last executing test programs: 5m2.033679992s ago: executing program 3 (id=1712): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r0}, 0x8) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x94) (async) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x2010800, 0x0, 0x0, 0x0, &(0x7f0000000000)) (async) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x8, 0xffe, 0x1ff, 0x42000}, 0x10) (async) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000005200010004000000000000001c0000001400", @ANYRES16=r1], 0x28}}, 0x0) (async) setsockopt$packet_int(r1, 0x107, 0xe, &(0x7f00000002c0)=0x7b, 0x4) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='9p_protocol_dump\x00', r2}, 0x10) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@version_9p2000}]}}) 5m1.968827053s ago: executing program 3 (id=1715): bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree\x00', r0}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0xa000032a) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f00000002c0)=""/256, 0x10}], 0x2) 5m1.717613128s ago: executing program 3 (id=1717): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d00)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x8, 0x0, 0x0, 0x0, 0x51}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000071182d0000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000140)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12t\x02\x006\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x01\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x04.\x9aL\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 5m0.441916523s ago: executing program 32 (id=1744): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 4.596527639s ago: executing program 4 (id=7590): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000130000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000100)={{r0}, &(0x7f0000000080), &(0x7f00000000c0)='%ps \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000140)="635fb97ba8c106a4f7e2eda622df", 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 4.493444791s ago: executing program 4 (id=7595): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r1) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) syz_usb_disconnect(0xffffffffffffffff) syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/cgroup\x00') 3.120564928s ago: executing program 4 (id=7606): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f00000004c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r0}, 0x10) rt_sigsuspend(&(0x7f0000000040)={[0x6]}, 0x8) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) 2.993358741s ago: executing program 0 (id=7609): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x3, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000110b0008850000000500000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @sched_cls=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0x10, 0x0, &(0x7f0000000000)="0e1e60ec0d01f01800000000000a37a4", 0x0, 0x8001fb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.689601367s ago: executing program 5 (id=7612): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000240)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="480000001400030400000000000000000a3f0000", @ANYRES32=r1, @ANYBLOB="14000200ff"], 0x48}}, 0x0) 2.660210127s ago: executing program 5 (id=7613): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x18000000000002a0, 0x4f, 0x0, &(0x7f00000002c0)="d2ff03076003008cb89e08f086dd", 0x0, 0xd5b1, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.51763343s ago: executing program 5 (id=7615): r0 = syz_io_uring_setup(0x1f87, &(0x7f0000000080)={0x0, 0x0, 0x13580}, &(0x7f0000000100), &(0x7f0000000380)) bpf$MAP_CREATE(0x0, 0x0, 0x50) io_uring_enter(r0, 0x0, 0x3, 0x7, 0x0, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x11, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) 2.078538549s ago: executing program 4 (id=7616): ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x3) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x3) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000300)=0x1) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2.04742555s ago: executing program 1 (id=7617): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x20048810) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x2000018c) sendmsg$key(r0, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="020100090e"], 0x70}}, 0x44091) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) 1.873616873s ago: executing program 1 (id=7618): mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) semtimedop(0x0, &(0x7f00000004c0)=[{0x0, 0xfff, 0x1000}], 0x1, &(0x7f0000000500)={0x0, 