last executing test programs: 1.899758558s ago: executing program 3 (id=4264): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = open(0x0, 0x10b942, 0x0) sendfile(r1, r0, 0x0, 0x80000003) syz_usb_connect$cdc_ncm(0x3, 0x0, 0x0, 0x0) getrandom(&(0x7f0000000240)=""/286, 0xffffff9a, 0x0) (fail_nth: 37) 1.388192951s ago: executing program 0 (id=4274): unshare(0x22020400) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xc}, 0x8, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) dup2(r2, r2) r3 = syz_open_dev$loop(&(0x7f0000000100), 0x8001, 0x400) acct(&(0x7f0000000140)='./file0\x00') ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0x3, 0xffffffffffffffbd, 0x4}) 1.330233186s ago: executing program 0 (id=4275): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000007000000000000004b64ffeca500000050000000260000008f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) read$char_usb(r1, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.numa_stat\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0x8004587d, &(0x7f0000000080)) 1.271666822s ago: executing program 2 (id=4277): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000001e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20008081}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a64000000060a0b0400000000000000000200000038000480340001800900010068617368000000002400028008000140000000030800044000000003080003400000004db01796ba2c2fa9120900010073797a30000000000900020073797a32"], 0x8c}}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x14, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)=ANY=[@ANYBLOB="540000000101010100000000000000000200000006001240000400002c0001800c0002800500010011000000060003400000200014000180080001007f00000108000200000000000c0019"], 0x54}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1c, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b708000000002000000007020000f8ffffff00d7d5be6ade68b4408e54816d27"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket(0x40000000015, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) r4 = creat(&(0x7f0000000000)='./file0\x00', 0xecf86c37d53049cc) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101b01) r5 = syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101301) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x5522, 0x0) write$nbd(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="674466987cbb00"/16], 0x10) close(r4) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000008c0)={0x2, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 1.243761564s ago: executing program 2 (id=4279): r0 = perf_event_open(&(0x7f0000001380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x1, 0xffffffffffffffff, 0x8) (async, rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000f2ffffff0000000000000000850000001700000095"], &(0x7f0000000080)='GPL\x00'}, 0x90) (async, rerun: 32) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000000)=[{0x64, 0x0, 0x5}, {0x3, 0x0, 0xb6}, {0x6, 0x0, 0x3}]}) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x48, 0x24, 0xd0f, 0x0, 0x0, {0x60, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_prio={{0x9}, {0x18, 0x2, {0x2, "000000000000000000000500"}}}]}, 0x48}}, 0x0) (async) r4 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r4, &(0x7f0000000080)=[{{0x0, 0x0, 0x0}}], 0x40000000000012d, 0x2, 0x0) (async, rerun: 64) r5 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) r6 = socket$inet6_mptcp(0xa, 0x1, 0x106) (async) perf_event_open(&(0x7f0000000500)={0x3, 0x80, 0x6, 0x9e, 0x15, 0x8, 0x0, 0xb93, 0x20041, 0x9, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x3, 0x100000000}, 0x1020, 0x3, 0x7, 0x0, 0x472, 0x13bb4a3, 0xd71, 0x0, 0x5, 0x0, 0x2}, 0x0, 0x0, r0, 0xb) setsockopt$inet6_int(r6, 0x29, 0x3e, 0x0, 0x0) (async, rerun: 64) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f00000000c0)) (async, rerun: 64) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000d, 0x4008031, 0xffffffffffffffff, 0x0) (async) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) (async) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a32000000001400000011"], 0x7c}}, 0x0) (async, rerun: 32) r8 = memfd_secret(0x0) (rerun: 32) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f0000000800), 0x1000, &(0x7f0000000980)={'trans=fd,', {'rfdno', 0x3d, r8}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@cache_fscache}, {@noextend}, {@cache_loose}, {@fscache}, {@access_any}, {@version_L}, {@access_uid}], [{@measure}, {@appraise_type}, {@fowner_lt}]}}) (async) fcntl$setlease(r8, 0x400, 0x0) (async, rerun: 32) fremovexattr(r8, &(0x7f0000000400)=@known='system.posix_acl_access\x00') (async, rerun: 32) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r8, 0xc0bc5351, &(0x7f0000000580)={0xe0f, 0x1, 'client1\x00', 0x180000002, "e030f1fab9045adb", "b9a023012fcb5e883decf2f7da31e58b92dfd749745e69a61ca93d09c1b7d55a", 0x6, 0x96}) truncate(0x0, 0x0) (async) sendmsg$nl_generic(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="20000000350001000900000000000000040000000492d800050009"], 0x20}}, 0x0) setsockopt$inet_int(r4, 0x0, 0x7, &(0x7f0000000180)=0x6, 0x4) (async) bind$inet(r4, &(0x7f0000000040)={0x2, 0x4c24, @empty}, 0xfffffffffffffeb8) syz_emit_ethernet(0x42, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaac7aa0180c285e40f6e2d403dc0ff441409017f00000100000000ac1414bb0000000000004e20000c907801000000"], 0x0) 1.207530567s ago: executing program 2 (id=4281): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@rdma_args={0x48, 0x114, 0x1, {{0x0, 0xa00100}, {0x0}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}], 0x1}}], 0x48}, 0x0) 1.206943857s ago: executing program 2 (id=4283): r0 = socket$inet_sctp(0x2, 0x5, 0x84) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000340)='kfree\x00'}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="7c000000000101040000000000000000020000002400018014000180080001007f00000108000200ac0314bb0c0002800500010000000000240002801400018008000100ac1414aa08000200ac1414000c000280050001000000000008000740000000000400170014001640000000000000000000000000000000008c91e7a179692c3f227a47c1df5c1b5bb1f9afc972297875d14a9910da9ad05dfbbcd13e32ce4be17f6ec179c8fc76a5ba3658ce65795d8f1d0ad11f58412cfc0bce387eaaa893ee5355624f44167dad1695b524c93a0e47e835c0e8bbeda623617aefa6804fce4827cf8b6cc3e4595086c376804536819005976bf142a44f12f503af4b637fe2b8d26d671c95df76d992a6ff35"], 0x7c}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) r3 = epoll_create1(0x0) io_setup(0xe, &(0x7f00000002c0)=0x0) io_submit(r4, 0x1, &(0x7f00000009c0)=[&(0x7f0000000400)={0x0, 0x0, 0x0, 0x2, 0x0, r3, &(0x7f0000000300)}]) mbind(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="18010000007b00000000000000000000850000007b00000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={0x0, r5}, 0x10) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000e74000/0x4000)=nil) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x88000, 0x0, 0xfe, 0x0, &(0x7f0000000000)) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r2, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8a08880}, 0xc, &(0x7f00000003c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e4000000", @ANYRES16=0x0, @ANYBLOB="000026bd7000fedbdf2513000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b005db700000600110003000000080001007063690011000200303030303a30303a31302e300008000b00ffffff7f0600110000080000080001007063690011006ef3cdd45d563afd89bf0200303030303a30303a31302e3080000000080003000200000008000b0003000000060000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b0004000000060011003c0f00000000000000"], 0xe4}, 0x1, 0x0, 0x0, 0x4004004}, 0x4000) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000340), 0x0, &(0x7f0000000180)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x30]}}}}]}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r7 = open(&(0x7f0000000200)='./bus\x00', 0x141a42, 0x0) sendfile(r7, r6, 0x0, 0x100800001) mremap(&(0x7f0000eb6000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000d17000/0x1000)=nil) r8 = socket$inet_udp(0x2, 0x2, 0x0) close(r8) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000040)={0x0, 0x0, 0x0, {0x0, 0xa}, {}, @const={0x0, {0x0, 0x8, 0x4}}}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4808000010001fff3a4ee9bfd5c3a3696c40af0b", @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800a00010076786c616e"], 0x3}}, 0x0) splice(0xffffffffffffffff, 0x0, r8, 0x0, 0x4ffe2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000100), 0x8) 1.206741467s ago: executing program 2 (id=4284): socket(0x10, 0x3, 0x0) setgid(0xee00) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0x1}, 0x62) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r4) r5 = socket$inet(0xa, 0x801, 0x84) connect$inet(r5, &(0x7f0000004cc0)={0x2, 0x0, @private=0xa010101}, 0x10) listen(r5, 0x8) sendto$inet(0xffffffffffffffff, &(0x7f0000000100)="e4", 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x4}, 0x8) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3={0x0, 0x0, 0x1000}, 0x1c) close(0xffffffffffffffff) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_open_dev$usbfs(&(0x7f0000000100), 0x75, 0x1a9a81) r6 = syz_usbip_server_init(0x5) write$usbip_server(r6, &(0x7f0000002680)=ANY=[@ANYBLOB="00000001"], 0x30) bind$bt_hci(r1, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) io_setup(0x8, &(0x7f00000002c0)=0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x9, 0x0, 0x8000}, 0x48) io_submit(r7, 0x1, &(0x7f0000000340)=[&(0x7f0000000100)={0x2000000000, 0x4, 0x0, 0x1, 0x0, r1, &(0x7f0000000040)="0200ffff0000", 0x6}]) r8 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r8) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) syz_open_procfs(r0, &(0x7f0000000140)='smaps_rollup\x00') 1.146144122s ago: executing program 3 (id=4287): syz_mount_image$ext4(&(0x7f0000000780)='ext3\x00', &(0x7f00000000c0)='./file1\x00', 0x3000480, &(0x7f0000000100)={[], [{@appraise_type}]}, 0x45, 0x7ac, &(0x7f0000000f80)="$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") r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r1 = syz_mount_image$ext4(&(0x7f00000010c0)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x28a090, &(0x7f0000000b80)={[{@min_batch_time={'min_batch_time', 0x3d, 0x103}}, {@nombcache}, {@dioread_lock}, {@grpquota}, {@orlov}, {@lazytime}, {@nouid32}, {@i_version}, {@grpjquota_path={'grpjquota', 0x3d, './file0/file0'}}, {@grpquota}], [{@fowner_eq}, {@pcr={'pcr', 0x3d, 0x3e}}, {@appraise_type}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, '*#,^#(%('}}]}, 0xfe, 0x54d, &(0x7f0000000400)="$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") setxattr$trusted_overlay_upper(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000001400), &(0x7f0000000380)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRESHEX=r1, @ANYRES32=0x0, @ANYRES16, @ANYRESOCT=r0, @ANYRESOCT=r1], 0x386, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x24, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, "0062ba0700000000ebffffff0000f77fff00"}) dup3(0xffffffffffffffff, r0, 0x0) ioperm(0x0, 0x4, 0x1) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext, 0x101014}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="010000000000000000001b000000070021"], 0x1c}}, 0x0) bind$inet(r3, &(0x7f0000000340)={0xa, 0x0, @loopback}, 0x57) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000003200)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x56}, 0x3d) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r5) r6 = socket(0x21, 0x2, 0x10000000000002) connect$rxrpc(r6, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x3a) sendmmsg(r6, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000010010000010000000000060000000000"], 0x18, 0xe000}, 0x5}], 0x1, 0x0) 1.085140587s ago: executing program 1 (id=4288): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000098c0), 0x0, 0x0) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000280)={0x0, 0x10100000, 0xf463, 0x0, 0x0, "83843c556dec3a9a90800124b904cfc27929a3"}) 1.030242182s ago: executing program 1 (id=4289): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) shmat(r0, &(0x7f0000ffb000/0x4000)=nil, 0x5000) socket$kcm(0x2, 0x3, 0x84) socket$key(0xf, 0x3, 0x2) listen(0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000016c0), 0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001d80)={&(0x7f0000001b80)={0x20, r2, 0x101, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x20}}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x5, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1f, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00'}) sendmsg$nl_route(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="3400000011000500000000000000000007000000", @ANYBLOB="6d08168e5dd54eef9d49e0ba289ff3552260c99ed506d8f28743708911857d3e", @ANYBLOB="00000000007f000014001a80"], 0x34}}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x2, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb}}, &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x29}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) 636.897585ms ago: executing program 4 (id=4291): socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000006c0)=0x100, 0x4) bind$inet6(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x545c, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x121201, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x15, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xd46}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00ff0200"/51], 0xfdef) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000040)={0x2d1, 0x0, 0x0, 0xffffffff, 0x0, "9ed98f159c35c80c45535d77abf995e5e5e541"}) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000000)) 622.605926ms ago: executing program 4 (id=4292): socket$inet_mptcp(0x2, 0x1, 0x106) (async) r0 = socket(0x2, 0x80805, 0x0) (async, rerun: 32) getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000003140)=""/4095, &(0x7f0000000000)=0xfff) (rerun: 32) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r1) (async) socket$inet(0x2, 0x2, 0x1) (async) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) (async, rerun: 64) getsockopt$bt_hci(r0, 0x84, 0x75, &(0x7f0000000000)=""/4071, &(0x7f0000001080)=0xfe7) (async, rerun: 64) socket$nl_route(0x10, 0x3, 0x0) (async, rerun: 64) r2 = socket$netlink(0x10, 0x3, 0x0) (rerun: 64) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="4000000010001f85236ccc4ce75fa61b6d6978d0", @ANYRES32=0x0, @ANYBLOB="0000000000000000180012800e0001007769726567756172640000000400028008000a00b8"], 0x40}}, 0x0) (async) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18010000070080001b00000018000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='mm_page_free\x00', r3}, 0x10) 562.324462ms ago: executing program 4 (id=4293): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_request_inode\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2200002, &(0x7f0000000080), 0x1, 0x53c, &(0x7f00000025c0)="$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") creat(&(0x7f0000000180)='./file0\x00', 0x980000) 562.093202ms ago: executing program 4 (id=4294): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) write(0xffffffffffffffff, &(0x7f0000000000), 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000140)) fsetxattr(0xffffffffffffffff, &(0x7f0000000080)=@known='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, "0062ba7d82000000000000000027d1287cff00"}) r1 = syz_open_pts(r0, 0x0) r2 = dup(r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) dup3(r0, r2, 0x0) r3 = dup3(r1, r0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000000)=0x13) r4 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000380)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000180)=0x10) r5 = socket$inet(0x2, 0x80001, 0x84) io_uring_setup(0x46a0, &(0x7f0000001240)={0x0, 0x0, 0x0, 0xfffffffc, 0x10000000}) r6 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r7 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r7, 0x0, &(0x7f00000000c0)=0x0) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r9) ioperm(0x0, 0x444, 0x1) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x9, 0x0) sendmsg$NFC_CMD_DEV_UP(r9, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c0000", @ANYBLOB, @ANYRES32=r8], 0x1c}}, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, 0x0, &(0x7f00000003c0)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, &(0x7f0000000440)) connect$nfc_llcp(r6, &(0x7f0000000000)={0x27, r8, 0x0, 0x0, 0x0, 0x0, "f235cd041ecfd237d48b9fc39aa09025f026b0634b6f82bded015a1b2cc967eff95fd0b6841d40ae65cd6ddd03de31eba0328a09ff4f717c7b1b1c65e750c8", 0x1d}, 0x60) listen(r6, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x7a, &(0x7f0000000200)={r10, 0x5, "179da51a4e"}, &(0x7f00000000c0)=0xd) 561.754041ms ago: executing program 4 (id=4295): r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'netdevsim0\x00', 0x0}) capset(&(0x7f0000000300)={0x20080522}, &(0x7f0000000340)) syz_io_uring_setup(0xcdc, &(0x7f00000003c0)={0x0, 0x50000, 0x612, 0x0, 0x4000}, 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x1, 0x261, 0xcd0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000000000), &(0x7f0000000080)=@udp}, 0x20) preadv(r3, &(0x7f0000000880)=[{&(0x7f0000000180)=""/190, 0xbe}, {&(0x7f0000000240)=""/187, 0xbb}, {&(0x7f0000000000)=""/24, 0x18}, {&(0x7f00000000c0)=""/51, 0x33}, {&(0x7f0000000dc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/110, 0x6e}, {&(0x7f0000001dc0)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/140, 0x8c}, {&(0x7f0000000680)=""/216, 0xd8}, {&(0x7f0000000780)=""/252, 0xfc}], 0xa, 0xa10, 0x80000001) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000240), 0x21, 0x4a6, &(0x7f0000000a40)="$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") r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x420440, 0x0) dup3(r5, r4, 0x0) io_setup(0x6, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0xf04aef, 0x3d8, 0x4, 0x0, 0x0, r4, 0x0}]) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000d80)={{r3, 0xffffffffffffffff}, &(0x7f0000000d00), &(0x7f0000000d40)='%+9llu \x00'}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r3}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r7, &(0x7f0000000340)='{', &(0x7f0000000400)=@tcp6}, 0x20) 516.428016ms ago: executing program 0 (id=4296): r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f00000001c0)=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x10) connect$tipc(r0, &(0x7f0000000080)=@name, 0x10) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40c8, &(0x7f0000000200), 0xfb, 0x496, &(0x7f0000000f40)="$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") r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={{0x14, 0x3e8}, [], {0x14, 0x3ea}}, 0x28}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000140)='mmap_lock_acquire_returned\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r4, 0x5c3c3000) mknodat$null(r4, 0x0, 0x40, 0x103) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000540), 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r5}, 0x3b) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000001c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xffffffffffffffff}, @exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000)='//\x00sC\xf740\xd8c\n&\x10\xff\xa4\xc9Xne\xf44.