? vfs_write+0xf70/0xf70 [ 1136.204387][T12705] ? __kasan_check_write+0x14/0x20 [ 1136.209626][T12705] ? switch_fpu_return+0x15d/0x2c0 [ 1136.214765][T12705] __x64_sys_read+0x7b/0x90 [ 1136.219300][T12705] x64_sys_call+0x96d/0x9a0 [ 1136.223955][T12705] do_syscall_64+0x4c/0xa0 [ 1136.228618][T12705] ? clear_bhb_loop+0x50/0xa0 [ 1136.233328][T12705] ? clear_bhb_loop+0x50/0xa0 [ 1136.238034][T12705] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1136.244223][T12705] RIP: 0033:0x7f7e9f6c79dc [ 1136.248750][T12705] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1136.269787][T12705] RSP: 002b:00007f7e9e0ef030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1136.278594][T12705] RAX: ffffffffffffffda RBX: 00007f7e9f920180 RCX: 00007f7e9f6c79dc [ 1136.287241][T12705] RDX: 000000000000000f RSI: 00007f7e9e0ef0a0 RDI: 0000000000000009 [ 1136.295738][T12705] RBP: 00007f7e9e0ef090 R08: 0000000000000000 R09: 0000000000000000 [ 1136.304175][T12705] R10: 0000200000000180 R11: 0000000000000246 R12: 0000000000000001 [ 1136.312352][T12705] R13: 00007f7e9f920218 R14: 00007f7e9f920180 R15: 00007ffd536344f8 [ 1136.321404][T12705] [ 1140.116755][ T30] audit: type=1326 audit(1760811390.149:2446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12716 comm="syz.2.3787" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1140.148861][ T30] audit: type=1326 audit(1760811390.149:2447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12716 comm="syz.2.3787" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1140.174537][ T30] audit: type=1326 audit(1760811390.309:2448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12716 comm="syz.2.3787" exe="/root/syz-executor" sig=0 arch=c000003e syscall=155 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1140.198706][ T30] audit: type=1326 audit(1760811390.309:2449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12716 comm="syz.2.3787" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1140.265310][ T30] audit: type=1326 audit(1760811390.309:2450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12716 comm="syz.2.3787" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1140.290593][ T30] audit: type=1326 audit(1760811390.459:2451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12716 comm="syz.2.3787" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1140.317499][ T30] audit: type=1326 audit(1760811390.459:2452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12716 comm="syz.2.3787" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1140.345124][ T30] audit: type=1326 audit(1760811390.459:2453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12716 comm="syz.2.3787" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1140.372820][ T30] audit: type=1326 audit(1760811390.609:2454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12716 comm="syz.2.3787" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f7e9f6c7810 code=0x7ffc0000 [ 1140.396817][ T30] audit: type=1326 audit(1760811390.609:2455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12716 comm="syz.2.3787" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1140.556584][T12743] FAULT_INJECTION: forcing a failure. [ 1140.556584][T12743] name failslab, interval 1, probability 0, space 0, times 0 [ 1140.571563][T12743] CPU: 1 PID: 12743 Comm: syz.5.3794 Not tainted syzkaller #0 [ 1140.579281][T12743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1140.589366][T12743] Call Trace: [ 1140.592846][T12743] [ 1140.595984][T12743] __dump_stack+0x21/0x30 [ 1140.600590][T12743] dump_stack_lvl+0xee/0x150 [ 1140.605427][T12743] ? show_regs_print_info+0x20/0x20 [ 1140.610851][T12743] dump_stack+0x15/0x20 [ 1140.615233][T12743] should_fail+0x3c1/0x510 [ 1140.619780][T12743] __should_failslab+0xa4/0xe0 [ 1140.624576][T12743] should_failslab+0x9/0x20 [ 1140.629101][T12743] slab_pre_alloc_hook+0x3b/0xe0 [ 1140.634264][T12743] kmem_cache_alloc_trace+0x48/0x270 [ 1140.639582][T12743] ? virtio_transport_do_socket_init+0x56/0x2c0 [ 1140.645849][T12743] virtio_transport_do_socket_init+0x56/0x2c0 [ 1140.651934][T12743] vsock_assign_transport+0x539/0x6c0 [ 1140.657418][T12743] vsock_connect+0x597/0xcf0 [ 1140.662016][T12743] ? security_file_permission+0x83/0xa0 [ 1140.667686][T12743] ? vfs_write+0xc17/0xf70 [ 1140.672285][T12743] ? vsock_auto_bind+0xf0/0xf0 [ 1140.677336][T12743] ? __fget_files+0x2c4/0x320 [ 1140.682355][T12743] ? io_schedule+0xe0/0xe0 [ 1140.686929][T12743] ? selinux_socket_connect+0x23/0x30 [ 1140.692322][T12743] ? security_socket_connect+0x82/0xa0 [ 1140.697893][T12743] ? vsock_auto_bind+0xf0/0xf0 [ 1140.702931][T12743] __sys_connect+0x389/0x410 [ 1140.707633][T12743] ? __sys_connect_file+0x170/0x170 [ 1140.712858][T12743] ? debug_smp_processor_id+0x17/0x20 [ 1140.718374][T12743] __x64_sys_connect+0x7a/0x90 [ 1140.723150][T12743] x64_sys_call+0x7c/0x9a0 [ 1140.727575][T12743] do_syscall_64+0x4c/0xa0 [ 1140.732294][T12743] ? clear_bhb_loop+0x50/0xa0 [ 1140.737064][T12743] ? clear_bhb_loop+0x50/0xa0 [ 1140.741750][T12743] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1140.747657][T12743] RIP: 0033:0x7fce50ee3fc9 [ 1140.752337][T12743] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1140.772394][T12743] RSP: 002b:00007fce4f94c038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 1140.780921][T12743] RAX: ffffffffffffffda RBX: 00007fce5113afa0 RCX: 00007fce50ee3fc9 [ 1140.789109][T12743] RDX: 0000000000000010 RSI: 0000200000000000 RDI: 000000000000000a [ 1140.797184][T12743] RBP: 00007fce4f94c090 R08: 0000000000000000 R09: 0000000000000000 [ 1140.805264][T12743] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1140.813345][T12743] R13: 00007fce5113b038 R14: 00007fce5113afa0 R15: 00007ffc0fb70bc8 [ 1140.821522][T12743] [ 1141.993272][T12750] overlayfs: failed to clone upperpath [ 1142.014009][ T342] usb 5-1: new high-speed USB device number 50 using dummy_hcd [ 1142.362876][ T342] usb 5-1: Using ep0 maxpacket: 16 [ 1142.442484][T12761] netlink: 20 bytes leftover after parsing attributes in process `syz.3.3798'. [ 1142.492780][ T342] usb 5-1: config index 0 descriptor too short (expected 4495, got 71) [ 1142.521337][ T342] usb 5-1: config 0 has an invalid interface number: 105 but max is 0 [ 1142.541743][T12761] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3798'. [ 1142.550900][ T342] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1142.573698][ T342] usb 5-1: config 0 has no interface number 0 [ 1142.805608][T12760] overlayfs: failed to clone upperpath [ 1142.902832][ T342] usb 5-1: New USB device found, idVendor=046c, idProduct=14e0, bcdDevice= 0.01 [ 1142.916292][ T342] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1142.966508][ T342] usb 5-1: Product: syz [ 1142.979475][ T342] usb 5-1: Manufacturer: syz [ 1142.994943][ T342] usb 5-1: SerialNumber: syz [ 1143.023356][ T342] usb 5-1: config 0 descriptor?? [ 1143.125377][ T342] usb 5-1: Found UVC 0.00 device syz (046c:14e0) [ 1143.135263][ T342] usb 5-1: No valid video chain found. [ 1143.330575][ T486] usb 5-1: USB disconnect, device number 50 [ 1145.246045][ T30] kauditd_printk_skb: 85 callbacks suppressed [ 1145.246062][ T30] audit: type=1326 audit(1760811396.109:2541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12808 comm="syz.3.3818" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1145.462159][ T30] audit: type=1326 audit(1760811396.109:2542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12808 comm="syz.3.3818" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1145.541591][T12835] FAULT_INJECTION: forcing a failure. [ 1145.541591][T12835] name failslab, interval 1, probability 0, space 0, times 0 [ 1145.555751][T12835] CPU: 1 PID: 12835 Comm: syz.2.3823 Not tainted syzkaller #0 [ 1145.563597][T12835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1145.573782][T12835] Call Trace: [ 1145.577081][T12835] [ 1145.580155][T12835] __dump_stack+0x21/0x30 [ 1145.584742][T12835] dump_stack_lvl+0xee/0x150 [ 1145.589372][T12835] ? show_regs_print_info+0x20/0x20 [ 1145.594794][T12835] ? __kasan_check_read+0x11/0x20 [ 1145.600348][T12835] ? preempt_schedule_irq+0xbb/0x110 [ 1145.605763][T12835] dump_stack+0x15/0x20 [ 1145.610284][T12835] should_fail+0x3c1/0x510 [ 1145.615155][T12835] __should_failslab+0xa4/0xe0 [ 1145.620864][T12835] should_failslab+0x9/0x20 [ 1145.625775][T12835] slab_pre_alloc_hook+0x3b/0xe0 [ 1145.631292][T12835] ? generic_parse_monolithic+0x1bc/0x2b0 [ 1145.637298][T12835] __kmalloc_track_caller+0x6c/0x2c0 [ 1145.642622][T12835] ? generic_parse_monolithic+0x1bc/0x2b0 [ 1145.648475][T12835] kmemdup_nul+0x2c/0xa0 [ 1145.653130][T12835] generic_parse_monolithic+0x1bc/0x2b0 [ 1145.658802][T12835] ? vfs_parse_fs_string+0x160/0x160 [ 1145.663214][ T30] audit: type=1326 audit(1760811396.139:2543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12808 comm="syz.3.3818" exe="/root/syz-executor" sig=0 arch=c000003e syscall=270 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1145.664111][T12835] ? fuse_init_fs_context+0xfa/0x200 [ 1145.688564][ T30] audit: type=1326 audit(1760811396.139:2544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12808 comm="syz.3.3818" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1145.693951][T12835] ? alloc_fs_context+0x637/0x7a0 [ 1145.693982][T12835] parse_monolithic_mount_data+0x6c/0x80 [ 1145.694005][T12835] do_new_mount+0x228/0xa20 [ 1145.734130][T12835] path_mount+0x675/0x1020 [ 1145.738581][T12835] ? user_path_at_empty+0x161/0x1c0 [ 1145.743813][T12835] __se_sys_mount+0x318/0x380 [ 1145.748616][T12835] ? __x64_sys_mount+0xd0/0xd0 [ 1145.749226][ T30] audit: type=1326 audit(1760811396.139:2545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12808 comm="syz.3.3818" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1145.753584][T12835] ? asm_sysvec_reschedule_ipi+0x1b/0x20 [ 1145.753620][T12835] __x64_sys_mount+0xbf/0xd0 [ 1145.753641][T12835] x64_sys_call+0x6bf/0x9a0 [ 1145.753660][T12835] do_syscall_64+0x4c/0xa0 [ 1145.753680][T12835] ? clear_bhb_loop+0x50/0xa0 [ 1145.753697][T12835] ? clear_bhb_loop+0x50/0xa0 [ 1145.753713][T12835] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1145.753735][T12835] RIP: 0033:0x7f7e9f6c8fc9 [ 1145.753753][T12835] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1145.753789][T12835] RSP: 002b:00007f7e9e0ef038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1145.753810][T12835] RAX: ffffffffffffffda RBX: 00007f7e9f920180 RCX: 00007f7e9f6c8fc9 [ 1145.753825][T12835] RDX: 00002000000003c0 RSI: 0000200000000100 RDI: 0000000000000000 [ 1145.753840][T12835] RBP: 00007f7e9e0ef090 R08: 0000200000000440 R09: 0000000000000000 [ 1145.753853][T12835] R10: 000000000280449c R11: 0000000000000246 R12: 0000000000000001 [ 1145.753867][T12835] R13: 00007f7e9f920218 R14: 00007f7e9f920180 R15: 00007ffd536344f8 [ 1145.753887][T12835] [ 1146.298093][ T30] audit: type=1326 audit(1760811397.049:2546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12839 comm="syz.1.3827" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ed860dfc9 code=0x7ffc0000 [ 1146.374062][ T30] audit: type=1326 audit(1760811397.049:2547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12839 comm="syz.1.3827" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ed860dfc9 code=0x7ffc0000 [ 1146.425354][T12849] netlink: 20 bytes leftover after parsing attributes in process `syz.3.3828'. [ 1146.435100][T12849] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3828'. [ 1146.565073][ T30] audit: type=1326 audit(1760811397.049:2548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12839 comm="syz.1.3827" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f8ed860c810 code=0x7ffc0000 [ 1147.053333][T12857] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3833'. [ 1147.166683][ T30] audit: type=1326 audit(1760811397.049:2549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12839 comm="syz.1.3827" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ed860dfc9 code=0x7ffc0000 [ 1147.404909][ T30] audit: type=1326 audit(1760811397.049:2550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12839 comm="syz.1.3827" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ed860dfc9 code=0x7ffc0000 [ 1147.503530][T12880] FAULT_INJECTION: forcing a failure. [ 1147.503530][T12880] name failslab, interval 1, probability 0, space 0, times 0 [ 1147.516553][T12880] CPU: 1 PID: 12880 Comm: syz.5.3837 Not tainted syzkaller #0 [ 1147.524857][T12880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1147.536216][T12880] Call Trace: [ 1147.540173][T12880] [ 1147.543638][T12880] __dump_stack+0x21/0x30 [ 1147.548543][T12880] dump_stack_lvl+0xee/0x150 [ 1147.553846][T12880] ? show_regs_print_info+0x20/0x20 [ 1147.559849][T12880] ? trace_raw_output_percpu_destroy_chunk+0xc0/0xc0 [ 1147.567126][T12880] dump_stack+0x15/0x20 [ 1147.571746][T12880] should_fail+0x3c1/0x510 [ 1147.576965][T12880] __should_failslab+0xa4/0xe0 [ 1147.581852][T12880] should_failslab+0x9/0x20 [ 1147.586846][T12880] slab_pre_alloc_hook+0x3b/0xe0 [ 1147.592034][T12880] kmem_cache_alloc_trace+0x48/0x270 [ 1147.597535][T12880] ? percpu_ref_init+0xce/0x350 [ 1147.602531][T12880] percpu_ref_init+0xce/0x350 [ 1147.607433][T12880] ? free_ioctx_users+0x2a0/0x2a0 [ 1147.612897][T12880] ioctx_alloc+0x265/0x6e0 [ 1147.617600][T12880] __se_sys_io_setup+0x6f/0x220 [ 1147.622805][T12880] __x64_sys_io_setup+0x5b/0x70 [ 1147.627920][T12880] x64_sys_call+0x767/0x9a0 [ 1147.632457][T12880] do_syscall_64+0x4c/0xa0 [ 1147.637000][T12880] ? clear_bhb_loop+0x50/0xa0 [ 1147.641795][T12880] ? clear_bhb_loop+0x50/0xa0 [ 1147.646663][T12880] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1147.652914][T12880] RIP: 0033:0x7fce50ee3fc9 [ 1147.657532][T12880] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1147.677980][T12880] RSP: 002b:00007fce4f90a038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ce [ 1147.687221][T12880] RAX: ffffffffffffffda RBX: 00007fce5113b180 RCX: 00007fce50ee3fc9 [ 1147.695588][T12880] RDX: 0000000000000000 RSI: 0000200000002400 RDI: 00000000000008f0 [ 1147.703724][T12880] RBP: 00007fce4f90a090 R08: 0000000000000000 R09: 0000000000000000 [ 1147.711730][T12880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1147.720618][T12880] R13: 00007fce5113b218 R14: 00007fce5113b180 R15: 00007ffc0fb70bc8 [ 1147.729681][T12880] [ 1147.734233][T12879] netlink: 624 bytes leftover after parsing attributes in process `syz.4.3838'. [ 1148.540217][T12901] FAULT_INJECTION: forcing a failure. [ 1148.540217][T12901] name failslab, interval 1, probability 0, space 0, times 0 [ 1148.553794][T12901] CPU: 1 PID: 12901 Comm: syz.4.3843 Not tainted syzkaller #0 [ 1148.561468][T12901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1148.571894][T12901] Call Trace: [ 1148.575281][T12901] [ 1148.578637][T12901] __dump_stack+0x21/0x30 [ 1148.583109][T12901] dump_stack_lvl+0xee/0x150 [ 1148.587716][T12901] ? show_regs_print_info+0x20/0x20 [ 1148.593107][T12901] dump_stack+0x15/0x20 [ 1148.597713][T12901] should_fail+0x3c1/0x510 [ 1148.602486][T12901] __should_failslab+0xa4/0xe0 [ 1148.607477][T12901] should_failslab+0x9/0x20 [ 1148.612265][T12901] slab_pre_alloc_hook+0x3b/0xe0 [ 1148.617496][T12901] kmem_cache_alloc_trace+0x48/0x270 [ 1148.623384][T12901] ? __get_vm_area_node+0x11d/0x350 [ 1148.629151][T12901] __get_vm_area_node+0x11d/0x350 [ 1148.634479][T12901] __vmalloc_node_range+0xdf/0xaf0 [ 1148.639808][T12901] ? reuseport_array_alloc+0xc7/0x160 [ 1148.645630][T12901] ? irqentry_exit_cond_resched+0x29/0x30 [ 1148.651617][T12901] ? irqentry_exit+0x37/0x40 [ 1148.656678][T12901] ? asm_sysvec_reschedule_ipi+0x1b/0x20 [ 1148.662438][T12901] ? security_capable+0x87/0xb0 [ 1148.667873][T12901] bpf_map_area_alloc+0xd5/0xe0 [ 1148.672899][T12901] ? reuseport_array_alloc+0xc7/0x160 [ 1148.678846][T12901] reuseport_array_alloc+0xc7/0x160 [ 1148.684387][T12901] map_create+0x455/0x21b0 [ 1148.689034][T12901] __sys_bpf+0x2cf/0x730 [ 1148.693316][T12901] ? bpf_link_show_fdinfo+0x310/0x310 [ 1148.698826][T12901] ? __kasan_check_write+0x14/0x20 [ 1148.704158][T12901] ? switch_fpu_return+0x15d/0x2c0 [ 