0x989680}) 1.803543734s ago: executing program 1 (id=7619): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000580)="17", 0x59a, 0x10008095, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, 0x0, 0x0) recvmmsg(r0, &(0x7f0000002a80)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000000380)=""/204, 0xcc}, {&(0x7f0000000680)=""/4096, 0x1000}], 0x2}, 0x9}, {{0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000001940)=""/193, 0xc1}], 0x1}, 0xc}], 0x2, 0x10040, 0x0) 1.668607107s ago: executing program 1 (id=7620): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'xfrm0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200000001100010100"/20, @ANYRES32=r2], 0x20}}, 0x0) r3 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000001c0)=ANY=[@ANYBLOB="12010000000000406d049cc200000000000109022400010000000009040000010300000009210000000122050009058103"], 0x0) r4 = socket(0x29, 0x2, 0x96) recvmsg(r4, &(0x7f0000000200)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @empty}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f0000000280)=""/83, 0x53}, {&(0x7f0000000340)=""/209, 0xd1}], 0x3, &(0x7f0000000440)=""/208, 0xd0}, 0x101) syz_usb_control_io(r3, 0x0, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000200)={r6, 0x1, 0x0, @random="1cd00c00"}, 0x10) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f00000000c0)={r6, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_drop_memb(r5, 0x107, 0x2, &(0x7f0000000580)={r6, 0x1, 0x6, @local}, 0x10) syz_usb_control_io$hid(r3, &(0x7f0000000300)={0x24, &(0x7f0000000540)={0x20, 0x0, 0x54, {0x54, 0x31, "330d44d8f7a9f677339d1fe8e07956cd56546f08f610897d70ac7ad189b8fba9161ca86d0cc55b994ff382ff0d324378f949982aeb917ad168424c668c72ce011fea5e12a49e4bdee85530c9c6922cd0ec97"}}, 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io$hid(r3, &(0x7f0000000240)={0x24, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00030400000004031d049e8e17f90f8de6d3716d3273ac95f807d06c"], 0x0, 0x0}, 0x0) 1.361808433s ago: executing program 0 (id=7622): r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2c00000012003b77"], 0x4c}}, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000080)=0xe, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c00000052000100"], 0x1c}, 0x1, 0x0, 0x0, 0xc005}, 0x20000000) 1.206630246s ago: executing program 0 (id=7623): syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', 0x214000, &(0x7f0000000540)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c757466383d302c636865636b3d7374726963742c646973636172642c757466383d312c6e66732c73686f72746e616d653d77696e39352c73686f72746e616d653d6c6f7765722c756e695f786c6174653d302c0036b5"], 0xfa, 0x2b0, &(0x7f0000000880)="$eJzs3M1qE1EUwPHTtGnTlDZZiKAgHnSjm6GNTxCkBTGg1EbUhTC1Ew0Zk5KJkYjY7tzqaxQ3gjvB9gW6cede3BRBcNOFdCTz0Xw02tqvqc3/B2VO597Te28zLWcG5m7ce/O0VHCMglmTWEIlJrIsmyLpZhQYCI4xLx6Wdstydeznlwt37j+4mc3lpmdVZ7Jz1zKqOnHx0/OX7y6t1cbufpj4OCLr6YcbPzJf18+un9vYmgt/eqWmps5XKjVz3rZ0oeiUDNXbtmU6lhbLjlXtaC/YlcXFhprlhfHkYtVyHDXLDS1ZDa1VtFZtqPnYLJbVMAwdT0q/GfznjPzK7KyZPZLJIApvEz1OVqtZs3ltjO5oya8cy6wAAMCJElX9/6ToaNHR8m71f0wOVP/3Koewzav/t3bWhTg14s0bgKyZDP5+O1H/AwAAAAAAAAAAAAAAAAAAAADwP9h03ZTruqnwGH6NBC/PhN9HPU8cjX18/gMRTheHrO3FvYSI/bqer+f9o9+eLUhRbLFkMi7yy7seAn48cyM3PametKzaS0G+95LgSJgfSvfOn/LztS1/qZ6PS7J9/Iyk5Ezv/ExXflxE6vlhuXK5Ld+QlHx+JBWxZcG7rlv5r6ZUr9/KdY0/6vUDAAAAAOA0MHRbuvP+199N0jA03Dakq90/2Xo+IKldng+orA5LK39Izg9Ft24AAAAAAPqJ03hRMm3bqnYFKek+Q9AR/PlXd3oDI9hO+a+dXdddanY6+KAxEYlopd9FZE+dE4ey0uMKvj3zP8C9dI7yvxIAAACAo9Aq+veTvfb+8GcEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAED/2evmYWH//ew91jbcYDSrBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAE6G3wEAAP//v/0bCw==") syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000640)='./file2\x00', 0xc0ed005e, &(0x7f0000000140)={[{@jqfmt_vfsold}, {@data_err_abort}, {@debug}, {@noload}, {@mblk_io_submit}, {@commit={'commit', 0x3d, 0xa}}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@commit={'commit', 0x3d, 0x1000}}], [{@appraise}]}, 0xfe, 