\x00'}, 0x30) close(r2) r6 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r6, 0x0) r7 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) 486.073708ms ago: executing program 0 (id=4297): perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0xb98}}, 0x0) mremap(&(0x7f0000812000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000ff5000/0x3000)=nil) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) pwritev2(0xffffffffffffffff, &(0x7f00000015c0), 0x0, 0x3, 0xfffffffd, 0x0) 453.777231ms ago: executing program 0 (id=4298): r0 = socket(0x2, 0x80805, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000001c0), 0x10) 453.281321ms ago: executing program 0 (id=4299): syz_mount_image$ext4(&(0x7f0000000780)='ext3\x00', &(0x7f00000000c0)='./file1\x00', 0x3000480, &(0x7f0000000100)={[], [{@appraise_type}]}, 0x45, 0x7ac, &(0x7f0000000f80)="$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") openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000140)={0x0, 0x0}) write(r0, &(0x7f0000000000)="fa", 0xfffffdef) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext, 0x101014}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000003200)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x56}, 0x3d) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 396.961696ms ago: executing program 2 (id=4300): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0x18, 0x20000000, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x0) splice(r1, 0x0, r3, 0x0, 0xfdef, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000280), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @empty}, 0x67) recvmsg$qrtr(r3, &(0x7f0000000a40)={&(0x7f00000002c0), 0xc, &(0x7f00000009c0)=[{&(0x7f0000000380)=""/151, 0x97}, {&(0x7f0000000600)=""/109, 0x6d}, {&(0x7f0000000680)=""/251, 0xfb}, {&(0x7f0000000440)=""/49, 0x31}, {&(0x7f0000000780)=""/92, 0x5c}, {&(0x7f0000000800)=""/250, 0xfa}, {&(0x7f0000000900)=""/147, 0x93}], 0x7, &(0x7f0000001480)=[{0x1010, 0x0, 0x0, ""/4096}, {0xb8, 0x0, 0x0, ""/161}], 0x10c8, 0x10200}, 0x38, 0x40012103) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) syz_emit_ethernet(0x3a, &(0x7f0000000200)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x6, 0x4, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4}]}}}}}}}, 0x0) 322.176202ms ago: executing program 4 (id=4301): syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x814c10, &(0x7f0000000600)=ANY=[@ANYBLOB="0084963f0b4883b8a8c2473034b4d1bf2472a76bae620cf3103903000dd411504d4e94b297af91b5987ce6f2a41ded7058c59e21ca7cd641ceefa13f36ecd31510824d45c4c80b9afe91872a"], 0xfd, 0x1c9, &(0x7f0000000980)="$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") prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f00000000c0)) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) shmget(0x1, 0x4000, 0x0, &(0x7f000081d000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f00000006c0)='net/dev\x00') preadv(r0, &(0x7f0000000900)=[{&(0x7f0000000300)=""/22, 0x16}, {&(0x7f0000000b80)=""/71, 0x47}, {&(0x7f0000000100)=""/43, 0xe}], 0x3, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='io.stat\x00', 0x275a, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f00000002c0)='syzkaller\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90) close(r4) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000800), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x80000000}, 0x10}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=0x1, r5, 0x26, 0x4, 0x0, @link_fd=r1}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)=r4}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r7}, &(0x7f0000000100), &(0x7f0000000140)=r4}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000540), &(0x7f0000000580)=r0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x6, 0x11, &(0x7f0000000340)=ANY=[@ANYRES32=r5, @ANYRES32, @ANYBLOB="0000000000000000b70800000b0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000184b0000f8ffffff0000000000000000"], &(0x7f0000000280)='syzkaller\x00', 0x7, 0x6b, &(0x7f0000000400)=""/107, 0x41100, 0x84, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f00000004c0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x9, 0x5, 0x7fff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r3, r1, 0xffffffffffffffff, r1, r3, 0xffffffffffffffff, r7, r8], &(0x7f0000000700), 0x10, 0xffffffad}, 0x90) creat(&(0x7f0000000880)='./bus\x00', 0x47) r9 = socket(0x2, 0x80805, 0x0) perf_event_open(0x0, 0x0, 0x80000, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) mmap(&(0x7f000000d000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="b40800000000000061106500000000000600000000000000950000000000000053fd83dde7ddf757bf"], &(0x7f0000000840)='syzkaller\x00', 0x6, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x8, 0x10, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6}, 0x10}, 0x90) setsockopt$inet_sctp6_SCTP_RTOINFO(r9, 0x84, 0x0, &(0x7f00000001c0), 0x10) ioctl$FIOCLEX(r9, 0x5451) 267.131077ms ago: executing program 3 (id=4302): socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000006c0)=0x100, 0x4) bind$inet6(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x545c, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x121201, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x15, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xd46}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00ff0200"/51], 0xfdef) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000040)={0x2d1, 0x0, 0x0, 0xffffffff, 0x0, "9ed98f159c35c80c45535d77abf995e5e5e541"}) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000000)) 210.929292ms ago: executing program 3 (id=4303): rt_sigreturn() sendmsg$NL80211_CMD_GET_MPATH(0xffffffffffffffff, 0x0, 0x20008800) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x8) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x2) rt_sigreturn() pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0, 0x2) quotactl_fd$Q_QUOTAOFF(0xffffffffffffffff, 0xffffffff80000302, 0xee00, 0x0) 207.849442ms ago: executing program 1 (id=4304): syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x3000490, &(0x7f0000000380), 0x45, 0x7ac, &(0x7f0000000f80)="$eJzs3c9rHNcdAPDvrFY/7VYqFFr3JCi0BuNV5ap2C4Wq9FAKNRiSc2yxWgtHK63RrowlRGITArkEkpBbcvE5Py8h1/w45JL8H8HGSWQThxyCwuwPaWXtyru2tGvHnw+M9d7MG733nTf75mlnvBvAU2sy/ScTcSwiXksixuvrk4gYrKayEbO1cvc2N/LpksTW1jPfJtUydzc38tG0T+pIPfP7iPjs5YgTmb31ltfWF+eKxcJKPT9VWbo8VV5bP3lpaW6hsFBYPj09M3PqzN/OnD64WL//av3ordf/++f3Z3986XcfvPp5ErNxtL6tOY6DMhmT9WMymB7CXf5z0JX1zUcvdFCo6QzIHmZj6FLaMQP1XjkW4zGwX/+M9rJlAMBheTEittoZaLsFAHiiJbXr/7/63Q4AoFca7wPc3dzIN5b+viPRW7f/HREjtfgb9zdrW7L1e3Yj1fugY3eTXXdGkoiYOID6JyPi7Y+fezdd4pDuQwK0cu16RFyYmNw7/id7nlno1l9ar15ozkzet9H4B73zSTr/+Xur+V9me/4TLeY/wy1euw/jwa//zM0DqKatdP73z6Zn2+41xV83MVDP/ao65xtMLl4qFtKx7dcRcTwGh9P89D51HL/z051225rnf9+98fw7af3pz50SmZvZ4d37zM9V5h4l5ma3r0f8Idsq/nT8H672f9Jm/nuuwzr+949X3mq3LY0/jbex7I3/cG3diPhTy/5Ptssk+z6fOFU9HaYaJ0ULH87GWLv6J7M7/Z8uaf2NvwV6Ie3/sf3jn0ian9csd/yrt58W+/LG+KftCjWf/63jb33+DyXPVtND9XVX5yqVlemIoeT/e9ef2tm3kW+UT+M//sfWr//G+Nfq/E//JrzQ4YHI3vrmvYeP/3Cl8c931f9dJ2Lk3uJAu/o76/+ZXft0Mv512sCHPW4AAAAAAAAAAAAAAAAAAAAAAAAA0I1MRByNJJPbTmcyuVztO7x/G2OZYqlcOXGxtLo8H9Xvyp6IwUzjoy7Hmz4Pdbr+efiN/Kn78n+NiN9ExJvDo9V8Ll8qzvc7eAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACoO9Lm+/9TXw/3u3UAwKEZGeh3CwCAHkuy2X43AQDotZGuSo8eWjsAgN7p7voPAPwSuP4DwNPnAdd//w0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAR3Xu7Nl02fphcyOf5uevrK0ulq6cnC+UF3NLq/lcvrRyObdQKi0UC7l8aantL7pW+1EslS7PxPLq1alKoVyZKq+tn18qrS5Xzl9amlsonC8M9iwyAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOhceW19ca5YLKxI9CWx+EWtHx6X9kh0l4hrtf57XNpzcIkY2hklRvszOAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8AX4OAAD//1N1IyI=") r0 = perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0xfffffffe, 0x8, 0x0, 0x0, 0x0, 0x0, 0xffffff75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = syz_io_uring_setup(0xd7b, &(0x7f00000035c0)={0x0, 0x0, 0x20, 0x0, 0x348, 0x0, r2}, &(0x7f00000004c0)=0x0, &(0x7f0000000480)=0x0) syz_io_uring_submit(r4, r5, 0x0) io_uring_enter(r3, 0x291c, 0x0, 0x0, 0x0, 0x0) r6 = open(0x0, 0x222080, 0x182) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) unshare(0x20000400) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, 0x0) syz_emit_ethernet(0x14, &(0x7f0000000440)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa8863"], 0x0) getsockopt$inet6_mreq(r6, 0x29, 0x1c, 0x0, 0x0) getsockname$packet(r6, 0x0, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, 0x0) sendmsg$nl_route(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000010000304000400000000000000007400", @ANYRES32=0x0, @ANYBLOB="00000000031201001c0012800b00010062726964676500000c0002800500190007000000"], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x10) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x1000410, &(0x7f0000000440)={[{@grpid}, {@grpquota}]}, 0x4, 0x4eb, &(0x7f0000000540)="$eJzs3c9vVFsdAPDvnXZoKQMFZaFGBRFFQ5j+ABqCC2GjMYTESFy5gNoOTdMZpum0SCuLsnRvIokr/RPcuTBh5cKdO925wYUJKnkv9CVvMS/3zqUd2g7te7Qd6Hw+ye2955xhvufMcM6Ze2B6AuhZZyNiNSKORMS9iBjO85P8iButI33cq5ePp9ZePp5Kotm8878kK0/zou3PpI7lzzkYET/7ccQvk61xG8src5PVamUhT48s1uZHGssrl2YLec74xNjE6LXLV8f3rK1nan968aPZWz//y5+/8fzvq9//dVqt0m+OZ2Xt7dhLraYXo9SW1x8Rt/YjWJf0539/+PCkve1LEXEu6//D0Ze9mwDAYdZsDkdzuD0NABx26f1/KZJCOV8LKEWhUC631vBOx1ChWm8sXhyuLz2YjmwN62QUC/dnq5XRfK3wZBSTND2WXW+kxzelL0fEqYj47cDRLF2eqlenu/nBBwB62LFN8//HA635HwA45Aa7XQEA4MCZ/wGg95j/AaD3fI7537cDAeCQcP8PAL3H/A8AvWfH+f/JwdQDADgQP719Oz2aa/nvv55+uLz0g9LDS9OVxly5tjRVnqovzJdn6vWZaqU81Wzu9HzVen1+7Mp6srG8crdWX3qweHe2NjlTuVsp7nN7AICdnTrz7J9JRKxeP5od0baXg7kaDrdCtysAdE1ftysAdI3v80Dv2sU9vmUAOOS22aL3DR3/i9BTm7/Ch+rCV63/Q6+y/g+964ut//9wz+sBHDzr/9C7ms3Env8A0GOs8QPv9O//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0KNK2ZEUytle4Kvpz0K5HHE8Ik5GMbk/W62MRsSJiPjHQHEgTY91u9IAwDsq/CfJ9/+6MHy+tLn0SPLJQHaOiF/9/s7vHk0uLi6Mpfn/X89ffJrnjx/pRgMAgHY3tma15un83HYj/+rl46nXx0FW8cXN1uaiady1/GiV9Ed/dh6MYkQMfZTk6Zb080rfHsRffRIRX9lo/6O2CKVsDaS18+nm+Gns4/sQf+P13xy/8Eb8QlaWnovZa/HlPagL9JpnN1vjZN730i6W979CnM3O2/f/wWyEenevx7+1LeNfYX3869sSP8n6/Nn19Ntr8uLKX3+yJbM53Cp7EvG1/u3iJ+vxkw7j7/ldtvFfX//muU5lzT9EXIjt47fUsmF2ZLE2P9JYXrk0W5ucqcxUHoyPT4xNjF67fHV8JFujbv3823Yx/nv94olO8dP2D3WIP7hD+7+zy/b/8dN7v/jWW+J/79vbv/+n3xI/nRO/u8v4k0M3Om7fncaf7tD+nd7/i7uM//zfK9O7fCgAcAAayytzk9VqZWGHi/Sz5k6PcfFhXsRqxHtQDRfv1UW3RyZgv210+m7XBAAAAAAAAAAAAAAA6KSxvDI3EPv7daJutxEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDD67MAAAD//w/PzvM=") r9 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r9, 0x40086602, &(0x7f0000000000)=0x10) writev(r9, &(0x7f0000000b80)=[{&(0x7f00000000c0)="13ca6a44dbcc", 0x6}], 0x1) r10 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r10, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="97000000437d65a83f6ac143f69474ee2ae8e0d7c4455247ea3d48c279e5b2ee76d249b297fd7e61f5891d8a8de73acbb1f6264293b51fff6f87e934c77ff6caa4af1255288dffb748a87d9b67ebe69f885bcbfeebdb8a5ddc41ff2eb7d79f7b8b51637b85aca3cc40e2a8bca54874074694f24601616448ae4ffa920b215422486822473d04850ca6b00d27df0e0ea6b469378079a2fac23e6b2a1daa0e7f670cf1193d30e3ad646146709d0cd847a4a9f3c69ab1ead185e2b404d5c0a73cd4ab49f36c45de88560079b34d89789dd5304f7282f1adbaa416d0c5e592b9f2c529e86fb04f6a09b8c6d90ee733b40f1365", @ANYRES16=r11, @ANYBLOB="080029bd7000ffdbdf25080000002600070073797374656d5f753a6f626a6563745f723a646863705f73746174655f743a733000000014000200ff02000000000000000000000000000108000500ac1414aa050001000000000008000500ac1e0101"], 0x68}, 0x1, 0x0, 0x0, 0x50}, 0x20004800) 118.279309ms ago: executing program 3 (id=4305): bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x6b, 0x7fdf, 0x1}, 0x48) r0 = syz_open_dev$sg(&(0x7f0000000440), 0x0, 0x181801) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2010, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xd48}, 0x0, 0x10, 0xffffffffffffffff, 0xb) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) r1 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x862b01) sendmsg$OSF_MSG_REMOVE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1508}, 0x1, 0x0, 0x0, 0x8050}, 0x800) write$char_usb(r1, &(0x7f0000000040)="e2", 0x2250) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000000)=ANY=[@ANYRES64=r0, @ANYRES16=r0]) 96.778591ms ago: executing program 3 (id=4306): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000007000000000000004b64ffeca500000050000000260000008f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) read$char_usb(r1, &(0x7f00000030c0)=""/4110, 0x100e) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.numa_stat\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0x8004587d, &(0x7f0000000080)) 89.298022ms ago: executing program 1 (id=4307): socket$kcm(0x2, 0xa, 0x2) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000240)=[{0x0}, {&(0x7f00000001c0)=""/65, 0x41}], 0x2, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) mbind(&(0x7f0000ff6000/0xa000)=nil, 0xa000, 0x4002, &(0x7f0000000000)=0x2, 0x3, 0x0) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4002, &(0x7f0000000000)=0x2, 0x83, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a09000000000002000000020000000900020073797a310000000008000440000000000900010073797a30000000000800034000000005"], 0x64}}, 0x2000000) 6.312639ms ago: executing program 1 (id=4308): bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x16, 0x0, 0x4, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4020940d, &(0x7f00000005c0)=0x80000000000004) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000"], 0x0}, 0x90) fcntl$getown(0xffffffffffffffff, 0x9) sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)=0x2) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001a0001000000000000800000810080000000000080ff0000140002"], 0x30}}, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x31, &(0x7f0000000000)=0xb2, 0x4) mknodat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x22) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'bridge_slave_0\x00', 0x0}) socket$inet_icmp_raw(0x2, 0x3, 0x1) 0s ago: executing program 1 (id=4309): socket$nl_netfilter(0x10, 0x3, 0xc) socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x3e, &(0x7f00000009c0)=ANY=[@ANYBLOB="bbbbbbbbbbbbaaaaaaaaaaaa86dd60f4adf700082c00fe800000000000000000000000000000ff020000000000000000000000000001810090780000000089f3903586dade3e13536379d23d39377bc9b0c354fdbbea4dde9160d4e79d7a438a7f4d89f5fceae46703757930512736b30e73dec3fbb7ebbda1eb563bec7dd8302c0a81a2ce2df9e2d959eb1b812493ab2321696f32575a85ad75f45cd3bb2e47d611b1abcb57bd574e3223d471e3e45a84649e84202b0e389a760fec42a6d1c2c27e"], 0x0) r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4d8, 0xf002, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x7}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0400000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffff04f29252e9000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70200000200f100850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r3}, 0x10) (async) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) (async) r4 = dup2(r1, r1) (async) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_MPATH(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000a40)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r5, @ANYBLOB="2107000000000000000015"], 0x1c}}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = socket(0x1e, 0x4, 0x0) (async) r8 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r8, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x1}, 0x10) (async) setsockopt$packet_tx_ring(r7, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200000001600156f000000000000000009000000", @ANYRES32=0x0, @ANYBLOB="77fd1fe0f609940d"], 0x20}}, 0x0) (async) sendmmsg(r7, &(0x7f00000030c0)=[{{0x0, 0xa9cc7003, &(0x7f0000000400)=[{&(0x7f00000000c0)="ee", 0x101d0}], 0x1}}], 0x400000000000181, 0x9200000000000000) (async) close_range(r6, 0xffffffffffffffff, 0x0) (async) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r9, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r10}, 0x10) kernel console output (not intermixed with test programs): e="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fc535c48810 code=0x7ffc0000 [ 257.808268][ T29] audit: type=1326 audit(1724479458.888:9012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15464 comm="syz.2.2660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=80 compat=0 ip=0x7fc535c48bf7 code=0x7ffc0000 [ 257.821940][T15476] syzkaller0: entered promiscuous mode [ 257.831710][ T29] audit: type=1326 audit(1724479458.888:9013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15464 comm="syz.2.2660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fc535c48810 code=0x7ffc0000 [ 257.837182][T15476] syzkaller0: entered allmulticast mode [ 257.848060][T15474] FAULT_INJECTION: forcing a failure. [ 257.848060][T15474] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 257.860672][ T29] audit: type=1326 audit(1724479458.888:9014): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15464 comm="syz.2.2660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc535c49e79 code=0x7ffc0000 [ 257.860706][ T29] audit: type=1326 audit(1724479458.888:9015): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15464 comm="syz.2.2660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc535c49e79 code=0x7ffc0000 [ 257.866358][T15474] CPU: 0 UID: 0 PID: 15474 Comm: syz.1.2663 Not tainted 6.11.0-rc4-syzkaller-00236-g60f0560f53e3 #0 [ 257.879737][ T29] audit: type=1326 audit(1724479458.888:9016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15464 comm="syz.2.2660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fc535c49e79 code=0x7ffc0000 [ 257.903157][T15474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 257.903171][T15474] Call Trace: [ 257.903179][T15474] [ 257.903188][T15474] dump_stack_lvl+0xf2/0x150 [ 257.926806][ T29] audit: type=1326 audit(1724479458.888:9017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15464 comm="syz.2.2660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc535c49e79 code=0x7ffc0000 [ 257.937437][T15474] dump_stack+0x15/0x20 [ 257.937477][T15474] should_fail_ex+0x229/0x230 [ 257.960868][ T29] audit: type=1326 audit(1724479458.888:9018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15464 comm="syz.2.2660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc535c49e79 code=0x7ffc0000 [ 257.970862][T15474] should_fail+0xb/0x10 [ 258.042114][T15474] should_fail_usercopy+0x1a/0x20 [ 258.047251][T15474] copy_page_from_iter_atomic+0x22a/0xda0 [ 258.053098][T15474] ? shmem_write_begin+0xa0/0x1c0 [ 258.058176][T15474] ? shmem_write_begin+0x10c/0x1c0 [ 258.063423][T15474] generic_perform_write+0x323/0x580 [ 258.068797][T15474] shmem_file_write_iter+0xc8/0xf0 [ 258.073950][T15474] vfs_write+0x78f/0x900 [ 258.078235][T15474] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 258.084105][T15474] ksys_write+0xeb/0x1b0 [ 258.088360][T15474] __x64_sys_write+0x42/0x50 [ 258.093006][T15474] x64_sys_call+0x27dd/0x2d60 [ 258.097757][T15474] do_syscall_64+0xc9/0x1c0 [ 258.102359][T15474] ? clear_bhb_loop+0x55/0xb0 [ 258.107113][T15474] ? clear_bhb_loop+0x55/0xb0 [ 258.111870][T15474] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 258.117855][T15474] RIP: 0033:0x7f664b7b9e79 [ 258.122265][T15474] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 258.141923][T15474] RSP: 002b:00007f664a431038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 258.150351][T15474] RAX: ffffffffffffffda RBX: 00007f664b955f80 RCX: 00007f664b7b9e79 [ 258.158348][T15474] RDX: 000000000208e24b RSI: 0000000020000040 RDI: 0000000000000005 [ 258.166315][T15474] RBP: 00007f664a431090 R08: 0000000000000000 R09: 0000000000000000 [ 258.174430][T15474] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 258.182478][T15474] R13: 0000000000000000 R14: 00007f664b955f80 R15: 00007ffe2d14afc8 [ 258.190453][T15474] [ 258.205997][ T29] audit: type=1326 audit(1724479458.888:9019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15464 comm="syz.2.2660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=49 compat=0 ip=0x7fc535c49e79 code=0x7ffc0000 [ 258.229522][ T29] audit: type=1326 audit(1724479458.888:9020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15464 comm="syz.2.2660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc535c49e79 code=0x7ffc0000 [ 258.258762][T14343] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 258.261187][T15478] netlink: 156 bytes leftover after parsing attributes in process `syz.4.2666'. [ 258.313062][T15482] dummy0: entered promiscuous mode [ 258.319713][T15482] dummy0: left promiscuous mode [ 258.345195][T15484] bridge0: port 3(syz_tun) entered blocking state [ 258.351805][T15484] bridge0: port 3(syz_tun) entered disabled state [ 258.366379][T15484] syz_tun: entered allmulticast mode [ 258.372980][T15484] syz_tun: entered promiscuous mode [ 258.382238][T15484] bridge0: port 3(syz_tun) entered blocking state [ 258.388755][T15484] bridge0: port 3(syz_tun) entered forwarding state [ 258.401632][T15488] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:20002. Sending cookies. [ 258.559030][T15509] FAULT_INJECTION: forcing a failure. [ 258.559030][T15509] name failslab, interval 1, probability 0, space 0, times 0 [ 258.571839][T15509] CPU: 0 UID: 0 PID: 15509 Comm: syz.3.2679 Not tainted 6.11.0-rc4-syzkaller-00236-g60f0560f53e3 #0 [ 258.578787][T15507] syzkaller0: entered promiscuous mode [ 258.582596][T15509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 258.582618][T15509] Call Trace: [ 258.588086][T15507] syzkaller0: entered allmulticast mode [ 258.598089][T15509] [ 258.598099][T15509] dump_stack_lvl+0xf2/0x150 [ 258.614540][T15509] dump_stack+0x15/0x20 [ 258.618789][T15509] should_fail_ex+0x229/0x230 [ 258.623499][T15509] ? __alloc_skb+0x10b/0x310 [ 258.628111][T15509] should_failslab+0x8f/0xb0 [ 258.632725][T15509] kmem_cache_alloc_node_noprof+0x51/0x2b0 [ 258.638554][T15509] __alloc_skb+0x10b/0x310 [ 258.643042][T15509] audit_log_start+0x368/0x6b0 [ 258.648433][T15509] ? __bpf_prog_run32+0x74/0xa0 [ 258.653366][T15509] audit_seccomp+0x4b/0x130 [ 258.657894][T15509] __seccomp_filter+0x6fa/0x1180 [ 258.662881][T15509] ? proc_fail_nth_write+0x130/0x160 [ 258.668197][T15509] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 258.673848][T15509] ? vfs_write+0x5a5/0x900 [ 258.678267][T15509] __secure_computing+0x9f/0x1c0 [ 258.683266][T15509] syscall_trace_enter+0xd1/0x1f0 [ 258.688404][T15509] do_syscall_64+0xaa/0x1c0 [ 258.693070][T15509] ? clear_bhb_loop+0x55/0xb0 [ 258.697825][T15509] ? clear_bhb_loop+0x55/0xb0 [ 258.702602][T15509] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 258.708578][T15509] RIP: 0033:0x7fd8d6489e79 [ 258.713179][T15509] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 258.732863][T15509] RSP: 002b:00007fd8d5101038 EFLAGS: 00000246 ORIG_RAX: 000000000000011a [ 258.741278][T15509] RAX: ffffffffffffffda RBX: 00007fd8d6625f80 RCX: 00007fd8d6489e79 [ 258.749246][T15509] RDX: 0000000000000008 RSI: 00000000200001c0 RDI: ffffffffffffffff [ 258.757347][T15509] RBP: 00007fd8d5101090 R08: 0000000000000000 R09: 0000000000000000 [ 258.765336][T15509] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 258.773317][T15509] R13: 0000000000000000 R14: 00007fd8d6625f80 R15: 00007fffece03108 [ 258.781377][T15509] [ 258.815565][T15514] lo speed is unknown, defaulting to 1000 [ 259.011220][T15549] syzkaller0: entered promiscuous mode [ 259.017844][T15549] syzkaller0: entered allmulticast mode [ 259.161816][T15558] FAULT_INJECTION: forcing a failure. [ 259.161816][T15558] name failslab, interval 1, probability 0, space 0, times 0 [ 259.174502][T15558] CPU: 1 UID: 0 PID: 15558 Comm: syz.3.2698 Not tainted 6.11.0-rc4-syzkaller-00236-g60f0560f53e3 #0 [ 259.185291][T15558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 259.195360][T15558] Call Trace: [ 259.198649][T15558] [ 259.201672][T15558] dump_stack_lvl+0xf2/0x150 [ 259.206442][T15558] dump_stack+0x15/0x20 [ 259.210680][T15558] should_fail_ex+0x229/0x230 [ 259.215381][T15558] ? scm_fp_dup+0x40/0x210 [ 259.219897][T15558] should_failslab+0x8f/0xb0 [ 259.224571][T15558] __kmalloc_node_track_caller_noprof+0xa6/0x380 [ 259.230972][T15558] kmemdup_noprof+0x2a/0x60 [ 259.235514][T15558] scm_fp_dup+0x40/0x210 [ 259.239835][T15558] unix_stream_read_generic+0x9df/0x13b0 [ 259.245604][T15558] unix_stream_recvmsg+0xc4/0xf0 [ 259.250557][T15558] ? __pfx_unix_stream_read_actor+0x10/0x10 [ 259.256469][T15558] ? __pfx_unix_stream_recvmsg+0x10/0x10 [ 259.262198][T15558] sock_recvmsg_nosec+0x107/0x140 [ 259.267319][T15558] ____sys_recvmsg+0x271/0x280 [ 259.272185][T15558] do_recvmmsg+0x2eb/0x720 [ 259.276710][T15558] __x64_sys_recvmmsg+0xe2/0x170 [ 259.281665][T15558] x64_sys_call+0x26e3/0x2d60 [ 259.286387][T15558] do_syscall_64+0xc9/0x1c0 [ 259.290968][T15558] ? clear_bhb_loop+0x55/0xb0 [ 259.295667][T15558] ? clear_bhb_loop+0x55/0xb0 [ 259.300380][T15558] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 259.306460][T15558] RIP: 0033:0x7fd8d6489e79 [ 259.310908][T15558] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 259.330633][T15558] RSP: 002b:00007fd8d5101038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 259.339106][T15558] RAX: ffffffffffffffda RBX: 00007fd8d6625f80 RCX: 00007fd8d6489e79 [ 259.347097][T15558] RDX: 0000000000000700 RSI: 0000000020001140 RDI: 0000000000000004 [ 259.355124][T15558] RBP: 00007fd8d5101090 R08: 0000000000000000 R09: 0000000000000000 [ 259.363156][T15558] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002 [ 259.371172][T15558] R13: 0000000000000000 R14: 00007fd8d6625f80 R15: 00007fffece03108 [ 259.379234][T15558] [ 259.565139][T15578] can0: slcan on ttyS3. [ 259.658138][T15586] futex_wake_op: syz.3.2708 tries to shift op by 32; fix this program [ 259.666307][T15582] syzkaller0: entered promiscuous mode [ 259.671903][T15582] syzkaller0: entered allmulticast mode [ 259.956210][T15610] can0 (unregistered): slcan off ttyS3. [ 260.011620][T15612] syzkaller0: entered promiscuous mode [ 260.017123][T15612] syzkaller0: entered allmulticast mode [ 260.536417][T15636] syzkaller0: entered promiscuous mode [ 260.541934][T15636] syzkaller0: entered allmulticast mode [ 260.577558][T15640] lo speed is unknown, defaulting to 1000 [ 260.591974][T15641] lo speed is unknown, defaulting to 1000 [ 260.824206][T15666] syzkaller0: entered promiscuous mode [ 260.829830][T15666] syzkaller0: entered allmulticast mode [ 261.084564][T15707] syzkaller0: entered promiscuous mode [ 261.090156][T15707] syzkaller0: entered allmulticast mode [ 261.738020][T15735] syzkaller0: entered promiscuous mode [ 261.743531][T15735] syzkaller0: entered allmulticast mode [ 261.848798][T15738] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) Aug 24 06:04:22 syzkaller daemon.err dhcpcd[2997]: ps_sendpsmmsg: Connection refused Aug 24 06:04:22 syzkaller daemon.err dhcpcd[2997]: ps_root_recvmsgcb: failed to send message to pid 12228: Connection refused [ 261.958217][T15750] tc_dump_action: action bad kind [ 261.988531][T15754] FAULT_INJECTION: forcing a failure. [ 261.988531][T15754] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 262.001709][T15754] CPU: 0 UID: 0 PID: 15754 Comm: syz.3.2781 Not tainted 6.11.0-rc4-syzkaller-00236-g60f0560f53e3 #0 [ 262.012569][T15754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 262.022650][T15754] Call Trace: [ 262.025935][T15754] [ 262.028872][T15754] dump_stack_lvl+0xf2/0x150 [ 262.033628][T15754] dump_stack+0x15/0x20 [ 262.037823][T15754] should_fail_ex+0x229/0x230 [ 262.042588][T15754] should_fail+0xb/0x10 [ 262.046763][T15754] should_fail_usercopy+0x1a/0x20 [ 262.051907][T15754] _copy_from_user+0x1e/0xd0 [ 262.056631][T15754] copy_msghdr_from_user+0x54/0x2a0 [ 262.062027][T15754] __sys_sendmmsg+0x22a/0x500 [ 262.066791][T15754] __x64_sys_sendmmsg+0x57/0x70 [ 262.071670][T15754] x64_sys_call+0xa49/0x2d60 [ 262.076300][T15754] do_syscall_64+0xc9/0x1c0 [ 262.080936][T15754] ? clear_bhb_loop+0x55/0xb0 [ 262.085683][T15754] ? clear_bhb_loop+0x55/0xb0 [ 262.090375][T15754] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 262.096297][T15754] RIP: 0033:0x7fd8d6489e79 [ 262.100724][T15754] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 262.120430][T15754] RSP: 002b:00007fd8d5101038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 262.128893][T15754] RAX: ffffffffffffffda RBX: 00007fd8d6625f80 RCX: 00007fd8d6489e79 [ 262.136867][T15754] RDX: 040000000000009f RSI: 00000000200002c0 RDI: 0000000000000003 [ 262.144836][T15754] RBP: 00007fd8d5101090 R08: 0000000000000000 R09: 0000000000000000 [ 262.152804][T15754] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 262.160810][T15754] R13: 0000000000000000 R14: 00007fd8d6625f80 R15: 00007fffece03108 [ 262.168789][T15754] [ 262.239480][T15763] syzkaller0: entered promiscuous mode [ 262.245003][T15763] syzkaller0: entered allmulticast mode [ 262.328416][T15782] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 262.334969][T15782] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 262.342833][T15782] vhci_hcd vhci_hcd.0: Device attached [ 262.354169][T15784] vhci_hcd: unknown pdu 1 [ 262.358947][ T4477] vhci_hcd: stop threads [ 262.363224][ T4477] vhci_hcd: release socket [ 262.367810][ T4477] vhci_hcd: disconnect device Aug 24 06:04:23 syzkaller daemon.err dhcpcd[2997]: ps_sendpsmmsg: Connection refused Aug 24 06:04:23 syzkaller daemon.err dhcpcd[2997]: ps_root_recvmsgcb: failed to send message to pid 12246: Connection refused [ 262.548063][T15817] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65041 sclass=netlink_route_socket pid=15817 comm=syz.3.2807 [ 262.620614][T15821] syzkaller0: entered promiscuous mode [ 262.626138][T15821] syzkaller0: entered allmulticast mode [ 262.788073][ T29] kauditd_printk_skb: 1598 callbacks suppressed [ 262.788090][ T29] audit: type=1400 audit(1724479463.898:10617): avc: denied { read write } for pid=14343 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 262.830481][ T29] audit: type=1400 audit(1724479463.938:10618): avc: denied { name_bind } for pid=15830 comm="syz.2.2814" src=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=0 [ 262.855957][ T29] audit: type=1400 audit(1724479463.938:10619): avc: denied { read write } for pid=14343 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 262.880528][ T29] audit: type=1400 audit(1724479463.938:10620): avc: denied { create } for pid=15822 comm="syz.3.2810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 262.908130][ T29] audit: type=1400 audit(1724479464.018:10621): avc: denied { read write } for pid=15833 comm="syz.2.2815" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 262.947889][T15840] can0: slcan on ptm0. [ 262.951429][ T29] audit: type=1400 audit(1724479464.018:10622): avc: denied { create } for pid=15833 comm="syz.2.2815" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 262.971815][ T29] audit: type=1400 audit(1724479464.018:10623): avc: denied { prog_load } for pid=15833 comm="syz.2.2815" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 262.991071][ T29] audit: type=1400 audit(1724479464.018:10624): avc: denied { create } for pid=15833 comm="syz.2.2815" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=0 [ 263.010817][ T29] audit: type=1400 audit(1724479464.018:10625): avc: denied { read write } for pid=14343 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 263.035194][ T29] audit: type=1400 audit(1724479464.018:10626): avc: denied { create } for pid=15836 comm="syz.2.2816" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 263.090239][T15846] syzkaller0: entered promiscuous mode [ 263.095746][T15846] syzkaller0: entered allmulticast mode [ 263.096297][T15839] can0 (unregistered): slcan off ptm0. [ 263.207002][T15864] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=62042 sclass=netlink_route_socket pid=15864 comm=syz.4.2829 [ 263.210027][T15866] netlink: 'syz.3.2827': attribute type 29 has an invalid length. [ 263.225814][T15863] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 263.234249][T15863] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 263.237361][T15866] netlink: 'syz.3.2827': attribute type 29 has an invalid length. [ 263.242027][T15863] vhci_hcd vhci_hcd.0: Device attached [ 263.258140][T15867] vhci_hcd: connection closed [ 263.258530][ T4477] vhci_hcd: stop threads [ 263.267723][ T4477] vhci_hcd: release socket [ 263.268842][T15865] netlink: 'syz.3.2827': attribute type 29 has an invalid length. [ 263.272127][ T4477] vhci_hcd: disconnect device [ 263.292926][T15874] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(4) [ 263.299501][T15874] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 263.307259][T15874] vhci_hcd vhci_hcd.0: Device attached [ 263.324594][T15878] vhci_hcd: unknown pdu 1 [ 263.330881][ T4477] vhci_hcd: stop threads [ 263.335258][ T4477] vhci_hcd: release socket [ 263.339742][ T4477] vhci_hcd: disconnect device Aug 24 06:04:24 syzkaller daemon.err dhcpcd[2997]: ps_sendpsmmsg: Connection refused Aug 24 06:04:24 syzkaller daemon.err dhcpcd[2997]: ps_root_recvmsgcb: failed to send message to pid 12297: Connection refused [ 263.392099][T15889] syzkaller0: entered promiscuous mode [ 263.397937][T15889] syzkaller0: entered allmulticast mode [ 264.034715][T15919] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 264.064773][T15921] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(3) [ 264.071311][T15921] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 264.079016][T15921] vhci_hcd vhci_hcd.0: Device attached [ 264.085551][T15922] vhci_hcd: connection closed [ 264.089734][ T50] vhci_hcd: stop threads [ 264.098781][ T50] vhci_hcd: release socket [ 264.103265][ T50] vhci_hcd: disconnect device [ 264.216007][T15931] syzkaller0: entered promiscuous mode [ 264.221540][T15931] syzkaller0: entered allmulticast mode [ 264.743174][T15969] syzkaller0: entered promiscuous mode [ 264.748743][T15969] syzkaller0: entered allmulticast mode [ 264.759400][T15977] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 264.765981][T15977] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 264.773811][T15977] vhci_hcd vhci_hcd.0: Device attached [ 264.782073][T15978] vhci_hcd: connection closed [ 264.782185][T11192] vhci_hcd: stop threads [ 264.791207][T11192] vhci_hcd: release socket [ 264.795639][T11192] vhci_hcd: disconnect device [ 265.886975][T16038] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(3) [ 265.893525][T16038] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 265.901240][T16038] vhci_hcd vhci_hcd.0: Device attached [ 265.907929][T16039] vhci_hcd: connection closed [ 265.908208][T11192] vhci_hcd: stop threads [ 265.917237][T11192] vhci_hcd: release socket [ 265.921683][T11192] vhci_hcd: disconnect device Aug 24 06:04:27 syzkaller daemon.err dhcpcd[2997]: ps_sendpsmmsg: Connection refused Aug 24 06:04:27 syzkaller daemon.err dhcpcd[2997]: ps_root_recvmsgcb: failed to send message to pid 12403: Connection refused [ 266.975542][T16088] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(3) [ 266.982114][T16088] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 266.989934][T16088] vhci_hcd vhci_hcd.0: Device attached [ 267.000669][T16089] vhci_hcd: connection closed [ 267.005783][ T50] vhci_hcd: stop threads [ 267.015105][ T50] vhci_hcd: release socket [ 267.019580][ T50] vhci_hcd: disconnect device [ 267.186325][T16115] lo speed is unknown, defaulting to 1000 [ 267.646493][T16171] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(3) [ 267.653068][T16171] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 267.660803][T16171] vhci_hcd vhci_hcd.0: Device attached [ 267.678026][T16174] vhci_hcd: connection closed [ 267.679033][ T4477] vhci_hcd: stop threads [ 267.688111][ T4477] vhci_hcd: release socket [ 267.692569][ T4477] vhci_hcd: disconnect device [ 267.765159][T16180] FAULT_INJECTION: forcing a failure. [ 267.765159][T16180] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 267.778469][T16180] CPU: 1 UID: 0 PID: 16180 Comm: syz.4.2952 Not tainted 6.11.0-rc4-syzkaller-00236-g60f0560f53e3 #0 [ 267.789246][T16180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 267.799296][T16180] Call Trace: [ 267.802569][T16180] [ 267.805493][T16180] dump_stack_lvl+0xf2/0x150 [ 267.810091][T16180] dump_stack+0x15/0x20 [ 267.814250][T16180] should_fail_ex+0x229/0x230 [ 267.818938][T16180] should_fail_alloc_page+0xfd/0x110 [ 267.824243][T16180] __alloc_pages_noprof+0x109/0x360 [ 267.829458][T16180] alloc_pages_mpol_noprof+0xb1/0x1e0 [ 267.834835][T16180] alloc_pages_noprof+0xe1/0x100 [ 267.839798][T16180] __pmd_alloc+0x4b/0x3c0 [ 267.844155][T16180] copy_page_range+0x3676/0x38c0 [ 267.845783][ T29] kauditd_printk_skb: 1411 callbacks suppressed [ 267.845799][ T29] audit: type=1400 audit(1724479468.955:12038): avc: denied { read write } for pid=13682 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 