1148.709419][T12901] __x64_sys_bpf+0x7c/0x90 [ 1148.713994][T12901] x64_sys_call+0x4b9/0x9a0 [ 1148.718624][T12901] do_syscall_64+0x4c/0xa0 [ 1148.723544][T12901] ? clear_bhb_loop+0x50/0xa0 [ 1148.728324][T12901] ? clear_bhb_loop+0x50/0xa0 [ 1148.733130][T12901] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1148.739485][T12901] RIP: 0033:0x7fa85ff75fc9 [ 1148.744284][T12901] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1148.764484][T12901] RSP: 002b:00007fa85e99c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1148.774894][T12901] RAX: ffffffffffffffda RBX: 00007fa8601cd180 RCX: 00007fa85ff75fc9 [ 1148.783525][T12901] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 1148.791896][T12901] RBP: 00007fa85e99c090 R08: 0000000000000000 R09: 0000000000000000 [ 1148.800019][T12901] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1148.808725][T12901] R13: 00007fa8601cd218 R14: 00007fa8601cd180 R15: 00007ffdb1861468 [ 1148.816929][T12901] [ 1150.403954][T12926] netlink: 168 bytes leftover after parsing attributes in process `syz.1.3851'. [ 1150.472747][ T26] usb 4-1: new high-speed USB device number 35 using dummy_hcd [ 1151.365144][T12936] FAULT_INJECTION: forcing a failure. [ 1151.365144][T12936] name failslab, interval 1, probability 0, space 0, times 0 [ 1151.378724][T12936] CPU: 1 PID: 12936 Comm: syz.2.3856 Not tainted syzkaller #0 [ 1151.386682][T12936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1151.396957][T12936] Call Trace: [ 1151.400472][T12936] [ 1151.403710][T12936] __dump_stack+0x21/0x30 [ 1151.408069][T12936] dump_stack_lvl+0xee/0x150 [ 1151.412765][T12936] ? show_regs_print_info+0x20/0x20 [ 1151.418267][T12936] ? __alloc_pages+0x440/0x440 [ 1151.423291][T12936] dump_stack+0x15/0x20 [ 1151.427607][T12936] should_fail+0x3c1/0x510 [ 1151.432038][T12936] __should_failslab+0xa4/0xe0 [ 1151.436831][T12936] should_failslab+0x9/0x20 [ 1151.441459][T12936] slab_pre_alloc_hook+0x3b/0xe0 [ 1151.446440][T12936] ? __build_skb+0x2d/0x310 [ 1151.451200][T12936] kmem_cache_alloc+0x44/0x260 [ 1151.456002][T12936] __build_skb+0x2d/0x310 [ 1151.460566][T12936] build_skb+0x24/0x200 [ 1151.464847][T12936] ? tun_get_user+0x85d/0x33c0 [ 1151.469861][T12936] tun_get_user+0x879/0x33c0 [ 1151.474573][T12936] ? __kasan_poison_slab+0x40/0x70 [ 1151.480096][T12936] ? tun_do_read+0x1c40/0x1c40 [ 1151.484987][T12936] ? kstrtouint_from_user+0x1a0/0x200 [ 1151.490678][T12936] ? kstrtol_from_user+0x260/0x260 [ 1151.496399][T12936] ? avc_policy_seqno+0x1b/0x70 [ 1151.501414][T12936] ? selinux_file_permission+0x2aa/0x510 [ 1151.507595][T12936] tun_chr_write_iter+0x1eb/0x2e0 [ 1151.513062][T12936] vfs_write+0x802/0xf70 [ 1151.517456][T12936] ? file_end_write+0x1b0/0x1b0 [ 1151.522341][T12936] ? __fget_files+0x2c4/0x320 [ 1151.527791][T12936] ? __fdget_pos+0x1f7/0x380 [ 1151.532691][T12936] ? ksys_write+0x71/0x240 [ 1151.537255][T12936] ksys_write+0x140/0x240 [ 1151.541731][T12936] ? __ia32_sys_read+0x90/0x90 [ 1151.546600][T12936] ? debug_smp_processor_id+0x17/0x20 [ 1151.552123][T12936] __x64_sys_write+0x7b/0x90 [ 1151.557074][T12936] x64_sys_call+0x8ef/0x9a0 [ 1151.561727][T12936] do_syscall_64+0x4c/0xa0 [ 1151.566382][T12936] ? clear_bhb_loop+0x50/0xa0 [ 1151.571439][T12936] ? clear_bhb_loop+0x50/0xa0 [ 1151.576188][T12936] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1151.582586][T12936] RIP: 0033:0x7f7e9f6c7a7f [ 1151.587133][T12936] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 1151.606839][T12936] RSP: 002b:00007f7e9e131000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1151.615477][T12936] RAX: ffffffffffffffda RBX: 00007f7e9f91ffa0 RCX: 00007f7e9f6c7a7f [ 1151.624007][T12936] RDX: 0000000000000032 RSI: 0000200000000280 RDI: 00000000000000c8 [ 1151.632343][T12936] RBP: 00007f7e9e131090 R08: 0000000000000000 R09: 0000000000000000 [ 1151.640655][T12936] R10: 0000000000000032 R11: 0000000000000293 R12: 0000000000000001 [ 1151.649133][T12936] R13: 00007f7e9f920038 R14: 00007f7e9f91ffa0 R15: 00007ffd536344f8 [ 1151.657123][T12936] [ 1151.794544][T12953] FAULT_INJECTION: forcing a failure. [ 1151.794544][T12953] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1151.824938][T12953] CPU: 0 PID: 12953 Comm: syz.2.3862 Not tainted syzkaller #0 [ 1151.832545][T12953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1151.842724][T12953] Call Trace: [ 1151.846025][T12953] [ 1151.849259][T12953] __dump_stack+0x21/0x30 [ 1151.853613][T12953] dump_stack_lvl+0xee/0x150 [ 1151.858415][T12953] ? show_regs_print_info+0x20/0x20 [ 1151.863781][T12953] dump_stack+0x15/0x20 [ 1151.868054][T12953] should_fail+0x3c1/0x510 [ 1151.872752][T12953] should_fail_usercopy+0x1a/0x20 [ 1151.878271][T12953] _copy_to_user+0x20/0x90 [ 1151.882857][T12953] simple_read_from_buffer+0xe9/0x160 [ 1151.888723][T12953] proc_fail_nth_read+0x19a/0x210 [ 1151.894010][T12953] ? proc_fault_inject_write+0x2f0/0x2f0 [ 1151.899896][T12953] ? security_file_permission+0x83/0xa0 [ 1151.905750][T12953] ? proc_fault_inject_write+0x2f0/0x2f0 [ 1151.911631][T12953] vfs_read+0x282/0xbe0 [ 1151.916087][T12953] ? kernel_read+0x1f0/0x1f0 [ 1151.920816][T12953] ? __tun_chr_ioctl+0x204/0x1eb0 [ 1151.925883][T12953] ? tun_flow_create+0x320/0x320 [ 1151.931025][T12953] ? do_sys_openat2+0x6a7/0x7b0 [ 1151.936049][T12953] ? __kasan_check_read+0x11/0x20 [ 1151.941381][T12953] ? __fdget_pos+0x2d9/0x380 [ 1151.946111][T12953] ksys_read+0x140/0x240 [ 1151.950482][T12953] ? vfs_write+0xf70/0xf70 [ 1151.954936][T12953] ? debug_smp_processor_id+0x17/0x20 [ 1151.960413][T12953] __x64_sys_read+0x7b/0x90 [ 1151.964936][T12953] x64_sys_call+0x96d/0x9a0 [ 1151.969539][T12953] do_syscall_64+0x4c/0xa0 [ 1151.973971][T12953] ? clear_bhb_loop+0x50/0xa0 [ 1151.978755][T12953] ? clear_bhb_loop+0x50/0xa0 [ 1151.983804][T12953] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1151.989744][T12953] RIP: 0033:0x7f7e9f6c79dc [ 1151.994197][T12953] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1152.014640][T12953] RSP: 002b:00007f7e9e131030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1152.023359][T12953] RAX: ffffffffffffffda RBX: 00007f7e9f91ffa0 RCX: 00007f7e9f6c79dc [ 1152.031656][T12953] RDX: 000000000000000f RSI: 00007f7e9e1310a0 RDI: 0000000000000004 [ 1152.040014][T12953] RBP: 00007f7e9e131090 R08: 0000000000000000 R09: 0000000000000000 [ 1152.048196][T12953] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1152.056316][T12953] R13: 00007f7e9f920038 R14: 00007f7e9f91ffa0 R15: 00007ffd536344f8 [ 1152.064596][T12953] [ 1152.083474][ T30] kauditd_printk_skb: 65 callbacks suppressed [ 1152.083491][ T30] audit: type=1400 audit(1760811402.949:2616): avc: denied { create } for pid=12949 comm="syz.4.3861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1152.172827][ T26] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1152.194814][ T26] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1152.225232][ T30] audit: type=1326 audit(1760811403.089:2617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12965 comm="syz.2.3868" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1152.266010][ T30] audit: type=1326 audit(1760811403.119:2618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12965 comm="syz.2.3868" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1152.284749][ T26] usb 4-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1152.294512][ T30] audit: type=1326 audit(1760811403.119:2619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12965 comm="syz.2.3868" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1152.322714][ T26] usb 4-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1152.345489][ T30] audit: type=1326 audit(1760811403.119:2620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12965 comm="syz.2.3868" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1152.360883][ T26] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1152.383793][ T26] usb 4-1: config 0 descriptor?? [ 1152.384903][ T30] audit: type=1326 audit(1760811403.119:2621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12965 