267.849103][T16180] ? mod_objcg_state+0x2ea/0x4f0 [ 267.865209][ T29] audit: type=1400 audit(1724479468.955:12039): avc: denied { map_create } for pid=16181 comm="syz.1.2953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 267.880232][T16180] ? try_charge_memcg+0x5fc/0x780 [ 267.880279][T16180] ? mas_wr_walk_descend+0x359/0x410 [ 267.908613][ T29] audit: type=1400 audit(1724479468.955:12040): avc: denied { prog_load } for pid=16181 comm="syz.1.2953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 267.910299][T16180] ? mas_wr_end_piv+0x15f/0x480 [ 267.915584][ T29] audit: type=1400 audit(1724479468.955:12041): avc: denied { create } for pid=16181 comm="syz.1.2953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 267.934824][T16180] ? mas_wr_store_entry+0x250/0x390 [ 267.934860][T16180] copy_mm+0x973/0x10e0 [ 267.934891][T16180] copy_process+0xee1/0x1fc0 [ 267.939728][ T29] audit: type=1400 audit(1724479469.015:12042): avc: denied { read write } for pid=16181 comm="syz.1.2953" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 267.960436][T16180] kernel_clone+0x167/0x5e0 [ 267.965629][ T29] audit: type=1400 audit(1724479469.015:12043): avc: denied { create } for pid=16181 comm="syz.1.2953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 267.969754][T16180] ? vfs_write+0x5a5/0x900 [ 267.969793][T16180] __x64_sys_clone+0xe8/0x120 [ 267.969820][T16180] x64_sys_call+0x2d23/0x2d60 [ 267.969851][T16180] do_syscall_64+0xc9/0x1c0 [ 267.974412][ T29] audit: type=1400 audit(1724479469.015:12044): avc: denied { open } for pid=16181 comm="syz.1.2953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 267.998509][T16180] ? clear_bhb_loop+0x55/0xb0 [ 268.003006][ T29] audit: type=1400 audit(1724479469.015:12045): avc: denied { read } for pid=16181 comm="syz.1.2953" dev="nsfs" ino=4026533484 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 268.022671][T16180] ? clear_bhb_loop+0x55/0xb0 [ 268.027097][ T29] audit: type=1400 audit(1724479469.015:12046): avc: denied { prog_load } for pid=16181 comm="syz.1.2953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 268.031740][T16180] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 268.036406][ T29] audit: type=1400 audit(1724479469.015:12047): avc: denied { create } for pid=16181 comm="syz.1.2953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 268.040874][T16180] RIP: 0033:0x7f0c710c9e79 [ 268.140016][T16180] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 268.159645][T16180] RSP: 002b:00007f0c6fd46fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 268.168095][T16180] RAX: ffffffffffffffda RBX: 00007f0c71265f80 RCX: 00007f0c710c9e79 [ 268.176081][T16180] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 268.184061][T16180] RBP: 00007f0c6fd47090 R08: 0000000000000000 R09: 0000000000000000 [ 268.192044][T16180] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 268.200025][T16180] R13: 0000000000000000 R14: 00007f0c71265f80 R15: 00007ffda43a0fc8 [ 268.208006][T16180] [ 268.295933][T16204] FAULT_INJECTION: forcing a failure. [ 268.295933][T16204] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 268.309108][T16204] CPU: 0 UID: 0 PID: 16204 Comm: syz.0.2964 Not tainted 6.11.0-rc4-syzkaller-00236-g60f0560f53e3 #0 [ 268.320001][T16204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 268.330073][T16204] Call Trace: [ 268.333364][T16204] [ 268.336307][T16204] dump_stack_lvl+0xf2/0x150 [ 268.340957][T16204] dump_stack+0x15/0x20 [ 268.345370][T16204] should_fail_ex+0x229/0x230 [ 268.350177][T16204] should_fail+0xb/0x10 [ 268.354363][T16204] should_fail_usercopy+0x1a/0x20 [ 268.359502][T16204] copy_page_from_iter_atomic+0x22a/0xda0 [ 268.365372][T16204] ? shmem_write_begin+0xa0/0x1c0 [ 268.370428][T16204] ? shmem_write_begin+0x10c/0x1c0 [ 268.375613][T16204] generic_perform_write+0x323/0x580 [ 268.380954][T16204] shmem_file_write_iter+0xc8/0xf0 [ 268.386099][T16204] vfs_write+0x78f/0x900 [ 268.390369][T16204] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 268.396284][T16204] ksys_write+0xeb/0x1b0 [ 268.397079][T16211] syzkaller0: entered promiscuous mode [ 268.400540][T16204] __x64_sys_write+0x42/0x50 [ 268.406052][T16211] syzkaller0: entered allmulticast mode [ 268.410563][T16204] x64_sys_call+0x27dd/0x2d60 [ 268.420883][T16204] do_syscall_64+0xc9/0x1c0 [ 268.425495][T16204] ? clear_bhb_loop+0x55/0xb0 [ 268.430265][T16204] ? clear_bhb_loop+0x55/0xb0 [ 268.434948][T16204] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 268.440857][T16204] RIP: 0033:0x7fc12c9b895f [ 268.445316][T16204] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48 [ 268.464986][T16204] RSP: 002b:00007fc12b636d40 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 268.473406][T16204] RAX: ffffffffffffffda RBX: 0000000000100000 RCX: 00007fc12c9b895f [ 268.481379][T16204] RDX: 0000000000100000 RSI: 00007fc123217000 RDI: 0000000000000004 [ 268.489371][T16204] RBP: 0000000000000000 R08: 0000000000000000 R09: 00000000000005ea [ 268.497345][T16204] R10: 00000000000003ee R11: 0000000000000293 R12: 0000000000000004 [ 268.505401][T16204] R13: 00007fc12b636dec R14: 00007fc12b636df0 R15: 00007fc123217000 [ 268.513651][T16204] [ 268.541032][T16216] FAULT_INJECTION: forcing a failure. [ 268.541032][T16216] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 268.554219][T16216] CPU: 0 UID: 0 PID: 16216 Comm: syz.0.2968 Not tainted 6.11.0-rc4-syzkaller-00236-g60f0560f53e3 #0 [ 268.565052][T16216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 268.573087][T16219] FAULT_INJECTION: forcing a failure. [ 268.573087][T16219] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 268.575104][T16216] Call Trace: [ 268.575113][T16216] [ 268.575121][T16216] dump_stack_lvl+0xf2/0x150 [ 268.604460][T16216] dump_stack+0x15/0x20 [ 268.609172][T16216] should_fail_ex+0x229/0x230 [ 268.614958][T16216] should_fail+0xb/0x10 [ 268.619754][T16216] should_fail_usercopy+0x1a/0x20 [ 268.624937][T16216] _copy_from_user+0x1e/0xd0 [ 268.629550][T16216] kstrtouint_from_user+0x76/0xe0 [ 268.634626][T16216] proc_fail_nth_write+0x4f/0x160 [ 268.639692][T16216] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 268.645340][T16216] vfs_write+0x28b/0x900 [ 268.649676][T16216] ? __fget_files+0x1da/0x210 [ 268.654396][T16216] ksys_write+0xeb/0x1b0 [ 268.658702][T16216] __x64_sys_write+0x42/0x50 [ 268.663319][T16216] x64_sys_call+0x27dd/0x2d60 [ 268.668003][T16216] do_syscall_64+0xc9/0x1c0 [ 268.672568][T16216] ? clear_bhb_loop+0x55/0xb0 [ 268.677253][T16216] ? clear_bhb_loop+0x55/0xb0 [ 268.682012][T16216] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 268.687925][T16216] RIP: 0033:0x7fc12c9b895f [ 268.692338][T16216] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48 [ 268.712137][T16216] RSP: 002b:00007fc12b637030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 268.720553][T16216] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fc12c9b895f [ 268.728529][T16216] RDX: 0000000000000001 RSI: 00007fc12b6370a0 RDI: 0000000000000004 [ 268.736500][T16216] RBP: 00007fc12b637090 R08: 0000000000000000 R09: 0000000000000027 [ 268.744518][T16216] R10: 0000000000000011 R11: 0000000000000293 R12: 0000000000000001 [ 268.752549][T16216] R13: 0000000000000000 R14: 00007fc12cb55f80 R15: 00007ffed23c0c38 [ 268.760548][T16216] [ 268.763567][T16219] CPU: 1 UID: 0 PID: 16219 Comm: syz.2.2969 Not tainted 6.11.0-rc4-syzkaller-00236-g60f0560f53e3 #0 [ 268.774435][T16219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 268.784663][T16219] Call Trace: [ 268.787948][T16219] [ 268.790899][T16219] dump_stack_lvl+0xf2/0x150 [ 268.795530][T16219] dump_stack+0x15/0x20 [ 268.799766][T16219] should_fail_ex+0x229/0x230 [ 268.804477][T16219] should_fail+0xb/0x10 [ 268.808666][T16219] should_fail_usercopy+0x1a/0x20 [ 268.813750][T16219] _copy_from_iter+0xd3/0xb00 [ 268.818447][T16219] ? __alloc_skb+0x1b5/0x310 [ 268.823144][T16219] ? kmalloc_reserve+0x16e/0x190 [ 268.828099][T16219] ? __build_skb_around+0x196/0x1f0 [ 268.833311][T16219] ? __alloc_skb+0x21f/0x310 [ 268.837954][T16219] ? __virt_addr_valid+0x1ed/0x250 [ 268.843108][T16219] ? __check_object_size+0x35b/0x510 [ 268.848511][T16219] netlink_sendmsg+0x460/0x6e0 [ 268.853328][T16219] ? __pfx_netlink_sendmsg+0x10/0x10 [ 268.858711][T16219] __sock_sendmsg+0x140/0x180 [ 268.863482][T16219] ____sys_sendmsg+0x312/0x410 [ 268.868277][T16219] __sys_sendmsg+0x1e9/0x280 [ 268.872887][T16219] __x64_sys_sendmsg+0x46/0x50 [ 268.877740][T16219] x64_sys_call+0x2689/0x2d60 [ 268.882490][T16219] do_syscall_64+0xc9/0x1c0 [ 268.887087][T16219] ? clear_bhb_loop+0x55/0xb0 [ 268.891796][T16219] ? clear_bhb_loop+0x55/0xb0 [ 268.896560][T16219] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 268.902471][T16219] RIP: 0033:0x7fc535c49e79 [ 268.906890][T16219] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 268.926546][T16219] RSP: 002b:00007fc5348c1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 268.934970][T16219] RAX: ffffffffffffffda RBX: 00007fc535de5f80 RCX: 00007fc535c49e79 [ 268.942940][T16219] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 268.950910][T16219] RBP: 00007fc5348c1090 R08: 0000000000000000 R09: 0000000000000000 [ 268.958887][T16219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 268.967000][T16219] R13: 0000000000000000 R14: 00007fc535de5f80 R15: 00007ffd61a190f8 [ 268.974979][T16219] [ 269.001343][T16230] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 269.007925][T16230] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 269.015996][T16230] vhci_hcd vhci_hcd.0: Device attached [ 269.022515][T16231] vhci_hcd: connection closed [ 269.022904][ T4477] vhci_hcd: stop threads [ 269.032436][ T4477] vhci_hcd: release socket [ 269.036953][ T4477] vhci_hcd: disconnect device [ 269.243015][T16267] syzkaller0: entered promiscuous mode [ 269.248835][T16267] syzkaller0: entered allmulticast mode [ 269.775468][T16321] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 269.782013][T16321] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 269.789793][T16321] vhci_hcd vhci_hcd.0: Device attached [ 269.796711][T16322] vhci_hcd: connection closed [ 269.796859][T15287] vhci_hcd: stop threads [ 269.805817][T15287] vhci_hcd: release socket [ 269.810309][T15287] vhci_hcd: disconnect device [ 270.190421][T16339] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=16339 comm=syz.3.3016 [ 271.131710][T16374] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(3) [ 271.138271][T16374] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 271.145996][T16374] vhci_hcd vhci_hcd.0: Device attached [ 271.152480][T16375] vhci_hcd: connection closed [ 271.152632][T15287] vhci_hcd: stop threads [ 271.161686][T15287] vhci_hcd: release socket [ 271.166122][T15287] vhci_hcd: disconnect device [ 271.484474][T16400] syzkaller0: entered promiscuous mode [ 271.490098][T16400] syzkaller0: entered allmulticast mode [ 271.519456][T16406] FAULT_INJECTION: forcing a failure. [ 271.519456][T16406] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 271.532683][T16406] CPU: 1 UID: 0 PID: 16406 Comm: syz.1.3043 Not tainted 6.11.0-rc4-syzkaller-00236-g60f0560f53e3 #0 [ 271.543508][T16406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 271.553571][T16406] Call Trace: [ 271.556843][T16406] [ 271.559767][T16406] dump_stack_lvl+0xf2/0x150 [ 271.564397][T16406] dump_stack+0x15/0x20 [ 271.568620][T16406] should_fail_ex+0x229/0x230 [ 271.573297][T16406] should_fail+0xb/0x10 [ 271.577468][T16406] should_fail_usercopy+0x1a/0x20 [ 271.582582][T16406] _copy_to_user+0x1e/0xa0 [ 271.587089][T16406] simple_read_from_buffer+0xa0/0x110 [ 271.592471][T16406] proc_fail_nth_read+0xff/0x140 [ 271.597411][T16406] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 271.602957][T16406] vfs_read+0x1a2/0x6e0 [ 271.607149][T16406] ? __rcu_read_unlock+0x4e/0x70 [ 271.612156][T16406] ? __fget_files+0x1da/0x210 [ 271.616825][T16406] ksys_read+0xeb/0x1b0 [ 271.621006][T16406] __x64_sys_read+0x42/0x50 [ 271.625517][T16406] x64_sys_call+0x27d3/0x2d60 [ 271.630227][T16406] do_syscall_64+0xc9/0x1c0 [ 271.634749][T16406] ? clear_bhb_loop+0x55/0xb0 [ 271.639504][T16406] ? clear_bhb_loop+0x55/0xb0 [ 271.644180][T16406] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 271.650094][T16406] RIP: 0033:0x7f664b7b88bc [ 271.654522][T16406] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 271.674147][T16406] RSP: 002b:00007f664a431030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 271.682601][T16406] RAX: ffffffffffffffda RBX: 00007f664b955f80 RCX: 00007f664b7b88bc [ 271.690581][T16406] RDX: 000000000000000f RSI: 00007f664a4310a0 RDI: 0000000000000004 [ 271.698555][T16406] RBP: 00007f664a431090 R08: 0000000000000000 R09: 0000000000000000 [ 271.706543][T16406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 271.714656][T16406] R13: 0000000000000000 R14: 00007f664b955f80 R15: 00007ffe2d14afc8 [ 271.722656][T16406] [ 271.923387][T16449] syzkaller0: entered promiscuous mode [ 271.928952][T16449] syzkaller0: entered allmulticast mode [ 272.288820][T16454] FAULT_INJECTION: forcing a failure. [ 272.288820][T16454] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 272.302150][T16454] CPU: 1 UID: 0 PID: 16454 Comm: syz.3.3060 Not tainted 6.11.0-rc4-syzkaller-00236-g60f0560f53e3 #0 [ 272.312921][T16454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 272.322975][T16454] Call Trace: [ 272.326256][T16454] [ 272.329282][T16454] dump_stack_lvl+0xf2/0x150 [ 272.334000][T16454] dump_stack+0x15/0x20 [ 272.338214][T16454] should_fail_ex+0x229/0x230 [ 272.343023][T16454] should_fail_alloc_page+0xfd/0x110 [ 272.348451][T16454] __alloc_pages_noprof+0x109/0x360 [ 272.353712][T16454] alloc_pages_mpol_noprof+0xb1/0x1e0 [ 272.359089][T16454] vma_alloc_folio_noprof+0x1a0/0x2f0 [ 272.364518][T16454] do_wp_page+0x62b/0x22c0 [ 272.368941][T16454] ? finish_task_switch+0xb5/0x2b0 [ 272.374075][T16454] ? __rcu_read_lock+0x36/0x50 [ 272.378908][T16454] handle_mm_fault+0xbf0/0x2940 [ 272.383848][T16454] exc_page_fault+0x296/0x650 [ 272.388538][T16454] asm_exc_page_fault+0x26/0x30 [ 272.393421][T16454] RIP: 0010:__put_user_8+0x11/0x20 [ 272.398609][T16454] Code: 84 00 00 00 00 00 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 48 89 cb 48 c1 fb 3f 48 09 d9 0f 01 cb <48> 89 01 31 c9 0f 01 ca c3 cc cc cc cc 66 90 90 90 90 90 90 90 90 [ 272.418343][T16454] RSP: 0018:ffffc9000166fec0 EFLAGS: 00050202 [ 272.424422][T16454] RAX: 00007fd8d715f000 RBX: 0000000000000000 RCX: 0000000020001140 [ 272.432466][T16454] RDX: 0000000000000841 RSI: 0000000000000000 RDI: ffff888118ec4b68 [ 272.440502][T16454] RBP: ffffc9000166ff48 R08: 0001888118ec4b6f R09: 0000000000000000 [ 272.448472][T16454] R10: 0001ffffffffffff R11: 000188812f971000 R12: 0000000000000000 [ 272.456470][T16454] R13: 000000000000001c R14: ffff888118ec4b40 R15: 0000000020001140 [ 272.464473][T16454] __se_sys_io_setup+0x95/0x1b0 [ 272.469360][T16454] __x64_sys_io_setup+0x31/0x40 [ 272.474225][T16454] x64_sys_call+0x2639/0x2d60 [ 272.479004][T16454] do_syscall_64+0xc9/0x1c0 [ 272.483539][T16454] ? clear_bhb_loop+0x55/0xb0 [ 272.488323][T16454] ? clear_bhb_loop+0x55/0xb0 [ 272.492998][T16454] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 272.498902][T16454] RIP: 0033:0x7fd8d6489e79 [ 272.503315][T16454] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 272.523048][T16454] RSP: 002b:00007fd8d50e0038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ce [ 272.531457][T16454] RAX: ffffffffffffffda RBX: 00007fd8d6626058 RCX: 00007fd8d6489e79 [ 272.539484][T16454] RDX: 0000000000000000 RSI: 0000000020001140 RDI: 000000000000001c [ 272.547454][T16454] RBP: 00007fd8d50e0090 R08: 0000000000000000 R09: 0000000000000000 [ 272.555421][T16454] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 272.563438][T16454] R13: 0000000000000000 R14: 00007fd8d6626058 R15: 00007fffece03108 [ 272.571403][T16454] [ 272.773246][T16492] syzkaller0: entered promiscuous mode [ 272.778814][T16492] syzkaller0: entered allmulticast mode [ 272.849193][ T29] kauditd_printk_skb: 1280 callbacks suppressed [ 272.849207][ T29] audit: type=1400 audit(1724479473.965:13328): avc: denied { prog_load } for pid=16498 comm="syz.1.3081" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 272.880188][ T29] audit: type=1400 audit(1724479473.965:13329): avc: denied { open } for pid=16498 comm="syz.1.3081" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 272.899739][ T29] audit: type=1400 audit(1724479473.965:13330): avc: denied { read } for pid=16498 comm="syz.1.3081" name="vsock" dev="devtmpfs" ino=232 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 272.922451][ T29] audit: type=1400 audit(1724479473.975:13331): avc: denied { read write } for pid=14343 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 272.946892][ T29] audit: type=1400 audit(1724479473.985:13332): avc: denied { read write } for pid=14343 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 272.946925][ T29] audit: type=1400 audit(1724479473.995:13333): avc: denied { execmem } for pid=16505 comm="syz.2.3083" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 272.947944][ T29] audit: type=1400 audit(1724479473.995:13334): avc: denied { read write } for pid=13682 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 273.015458][ T29] audit: type=1400 audit(1724479473.995:13335): avc: denied { create } for pid=16507 comm="syz.1.3084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 273.035299][ T29] audit: type=1400 audit(1724479473.995:13336): avc: denied { create } for pid=16507 comm="syz.1.3084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 273.055108][ T29] audit: type=1400 audit(1724479473.995:13337): avc: denied { prog_load } for pid=16507 comm="syz.1.3084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 273.120746][T16523] netlink: 16 bytes leftover after parsing attributes in process `syz.2.3090'. [ 273.180730][T16526] syzkaller0: entered promiscuous mode [ 273.186380][T16526] syzkaller0: entered allmulticast mode [ 273.630091][T16548] netlink: 14 bytes leftover after parsing attributes in process `syz.3.3101'. [ 273.682814][T16550] syzkaller0: entered promiscuous mode [ 273.688483][T16550] syzkaller0: entered allmulticast mode [ 273.919594][T16591] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16591 comm=syz.4.3120 [ 273.943411][T16593] FAULT_INJECTION: forcing a failure. [ 273.943411][T16593] name failslab, interval 1, probability 0, space 0, times 0 [ 273.956318][T16593] CPU: 0 UID: 0 PID: 16593 Comm: syz.1.3119 Not tainted 6.11.0-rc4-syzkaller-00236-g60f0560f53e3 #0 [ 273.967106][T16593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 273.977275][T16593] Call Trace: [ 273.980633][T16593] [ 273.983576][T16593] dump_stack_lvl+0xf2/0x150 [ 273.988282][T16593] dump_stack+0x15/0x20 [ 273.992486][T16593] should_fail_ex+0x229/0x230 [ 273.997213][T16593] ? __alloc_skb+0x10b/0x310 [ 274.001903][T16593] should_failslab+0x8f/0xb0 [ 274.002037][T16595] syzkaller0: entered promiscuous mode [ 274.006522][T16593] kmem_cache_alloc_node_noprof+0x51/0x2b0 [ 274.006596][T16593] __alloc_skb+0x10b/0x310 [ 274.006624][T16593] netlink_alloc_large_skb+0xad/0xe0 [ 274.006649][T16593] netlink_sendmsg+0x3b4/0x6e0 [ 274.006681][T16593] ? __pfx_netlink_sendmsg+0x10/0x10 [ 274.006707][T16593] __sock_sendmsg+0x140/0x180 [ 274.012370][T16595] syzkaller0: entered allmulticast mode [ 274.017963][T16593] ____sys_sendmsg+0x312/0x410 [ 274.018002][T16593] __sys_sendmsg+0x1e9/0x280 [ 274.057447][T16593] __x64_sys_sendmsg+0x46/0x50 [ 274.062257][T16593] x64_sys_call+0x2689/0x2d60 [ 274.067007][T16593] do_syscall_64+0xc9/0x1c0 [ 274.071561][T16593] ? clear_bhb_loop+0x55/0xb0 [ 274.076270][T16593] ? clear_bhb_loop+0x55/0xb0 [ 274.080968][T16593] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 274.086986][T16593] RIP: 0033:0x7f664b7b9e79 [ 274.091409][T16593] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 274.111036][T16593] RSP: 002b:00007f664a410038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 274.119468][T16593] RAX: ffffffffffffffda RBX: 00007f664b956058 RCX: 00007f664b7b9e79 [ 274.127478][T16593] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 274.135461][T16593] RBP: 00007f664a410090 R08: 0000000000000000 R09: 0000000000000000 [ 274.143467][T16593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 274.151449][T16593] R13: 0000000000000000 R14: 00007f664b956058 R15: 00007ffe2d14afc8 [ 274.159441][T16593] [ 274.811968][T16640] syzkaller0: entered promiscuous mode [ 274.817516][T16640] syzkaller0: entered allmulticast mode [ 274.959831][T16651] sctp: [Deprecated]: syz.3.3144 (pid 16651) Use of struct sctp_assoc_value in delayed_ack socket option. [ 274.959831][T16651] Use struct sctp_sack_info instead [ 275.103751][T16668] xt_TCPMSS: Only works on TCP SYN packets [ 275.128383][T16666] syzkaller0: entered promiscuous mode [ 275.133892][T16666] syzkaller0: entered allmulticast mode [ 275.277503][ T4554] IPVS: starting estimator thread 0... [ 275.376045][T16690] IPVS: using max 2544 ests per chain, 127200 per kthread [ 275.659124][T16709] syzkaller0: entered promiscuous mode [ 275.664687][T16709] syzkaller0: entered allmulticast mode [ 275.905369][T16737] syzkaller0: entered promiscuous mode [ 275.911021][T16737] syzkaller0: entered allmulticast mode [ 275.964663][T16744] xt_TCPMSS: Only works on TCP SYN packets [ 276.184534][T16775] xt_CT: You must specify a L4 protocol and not use inversions on it [ 276.257212][T16780] syzkaller0: entered promiscuous mode [ 276.262783][T16780] syzkaller0: entered allmulticast mode [ 277.094704][T16800] FAULT_INJECTION: forcing a failure. [ 277.094704][T16800] name failslab, interval 1, probability 0, space 0, times 0 [ 277.107468][T16800] CPU: 0 UID: 0 PID: 16800 Comm: syz.4.3202 Not tainted 6.11.0-rc4-syzkaller-00236-g60f0560f53e3 #0 [ 277.118262][T16800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 277.128340][T16800] Call Trace: [ 277.131675][T16800] [ 277.134604][T16800] dump_stack_lvl+0xf2/0x150 [ 277.139215][T16800] dump_stack+0x15/0x20 [ 277.143443][T16800] should_fail_ex+0x229/0x230 [ 277.148131][T16800] ? audit_log_d_path+0x96/0x250 [ 277.153074][T16800] should_failslab+0x8f/0xb0 [ 277.157675][T16800] __kmalloc_cache_noprof+0x4b/0x2a0 [ 277.162978][T16800] audit_log_d_path+0x96/0x250 [ 277.167758][T16800] ? get_file_rcu+0xf4/0x110 [ 277.172364][T16800] ? __rcu_read_unlock+0x4e/0x70 [ 277.177313][T16800] audit_log_d_path_exe+0x45/0x80 [ 277.182351][T16800] audit_log_task+0x155/0x180 [ 277.187043][T16800] audit_seccomp+0x68/0x130 [ 277.191597][T16800] __seccomp_filter+0x6fa/0x1180 [ 277.196648][T16800] ? proc_fail_nth_write+0x130/0x160 [ 277.201951][T16800] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 277.207609][T16800] ? vfs_write+0x5a5/0x900 [ 277.212051][T16800] ? __fget_files+0x1da/0x210 [ 277.216744][T16800] __secure_computing+0x9f/0x1c0 [ 277.221727][T16800] syscall_trace_enter+0xd1/0x1f0 [ 277.226855][T16800] ? fpregs_assert_state_consistent+0x83/0xa0 [ 277.233057][T16800] do_syscall_64+0xaa/0x1c0 [ 277.237601][T16800] ? clear_bhb_loop+0x55/0xb0 [ 277.242378][T16800] ? clear_bhb_loop+0x55/0xb0 [ 277.247162][T16800] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 277.253078][T16800] RIP: 0033:0x7f0c710c9e79 [ 277.257493][T16800] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 277.277110][T16800] RSP: 002b:00007f0c6fd47038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ef [ 277.285546][T16800] RAX: ffffffffffffffda RBX: 00007f0c71265f80 RCX: 00007f0c710c9e79 [ 277.293521][T16800] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020006740 [ 277.301489][T16800] RBP: 00007f0c6fd47090 R08: 0000000000000002 R09: 0000000000000000 [ 277.309541][T16800] R10: 0000000020ffa000 R11: 0000000000000246 R12: 0000000000000001 [ 277.317742][T16800] R13: 0000000000000000 R14: 00007f0c71265f80 R15: 00007ffda43a0fc8 [ 277.325761][T16800] [ 277.355106][T16800] xt_CT: You must specify a L4 protocol and not use inversions on it [ 277.765800][T16812] syzkaller0: entered promiscuous mode [ 277.771414][T16812] syzkaller0: entered allmulticast mode [ 277.883039][ T29] kauditd_printk_skb: 1457 callbacks suppressed [ 277.883053][ T29] audit: type=1400 audit(1724479478.995:14795): avc: denied { create } for pid=16819 comm="syz.0.3209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 277.909800][ T29] audit: type=1400 audit(1724479478.995:14796): avc: denied { create } for pid=16819 comm="syz.0.3209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 277.954526][ T29] audit: type=1400 audit(1724479478.995:14797): avc: denied { name_bind } for pid=16816 comm="syz.1.3218" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 277.976541][ T29] audit: type=1400 audit(1724479479.005:14798): avc: denied { read write } for pid=13903 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 277.978333][T16829] audit: audit_backlog=65 > audit_backlog_limit=64 [ 278.000922][ T29] audit: type=1400 audit(1724479479.025:14799): avc: denied { read write } for pid=15203 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 278.007692][T16829] audit: audit_lost=4 audit_rate_limit=0 audit_backlog_limit=64 [ 278.031838][ T29] audit: type=1400 audit(1724479479.045:14800): avc: denied { create } for pid=16822 comm="syz.3.3211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 278.039509][T16829] audit: backlog limit exceeded [ 278.060223][ T29] audit: type=1326 audit(1724479479.055:14801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16823 comm="syz.0.3210" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc12c9b9e79 code=0x7ffc0000 [ 278.836635][T16859] FAULT_INJECTION: forcing a failure. [ 278.836635][T16859] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 278.849975][T16859] CPU: 0 UID: 0 PID: 16859 Comm: syz.3.3224 Not tainted 6.11.0-rc4-syzkaller-00236-g60f0560f53e3 #0 [ 278.860754][T16859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 278.870919][T16859] Call Trace: [ 278.874282][T16859] [ 278.877218][T16859] dump_stack_lvl+0xf2/0x150 [ 278.881904][T16859] dump_stack+0x15/0x20 [ 278.886137][T16859] should_fail_ex+0x229/0x230 [ 278.890916][T16859] should_fail+0xb/0x10 [ 278.891242][T16855] syzkaller0: entered promiscuous mode [ 278.895079][T16859] should_fail_usercopy+0x1a/0x20 [ 278.900616][T16855] syzkaller0: entered allmulticast mode [ 278.905554][T16859] _copy_to_user+0x1e/0xa0 [ 278.915578][T16859] simple_read_from_buffer+0xa0/0x110 [ 278.921047][T16859] proc_fail_nth_read+0xff/0x140 [ 278.926068][T16859] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 278.931637][T16859] vfs_read+0x1a2/0x6e0 [ 278.935849][T16859] ? __rcu_read_unlock+0x4e/0x70 [ 278.940810][T16859] ? __fget_files+0x1da/0x210 [ 278.945553][T16859] ksys_read+0xeb/0x1b0 [ 278.949735][T16859] __x64_sys_read+0x42/0x50 [ 278.954247][T16859] x64_sys_call+0x27d3/0x2d60 [ 278.958931][T16859] do_syscall_64+0xc9/0x1c0 [ 278.963441][T16859] ? clear_bhb_loop+0x55/0xb0 [ 278.968143][T16859] ? clear_bhb_loop+0x55/0xb0 [ 278.972863][T16859] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 278.978856][T16859] RIP: 0033:0x7fd8d64888bc [ 278.983291][T16859] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 279.002923][T16859] RSP: 002b:00007fd8d5101030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 279.011408][T16859] RAX: ffffffffffffffda RBX: 00007fd8d6625f80 RCX: 00007fd8d64888bc [ 279.019450][T16859] RDX: 000000000000000f RSI: 00007fd8d51010a0 RDI: 0000000000000003 [ 279.027461][T16859] RBP: 00007fd8d5101090 R08: 0000000000000000 R09: 0000000000000000 [ 279.035435][T16859] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 279.043429][T16859] R13: 0000000000000000 R14: 00007fd8d6625f80 R15: 00007fffece03108 [ 279.051424][T16859] [ 279.094006][T16870] FAULT_INJECTION: forcing a failure. [ 279.094006][T16870] name failslab, interval 1, probability 0, space 0, times 0 [ 279.106735][T16870] CPU: 1 UID: 0 PID: 16870 Comm: syz.4.3229 Not tainted 6.11.0-rc4-syzkaller-00236-g60f0560f53e3 #0 [ 279.117596][T16870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 279.127663][T16870] Call Trace: [ 279.131128][T16870] [ 279.134086][T16870] dump_stack_lvl+0xf2/0x150 [ 279.138712][T16870] dump_stack+0x15/0x20 [ 279.142945][T16870] should_fail_ex+0x229/0x230 [ 279.147713][T16870] ? sidtab_sid2str_get+0xb8/0x140 [ 279.152858][T16870] should_failslab+0x8f/0xb0 [ 279.157470][T16870] __kmalloc_node_track_caller_noprof+0xa6/0x380 [ 279.163800][T16870] kmemdup_noprof+0x2a/0x60 [ 279.168308][T16870] sidtab_sid2str_get+0xb8/0x140 [ 279.173332][T16870] security_sid_to_context_core+0x1eb/0x2f0 [ 279.179303][T16870] security_sid_to_context+0x27/0x30 [ 279.184638][T16870] selinux_secid_to_secctx+0x22/0x30 [ 279.190089][T16870] security_secid_to_secctx+0x4a/0x80 [ 279.195487][T16870] audit_log_task_context+0x8c/0x1b0 [ 279.200875][T16870] audit_log_task+0xfb/0x180 [ 279.205534][T16870] audit_seccomp+0x68/0x130 [ 279.210126][T16870] __seccomp_filter+0x6fa/0x1180 [ 279.215127][T16870] ? __se_sys_get_mempolicy+0x7a7/0xd60 [ 279.220688][T16870] __secure_computing+0x9f/0x1c0 [ 279.225629][T16870] syscall_trace_enter+0xd1/0x1f0 [ 279.230724][T16870] do_syscall_64+0xaa/0x1c0 [ 279.235282][T16870] ? clear_bhb_loop+0x55/0xb0 [ 279.239954][T16870] ? clear_bhb_loop+0x55/0xb0 [ 279.244700][T16870] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 279.250693][T16870] RIP: 0033:0x7f0c710c88bc [ 279.255099][T16870] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 279.274772][T16870] RSP: 002b:00007f0c6fd47030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 279.283249][T16870] RAX: ffffffffffffffda RBX: 00007f0c71265f80 RCX: 00007f0c710c88bc [ 279.291219][T16870] RDX: 000000000000000f RSI: 00007f0c6fd470a0 RDI: 0000000000000003 [ 279.299242][T16870] RBP: 00007f0c6fd47090 R08: 0000000000000000 R09: 0000000000000000 [ 279.307208][T16870] R10: 0000000020ffa000 R11: 0000000000000246 R12: 0000000000000002 [ 279.315176][T16870] R13: 0000000000000000 R14: 00007f0c71265f80 R15: 00007ffda43a0fc8 [ 279.323147][T16870] [ 279.780232][T16909] syzkaller0: entered promiscuous mode [ 279.785735][T16909] syzkaller0: entered allmulticast mode [ 280.047570][T16946] xt_CT: You must specify a L4 protocol and not use inversions on it [ 280.061244][T16949] syzkaller0: entered promiscuous mode [ 280.066873][T16949] syzkaller0: entered allmulticast mode [ 284.249172][ T29] kauditd_printk_skb: 492 callbacks suppressed [ 284.249186][ T29] audit: type=1400 audit(1724479741.366:15293): avc: denied { map_create } for pid=16973 comm="syz.2.3272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 284.274739][ T29] audit: type=1400 audit(1724479741.366:15294): avc: denied { map_create } for pid=16973 comm="syz.2.3272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 284.300476][ T29] audit: type=1400 audit(1724479741.366:15295): avc: denied { create } for pid=16969 comm="syz.0.3270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 284.321330][ T29] audit: type=1400 audit(1724479741.366:15296): avc: denied { prog_load } for pid=16969 comm="syz.0.3270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 284.323800][T16972] syzkaller0: entered promiscuous mode [ 284.340573][ T29] audit: type=1400 audit(1724479741.366:15297): avc: denied { open } for pid=16969 comm="syz.0.3270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 284.346033][T16972] syzkaller0: entered allmulticast mode [ 284.365389][ T29] audit: type=1400 audit(1724479741.366:15298): avc: denied { create } for pid=16969 comm="syz.0.3270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 284.391606][ T29] audit: type=1400 audit(1724479741.366:15299): avc: denied { create } for pid=16969 comm="syz.0.3270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 284.412330][ T29] audit: type=1400 audit(1724479741.366:15300): avc: denied { prog_load } for pid=16969 comm="syz.0.3270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 284.431579][ T29] audit: type=1400 audit(1724479741.366:15301): avc: denied { bpf } for pid=16969 comm="syz.0.3270" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 284.452305][ T29] audit: type=1400 audit(1724479741.366:15302): avc: denied { map_create } for pid=16969 comm="syz.0.3270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 284.688268][T17010] lo speed is unknown, defaulting to 1000 [ 284.721116][T17010] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5 sclass=netlink_route_socket pid=17010 comm=syz.2.3286 [ 284.993001][T17026] syzkaller0: entered promiscuous mode [ 284.998617][T17026] syzkaller0: entered allmulticast mode [ 285.449913][T17057] syzkaller0: entered promiscuous mode [ 285.455466][T17057] syzkaller0: entered allmulticast mode [ 285.463182][T17060] futex_wake_op: syz.3.3306 tries to shift op by 36; fix this program [ 286.286878][T17092] syzkaller0: entered promiscuous mode [ 286.292355][T17092] syzkaller0: entered allmulticast mode [ 286.525555][T17113] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(4) [ 286.532111][T17113] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 286.539953][T17113] vhci_hcd vhci_hcd.0: Device attached [ 286.640466][T17130] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 286.647007][T17130] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 286.654747][T17130] vhci_hcd vhci_hcd.0: Device attached [ 286.661129][T17132] vhci_hcd: connection closed [ 286.661252][ T4477] vhci_hcd: stop threads [ 286.670249][ T4477] vhci_hcd: release socket [ 286.674771][ T4477] vhci_hcd: disconnect device [ 286.846829][T14885] usb 10-1: SetAddress Request (6) to port 0 [ 286.854289][T14885] usb 10-1: new SuperSpeed USB device number 6 using vhci_hcd [ 287.162346][T17116] vhci_hcd: connection reset by peer [ 287.174727][ T4477] vhci_hcd: stop threads [ 287.179052][ T4477] vhci_hcd: release socket [ 287.183473][ T4477] vhci_hcd: disconnect device [ 287.370663][T17167] syzkaller0: entered promiscuous mode [ 287.376183][T17167] syzkaller0: entered allmulticast mode [ 287.468115][T17176] ÿÿÿÿÿÿ: renamed from vlan0 (while UP) [ 287.492147][T17180] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(3) [ 287.498690][T17180] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 287.506484][T17180] vhci_hcd vhci_hcd.0: Device attached [ 287.512986][T17181] vhci_hcd: connection closed [ 287.513069][ T4477] vhci_hcd: stop threads [ 287.522127][ T4477] vhci_hcd: release socket [ 287.526634][ T4477] vhci_hcd: disconnect device [ 288.057635][T17202] syzkaller0: entered promiscuous mode [ 288.063270][T17202] syzkaller0: entered allmulticast mode [ 288.286779][T17227] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(3) [ 288.293326][T17227] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 288.301086][T17227] vhci_hcd vhci_hcd.0: Device attached [ 288.307594][T17228] vhci_hcd: connection closed [ 288.307813][ T4477] vhci_hcd: stop threads [ 288.316873][ T4477] vhci_hcd: release socket [ 288.321284][ T4477] vhci_hcd: disconnect device [ 288.655430][T17241] syzkaller0: entered promiscuous mode [ 288.660984][T17241] syzkaller0: entered allmulticast mode [ 288.825018][T17253] FAULT_INJECTION: forcing a failure. [ 288.825018][T17253] name failslab, interval 1, probability 0, space 0, times 0 [ 288.837838][T17253] CPU: 0 UID: 0 PID: 17253 Comm: syz.0.3380 Not tainted 6.11.0-rc4-syzkaller-00236-g60f0560f53e3 #0 [ 288.848631][T17253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 288.858707][T17253] Call Trace: [ 288.861999][T17253] [ 288.864966][T17253] dump_stack_lvl+0xf2/0x150 [ 288.869592][T17253] dump_stack+0x15/0x20 [ 288.873853][T17253] should_fail_ex+0x229/0x230 [ 288.878631][T17253] ? copy_net_ns+0x143/0x510 [ 288.883256][T17253] should_failslab+0x8f/0xb0 [ 288.887936][T17253] __kmalloc_cache_noprof+0x4b/0x2a0 [ 288.893232][T17253] copy_net_ns+0x143/0x510 [ 288.897731][T17253] ? copy_cgroup_ns+0x79/0x370 [ 288.902503][T17253] create_new_namespaces+0x228/0x430 [ 288.907807][T17253] copy_namespaces+0x1ad/0x210 [ 288.912624][T17253] copy_process+0xf08/0x1fc0 [ 288.917247][T17253] kernel_clone+0x167/0x5e0 [ 288.921766][T17253] ? vfs_write+0x5a5/0x900 [ 288.926219][T17253] __x64_sys_clone+0xe8/0x120 [ 288.930927][T17253] x64_sys_call+0x2d23/0x2d60 [ 288.935690][T17253] do_syscall_64+0xc9/0x1c0 [ 288.940262][T17253] ? clear_bhb_loop+0x55/0xb0 [ 288.944936][T17253] ? clear_bhb_loop+0x55/0xb0 [ 288.949613][T17253] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 288.955527][T17253] RIP: 0033:0x7fc12c9b9e79 [ 288.960020][T17253] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 288.979814][T17253] RSP: 002b:00007fc12b636fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 288.988277][T17253] RAX: ffffffffffffffda RBX: 00007fc12cb55f80 RCX: 00007fc12c9b9e79 [ 288.996346][T17253] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000064289200 [ 289.004344][T17253] RBP: 00007fc12b637090 R08: 0000000000000000 R09: 0000000000000000 [ 289.012360][T17253] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 289.020333][T17253] R13: 0000000000000000 R14: 00007fc12cb55f80 R15: 00007ffed23c0c38 [ 289.028329][T17253] [ 289.043658][T17259] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 289.050313][T17259] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 289.058235][T17259] vhci_hcd vhci_hcd.0: Device attached [ 289.064628][T17260] vhci_hcd: connection closed [ 289.064872][ T4477] vhci_hcd: stop threads [ 289.073827][ T4477] vhci_hcd: release