comm="syz.2.3868" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1152.414492][ T30] audit: type=1326 audit(1760811403.119:2622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12965 comm="syz.2.3868" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1152.442061][ T30] audit: type=1326 audit(1760811403.119:2623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12965 comm="syz.2.3868" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1152.468470][ T30] audit: type=1326 audit(1760811403.119:2624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12965 comm="syz.2.3868" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1152.576797][ T30] audit: type=1326 audit(1760811403.119:2625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12965 comm="syz.2.3868" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1152.629433][T12976] fuse: Bad value for 'rootmode' [ 1152.682726][ T563] usb 5-1: new high-speed USB device number 51 using dummy_hcd [ 1152.690505][ T486] usb 6-1: new high-speed USB device number 10 using dummy_hcd [ 1152.932705][ T486] usb 6-1: Using ep0 maxpacket: 16 [ 1152.938248][ T563] usb 5-1: Using ep0 maxpacket: 16 [ 1153.062865][ T486] usb 6-1: config 0 has an invalid interface number: 64 but max is 0 [ 1153.071430][ T563] usb 5-1: config 0 has an invalid interface number: 64 but max is 0 [ 1153.079925][ T563] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1153.090364][ T486] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1153.100884][ T563] usb 5-1: config 0 has no interface number 0 [ 1153.107786][ T486] usb 6-1: config 0 has no interface number 0 [ 1153.114289][ T486] usb 6-1: New USB device found, idVendor=0bd3, idProduct=05f4, bcdDevice= 0.5b [ 1153.123799][ T563] usb 5-1: New USB device found, idVendor=0bd3, idProduct=05f4, bcdDevice= 0.5b [ 1153.133538][ T486] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1153.141673][ T563] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1153.151292][ T486] usb 6-1: config 0 descriptor?? [ 1153.156633][ T563] usb 5-1: config 0 descriptor?? [ 1153.193448][ T486] usb 6-1: Found UVC 0.00 device (0bd3:05f4) [ 1153.201289][ T563] usb 5-1: Found UVC 0.00 device (0bd3:05f4) [ 1153.209127][ T486] usb 6-1: No valid video chain found. [ 1153.214957][ T563] usb 5-1: No valid video chain found. [ 1153.435786][ T563] usb 5-1: USB disconnect, device number 51 [ 1153.511463][ T486] usb 6-1: USB disconnect, device number 10 [ 1153.939474][ T26] usbhid 4-1:0.0: can't add hid device: -71 [ 1153.950681][ T26] usbhid: probe of 4-1:0.0 failed with error -71 [ 1154.223957][ T26] usb 4-1: USB disconnect, device number 35 [ 1159.448884][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 1159.448902][ T30] audit: type=1400 audit(1760811410.309:2628): avc: denied { connect } for pid=13018 comm="syz.2.3886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 1163.549173][ T30] audit: type=1326 audit(1760811414.409:2629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13037 comm="syz.5.3890" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fce50ee3fc9 code=0x7ffc0000 [ 1163.585082][ T30] audit: type=1326 audit(1760811414.439:2630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13037 comm="syz.5.3890" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fce50ee3fc9 code=0x7ffc0000 [ 1163.595598][T13034] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 1163.612376][ T30] audit: type=1326 audit(1760811414.439:2631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13037 comm="syz.5.3890" exe="/root/syz-executor" sig=0 arch=c000003e syscall=270 compat=0 ip=0x7fce50ee3fc9 code=0x7ffc0000 [ 1163.649368][ T30] audit: type=1326 audit(1760811414.439:2632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13037 comm="syz.5.3890" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fce50ee3fc9 code=0x7ffc0000 [ 1163.674470][ T30] audit: type=1326 audit(1760811414.439:2633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13037 comm="syz.5.3890" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fce50ee3fc9 code=0x7ffc0000 [ 1163.700539][T13034] SELinux: failed to load policy [ 1164.021029][T13063] device xfrm0 left promiscuous mode [ 1166.442697][ T30] audit: type=1326 audit(1760811417.279:2634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13085 comm="syz.3.3907" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1166.552819][ T30] audit: type=1326 audit(1760811417.289:2635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13085 comm="syz.3.3907" exe="/root/syz-executor" sig=0 arch=c000003e syscall=270 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1166.583949][T13097] FAULT_INJECTION: forcing a failure. [ 1166.583949][T13097] name failslab, interval 1, probability 0, space 0, times 0 [ 1166.597144][T13097] CPU: 0 PID: 13097 Comm: syz.3.3909 Not tainted syzkaller #0 [ 1166.604806][T13097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1166.615070][T13097] Call Trace: [ 1166.618829][T13097] [ 1166.622089][T13097] __dump_stack+0x21/0x30 [ 1166.622369][ T30] audit: type=1326 audit(1760811417.289:2636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13085 comm="syz.3.3907" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1166.626651][T13097] dump_stack_lvl+0xee/0x150 [ 1166.626677][T13097] ? show_regs_print_info+0x20/0x20 [ 1166.626696][T13097] ? key_task_permission+0x36a/0x4a0 [ 1166.626718][T13097] dump_stack+0x15/0x20 [ 1166.626737][T13097] should_fail+0x3c1/0x510 [ 1166.651467][ T30] audit: type=1400 audit(1760811417.439:2637): avc: denied { bind } for pid=13089 comm="syz.3.3909" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1166.655895][T13097] __should_failslab+0xa4/0xe0 [ 1166.655925][T13097] should_failslab+0x9/0x20 [ 1166.705899][T13097] slab_pre_alloc_hook+0x3b/0xe0 [ 1166.710884][T13097] ? key_alloc+0x2be/0xf30 [ 1166.715606][T13097] kmem_cache_alloc+0x44/0x260 [ 1166.720412][T13097] key_alloc+0x2be/0xf30 [ 1166.724719][T13097] request_key_and_link+0x56c/0x1060 [ 1166.730144][T13097] ? __kasan_check_write+0x14/0x20 [ 1166.735297][T13097] ? complete_request_key+0xa0/0xa0 [ 1166.740713][T13097] ? downgrade_write+0x410/0x410 [ 1166.746095][T13097] ? restrict_link_reject+0x10/0x10 [ 1166.751541][T13097] ? keyring_search_rcu+0x290/0x290 [ 1166.756780][T13097] __se_sys_request_key+0x229/0x330 [ 1166.762093][T13097] ? fput+0x1a/0x20 [ 1166.766015][T13097] ? __x64_sys_request_key+0xb0/0xb0 [ 1166.771591][T13097] __x64_sys_request_key+0x9b/0xb0 [ 1166.776766][T13097] x64_sys_call+0x6f7/0x9a0 [ 1166.781308][T13097] do_syscall_64+0x4c/0xa0 [ 1166.785761][T13097] ? clear_bhb_loop+0x50/0xa0 [ 1166.790456][T13097] ? clear_bhb_loop+0x50/0xa0 [ 1166.795350][T13097] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1166.801272][T13097] RIP: 0033:0x7f83b84a8fc9 [ 1166.805710][T13097] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1166.825625][T13097] RSP: 002b:00007f83b6ef0038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1166.834094][T13097] RAX: ffffffffffffffda RBX: 00007f83b8700090 RCX: 00007f83b84a8fc9 [ 1166.842318][T13097] RDX: 0000200000001fee RSI: 0000200000001ffb RDI: 0000200000000040 [ 1166.850946][T13097] RBP: 00007f83b6ef0090 R08: 0000000000000000 R09: 0000000000000000 [ 1166.859081][T13097] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1166.867251][T13097] R13: 00007f83b8700128 R14: 00007f83b8700090 R15: 00007ffcf75915c8 [ 1166.875328][T13097] [ 1167.872337][ T30] audit: type=1326 audit(1760811418.729:2638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13108 comm="syz.3.3913" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1167.896350][ T30] audit: type=1326 audit(1760811418.759:2639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13108 comm="syz.3.3913" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1167.931941][ T30] audit: type=1326 audit(1760811418.789:2640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13108 comm="syz.3.3913" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1167.970782][ T30] audit: type=1326 audit(1760811418.789:2641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13108 