socket [ 289.073836][ T4477] vhci_hcd: disconnect device [ 289.177897][T17274] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(4) [ 289.184493][T17274] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 289.192223][T17274] vhci_hcd vhci_hcd.0: Device attached [ 289.200667][T17276] vhci_hcd: unknown pdu 1 [ 289.205193][ T4477] vhci_hcd: stop threads [ 289.209517][ T4477] vhci_hcd: release socket [ 289.213940][ T4477] vhci_hcd: disconnect device [ 289.214922][T17279] syzkaller0: entered promiscuous mode [ 289.224297][T17279] syzkaller0: entered allmulticast mode [ 289.275036][ T29] kauditd_printk_skb: 1286 callbacks suppressed [ 289.275050][ T29] audit: type=1400 audit(1724479746.385:16589): avc: denied { read write } for pid=15203 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 289.283036][T17282] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 289.308184][ T29] audit: type=1400 audit(1724479746.395:16590): avc: denied { open } for pid=17281 comm="syz.3.3389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 289.336833][ T29] audit: type=1400 audit(1724479746.395:16591): avc: denied { map_create } for pid=17281 comm="syz.3.3389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 289.356145][ T29] audit: type=1400 audit(1724479746.395:16592): avc: denied { prog_load } for pid=17281 comm="syz.3.3389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 289.375624][ T29] audit: type=1400 audit(1724479746.395:16593): avc: denied { name_bind } for pid=17281 comm="syz.3.3389" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 289.399073][ T29] audit: type=1400 audit(1724479746.445:16594): avc: denied { read write } for pid=15203 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 289.423552][ T29] audit: type=1400 audit(1724479746.465:16595): avc: denied { read write } for pid=17283 comm="syz.3.3390" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 289.447817][ T29] audit: type=1400 audit(1724479746.465:16596): avc: denied { create } for pid=17283 comm="syz.3.3390" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 289.468619][ T29] audit: type=1400 audit(1724479746.465:16597): avc: denied { create } for pid=17283 comm="syz.3.3390" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 289.488582][ T29] audit: type=1326 audit(1724479746.475:16598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17283 comm="syz.3.3390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd8d6489e79 code=0x7ffc0000 [ 289.598347][T17295] lo speed is unknown, defaulting to 1000 [ 289.983954][T17308] syzkaller0: entered promiscuous mode [ 289.989495][T17308] syzkaller0: entered allmulticast mode [ 290.088045][T17320] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 290.094594][T17320] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 290.102370][T17320] vhci_hcd vhci_hcd.0: Device attached [ 290.109468][T17321] vhci_hcd: connection closed [ 290.109910][ T4477] vhci_hcd: stop threads [ 290.118908][ T4477] vhci_hcd: release socket [ 290.123372][ T4477] vhci_hcd: disconnect device [ 290.156727][T17326] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 290.163295][T17326] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 290.171203][T17326] vhci_hcd vhci_hcd.0: Device attached [ 290.177206][T17328] vhci_hcd: unknown pdu 1 [ 290.181651][ T4014] vhci_hcd: stop threads [ 290.185929][ T4014] vhci_hcd: release socket [ 290.190370][ T4014] vhci_hcd: disconnect device [ 290.692770][T17350] syzkaller0: entered promiscuous mode [ 290.698421][T17350] syzkaller0: entered allmulticast mode [ 290.778280][T17358] FAULT_INJECTION: forcing a failure. [ 290.778280][T17358] name failslab, interval 1, probability 0, space 0, times 0 [ 290.790992][T17358] CPU: 1 UID: 0 PID: 17358 Comm: syz.4.3419 Not tainted 6.11.0-rc4-syzkaller-00236-g60f0560f53e3 #0 [ 290.801768][T17358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 290.811858][T17358] Call Trace: [ 290.815136][T17358] [ 290.818092][T17358] dump_stack_lvl+0xf2/0x150 [ 290.822814][T17358] dump_stack+0x15/0x20 [ 290.827026][T17358] should_fail_ex+0x229/0x230 [ 290.831717][T17358] ? __alloc_skb+0x10b/0x310 [ 290.836303][T17358] should_failslab+0x8f/0xb0 [ 290.840897][T17358] kmem_cache_alloc_node_noprof+0x51/0x2b0 [ 290.846781][T17358] __alloc_skb+0x10b/0x310 [ 290.851198][T17358] ? fib6_table_lookup+0x222/0x650 [ 290.856317][T17358] alloc_skb_with_frags+0x7f/0x400 [ 290.861473][T17358] ? __rt6_find_exception_rcu+0x93/0x2e0 [ 290.867202][T17358] ? fib6_select_path+0x2bf/0x2f0 [ 290.872237][T17358] sock_alloc_send_pskb+0x435/0x4f0 [ 290.877442][T17358] ? ipv6_get_saddr_eval+0x7a8/0x7d0 [ 290.882740][T17358] __ip6_append_data+0x1773/0x2160 [ 290.887890][T17358] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 290.893429][T17358] ? __rcu_read_unlock+0x4e/0x70 [ 290.898385][T17358] ? ip6_mtu+0xfb/0x120 [ 290.902549][T17358] ? __pfx_ip6_mtu+0x10/0x10 [ 290.907167][T17358] ip6_make_skb+0x28f/0x510 [ 290.911707][T17358] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 290.917346][T17358] udpv6_sendmsg+0x14ac/0x1590 [ 290.922163][T17358] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 290.927796][T17358] ? __pfx_udpv6_sendmsg+0x10/0x10 [ 290.932990][T17358] inet6_sendmsg+0xaf/0xd0 [ 290.937416][T17358] __sock_sendmsg+0x8b/0x180 [ 290.942025][T17358] ____sys_sendmsg+0x312/0x410 [ 290.946823][T17358] __sys_sendmsg+0x1e9/0x280 [ 290.951428][T17358] __x64_sys_sendmsg+0x46/0x50 [ 290.956293][T17358] x64_sys_call+0x2689/0x2d60 [ 290.960976][T17358] do_syscall_64+0xc9/0x1c0 [ 290.965505][T17358] ? clear_bhb_loop+0x55/0xb0 [ 290.970220][T17358] ? clear_bhb_loop+0x55/0xb0 [ 290.974904][T17358] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 290.980887][T17358] RIP: 0033:0x7f0c710c9e79 [ 290.985298][T17358] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 291.004974][T17358] RSP: 002b:00007f0c6fd47038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 291.013389][T17358] RAX: ffffffffffffffda RBX: 00007f0c71265f80 RCX: 00007f0c710c9e79 [ 291.021424][T17358] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000003 [ 291.029393][T17358] RBP: 00007f0c6fd47090 R08: 0000000000000000 R09: 0000000000000000 [ 291.037411][T17358] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 291.045460][T17358] R13: 0000000000000000 R14: 00007f0c71265f80 R15: 00007ffda43a0fc8 [ 291.053475][T17358] [ 291.118828][T17369] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 291.125362][T17369] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 291.133041][T17369] vhci_hcd vhci_hcd.0: Device attached [ 291.139603][T17370] vhci_hcd: connection closed [ 291.139707][T15287] vhci_hcd: stop threads [ 291.148656][T15287] vhci_hcd: release socket [ 291.153156][T15287] vhci_hcd: disconnect device [ 291.357460][T17382] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(4) [ 291.364008][T17382] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 291.371723][T17382] vhci_hcd vhci_hcd.0: Device attached [ 291.377611][T17384] vhci_hcd: unknown pdu 1 [ 291.382090][T15287] vhci_hcd: stop threads [ 291.386412][T15287] vhci_hcd: release socket [ 291.390859][T15287] vhci_hcd: disconnect device [ 291.649394][T17388] syzkaller0: entered promiscuous mode [ 291.654916][T17388] syzkaller0: entered allmulticast mode [ 291.675131][T17392] ip6t_srh: unknown srh invflags 4000 [ 291.730471][T17394] FAULT_INJECTION: forcing a failure. [ 291.730471][T17394] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 291.743729][T17394] CPU: 0 UID: 0 PID: 17394 Comm: syz.0.3432 Not tainted 6.11.0-rc4-syzkaller-00236-g60f0560f53e3 #0 [ 291.754543][T17394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 291.764611][T17394] Call Trace: [ 291.767902][T17394] [ 291.770835][T17394] dump_stack_lvl+0xf2/0x150 [ 291.775531][T17394] dump_stack+0x15/0x20 [ 291.779771][T17394] should_fail_ex+0x229/0x230 [ 291.784533][T17394] should_fail_alloc_page+0xfd/0x110 [ 291.789852][T17394] __alloc_pages_noprof+0x109/0x360 [ 291.795077][T17394] alloc_pages_mpol_noprof+0xb1/0x1e0 [ 291.800468][T17394] alloc_pages_noprof+0xe1/0x100 [ 291.805467][T17394] kimage_alloc_page+0x136/0x590 [ 291.810508][T17394] kimage_load_segment+0x4a9/0x790 [ 291.815643][T17394] do_kexec_load+0x3a5/0x460 [ 291.820346][T17394] __se_sys_kexec_load+0x12b/0x160 [ 291.825537][T17394] __x64_sys_kexec_load+0x55/0x70 [ 291.830617][T17394] x64_sys_call+0x28c3/0x2d60 [ 291.835291][T17394] do_syscall_64+0xc9/0x1c0 [ 291.839812][T17394] ? clear_bhb_loop+0x55/0xb0 [ 291.844493][T17394] ? clear_bhb_loop+0x55/0xb0 [ 291.849316][T17394] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 291.855223][T17394] RIP: 0033:0x7fc12c9b9e79 [ 291.859648][T17394] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 291.879259][T17394] RSP: 002b:00007fc12b637038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f6 [ 291.887743][T17394] RAX: ffffffffffffffda RBX: 00007fc12cb55f80 RCX: 00007fc12c9b9e79 [ 291.895782][T17394] RDX: 0000000020000480 RSI: 0000000000000001 RDI: 0000000000000000 [ 291.903761][T17394] RBP: 00007fc12b637090 R08: 0000000000000000 R09: 0000000000000000 [ 291.911840][T17394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 291.919797][T17394] R13: 0000000000000000 R14: 00007fc12cb55f80 R15: 00007ffed23c0c38 [ 291.927792][T17394] [ 291.937846][T14885] usb 10-1: device descriptor read/8, error -110 [ 292.057063][T14885] usb 10-1: new SuperSpeed USB device number 6 using vhci_hcd [ 292.098173][T14885] usb 10-1: enqueue for inactive port 0 [ 292.103868][T14885] usb 10-1: enqueue for inactive port 0 [ 292.109498][T14885] usb 10-1: enqueue for inactive port 0 [ 292.112331][T17418] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(3) [ 292.121614][T17418] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 292.129417][T17418] vhci_hcd vhci_hcd.0: Device attached [ 292.136099][T17419] vhci_hcd: connection closed [ 292.136252][ T4477] vhci_hcd: stop threads [ 292.145173][ T4477] vhci_hcd: release socket [ 292.149605][ T4477] vhci_hcd: disconnect device [ 292.207051][T17422] syzkaller0: entered promiscuous mode [ 292.212547][T17422] syzkaller0: entered allmulticast mode [ 292.831368][T17449] syzkaller0: entered promiscuous mode [ 292.837015][T17449] syzkaller0: entered allmulticast mode [ 292.864645][T17451] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(4) [ 292.871279][T17451] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 292.879055][T17451] vhci_hcd vhci_hcd.0: Device attached [ 292.886147][T17453] vhci_hcd: unknown pdu 1 [ 292.890668][ T4477] vhci_hcd: stop threads [ 292.894917][ T4477] vhci_hcd: release socket [ 292.899457][ T4477] vhci_hcd: disconnect device [ 293.622531][T17479] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(3) [ 293.629139][T17479] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 293.636983][T17479] vhci_hcd vhci_hcd.0: Device attached [ 293.649630][T17481] vhci_hcd: connection closed [ 293.649790][T15287] vhci_hcd: stop threads [ 293.658764][T15287] vhci_hcd: release socket [ 293.663170][T15287] vhci_hcd: disconnect device [ 293.912293][T17494] syzkaller0: entered promiscuous mode [ 293.917828][T17494] syzkaller0: entered allmulticast mode [ 294.180137][T17501] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(4) [ 294.186672][T17501] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 294.194473][T17501] vhci_hcd vhci_hcd.0: Device attached [ 294.200382][T17503] vhci_hcd: unknown pdu 1 [ 294.204918][ T4477] vhci_hcd: stop threads [ 294.209193][ T4477] vhci_hcd: release socket [ 294.213704][ T4477] vhci_hcd: disconnect device [ 294.346811][ T29] kauditd_printk_skb: 1142 callbacks suppressed [ 294.346827][ T29] audit: type=1400 audit(1724479751.465:17741): avc: denied { read write } for pid=13682 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 294.377667][ T29] audit: type=1400 audit(1724479751.465:17742): avc: denied { prog_load } for pid=17505 comm="syz.1.3472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 294.396929][ T29] audit: type=1400 audit(1724479751.475:17743): avc: denied { map_create } for pid=17505 comm="syz.1.3472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 294.416332][ T29] audit: type=1400 audit(1724479751.475:17744): avc: denied { prog_load } for pid=17505 comm="syz.1.3472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 294.435614][ T29] audit: type=1400 audit(1724479751.475:17745): avc: denied { execmem } for pid=17505 comm="syz.1.3472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 294.484796][ T29] audit: type=1400 audit(1724479751.595:17746): avc: denied { read write } for pid=14319 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 294.509813][ T29] audit: type=1400 audit(1724479751.595:17747): avc: denied { map_create } for pid=17508 comm="syz.4.3473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 294.529347][ T29] audit: type=1400 audit(1724479751.595:17748): avc: denied { prog_load } for pid=17508 comm="syz.4.3473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 294.548993][ T29] audit: type=1400 audit(1724479751.595:17749): avc: denied { create } for pid=17508 comm="syz.4.3473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 294.569981][ T29] audit: type=1400 audit(1724479751.595:17750): avc: denied { read write } for pid=17508 comm="syz.4.3473" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 294.664893][T17521] syzkaller0: entered promiscuous mode [ 294.670417][T17521] syzkaller0: entered allmulticast mode [ 294.734997][T17525] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 294.741544][T17525] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 294.749269][T17525] vhci_hcd vhci_hcd.0: Device attached [ 294.755947][T17526] vhci_hcd: connection closed [ 294.756533][ T4014] vhci_hcd: stop threads [ 294.765503][ T4014] vhci_hcd: release socket [ 294.769982][ T4014] vhci_hcd: disconnect device [ 295.436908][T17560] syzkaller0: entered promiscuous mode [ 295.442431][T17560] syzkaller0: entered allmulticast mode [ 295.508023][T17562] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(4) [ 295.514560][T17562] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 295.522312][T17562] vhci_hcd vhci_hcd.0: Device attached [ 295.528225][T17564] vhci_hcd: unknown pdu 1 [ 295.533824][T15287] vhci_hcd: stop threads [ 295.538186][T15287] vhci_hcd: release socket [ 295.542766][T15287] vhci_hcd: disconnect device [ 295.753107][T17583] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 295.759665][T17583] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 295.767766][T17583] vhci_hcd vhci_hcd.0: Device attached [ 295.774762][T17584] vhci_hcd: connection closed [ 295.774887][ T4477] vhci_hcd: stop threads [ 295.784083][ T4477] vhci_hcd: release socket [ 295.788680][ T4477] vhci_hcd: disconnect device [ 296.178341][T17591] syzkaller0: entered promiscuous mode [ 296.183862][T17591] syzkaller0: entered allmulticast mode [ 296.513483][T17621] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(4) [ 296.520032][T17621] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 296.527788][T17621] vhci_hcd vhci_hcd.0: Device attached [ 296.535986][T17623] vhci_hcd: unknown pdu 1 [ 296.541237][ T4477] vhci_hcd: stop threads [ 296.545694][ T4477] vhci_hcd: release socket [ 296.550296][ T4477] vhci_hcd: disconnect device [ 296.596672][T17628] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(3) [ 296.603309][T17628] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 296.610998][T17628] vhci_hcd vhci_hcd.0: Device attached [ 296.617570][T17629] vhci_hcd: connection closed [ 296.617694][ T4477] vhci_hcd: stop threads [ 296.626651][ T4477] vhci_hcd: release socket [ 296.631061][ T4477] vhci_hcd: disconnect device [ 297.951550][T17669] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 297.958250][T17669] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 297.965966][T17669] vhci_hcd vhci_hcd.0: Device attached [ 297.972347][T17670] vhci_hcd: connection closed [ 297.972468][T15287] vhci_hcd: stop threads [ 297.981414][T15287] vhci_hcd: release socket [ 297.985947][T15287] vhci_hcd: disconnect device [ 298.018483][T17673] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(4) [ 298.025126][T17673] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 298.032856][T17673] vhci_hcd vhci_hcd.0: Device attached [ 298.040135][T17675] vhci_hcd: unknown pdu 1 [ 298.044696][T15287] vhci_hcd: stop threads [ 298.049042][T15287] vhci_hcd: release socket [ 298.053478][T15287] vhci_hcd: disconnect device [ 298.078226][T17680] ALSA: seq fatal error: cannot create timer (-22) [ 299.108876][T17730] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 299.115430][T17730] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 299.123158][T17730] vhci_hcd vhci_hcd.0: Device attached [ 299.130161][T17731] vhci_hcd: connection closed [ 299.131834][T11192] vhci_hcd: stop threads [ 299.140890][T11192] vhci_hcd: release socket [ 299.145364][T11192] vhci_hcd: disconnect device [ 299.196433][T17738] lo speed is unknown, defaulting to 1000 [ 299.248735][T17744] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(4) [ 299.255254][T17744] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 299.262992][T17744] vhci_hcd vhci_hcd.0: Device attached [ 299.268990][T17746] vhci_hcd: unknown pdu 1 [ 299.273788][T11192] vhci_hcd: stop threads [ 299.278095][T11192] vhci_hcd: release socket [ 299.282516][T11192] vhci_hcd: disconnect device [ 299.385409][ T29] kauditd_printk_skb: 972 callbacks suppressed [ 299.385425][ T29] audit: type=1400 audit(1724479756.495:18723): avc: denied { create } for pid=17741 comm="syz.0.3557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 299.412612][ T29] audit: type=1400 audit(1724479756.495:18724): avc: denied { create } for pid=17741 comm="syz.0.3557" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 299.434723][ T29] audit: type=1400 audit(1724479756.555:18725): avc: denied { write } for pid=17741 comm="syz.0.3557" name="001" dev="devtmpfs" ino=141 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 [ 299.457854][ T29] audit: type=1400 audit(1724479756.555:18726): avc: denied { open } for pid=17741 comm="syz.0.3557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 299.500446][ T29] audit: type=1400 audit(1724479756.615:18727): avc: denied { read write } for pid=15203 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 299.525758][ T29] audit: type=1400 audit(1724479756.645:18728): avc: denied { create } for pid=17750 comm="syz.3.3559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 299.545684][ T29] audit: type=1400 audit(1724479756.645:18729): avc: denied { open } for pid=17750 comm="syz.3.3559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 299.565102][ T29] audit: type=1400 audit(1724479756.645:18730): avc: denied { prog_load } for pid=17750 comm="syz.3.3559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 299.584399][ T29] audit: type=1400 audit(1724479756.645:18731): avc: denied { prog_load } for pid=17750 comm="syz.3.3559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 299.603633][ T29] audit: type=1400 audit(1724479756.645:18732): avc: denied { prog_load } for pid=17750 comm="syz.3.3559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 299.738849][T17762] FAULT_INJECTION: forcing a failure. [ 299.738849][T17762] name failslab, interval 1, probability 0, space 0, times 0 [ 299.751505][T17762] CPU: 0 UID: 0 PID: 17762 Comm: syz.3.3562 Not tainted 6.11.0-rc4-syzkaller-00236-g60f0560f53e3 #0 [ 299.762312][T17762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 299.772733][T17762] Call Trace: [ 299.776019][T17762] [ 299.778956][T17762] dump_stack_lvl+0xf2/0x150 [ 299.783597][T17762] dump_stack+0x15/0x20 [ 299.787832][T17762] should_fail_ex+0x229/0x230 [ 299.792532][T17762] ? __pfx_ip6_dst_gc+0x10/0x10 [ 299.798902][T17762] ? dst_alloc+0xc0/0x100 [ 299.803285][T17762] should_failslab+0x8f/0xb0 [ 299.807905][T17762] kmem_cache_alloc_noprof+0x4c/0x290 [ 299.813413][T17762] ? fib6_select_path+0x2bf/0x2f0 [ 299.818452][T17762] dst_alloc+0xc0/0x100 [ 299.822648][T17762] ip6_pol_route+0x6ff/0xb90 [ 299.827263][T17762] ? ip6_pol_route+0x385/0xb90 [ 299.832131][T17762] ip6_pol_route_output+0x3f/0x50 [ 299.837228][T17762] ? __pfx_ip6_pol_route_output+0x10/0x10 [ 299.842970][T17762] fib6_rule_lookup+0x137/0x4e0 [ 299.847841][T17762] ? __pfx_ip6_pol_route_output+0x10/0x10 [ 299.853661][T17762] ? nf_conntrack_tuple_taken+0x97d/0xa00 [ 299.859444][T17762] ? __rcu_read_unlock+0x34/0x70 [ 299.864471][T17762] ip6_route_output_flags+0x1f1/0x2e0 [ 299.869864][T17762] icmpv6_rt_has_prefsrc+0x2b/0xe0 [ 299.874989][T17762] icmp6_send+0x820/0xfd0 [ 299.879358][T17762] ? icmp6_send+0x674/0xfd0 [ 299.883877][T17762] ip6_fragment+0x39b/0x1260 [ 299.888491][T17762] ? __pfx_ip6_finish_output2+0x10/0x10 [ 299.894061][T17762] ip6_finish_output+0x33e/0x540 [ 299.899037][T17762] ip6_output+0xf5/0x230 [ 299.903316][T17762] ? __pfx_ip6_finish_output+0x10/0x10 [ 299.908910][T17762] ? __pfx_ip6_output+0x10/0x10 [ 299.913852][T17762] ip6_local_out+0x76/0xd0 [ 299.918325][T17762] ip6_send_skb+0x5a/0x120 [ 299.922794][T17762] udp_v6_send_skb+0x760/0xbf0 [ 299.927592][T17762] udp_v6_push_pending_frames+0xd7/0x120 [ 299.933418][T17762] ? __pfx_udp_v6_push_pending_frames+0x10/0x10 [ 299.939722][T17762] udp_lib_setsockopt+0x508/0x7e0 [ 299.944834][T17762] udpv6_setsockopt+0x73/0xb0 [ 299.949577][T17762] ? __pfx_udp_v6_push_pending_frames+0x10/0x10 [ 299.955886][T17762] sock_common_setsockopt+0x64/0x80 [ 299.961109][T17762] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 299.967183][T17762] __sys_setsockopt+0x1d8/0x250 [ 299.972051][T17762] __x64_sys_setsockopt+0x66/0x80 [ 299.977082][T17762] x64_sys_call+0x278d/0x2d60 [ 299.981784][T17762] do_syscall_64+0xc9/0x1c0 [ 299.986433][T17762] ? clear_bhb_loop+0x55/0xb0 [ 299.991134][T17762] ? clear_bhb_loop+0x55/0xb0 [ 299.995901][T17762] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 300.001834][T17762] RIP: 0033:0x7fd8d6489e79 [ 300.006338][T17762] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 300.025972][T17762] RSP: 002b:00007fd8d5101038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 300.034388][T17762] RAX: ffffffffffffffda RBX: 00007fd8d6625f80 RCX: 00007fd8d6489e79 [ 300.042367][T17762] RDX: 0000000000000001 RSI: 0000000000000011 RDI: 0000000000000003 [ 300.050497][T17762] RBP: 00007fd8d5101090 R08: 0000000000000004 R09: 0000000000000000 [ 300.058524][T17762] R10: 0000000020000080 R11: 0000000000000246 R12: 0000000000000001 [ 300.066596][T17762] R13: 0000000000000000 R14: 00007fd8d6625f80 R15: 00007fffece03108 [ 300.074657][T17762] [ 300.099801][T17767] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 300.277074][T17782] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 300.283797][T17782] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 300.291661][T17782] vhci_hcd vhci_hcd.0: Device attached [ 300.318538][T17783] vhci_hcd: connection closed [ 300.319239][T11192] vhci_hcd: stop threads [ 300.328392][T11192] vhci_hcd: release socket [ 300.332807][T11192] vhci_hcd: disconnect device [ 300.675066][T17810] lo speed is unknown, defaulting to 1000 [ 303.557781][T17924] pim6reg1: entered promiscuous mode [ 303.563217][T17924] pim6reg1: entered allmulticast mode [ 304.157401][T17962] veth1_macvtap: left promiscuous mode [ 304.388639][ T29] kauditd_printk_skb: 528 callbacks suppressed [ 304.388653][ T29] audit: type=1400 audit(1724479761.505:19261): avc: denied { read write } for pid=14319 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 304.495807][ T29] audit: type=1400 audit(1724479761.605:19262): avc: denied { read write } for pid=14319 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 304.560800][ T29] audit: type=1400 audit(1724479761.675:19263): avc: denied { read write } for pid=14319 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 304.603958][ T29] audit: type=1400 audit(1724479761.715:19264): avc: denied { read write } for pid=14319 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 304.641179][ T29] audit: type=1400 audit(1724479761.745:19265): avc: denied { read write } for pid=13682 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 304.665602][ T29] audit: type=1400 audit(1724479761.745:19266): avc: denied { read write } for pid=14343 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 304.720608][ T29] audit: type=1400 audit(1724479761.835:19267): avc: denied { read write } for pid=14343 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 304.770572][ T29] audit: type=1400 audit(1724479761.875:19268): avc: denied { read write } for pid=14319 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 304.817917][ T29] audit: type=1400 audit(1724479761.915:19269): avc: denied { read write } for pid=14343 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 304.842381][ T29] audit: type=1400 audit(1724479761.935:19270): avc: denied { read write } for pid=15203 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 304.851827][T18002] pim6reg1: entered promiscuous mode [ 304.872157][T18002] pim6reg1: entered allmulticast mode [ 304.894425][T18005] pim6reg1: entered promiscuous mode [ 304.899764][T18005] pim6reg1: entered allmulticast mode [ 304.977115][T18013] pim6reg1: entered promiscuous mode [ 304.982546][T18013] pim6reg1: entered allmulticast mode [ 304.990219][T18012] pim6reg1: entered promiscuous mode [ 304.995532][T18012] pim6reg1: entered allmulticast mode [ 305.037634][T18016] pim6reg1: entered promiscuous mode [ 305.042983][T18016] pim6reg1: entered allmulticast mode [ 305.081755][T18023] pim6reg1: entered promiscuous mode [ 305.087194][T18023] pim6reg1: entered allmulticast mode [ 305.149101][T18021] pim6reg1: entered promiscuous mode [ 305.154503][T18021] pim6reg1: entered allmulticast mode [ 305.166531][T18029] pim6reg1: entered promiscuous mode [ 305.171858][T18029] pim6reg1: entered allmulticast mode [ 305.380055][T18062] veth0_vlan: entered allmulticast mode [ 305.486177][T18062] veth0_vlan: left promiscuous mode [ 305.514679][T18062] veth0_vlan: entered promiscuous mode [ 310.479750][ T29] kauditd_printk_skb: 322 callbacks suppressed [ 310.479767][ T29] audit: type=1400 audit(1724479767.595:19593): avc: denied { read write } for pid=15203 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 310.589788][ T29] audit: type=1400 audit(1724479767.645:19594): avc: denied { read write } for pid=15203 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 310.614228][ T29] audit: type=1400 audit(1724479767.665:19595): avc: denied { create } for pid=18217 comm="syz.3.3759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 310.705966][ T29] audit: type=1400 audit(1724479767.755:19596): avc: denied { read write } for pid=15203 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 310.730453][ T29] audit: type=1400 audit(1724479767.795:19597): avc: denied { read write } for pid=18219 comm="syz.3.3760" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 310.798610][ T29] audit: type=1400 audit(1724479767.885:19598): avc: denied { read write } for pid=14319 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 310.855973][ T29] audit: type=1400 audit(1724479767.935:19599): avc: denied { map_create } for pid=18221 comm="syz.4.3761" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 310.875374][ T29] audit: type=1400 audit(1724479767.935:19600): avc: denied { prog_load } for pid=18221 comm="syz.4.3761" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 310.894679][ T29] audit: type=1400 audit(1724479767.945:19601): avc: denied { read write } for pid=14319 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 310.962005][ T29] audit: type=1400 audit(1724479768.075:19602): avc: denied { execmem } for pid=18223 comm="syz.4.3762" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 311.018268][T18227] veth0_vlan: entered allmulticast mode [ 311.198364][T18230] veth0_vlan: left promiscuous mode [ 311.204049][T18230] veth0_vlan: entered promiscuous mode [ 311.223027][T18232] netlink: 12 bytes leftover after parsing attributes in process `syz.3.3764'. [ 311.232068][T18232] tc_dump_action: action bad kind [ 311.402952][T18257] netlink: 'syz.3.3777': attribute type 29 has an invalid length. [ 311.561533][T18276] pim6reg1: entered promiscuous mode [ 311.567034][T18276] pim6reg1: entered allmulticast mode [ 312.297828][T18304] syzkaller0: entered allmulticast mode [ 314.202687][T18400] lo speed is unknown, defaulting to 1000 [ 314.301229][T18402] lo speed is unknown, defaulting to 1000 [ 315.294922][T18538] lo speed is unknown, defaulting to 1000 [ 315.545593][ T29] kauditd_printk_skb: 1128 callbacks suppressed [ 315.545626][ T29] audit: type=1400 audit(1724479772.655:20731): avc: denied { read write } for pid=13903 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 315.615418][ T29] audit: type=1400 audit(1724479772.715:20732): avc: denied { read write } for pid=14319 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 315.639854][ T29] audit: type=1400 audit(1724479772.715:20733): avc: denied { create } for pid=18545 comm="syz.0.3907" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 315.694529][ T29] audit: type=1400 audit(1724479772.725:20734): avc: denied { read write } for pid=13903 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 315.719134][ T29] audit: type=1400 audit(1724479772.725:20735): avc: denied { map_create } for pid=18547 comm="syz.4.3908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 315.738602][ T29] audit: type=1400 audit(1724479772.725:20736): avc: denied { map_create } for pid=18547 comm="syz.4.3908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 315.758258][ T29] audit: type=1400 audit(1724479772.725:20737): avc: denied { read } for pid=18547 comm="syz.4.3908" name="qrtr-tun" dev="devtmpfs" ino=233 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 315.781316][ T29] audit: type=1400 audit(1724479772.725:20738): avc: denied { create } for pid=18547 comm="syz.4.3908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 315.802137][ T29] audit: type=1400 audit(1724479772.725:20739): avc: denied { create } for pid=18547 comm="syz.4.3908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 315.822961][ T29] audit: type=1400 audit(1724479772.725:20740): avc: denied { create } for pid=18547 comm="syz.4.3908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 316.299620][T18601] pim6reg1: entered promiscuous mode [ 316.304993][T18601] pim6reg1: entered allmulticast mode [ 317.075119][T18682] bridge0: port 3(syz_tun) entered blocking state [ 317.081811][T18682] bridge0: port 3(syz_tun) entered disabled state [ 317.109651][T18682] syz_tun: entered allmulticast mode [ 317.125187][T18682] syz_tun: entered promiscuous mode [ 317.133612][T18682] bridge0: port 3(syz_tun) entered blocking state [ 317.140127][T18682] bridge0: port 3(syz_tun) entered forwarding state [ 319.144581][T18766] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 319.151324][T18766] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 319.159095][T18766] vhci_hcd vhci_hcd.0: Device attached [ 319.187979][T18768] vhci_hcd: connection closed [ 319.188146][ T4477] vhci_hcd: stop threads [ 319.197209][ T4477] vhci_hcd: release socket [ 319.201649][ T4477] vhci_hcd: disconnect device [ 319.707598][T18797] netlink: 'syz.2.4015': attribute type 10 has an invalid length. [ 319.822619][T18808] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 319.920440][T18820] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 319.926975][T18820] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 319.934703][T18820] vhci_hcd vhci_hcd.0: Device attached [ 319.941334][T18821] vhci_hcd: connection closed [ 319.941434][T11192] vhci_hcd: stop threads [ 319.950454][T11192] vhci_hcd: release socket [ 319.954968][T11192] vhci_hcd: disconnect device [ 320.825155][ T29] kauditd_printk_skb: 767 callbacks suppressed [ 320.825241][ T29] audit: type=1400 audit(1724479777.935:21508): avc: denied { read write } for pid=13903 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 320.857492][ T29] audit: type=1400 audit(1724479777.945:21509): avc: denied { create } for pid=18854 comm="syz.1.4039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 320.877306][ T29] audit: type=1400 audit(1724479777.945:21510): avc: denied { read write } for pid=13682 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 320.901791][ T29] audit: type=1400 audit(1724479777.945:21511): avc: denied { create } for pid=18857 comm="syz.1.4040" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 320.922325][ T29] audit: type=1400 audit(1724479777.975:21512): avc: denied { create } for pid=18857 comm="syz.1.4040" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 320.942210][ T29] audit: type=1400 audit(1724479777.975:21513): avc: denied { read write } for pid=13682 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 320.966698][ T29] audit: type=1400 audit(1724479777.975:21514): avc: denied { open } for pid=18860 comm="syz.1.4041" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 320.986681][ T29] audit: type=1400 audit(1724479777.975:21515): avc: denied { create } for pid=18860 comm="syz.1.4041" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 321.007119][ T29] audit: type=1400 audit(1724479777.975:21516): avc: denied { create } for pid=18860 comm="syz.1.4041" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 321.027276][ T29] audit: type=1400 audit(1724479777.975:21517): avc: denied { create } for pid=18860 comm="syz.1.4041" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 321.047707][T18873] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(3) [ 321.054298][T18873] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 321.062078][T18873] vhci_hcd vhci_hcd.0: Device attached [ 321.069204][T18874] vhci_hcd: connection closed [ 321.069425][ T4014] vhci_hcd: stop threads [ 321.070802][T18876] can0: slcan on pts0. [ 321.074160][ T4014] vhci_hcd: release socket [ 321.074170][ T4014] vhci_hcd: disconnect device [ 321.196005][T18876] can0 (unregistered): slcan off pts0. [ 321.234257][T18892] lo speed is unknown, defaulting to 1000 [ 321.895883][ C1] Adjusting tsc more than 11% (6672762 vs 8464875) [ 322.088624][T18968] tap0: tun_chr_ioctl cmd 1074025676 [ 322.094017][T18968] tap0: owner set to 0 [ 322.483806][T19000] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(4) [ 322.490433][T19000] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 322.498199][T19000] vhci_hcd vhci_hcd.0: Device attached [ 322.504283][T19002] vhci_hcd: unknown pdu 1 [ 322.510088][ T4014] vhci_hcd: stop threads [ 322.514505][ T4014] vhci_hcd: release socket [ 322.519013][ T4014] vhci_hcd: disconnect device [ 323.241818][T19044] lo speed is unknown, defaulting to 1000 [ 323.300176][T19059] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(4) [ 323.306721][T19059] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 323.314435][T19059] vhci_hcd vhci_hcd.0: Device attached [ 323.320903][T19061] vhci_hcd: unknown pdu 1 [ 323.325523][T15287] vhci_hcd: stop threads [ 323.329829][T15287] vhci_hcd: release socket [ 323.334254][T15287] vhci_hcd: disconnect device [ 324.815756][T19130] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 324.822310][T19130] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 324.830110][T19130] vhci_hcd vhci_hcd.0: Device attached [ 324.838563][T19132] vhci_hcd: unknown pdu 1 [ 324.843106][T15287] vhci_hcd: stop threads [ 324.847384][T15287] vhci_hcd: release socket [ 324.851833][T15287] vhci_hcd: disconnect device [ 324.932310][T19137] FAULT_INJECTION: forcing a failure. [ 324.932310][T19137] name failslab, interval 1, probability 0, space 0, times 0 [ 324.944989][T19137] CPU: 1 UID: 0 PID: 19137 Comm: syz.1.4153 Not tainted 6.11.0-rc4-syzkaller-00236-g60f0560f53e3 #0 [ 324.955836][T19137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 324.965893][T19137] Call Trace: [ 324.969193][T19137] [ 324.972131][T19137] dump_stack_lvl+0xf2/0x150 [ 324.976759][T19137] dump_stack+0x15/0x20 [ 324.980966][T19137] should_fail_ex+0x229/0x230 [ 324.985667][T19137] ? build_skb+0x33/0x210 [ 324.990065][T19137] should_failslab+0x8f/0xb0 [ 324.994691][T19137] kmem_cache_alloc_noprof+0x4c/0x290 [ 325.000144][T19137] ? alloc_pages_mpol_noprof+0xd5/0x1e0 [ 325.005721][T19137] build_skb+0x33/0x210 [ 325.009897][T19137] __tun_build_skb+0x2b/0x1b0 [ 325.014610][T19137] ? tun_get_user+0x1474/0x24b0 [ 325.019517][T19137] tun_get_user+0x1494/0x24b0 [ 325.024222][T19137] ? kstrtoull+0x110/0x140 [ 325.028727][T19137] ? ref_tracker_alloc+0x1f5/0x2f0 [ 325.033917][T19137] tun_chr_write_iter+0x18e/0x240 [ 325.039019][T19137] vfs_write+0x78f/0x900 [ 325.043289][T19137] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 325.048868][T19137] ksys_write+0xeb/0x1b0 [ 325.053140][T19137] __x64_sys_write+0x42/0x50 [ 325.057790][T19137] x64_sys_call+0x27dd/0x2d60 [ 325.062522][T19137] do_syscall_64+0xc9/0x1c0 [ 325.067054][T19137] ? clear_bhb_loop+0x55/0xb0 [ 325.071792][T19137] ? clear_bhb_loop+0x55/0xb0 [ 325.076499][T19137] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 325.082442][T19137] RIP: 0033:0x7f664b7b895f [ 325.086869][T19137] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48 [ 325.106494][T19137] RSP: 002b:00007f664a431000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 325.115012][T19137] RAX: ffffffffffffffda RBX: 00007f664b955f80 RCX: 00007f664b7b895f [ 325.122999][T19137] RDX: 0000000000000046 RSI: 0000000020000000 RDI: 00000000000000c8 [ 325.131054][T19137] RBP: 00007f664a431090 R08: 0000000000000000 R09: 0000000000000000 [ 325.139035][T19137] R10: 0000000000000046 R11: 0000000000000293 R12: 0000000000000001 [ 325.147014][T19137] R13: 0000000000000000 R14: 00007f664b955f80 R15: 00007ffe2d14afc8 [ 325.155001][T19137] [ 325.645416][T19187] FAULT_INJECTION: forcing a failure. [ 325.645416][T19187] name failslab, interval 1, probability 0, space 0, times 0 [ 325.658154][T19187] CPU: 0 UID: 0 PID: 19187 Comm: syz.3.4174 Not tainted 6.11.0-rc4-syzkaller-00236-g60f0560f53e3 #0 [ 325.668932][T19187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 325.679001][T19187] Call Trace: [ 325.682289][T19187] [ 325.685246][T19187] dump_stack_lvl+0xf2/0x150 [ 325.689874][T19187] dump_stack+0x15/0x20 [ 325.690779][T19189] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 325.694137][T19187] should_fail_ex+0x229/0x230 [ 325.700690][T19189] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 325.705364][T19187] ? __alloc_skb+0x10b/0x310 [ 325.713152][T19189] vhci_hcd vhci_hcd.0: Device attached [ 325.717631][T19187] should_failslab+0x8f/0xb0 [ 325.717702][T19187] kmem_cache_alloc_node_noprof+0x51/0x2b0 [ 325.728542][T19191] vhci_hcd: unknown pdu 1 [ 325.733589][T19187] __alloc_skb+0x10b/0x310 [ 325.740592][ T4477] vhci_hcd: stop threads [ 325.742314][T19187] netlink_alloc_large_skb+0xad/0xe0 [ 325.746600][ T4477] vhci_hcd: release socket [ 325.751812][T19187] netlink_sendmsg+0x3b4/0x6e0 [ 325.756250][ T4477] vhci_hcd: disconnect device [ 325.760969][T19187] ? __pfx_netlink_sendmsg+0x10/0x10 [ 325.771087][T19187] __sock_sendmsg+0x140/0x180 [ 325.775863][T19187] ____sys_sendmsg+0x312/0x410 [ 325.780736][T19187] __sys_sendmmsg+0x269/0x500 [ 325.785496][T19187] __x64_sys_sendmmsg+0x57/0x70 [ 325.790352][T19187] x64_sys_call+0xa49/0x2d60 [ 325.795019][T19187] do_syscall_64+0xc9/0x1c0 [ 325.799585][T19187] ? clear_bhb_loop+0x55/0xb0 [ 325.804269][T19187] ? clear_bhb_loop+0x55/0xb0 [ 325.809001][T19187] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 325.814947][T19187] RIP: 0033:0x7fd8d6489e79 [ 325.819358][T19187] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 325.839037][T19187] RSP: 002b:00007fd8d5101038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 325.847493][T19187] RAX: ffffffffffffffda RBX: 00007fd8d6625f80 RCX: 00007fd8d6489e79 [ 325.855477][T19187] RDX: 040000000000009f RSI: 00000000200002c0 RDI: 0000000000000005 [ 325.863497][T19187] RBP: 00007fd8d5101090 R08: 0000000000000000 R09: 0000000000000000 [ 325.871469][T19187] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 325.879478][T19187] R13: 0000000000000000 R14: 00007fd8d6625f80 R15: 00007fffece03108 [ 325.887452][T19187] Aug 24 06:09:42 syzkaller daemon.err dhcpcd[19197]: ps_bpf_start_bpf: bpf_open: Invalid argument Aug 24 06:09:42 syzkaller daemon.err dhcpcd[19197]: ps_root_recvmsg: Invalid argument [ 326.172141][T19213] FAULT_INJECTION: forcing a failure. [ 326.172141][T19213] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 326.185405][T19213] CPU: 0 UID: 0 PID: 19213 Comm: syz.2.4184 Not tainted 6.11.0-rc4-syzkaller-00236-g60f0560f53e3 #0 [ 326.196197][T19213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 326.206265][T19213] Call Trace: [ 326.209553][T19213] [ 326.212511][T19213] dump_stack_lvl+0xf2/0x150 [ 326.215356][ T29] kauditd_printk_skb: 1499 callbacks suppressed [ 326.215374][ T29] audit: type=1400 audit(1724479782.955:23017): avc: denied { read write } for pid=13682 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 326.217202][T19213] dump_stack+0x15/0x20 [ 326.251997][T19213] should_fail_ex+0x229/0x230 [ 326.256700][T19213] should_fail_alloc_page+0xfd/0x110 [ 326.262028][T19213] __alloc_pages_noprof+0x109/0x360 [ 326.267366][T19213] alloc_pages_mpol_noprof+0xb1/0x1e0 [ 326.272838][T19213] folio_alloc_mpol_noprof+0x36/0x70 [ 326.278154][T19213] shmem_get_folio_gfp+0x3eb/0xd80 [ 326.283358][T19213] shmem_write_begin+0xa0/0x1c0 [ 326.288305][T19213] generic_perform_write+0x1b4/0x580 [ 326.293610][T19213] shmem_file_write_iter+0xc8/0xf0 [ 326.298794][T19213] vfs_write+0x78f/0x900 [ 326.303056][T19213] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 326.308960][T19213] ksys_write+0xeb/0x1b0 [ 326.313303][T19213] __x64_sys_write+0x42/0x50 [ 326.317956][T19213] x64_sys_call+0x27dd/0x2d60 [ 326.322684][T19213] do_syscall_64+0xc9/0x1c0 [ 326.327348][T19213] ? clear_bhb_loop+0x55/0xb0 [ 326.332037][T19213] ? clear_bhb_loop+0x55/0xb0 [ 326.336727][T19213] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 326.342641][T19213] RIP: 0033:0x7fc535c4895f [ 326.347059][T19213] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48 [ 326.366675][T19213] RSP: 002b:00007fc5348c0df0 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 326.375239][T19213] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007fc535c4895f [ 326.383218][T19213] RDX: 0000000000040000 RSI: 00007fc52c4a1000 RDI: 0000000000000004 [ 326.391194][T19213] RBP: 0000000000000000 R08: 0000000000000000 R09: 00000000000004be [ 326.399194][T19213] R10: 00000000000003c4 R11: 0000000000000293 R12: 0000000000000004 [ 326.407167][T19213] R13: 00007fc5348c0ef0 R14: 00007fc5348c0eb0 R15: 00007fc52c4a1000 [ 326.415195][T19213] [ 326.434303][ T29] audit: type=1400 audit(1724479783.166:23018): avc: denied { read write } for pid=14319 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 326.460957][ T29] audit: type=1400 audit(1724479783.166:23019): avc: denied { read write } for pid=13682 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 326.473560][T19222] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 326.485412][ T29] audit: type=1400 audit(1724479783.166:23020): avc: denied { create } for pid=19216 comm="syz.4.4186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 326.517118][ T29] audit: type=1400 audit(1724479783.166:23021): avc: denied { read write } for pid=14319 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 326.517945][T19225] FAULT_INJECTION: forcing a failure. [ 326.517945][T19225] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 326.541565][ T29] audit: type=1400 audit(1724479783.166:23022): avc: denied { read write } for pid=14343 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 326.554749][T19225] CPU: 0 UID: 0 PID: 19225 Comm: syz.2.4190 Not tainted 6.11.0-rc4-syzkaller-00236-g60f0560f53e3 #0 [ 326.582748][ T29] audit: type=1400 audit(1724479783.194:23023): avc: denied { open } for pid=19221 comm="syz.2.4188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 326.589748][T19225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 326.589765][T19225] Call Trace: [ 326.609230][ T29] audit: type=1400 audit(1724479783.194:23024): avc: denied { map_create } for pid=19220 comm="syz.4.4189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 326.619207][T19225] [ 326.622491][ T29] audit: type=1400 audit(1724479783.194:23025): avc: denied { map_create } for pid=19221 comm="syz.2.4188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 326.641728][T19225] dump_stack_lvl+0xf2/0x150 [ 326.644746][ T29] audit: type=1400 audit(1724479783.194:23026): avc: denied { create } for pid=19220 comm="syz.4.4189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 326.663985][T19225] dump_stack+0x15/0x20 [ 326.664115][T19225] should_fail_ex+0x229/0x230 [ 326.697392][T19225] should_fail+0xb/0x10 [ 326.701574][T19225] should_fail_usercopy+0x1a/0x20 [ 326.706691][T19225] _copy_from_user+0x1e/0xd0 [ 326.711421][T19225] do_sys_poll+0x156/0xc10 [ 326.715843][T19225] ? avc_has_perm+0xd4/0x160 [ 326.720444][T19225] ? selinux_file_open+0x34c/0x3b0 [ 326.725677][T19225] __se_sys_poll+0xe1/0x200 [ 326.730180][T19225] __x64_sys_poll+0x43/0x50 [ 326.734687][T19225] x64_sys_call+0x29db/0x2d60 [ 326.739482][T19225] do_syscall_64+0xc9/0x1c0 [ 326.744053][T19225] ? clear_bhb_loop+0x55/0xb0 [ 326.748747][T19225] ? clear_bhb_loop+0x55/0xb0 [ 326.753515][T19225] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 326.759427][T19225] RIP: 0033:0x7fc535c49e79 [ 326.763869][T19225] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 326.783519][T19225] RSP: 002b:00007fc5348c1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000007 [ 326.792002][T19225] RAX: ffffffffffffffda RBX: 00007fc535de5f80 RCX: 00007fc535c49e79 [ 326.799975][T19225] RDX: 0000000000000f45 RSI: 0000000000000001 RDI: 00000000200000c0 [ 326.808114][T19225] RBP: 00007fc5348c1090 R08: 0000000000000000 R09: 0000000000000000 [ 326.816143][T19225] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 326.824166][T19225] R13: 0000000000000000 R14: 00007fc535de5f80 R15: 00007ffd61a190f8 [ 326.832148][T19225] [ 326.904169][T19238] FAULT_INJECTION: forcing a failure. [ 326.904169][T19238] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 326.917388][T19238] CPU: 1 UID: 0 PID: 19238 Comm: syz.0.4195 Not tainted 6.11.0-rc4-syzkaller-00236-g60f0560f53e3 #0 [ 326.928297][T19238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 326.938354][T19238] Call Trace: [ 326.941711][T19238] [ 326.944667][T19238] dump_stack_lvl+0xf2/0x150 [ 326.949279][T19238] dump_stack+0x15/0x20 [ 326.953466][T19238] should_fail_ex+0x229/0x230 [ 326.958195][T19238] should_fail+0xb/0x10 [ 326.962360][T19238] should_fail_usercopy+0x1a/0x20 [ 326.967478][T19238] _copy_to_user+0x1e/0xa0 [ 326.971908][T19238] simple_read_from_buffer+0xa0/0x110 [ 326.977305][T19238] proc_fail_nth_read+0xff/0x140 [ 326.982285][T19238] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 326.987877][T19238] vfs_read+0x1a2/0x6e0 [ 326.992167][T19238] ? __rcu_read_unlock+0x4e/0x70 [ 326.997127][T19238] ? __fget_files+0x1da/0x210 [ 327.001892][T19238] ksys_read+0xeb/0x1b0 [ 327.006067][T19238] __x64_sys_read+0x42/0x50 [ 327.010651][T19238] x64_sys_call+0x27d3/0x2d60 [ 327.015414][T19238] do_syscall_64+0xc9/0x1c0 [ 327.020033][T19238] ? clear_bhb_loop+0x55/0xb0 [ 327.024760][T19238] ? clear_bhb_loop+0x55/0xb0 [ 327.029450][T19238] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 327.035360][T19238] RIP: 0033:0x7fc12c9b88bc [ 327.039852][T19238] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 327.059474][T19238] RSP: 002b:00007fc12b637030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 327.067900][T19238] RAX: ffffffffffffffda RBX: 00007fc12cb55f80 RCX: 00007fc12c9b88bc [ 327.075892][T19238] RDX: 000000000000000f RSI: 00007fc12b6370a0 RDI: 0000000000000005 [ 327.083887][T19238] RBP: 00007fc12b637090 R08: 0000000000000000 R09: 000000000000001c [ 327.091896][T19238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 327.099884][T19238] R13: 0000000000000000 R14: 00007fc12cb55f80 R15: 00007ffed23c0c38 [ 327.107865][T19238] Aug 24 06:09:43 syzkaller daemon.err dhcpcd[19247]: ps_bpf_start_bpf: bpf_open: Invalid argument Aug 24 06:09:43 syzkaller daem[ 327.133654][T19250] tc_dump_action: action bad kind on.err dhcpcd[19247]: ps_root_recvmsg: Invalid argument [ 327.155539][T19254] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 327.348333][T19262] tc_dump_action: action bad kind [ 327.423020][T19268] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(4) [ 327.429573][T19268] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 327.437366][T19268] vhci_hcd vhci_hcd.0: Device attached [ 327.444939][T19270] vhci_hcd: unknown pdu 1 [ 327.450732][T15287] vhci_hcd: stop threads [ 327.455071][T15287] vhci_hcd: release socket [ 327.459543][T15287] vhci_hcd: disconnect device Aug 24 06:09:44 syzkaller daemon.err dhcpcd[19279]: ps_bpf_start_bpf: bpf_open: Invalid argument Aug 24 06:09:44 syzkaller daemon.err dhcpcd[19279]: ps_root_recvmsg: Invalid argument [ 328.804288][T19319] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(4) [ 328.810909][T19319] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 328.818653][T19319] vhci_hcd vhci_hcd.0: Device attached [ 328.825063][T19321] vhci_hcd: unknown pdu 1 [ 328.829813][T15287] vhci_hcd: stop threads [ 328.834264][T15287] vhci_hcd: release socket [ 328.838998][T15287] vhci_hcd: disconnect device [ 329.005893][T19328] Cannot find set identified by id 0 to match [ 329.035802][T19330] xt_recent: hitcount (4294967295) is larger than allowed maximum (65535) [ 329.844022][T19367] Cannot find del_set index 0 as target [ 329.883727][T19371] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 329.910751][T19373] xt_TCPMSS: Only works on TCP SYN packets [ 329.987421][T19379] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 329.994017][T19379] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 330.001726][T19379] vhci_hcd vhci_hcd.0: Device attached [ 330.011527][T19381] vhci_hcd: unknown pdu 1 [ 330.016074][T15287] vhci_hcd: stop threads [ 330.020400][T15287] vhci_hcd: release socket [ 330.024832][T15287] vhci_hcd: disconnect device [ 330.321658][T19412] FAULT_INJECTION: forcing a failure. [ 330.321658][T19412] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 330.335009][T19412] CPU: 0 UID: 0 PID: 19412 Comm: syz.3.4264 Not tainted 6.11.0-rc4-syzkaller-00236-g60f0560f53e3 #0 [ 330.345790][T19412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 330.355941][T19412] Call Trace: [ 330.359225][T19412] [ 330.362166][T19412] dump_stack_lvl+0xf2/0x150 [ 330.366828][T19412] dump_stack+0x15/0x20 [ 330.371072][T19412] should_fail_ex+0x229/0x230 [ 330.375793][T19412] should_fail+0xb/0x10 [ 330.379961][T19412] should_fail_usercopy+0x1a/0x20 [ 330.385028][T19412] _copy_to_iter+0xd3/0xb00 [ 330.389584][T19412] ? chacha_block_generic+0x24e/0x280 [ 330.395000][T19412] get_random_bytes_user+0x112/0x260 [ 330.400310][T19412] ? import_ubuf+0xe9/0x120 [ 330.404953][T19412] __x64_sys_getrandom+0xb5/0x190 [ 330.409995][T19412] x64_sys_call+0x2887/0x2d60 [ 330.414772][T19412] do_syscall_64+0xc9/0x1c0 [ 330.419335][T19412] ? clear_bhb_loop+0x55/0xb0 [ 330.424030][T19412] ? clear_bhb_loop+0x55/0xb0 [ 330.428856][T19412] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 330.434773][T19412] RIP: 0033:0x7fd8d6489e79 [ 330.439279][T19412] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 330.458950][T19412] RSP: 002b:00007fd8d5101038 EFLAGS: 00000246 ORIG_RAX: 000000000000013e [ 330.467378][T19412] RAX: ffffffffffffffda RBX: 00007fd8d6625f80 RCX: 00007fd8d6489e79 [ 330.475372][T19412] RDX: 0000000000000000 RSI: 00000000ffffff9a RDI: 0000000020000240 [ 330.483384][T19412] RBP: 00007fd8d5101090 R08: 0000000000000000 R09: 0000000000000000 [ 330.491448][T19412] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 330.499436][T19412] R13: 0000000000000000 R14: 00007fd8d6625f80 R15: 00007fffece03108 [ 330.507500][T19412] Aug 24 06:09:47 syzkaller daemon.err dhcpcd[19426]: ps_bpf_start_bpf: bpf_open: Invalid argument Aug 24 06:09:47 syzkaller daemon.err dhcpcd[19426]: ps_root_recvmsg: Invalid argument [ 330.828376][T19438] Process accounting resumed [ 331.020966][T19463] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(4) [ 331.027525][T19463] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 331.035281][T19463] vhci_hcd vhci_hcd.0: Device attached [ 331.044528][T19465] vhci_hcd: unknown pdu 1 [ 331.049534][T11192] vhci_hcd: stop threads [ 331.053850][T11192] vhci_hcd: release socket [ 331.058280][T11192] vhci_hcd: disconnect device [ 331.561763][ T29] kauditd_printk_skb: 1114 callbacks suppressed [ 331.561780][ T29] audit: type=1400 audit(1724479788.176:24141): avc: denied { read write } for pid=14319 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 331.594305][ T29] audit: type=1400 audit(1724479788.176:24142): avc: denied { read write } for pid=14319 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 331.618832][ T29] audit: type=1400 audit(1724479788.176:24143): avc: denied { prog_load } for pid=19481 comm="syz.4.4291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 331.638186][ T29] audit: type=1400 audit(1724479788.176:24144): avc: denied { map_create } for pid=19481 comm="syz.4.4291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 331.657682][ T29] audit: type=1400 audit(1724479788.176:24145): avc: denied { prog_load } for pid=19481 comm="syz.4.4291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 331.677004][ T29] audit: type=1400 audit(1724479788.176:24146): avc: denied { prog_load } for pid=19481 comm="syz.4.4291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 331.696279][ T29] audit: type=1400 audit(1724479788.176:24147): avc: denied { open } for pid=19481 comm="syz.4.4291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 331.715723][ T29] audit: type=1400 audit(1724479788.206:24148): avc: denied { read write } for pid=14319 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 331.741831][ T29] audit: type=1400 audit(1724479788.206:24149): avc: denied { create } for pid=19483 comm="syz.4.4292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 331.761565][ T29] audit: type=1400 audit(1724479788.206:24150): avc: denied { read write } for pid=14319 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 332.231603][T19528] ================================================================== [ 332.239730][T19528] BUG: KCSAN: data-race in mas_walk / mas_wmb_replace [ 332.246517][T19528] [ 332.248864][T19528] write to 0xffff888103d56000 of 8 bytes by task 19525 on cpu 0: [ 332.256602][T19528] mas_wmb_replace+0x20f/0x14f0 [ 332.261481][T19528] mas_wr_modify+0x183d/0x3c90 [ 332.266258][T19528] mas_wr_store_entry+0x250/0x390 [ 332.271313][T19528] mas_store_prealloc+0x151/0x2b0 [ 332.276345][T19528] vma_complete+0x3a7/0x760 [ 332.280870][T19528] __split_vma+0x623/0x690 [ 332.285319][T19528] vma_modify+0x198/0x1f0 [ 332.289669][T19528] mprotect_fixup+0x335/0x610 [ 332.294808][T19528] do_mprotect_pkey+0x673/0x9a0 [ 332.299666][T19528] __x64_sys_mprotect+0x48/0x60 [ 332.304545][T19528] x64_sys_call+0x26cf/0x2d60 [ 332.309259][T19528] do_syscall_64+0xc9/0x1c0 [ 332.313795][T19528] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 332.319715][T19528] [ 332.322058][T19528] read to 0xffff888103d56000 of 8 bytes by task 19528 on cpu 1: [ 332.329714][T19528] mas_walk+0x123/0x320 [ 332.333885][T19528] lock_vma_under_rcu+0x84/0x260 [ 332.338959][T19528] exc_page_fault+0x150/0x650 [ 332.343650][T19528] asm_exc_page_fault+0x26/0x30 [ 332.348527][T19528] [ 332.350863][T19528] value changed: 0xffff88811826e501 -> 0xffff888103d56000 [ 332.358064][T19528] [ 332.360396][T19528] Reported by Kernel Concurrency Sanitizer on: [ 332.366570][T19528] CPU: 1 UID: 0 PID: 19528 Comm: syz.1.4309 Not tainted 6.11.0-rc4-syzkaller-00236-g60f0560f53e3 #0 [ 332.377346][T19528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 332.387423][T19528] ==================================================================