comm="syz.3.3913" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1168.004950][ T30] audit: type=1326 audit(1760811418.789:2642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13108 comm="syz.3.3913" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1168.029987][ T30] audit: type=1326 audit(1760811418.789:2643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13108 comm="syz.3.3913" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1176.799584][T13168] af_packet: tpacket_rcv: packet too big, clamped from 64989 to 3952. macoff=96 [ 1176.809123][T13168] ip6_tunnel: non-ECT from fc00:0000:0000:0000:0000:0000:0000:0000 with DS=0x5 [ 1177.332843][ T30] kauditd_printk_skb: 45 callbacks suppressed [ 1177.332943][ T30] audit: type=1400 audit(1760811427.659:2689): avc: denied { create } for pid=13164 comm="syz.3.3930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1177.862389][T13184] xt_bpf: check failed: parse error [ 1177.868692][T13194] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 1177.878614][T13194] SELinux: failed to load policy [ 1177.902703][T10941] usb 3-1: new high-speed USB device number 45 using dummy_hcd [ 1178.354785][T10941] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1178.366426][T10941] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1178.378816][T10941] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1178.394172][T10941] usb 3-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1179.112591][T10941] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1179.135325][T10941] usb 3-1: config 0 descriptor?? [ 1179.605404][ T30] audit: type=1326 audit(1760811430.439:2690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13219 comm="syz.1.3947" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ed860dfc9 code=0x7ffc0000 [ 1179.607714][T10941] plantronics 0003:047F:FFFF.0036: No inputs registered, leaving [ 1179.698900][T10941] plantronics 0003:047F:FFFF.0036: hiddev96,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.2-1/input0 [ 1179.733285][ T30] audit: type=1326 audit(1760811430.439:2691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13219 comm="syz.1.3947" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ed860dfc9 code=0x7ffc0000 [ 1179.822711][ T30] audit: type=1326 audit(1760811430.439:2692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13219 comm="syz.1.3947" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f8ed860c810 code=0x7ffc0000 [ 1179.856110][ T30] audit: type=1326 audit(1760811430.439:2693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13219 comm="syz.1.3947" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ed860dfc9 code=0x7ffc0000 [ 1179.894055][ T30] audit: type=1326 audit(1760811430.439:2694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13219 comm="syz.1.3947" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ed860dfc9 code=0x7ffc0000 [ 1179.921820][ T30] audit: type=1326 audit(1760811430.449:2695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13219 comm="syz.1.3947" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f8ed860c810 code=0x7ffc0000 [ 1179.959060][ T30] audit: type=1326 audit(1760811430.449:2696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13219 comm="syz.1.3947" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ed860dfc9 code=0x7ffc0000 [ 1179.987337][ T30] audit: type=1326 audit(1760811430.449:2697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13219 comm="syz.1.3947" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ed860dfc9 code=0x7ffc0000 [ 1180.029168][ T30] audit: type=1326 audit(1760811430.449:2698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13219 comm="syz.1.3947" exe="/root/syz-executor" sig=0 arch=c000003e syscall=33 compat=0 ip=0x7f8ed860dfc9 code=0x7ffc0000 [ 1182.732705][ T30] kauditd_printk_skb: 23 callbacks suppressed [ 1182.732723][ T30] audit: type=1326 audit(1760811433.589:2722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13273 comm="syz.3.3961" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1182.812704][ T30] audit: type=1326 audit(1760811433.589:2723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13273 comm="syz.3.3961" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1183.334332][ T30] audit: type=1326 audit(1760811433.589:2724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13273 comm="syz.3.3961" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1183.423312][ T2627] usb 3-1: USB disconnect, device number 45 [ 1183.513097][ T30] audit: type=1326 audit(1760811433.589:2725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13273 comm="syz.3.3961" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1183.593714][ T30] audit: type=1326 audit(1760811433.589:2726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13273 comm="syz.3.3961" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1183.618760][ T30] audit: type=1326 audit(1760811433.589:2727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13273 comm="syz.3.3961" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1183.683337][ T30] audit: type=1326 audit(1760811433.589:2728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13273 comm="syz.3.3961" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1183.709599][ T30] audit: type=1326 audit(1760811433.589:2729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13273 comm="syz.3.3961" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1183.734126][ T30] audit: type=1326 audit(1760811433.589:2730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13273 comm="syz.3.3961" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83b84a8fc9 code=0x7ffc0000 [ 1183.760374][ T30] audit: type=1326 audit(1760811433.589:2731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13273 comm="syz.3.3961" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f83b84aaee7 code=0x7ffc0000 [ 1183.832111][T13298] SELinux: failed to load policy [ 1187.086351][T13354] netlink: 20 bytes leftover after parsing attributes in process `syz.4.3972'. [ 1187.095785][T13354] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3972'. [ 1188.357773][T13363] FAULT_INJECTION: forcing a failure. [ 1188.357773][T13363] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1188.395763][T13363] CPU: 0 PID: 13363 Comm: syz.3.3990 Not tainted syzkaller #0 [ 1188.403471][T13363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1188.414235][T13363] Call Trace: [ 1188.417637][T13363] [ 1188.420673][T13363] __dump_stack+0x21/0x30 [ 1188.425113][T13363] dump_stack_lvl+0xee/0x150 [ 1188.429738][T13363] ? show_regs_print_info+0x20/0x20 [ 1188.435133][T13363] ? is_bpf_text_address+0x177/0x190 [ 1188.440538][T13363] dump_stack+0x15/0x20 [ 1188.444829][T13363] should_fail+0x3c1/0x510 [ 1188.449627][T13363] should_fail_usercopy+0x1a/0x20 [ 1188.455031][T13363] _copy_from_user+0x20/0xd0 [ 1188.459941][T13363] ____sys_sendmsg+0x305/0x8c0 [ 1188.465039][T13363] ? __sys_sendmsg_sock+0x40/0x40 [ 1188.470449][T13363] ? import_iovec+0x7c/0xb0 [ 1188.474972][T13363] ___sys_sendmsg+0x1f0/0x260 [ 1188.479759][T13363] ? _kstrtoull+0x3c0/0x4d0 [ 1188.484279][T13363] ? __sys_sendmsg+0x250/0x250 [ 1188.489068][T13363] ? __fdget+0x1a1/0x230 [ 1188.493413][T13363] __sys_sendmmsg+0x278/0x480 [ 1188.498199][T13363] ? __ia32_sys_sendmsg+0x2a0/0x2a0 [ 1188.503430][T13363] ? __ia32_sys_read+0x90/0x90 [ 1188.508306][T13363] __x64_sys_sendmmsg+0xa0/0xb0 [ 1188.513305][T13363] x64_sys_call+0x6c6/0x9a0 [ 1188.518007][T13363] do_syscall_64+0x4c/0xa0 [ 1188.522462][T13363] ? clear_bhb_loop+0x50/0xa0 [ 1188.527206][T13363] ? clear_bhb_loop+0x50/0xa0 [ 1188.532074][T13363] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1188.537977][T13363] RIP: 0033:0x7f83b84a8fc9 [ 1188.542423][T13363] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1188.562723][T13363] RSP: 002b:00007f83b6f11038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1188.571156][T13363] RAX: ffffffffffffffda RBX: 00007f83b86fffa0 RCX: 00007f83b84a8fc9 [ 1188.579137][T13363] RDX: 0000000000000001 RSI: 00002000000017c0 RDI: 0000000000000003 [ 1188.587340][T13363] RBP: 00007f83b6f11090 R08: 0000000000000000 R09: 0000000000000000 [ 1188.595361][T13363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1188.603338][T13363] R13: 00007f83b8700038 R14: 00007f83b86fffa0 R15: 00007ffcf75915c8 [ 1188.611417][T13363] [ 1188.672055][ T30] kauditd_printk_skb: 78 callbacks suppressed [ 1188.672074][ T30] audit: type=1326 audit(1760811439.529:2810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13379 comm="syz.5.3994" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fce50ee3fc9 code=0x7ffc0000 [ 1188.920813][ T30] audit: type=1326 audit(1760811439.579:2811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13379 comm="syz.5.3994" exe="/root/syz-executor" sig=0 arch=c000003e syscall=13 compat=0 ip=0x7fce50ee3fc9 code=0x7ffc0000 [ 1189.482852][ T30] audit: type=1326 audit(1760811439.579:2812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13379 comm="syz.5.3994" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fce50ee3fc9 code=0x7ffc0000 [ 1189.862101][ T30] audit: type=1326 audit(1760811439.579:2813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13379 comm="syz.5.3994" exe="/root/syz-executor" sig=0 arch=c000003e syscall=7 compat=0 ip=0x7fce50ee3fc9 code=0x7ffc0000 [ 1189.934753][ T30] audit: type=1326 audit(1760811439.579:2814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13379 comm="syz.5.3994" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fce50ee3fc9 code=0x7ffc0000 [ 1189.967981][ T30] audit: type=1326 audit(1760811439.579:2815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13379 comm="syz.5.3994" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fce50ee3fc9 code=0x7ffc0000 [ 1190.002737][ T30] audit: type=1326 audit(1760811439.579:2816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13379 comm="syz.5.3994" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fce50ee3fc9 code=0x7ffc0000 [ 1190.032731][ T30] audit: type=1326 audit(1760811439.579:2817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13379 comm="syz.5.3994" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fce50ee3fc9 code=0x7ffc0000 [ 1190.122877][ T30] audit: type=1326 audit(1760811439.579:2818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13379 comm="syz.5.3994" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fce50ee3fc9 code=0x7ffc0000 [ 1190.219442][ T30] audit: type=1326 audit(1760811439.579:2819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13379 comm="syz.5.3994" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fce50ee3fc9 code=0x7ffc0000 [ 1190.819671][T13433] FAULT_INJECTION: forcing a failure. [ 1190.819671][T13433] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1190.876789][T13433] CPU: 0 PID: 13433 Comm: syz.2.4014 Not tainted syzkaller #0 [ 1190.884400][T13433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1190.894606][T13433] Call Trace: [ 1190.897909][T13433] [ 1190.900888][T13433] __dump_stack+0x21/0x30 [ 1190.905265][T13433] dump_stack_lvl+0xee/0x150 [ 1190.909977][T13433] ? show_regs_print_info+0x20/0x20 [ 1190.915301][T13433] dump_stack+0x15/0x20 [ 1190.919579][T13433] should_fail+0x3c1/0x510 [ 1190.924127][T13433] should_fail_usercopy+0x1a/0x20 [ 1190.929182][T13433] _copy_to_user+0x20/0x90 [ 1190.933855][T13433] simple_read_from_buffer+0xe9/0x160 [ 1190.939618][T13433] proc_fail_nth_read+0x19a/0x210 [ 1190.944778][T13433] ? proc_fault_inject_write+0x2f0/0x2f0 [ 1190.950464][T13433] ? security_file_permission+0x83/0xa0 [ 1190.956408][T13433] ? proc_fault_inject_write+0x2f0/0x2f0 [ 1190.962172][T13433] vfs_read+0x282/0xbe0 [ 1190.966762][T13433] ? kernel_read+0x1f0/0x1f0 [ 1190.971474][T13433] ? __kasan_check_write+0x14/0x20 [ 1190.976844][T13433] ? mutex_lock+0x95/0x1a0 [ 1190.981342][T13433] ? wait_for_completion_killable_timeout+0x10/0x10 [ 1190.988055][T13433] ? __fget_files+0x2c4/0x320 [ 1190.992776][T13433] ? __fdget_pos+0x2d2/0x380 [ 1190.997786][T13433] ? ksys_read+0x71/0x240 [ 1191.002641][T13433] ksys_read+0x140/0x240 [ 1191.006921][T13433] ? vfs_write+0xf70/0xf70 [ 1191.011462][T13433] ? debug_smp_processor_id+0x17/0x20 [ 1191.017167][T13433] __x64_sys_read+0x7b/0x90 [ 1191.021793][T13433] x64_sys_call+0x96d/0x9a0 [ 1191.026333][T13433] do_syscall_64+0x4c/0xa0 [ 1191.030878][T13433] ? clear_bhb_loop+0x50/0xa0 [ 1191.035593][T13433] ? clear_bhb_loop+0x50/0xa0 [ 1191.040625][T13433] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1191.046812][T13433] RIP: 0033:0x7f7e9f6c79dc [ 1191.051256][T13433] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1191.070990][T13433] RSP: 002b:00007f7e9e131030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1191.079436][T13433] RAX: ffffffffffffffda RBX: 00007f7e9f91ffa0 RCX: 00007f7e9f6c79dc [ 1191.087448][T13433] RDX: 000000000000000f RSI: 00007f7e9e1310a0 RDI: 0000000000000003 [ 1191.095448][T13433] RBP: 00007f7e9e131090 R08: 0000000000000000 R09: 0000000000000000 [ 1191.103857][T13433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1191.112091][T13433] R13: 00007f7e9f920038 R14: 00007f7e9f91ffa0 R15: 00007ffd536344f8 [ 1191.120106][T13433] [ 1191.685447][T13449] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4019'. [ 1193.793212][T13491] overlayfs: failed to resolve './file0': -2 [ 1194.555379][ T30] kauditd_printk_skb: 35 callbacks suppressed [ 1194.555406][ T30] audit: type=1326 audit(1760811445.379:2855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13487 comm="syz.2.4032" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1194.781696][ T30] audit: type=1326 audit(1760811445.379:2856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13487 comm="syz.2.4032" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1194.807860][ T30] audit: type=1326 audit(1760811445.379:2857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13487 comm="syz.2.4032" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f7e9f6c7810 code=0x7ffc0000 [ 1195.673262][ T30] audit: type=1326 audit(1760811445.379:2858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13487 comm="syz.2.4032" exe="/root/syz-executor" sig=0 arch=c000003e syscall=308 compat=0 ip=0x7f7e9f6ca7f7 code=0x7ffc0000 [ 1195.683247][T13516] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 1195.697355][ T30] audit: type=1326 audit(1760811445.379:2859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13487 comm="syz.2.4032" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1195.730788][ T30] audit: type=1326 audit(1760811445.379:2860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13487 comm="syz.2.4032" exe="/root/syz-executor" sig=0 arch=c000003e syscall=308 compat=0 ip=0x7f7e9f6ca7f7 code=0x7ffc0000 [ 1195.755263][ T30] audit: type=1326 audit(1760811445.379:2861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13487 comm="syz.2.4032" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f7e9f6c7c2a code=0x7ffc0000 [ 1195.896733][T13516] SELinux: failed to load policy [ 1195.918417][ T30] audit: type=1326 audit(1760811445.379:2862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13487 comm="syz.2.4032" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1196.015317][T13525] overlayfs: failed to clone upperpath [ 1196.609368][ T30] audit: type=1326 audit(1760811445.389:2863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13487 comm="syz.2.4032" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e9f6c8fc9 code=0x7ffc0000 [ 1197.655372][ T30] audit: type=1326 audit(1760811445.389:2864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13487 comm="syz.2.4032" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f7e9f6c7810 code=0x7ffc0000 [ 1199.373628][T13567] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 1199.420172][T13567] SELinux: failed to load policy [ 1201.530369][T13598] input: syz1 as /devices/virtual/input/input21 [ 1201.553186][ T30] kauditd_printk_skb: 64 callbacks suppressed [ 1201.553201][ T30] audit: type=1400 audit(1760811452.419:2929): avc: denied { read } for pid=86 comm="acpid" name="event3" dev="devtmpfs" ino=4625 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1201.599068][ T30] audit: type=1400 audit(1760811452.419:2930): avc: denied { open } for pid=86 comm="acpid" path="/dev/input/event3" dev="devtmpfs" ino=4625 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1201.623878][ T30] audit: type=1400 audit(1760811452.419:2931): avc: denied { ioctl } for pid=86 comm="acpid" path="/dev/input/event3" dev="devtmpfs" ino=4625 ioctlcmd=0x4520 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1201.652722][ T30] audit: type=1326 audit(1760811452.459:2932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13601 comm="syz.4.4066" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa85ff75fc9 code=0x7ffc0000 [ 1201.676513][ T30] audit: type=1326 audit(1760811452.459:2933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13601 comm="syz.4.4066" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa85ff75fc9 code=0x7ffc0000 [ 1201.701674][ T30] audit: type=1326 audit(1760811452.459:2934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13601 comm="syz.4.4066" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa85ff75fc9 code=0x7ffc0000 [ 1201.739865][ T30] audit: type=1326 audit(1760811452.459:2935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13601 comm="syz.4.4066" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fa85ff74810 code=0x7ffc0000 [ 1201.739920][ T30] audit: type=1326 audit(1760811452.459:2936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13601 comm="syz.4.4066" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa85ff75fc9 code=0x7ffc0000 [ 1201.739957][ T30] audit: type=1326 audit(1760811452.459:2937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13601 comm="syz.4.4066" exe="/root/syz-executor" sig=0 arch=c000003e syscall=53 compat=0 ip=0x7fa85ff75fc9 code=0x7ffc0000 [ 1201.739985][ T30] audit: type=1326 audit(1760811452.459:2938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13601 comm="syz.4.4066" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa85ff75fc9 code=0x7ffc0000 [ 1201.780132][T13616] netlink: 20 bytes leftover after parsing attributes in process `syz.3.4059'. [ 1201.780163][T13616] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4059'. [ 1202.081101][T13615] overlayfs: failed to clone upperpath [ 1202.722495][T13632] syz.5.4074 uses obsolete (PF_INET,SOCK_PACKET) [ 1202.907914][T13629] incfs: Error accessing: ./bus. [ 1202.926669][T13629] incfs: mount failed -20 [ 1203.183642][T13648] netlink: 'syz.4.4078': attribute type 4 has an invalid length. [ 1203.635512][T13650] netlink: 'syz.3.4080': attribute type 4 has an invalid length. [ 1203.715714][T13650] device bridge1 entered promiscuous mode [ 1204.280577][T13667] overlayfs: failed to resolve './file0': -2 [ 1205.813279][ T509] usb 5-1: new high-speed USB device number 52 using dummy_hcd [ 1206.073251][ T509] usb 5-1: Using ep0 maxpacket: 16 [ 1306.122586][ C1] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 1306.130353][ C1] (detected by 1, t=10002 jiffies, g=73161, q=109) [ 1306.137242][ C1] rcu: All QSes seen, last rcu_preempt kthread activity 10002 (4295067813-4295057811), jiffies_till_next_fqs=1, root ->qsmask 0x0 [ 1306.151445][ C1] rcu: rcu_preempt kthread starved for 10002 jiffies! g73161 f0x2 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 [ 1306.163525][ C1] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 1306.174555][ C1] rcu: RCU grace-period kthread stack dump: [ 1306.180561][ C1] task:rcu_preempt state:R running task stack:28720 pid: 14 ppid: 2 flags:0x00004000 [ 1306.191870][ C1] Call Trace: [ 1306.195682][ C1] [ 1306.198745][ C1] __schedule+0xb6e/0x14c0 [ 1306.203959][ C1] ? release_firmware_map_entry+0x190/0x190 [ 1306.210193][ C1] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 1306.216423][ C1] ? __mod_timer+0x7ae/0xb30 [ 1306.221462][ C1] schedule+0x11e/0x1e0 [ 1306.225738][ C1] schedule_timeout+0x12c/0x2e0 [ 1306.231176][ C1] ? console_conditional_schedule+0x30/0x30 [ 1306.238025][ C1] ? update_process_times+0x200/0x200 [ 1306.243635][ C1] ? prepare_to_swait_event+0x308/0x320 [ 1306.249557][ C1] rcu_gp_fqs_loop+0x293/0xf60 [ 1306.254668][ C1] ? debug_smp_processor_id+0x17/0x20 [ 1306.260429][ C1] ? __note_gp_changes+0x4e2/0x9e0 [ 1306.265745][ C1] ? rcu_gp_init+0xc00/0xc00 [ 1306.270800][ C1] ? _raw_spin_unlock_irq+0x4e/0x70 [ 1306.276034][ C1] ? rcu_gp_init+0x9a7/0xc00 [ 1306.280781][ C1] rcu_gp_kthread+0x98/0x330 [ 1306.285849][ C1] ? wake_nocb_gp+0x1d0/0x1d0 [ 1306.290553][ C1] ? __kasan_check_read+0x11/0x20 [ 1306.295880][ C1] ? __kthread_parkme+0xac/0x200 [ 1306.301095][ C1] ? preempt_count_add+0x90/0x1b0 [ 1306.306248][ C1] kthread+0x411/0x500 [ 1306.310341][ C1] ? wake_nocb_gp+0x1d0/0x1d0 [ 1306.315261][ C1] ? kthread_blkcg+0xd0/0xd0 [ 1306.319968][ C1] ret_from_fork+0x1f/0x30 [ 1306.324496][ C1] [ 1306.327538][ C1] rcu: Stack dump where RCU GP kthread last ran: [ 1306.333887][ C1] Sending NMI from CPU 1 to CPUs 0: [ 1306.339245][ C0] NMI backtrace for cpu 0 [ 1306.339257][ C0] CPU: 0 PID: 13696 Comm: syz.3.4097 Not tainted syzkaller #0 [ 1306.339274][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1306.339285][ C0] RIP: 0010:hrtimer_start_range_ns+0x4c4/0xc00 [ 1306.339388][ C0] Code: e8 03 48 b9 00 00 00 00 00 fc ff df 0f b6 04 08 84 c0 0f 85 cf 06 00 00 4c 63 23 e8 86 87 49 03 41 89 c6 89 c3 bf 08 00 00 00 <89> c6 e8 75 d4 0e 00 41 83 fe 07 0f 87 c9 06 00 00 e8 b6 d0 0e 00 [ 1306.339434][ C0] RSP: 0018:ffffc90000a07a38 EFLAGS: 00000082 [ 1306.339450][ C0] RAX: 0000000000000000 RBX: 0000000000000000 RCX: a1b6f476d119fd00 [ 1306.339463][ C0] RDX: 0000000000000002 RSI: ffffffff85633ee0 RDI: 0000000000000008 [ 1306.339475][ C0] RBP: ffffc90000a07ab8 R08: 0000000000000004 R09: 0000000000000003 [ 1306.339486][ C0] R10: fffff52000140f34 R11: 1ffff92000140f34 R12: 0000000000000000 [ 1306.339498][ C0] R13: ffff8881f7029a40 R14: 0000000000000000 R15: 1ffff110246cf63b [ 1306.339511][ C0] FS: 00007f83b6f116c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 1306.339527][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1306.339539][ C0] CR2: 000020000006b000 CR3: 000000011672f000 CR4: 00000000003506b0 [ 1306.339555][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1306.339565][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1306.339575][ C0] Call Trace: [ 1306.339582][ C0] [ 1306.339592][ C0] ? _raw_spin_lock_irqsave+0x110/0x110 [ 1306.339615][ C0] common_hrtimer_rearm+0xf6/0x100 [ 1306.339636][ C0] posixtimer_rearm+0x13d/0x330 [ 1306.339655][ C0] dequeue_signal+0x173/0x440 [ 1306.339675][ C0] get_signal+0x696/0x1480 [ 1306.339698][ C0] arch_do_signal_or_restart+0xc1/0x10f0 [ 1306.339719][ C0] ? load_gs_index+0xb0/0xb0 [ 1306.339735][ C0] ? get_sigframe_size+0x10/0x10 [ 1306.339754][ C0] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 1306.339779][ C0] exit_to_user_mode_loop+0xa7/0xe0 [ 1306.339796][ C0] exit_to_user_mode_prepare+0x87/0xd0 [ 1306.339813][ C0] syscall_exit_to_user_mode+0x1a/0x30 [ 1306.339829][ C0] do_syscall_64+0x58/0xa0 [ 1306.339846][ C0] ? clear_bhb_loop+0x50/0xa0 [ 1306.339862][ C0] ? clear_bhb_loop+0x50/0xa0 [ 1306.339877][ C0] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1306.339898][ C0] RIP: 0033:0x7f83b84a8fc7 [ 1306.339915][ C0] Code: ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 <0f> 05 48 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 [ 1306.339931][ C0] RSP: 002b:00007f83b6f11038 EFLAGS: 00000246 [ 1306.339945][ C0] RAX: 0000000000000113 RBX: 00007f83b86fffa0 RCX: 00007f83b84a8fc9 [ 1306.339958][ C0] RDX: 0000000000000007 RSI: 0000000000000000 RDI: 0000000000000005 [ 1306.339969][ C0] RBP: 00007f83b852bf91 R08: 0000000000000007 R09: 0000000000000000 [ 1306.339981][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1306.339992][ C0] R13: 00007f83b8700038 R14: 00007f83b86fffa0 R15: 00007ffcf75915c8 [ 1306.340010][ C0] [ 1432.472735][ C0] BUG: workqueue lockup - pool cpus=0-1 flags=0x4 nice=0 stuck for 226s! [ 1432.481448][ C0] Showing busy workqueues and worker pools: [ 1432.487902][ C0] workqueue events: flags=0x0 [ 1432.493380][ C0] pwq 2: cpus=1 node=0 flags=0x0 nice=0 active=3/256 refcnt=4 [ 1432.493440][ C0] pending: kfree_rcu_monitor, rht_deferred_worker, rht_deferred_worker [ 1432.493516][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=6/256 refcnt=7 [ 1432.493558][ C0] pending: psi_avgs_work, vmstat_shepherd, kfree_rcu_monitor, xfrm_state_gc_task, rht_deferred_worker, key_garbage_collector [ 1432.493669][ C0] workqueue events_long: flags=0x0 [ 1432.540315][ C0] pwq 2: cpus=1 node=0 flags=0x0 nice=0 active=3/256 refcnt=4 [ 1432.540380][ C0] pending: br_multicast_gc_work, br_multicast_gc_work, br_fdb_cleanup [ 1432.540445][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=4/256 refcnt=5 [ 1432.540488][ C0] pending: br_fdb_cleanup, br_multicast_gc_work, br_fdb_cleanup, br_fdb_cleanup [ 1432.540558][ C0] workqueue events_unbound: flags=0x2 [ 1432.580991][ C0] pwq 4: cpus=0-1 flags=0x4 nice=0 active=2/512 refcnt=4 [ 1432.581041][ C0] pending: toggle_allocation_gate, flush_memcg_stats_dwork [ 1432.581098][ C0] workqueue events_power_efficient: flags=0x80 [ 1432.603092][ C0] pwq 2: cpus=1 node=0 flags=0x0 nice=0 active=3/256 refcnt=4 [ 1432.603145][ C0] pending: neigh_periodic_work, check_lifetime, gc_worker [ 1432.603204][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=2/256 refcnt=3 [ 1432.603245][ C0] pending: wg_ratelimiter_gc_entries, neigh_periodic_work [ 1432.603300][ C0] workqueue mm_percpu_wq: flags=0x8 [ 1432.639427][ C0] pwq 2: cpus=1 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 [ 1432.639486][ C0] pending: vmstat_update [ 1432.639521][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 [ 1432.639563][ C0] pending: vmstat_update [ 1432.639594][ C0] workqueue writeback: flags=0x4a [ 1432.671004][ C0] pwq 4: cpus=0-1 flags=0x4 nice=0 active=1/256 refcnt=3 [ 1432.671054][ C0] pending: wb_workfn [ 1432.671088][ C0] workqueue kblockd: flags=0x18 [ 1432.687873][ C0] pwq 1: cpus=0 node=0 flags=0x0 nice=-20 active=1/256 refcnt=2 [ 1432.687932][ C0] pending: blk_mq_timeout_work [ 1432.687968][ C0] workqueue usb_hub_wq: flags=0x4 [ 1432.706390][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=2/256 refcnt=3 [ 1432.706443][ C0] in-flight: 509:hub_event hub_event [ 1432.706512][ C0] workqueue dm_bufio_cache: flags=0x8 [ 1432.726294][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 [ 1432.726349][ C0] pending: work_fn [ 1432.726383][ C0] workqueue ipv6_addrconf: flags=0x40008 [ 1432.743976][ C0] pwq 2: cpus=1 node=0 flags=0x0 nice=0 active=1/1 refcnt=2 [ 1432.744036][ C0] pending: addrconf_verify_work [ 1432.744081][ C0] workqueue wg-kex-wg0: flags=0x6 [ 1432.763419][ C0] pwq 4: cpus=0-1 flags=0x4 nice=0 active=2/256 refcnt=4 [ 1432.763470][ C0] pending: wg_packet_handshake_send_worker, wg_packet_handshake_send_worker [ 1432.763525][ C0] workqueue wg-crypt-wg0: flags=0x28 [ 1432.786136][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 [ 1432.786192][ C0] pending: wg_packet_encrypt_worker [ 1432.786237][ C0] workqueue wg-kex-wg1: flags=0x6 [ 1432.805148][ C0] pwq 4: cpus=0-1 flags=0x4 nice=0 active=2/256 refcnt=4 [ 1432.805194][ C0] pending: wg_packet_handshake_send_worker, wg_packet_handshake_send_worker [ 1432.805255][ C0] workqueue wg-crypt-wg1: flags=0x28 [ 1432.827908][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 [ 1432.827962][ C0] pending: wg_packet_encrypt_worker [ 1432.827994][ C0] workqueue wg-kex-wg2: flags=0x6 [ 1432.848015][ C0] pwq 4: cpus=0-1 flags=0x4 nice=0 active=2/256 refcnt=4 [ 1432.848066][ C0] pending: wg_packet_handshake_send_worker, wg_packet_handshake_send_worker [ 1432.848119][ C0] workqueue wg-crypt-wg2: flags=0x28 [ 1432.870267][ C0] pwq 2: cpus=1 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 [ 1432.870322][ C0] pending: wg_packet_encrypt_worker [ 1432.870358][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 [ 1432.870403][ C0] pending: wg_packet_encrypt_worker [ 1432.870436][ C0] workqueue wg-kex-wg0: flags=0x6 [ 1432.902990][ C0] pwq 4: cpus=0-1 flags=0x4 nice=0 active=1/256 refcnt=3 [ 1432.903039][ C0] pending: wg_packet_handshake_send_worker [ 1432.903080][ C0] workqueue wg-crypt-wg0: flags=0x28 [ 1432.921960][ C0] pwq 2: cpus=1 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 [ 1432.922020][ C0] pending: wg_packet_encrypt_worker [ 1432.922058][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 [ 1432.922098][ C0] pending: wg_packet_encrypt_worker [ 1432.922131][ C0] workqueue wg-kex-wg1: flags=0x6 [ 1432.954207][ C0] pwq 4: cpus=0-1 flags=0x4 nice=0 active=1/256 refcnt=3 [ 1432.954255][ C0] pending: wg_packet_handshake_send_worker [ 1432.954288][ C0] workqueue wg-crypt-wg1: flags=0x28 [ 1432.973813][ C0] pwq 2: cpus=1 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 [ 1432.973865][ C0] pending: wg_packet_encrypt_worker [ 1432.973899][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 [ 1432.973939][ C0] pending: wg_packet_encrypt_worker [ 1432.973979][ C0] workqueue wg-kex-wg2: flags=0x6 [ 1433.006120][ C0] pwq 4: cpus=0-1 flags=0x4 nice=0 active=1/256 refcnt=3 [ 1433.006169][ C0] pending: wg_packet_handshake_send_worker [ 1433.006203][ C0] workqueue wg-crypt-wg2: flags=0x28 [ 1433.025686][ C0] pwq 2: cpus=1 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 [ 1433.025746][ C0] pending: wg_packet_encrypt_worker [ 1433.025783][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 [ 1433.025824][ C0] pending: wg_packet_encrypt_worker [ 1433.025868][ C0] workqueue wg-kex-wg0: flags=0x6 [ 1433.057719][ C0] pwq 4: cpus=0-1 flags=0x4 nice=0 active=1/256 refcnt=3 [ 1433.057769][ C0] pending: wg_packet_handshake_send_worker [ 1433.057807][ C0] workqueue wg-crypt-wg0: flags=0x28 [ 1433.077214][ C0] pwq 2: cpus=1 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 [ 1433.077267][ C0] pending: wg_packet_encrypt_worker [ 1433.077302][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 [ 1433.077343][ C0] pending: wg_packet_encrypt_worker [ 1433.077376][ C0] workqueue wg-kex-wg1: flags=0x6 [ 1433.109452][ C0] pwq 4: cpus=0-1 flags=0x4 nice=0 active=2/256 refcnt=4 [ 1433.109500][ C0] pending: wg_packet_handshake_send_worker, wg_packet_handshake_send_worker [ 1433.109552][ C0] workqueue wg-crypt-wg1: flags=0x28 [ 1433.131523][ C0] pwq 2: cpus=1 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 [ 1433.131575][ C0] pending: wg_packet_encrypt_worker [ 1433.131610][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 [ 1433.131653][ C0] pending: wg_packet_encrypt_worker [ 1433.131682][ C0] workqueue wg-crypt-wg2: flags=0x28 [ 1433.165477][ C0] pwq 2: cpus=1 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 [ 1433.165530][ C0] pending: wg_packet_encrypt_worker [ 1433.165568][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 [ 1433.165609][ C0] pending: wg_packet_encrypt_worker [ 1433.165644][ C0] workqueue wg-crypt-wg0: flags=0x28 [ 1433.198049][ C0] pwq 2: cpus=1 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 [ 1433.198103][ C0] pending: wg_packet_encrypt_worker [ 1433.198140][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 [ 1433.198181][ C0] pending: wg_packet_encrypt_worker [ 1433.198211][ C0] workqueue wg-kex-wg1: flags=0x6 [ 1433.232324][ C0] pwq 4: cpus=0-1 flags=0x4 nice=0 active=1/256 refcnt=3 [ 1433.232374][ C0] pending: wg_packet_handshake_send_worker [ 1433.232409][ C0] workqueue wg-crypt-wg1: flags=0x28 [ 1433.252460][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 [ 1433.252519][ C0] pending: wg_packet_encrypt_worker [ 1433.266190][ C0] workqueue wg-kex-wg2: flags=0x6 [ 1433.271232][ C0] pwq 4: cpus=0-1 flags=0x4 nice=0 active=1/256 refcnt=3 [ 1433.271275][ C0] pending: wg_packet_handshake_send_worker [ 1433.271308][ C0] workqueue wg-crypt-wg2: flags=0x28 [ 1433.290366][ C0] pwq 2: cpus=1 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 [ 1433.290420][ C0] pending: wg_packet_encrypt_worker [ 1433.290459][ C0] pool 0: cpus=0 node=0 flags=0x0 nice=0 hung=226s workers=7 idle: 2627 486 398 563 1160 20