0x46d, &(0x7f0000000f00)="$eJzs3M1vFOUfAPDvTF94+/FrRXwBQapoJL60tLzIwYtGEw6amOgB46m2hVQKNbQmQohWD3g0JN6N/4XxpBejXjTxqndDQgwXUC9rZmemLMtu2aXbLnQ/n2S6zzPzdJ/nOzPP7jPz7G4APWsk+5NE/C8ifo+IoTx7a4GR/OHGtYtTf1+7OJVEpfLWX0m13PVrF6fKouX/bcszlUqR39Sg3kvvRkzOzc2cK/Jji2c+GFs4f+GF2TOTp2ZOzZydOHbs8KG9g0cnjnQkziyu67s/nt+z6/g7l9+YOnH5vZ+S/sjjjro4OmUk37sNPd3pyrpse026umOX7fvlZrrRmUA39UVEdrgGqv1/KPpiy/K2oXjts642DlhTlUqlssKr8lIF2MCS6HYLgO4o3+iz699yWaehxz3h6sv5BVAW941iybf0R5on9g3UXd920khEnFj656tsiTW6DwEAUOu7bPzzfKPxXxoP54nB7M//izmU4Yh4ICJ2RMSDEbEzIh6KqJZ9JCIebbP++hmS28c/6ZW7Dq4F2fjvpWJu69bxX1oWGe4rctur8Q8kJ2fnZg4W++RADGw6OZvMjK9Qx/ev/vZFs221479syeovx4JFO670192gm55cnFxNzLWufhqxu79R/EmU0zhJROyKiN13Wcfss/1Nt905/hU0f9qWVb6OeCY//ktRF38paTo/Of7i0YkjY5tjbubgWHlW3O7nXy+92az+VcXfAdnx39rw/F+OfzjZHLFw/sLp6nztQvt1XPrj86bXNG2e/8e3F+f/YPJ2dcVgseGjycXFc+MRg8nrt6+fuPlsZb4sn8V/YH/j/r8jbu6JxyJiT0TsjYjHs4vCou1PRMSTEbF/hfh/fOWp99uPf33mSrP4p+90/KP2+Lef6Dv9w7d3jn9zRDQ7/oerqQPFmlZe/1pt4Gr2HQAAANwv0upn4JN0dDmdpqOj+Wf4d8bWdG5+YfG5k/Mfnp3OPys/HANpeadrqOZ+6Hhxb7jMT9TlDxX3jb/s21LNj07Nz013O3jocdua9P/Mn33dbh2w5jowjwbcp/R/6F36P/SmRP+Hnqb/Q+9q1P8/aVp69Js1bQywrrz/Q+9qof8v5Q/NRwXA/cn7P/Qu/R96UtPvxqer+sr/uif+LX7P8F5pz8ZPRHpPNGPjJ/pb/jGLNhKVobz/Z2s2NSzT7VcmAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAzvgvAAD//w3J5b0=") mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x200000c, 0x3032, 0xffffffffffffffff, 0x0) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000f40)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') 1.069688999s ago: executing program 4 (id=7624): r0 = epoll_create1(0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)={0x10}) 1.069502269s ago: executing program 2 (id=7625): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x500f0, 0x0, 0x0) 1.04366144s ago: executing program 4 (id=7626): openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2241, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff, 0x6}) syz_usb_connect(0x0, 0x2d, &(0x7f00000002c0)=ANY=[@ANYBLOB="12010000091c2f20c81403006c050102030109021b00010000000009040000018ea44300090585da20"], 0x0) syz_open_dev$evdev(&(0x7f0000000000), 0x400000000008c, 0x200) 1.02069779s ago: executing program 2 (id=7627): pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x100080, 0x0) ioctl$TIOCSSOFTCAR(r1, 0x5453, 0x0) splice(r1, 0x0, r0, 0x0, 0x9, 0x0) 967.150351ms ago: executing program 0 (id=7628): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="640000000001010400000000141a0000020000002400018014000180080003"], 0x64}}, 0x0) 963.710561ms ago: executing program 5 (id=7629): prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r0 = io_uring_setup(0x1b7b, &(0x7f0000000040)={0x0, 0xc89f, 0xc000, 0xa, 0x20002f7}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000093c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@deltfilter={0x24, 0x2d, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x0, 0x4}, {}, {0xe, 0xffff}}}, 0x24}}, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000000)=0x13) io_uring_enter(r0, 0x2219, 0x7721, 0x16, 0x0, 0x0) 913.650622ms ago: executing program 2 (id=7630): syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000300)='./file0\x00', 0xa00008, &(0x7f0000000000), 0x1, 0x7c8, &(0x7f0000001280)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x18e) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[], 0x78) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) fallocate(r1, 0x3, 0xfe00, 0x8000c62) 905.313362ms ago: executing program 5 (id=7631): r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp\x00') ioperm(0x1, 0x3, 0x1000) r1 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0xc0002009}) epoll_pwait(r1, &(0x7f0000000540)=[{}], 0x1, 0x4000a, 0x0, 0x0) 891.097702ms ago: executing program 0 (id=7632): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x4e22, @local}}, 0x0, 0x0, 0x39, 0x0, "3aca3d23e2d6290b34de762efb02913f7aa907ab9588934671c94ca6bcbeefb7213dc5bc1ac52b677c7fa278e32bdcc730e360c03a41f0590f82fdf94a136ef7bd0251fad4a38bcc5a8537f570b4a2ea"}, 0xd8) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0x0, 0x0, 0x0) 831.688323ms ago: executing program 2 (id=7633): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x13, 0x4, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = fsopen(&(0x7f0000000040)='sysfs\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) setreuid(0xee01, 0xee01) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000080)='dirsync\x00', &(0x7f00000000c0)='./file0\x00', r1) 831.526064ms ago: executing program 5 (id=7634): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x80000100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x7) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = getpid() syz_open_procfs(r0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r1 = syz_clone(0x8000, 0x0, 0xfffffffffffffe7e, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, r1, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000bce) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) bpf$PROG_LOAD(0x5, 0x0, 0x0) shmget$private(0x0, 0x400000, 0x8, &(0x7f000000e000/0x400000)=nil) r3 = syz_open_dev$vcsu(&(0x7f0000000240), 0x1ff, 0x0) pselect6(0x40, &(0x7f0000000080)={0x4, 0x3, 0x2, 0x8, 0xfffffffffffffffe, 0x704c7644, 0x3, 0x4}, 0x0, &(0x7f0000000140)={0x8, 0x2, 0xb30, 0x7, 0xfffffffffffffff9, 0x1ff, 0xd9, 0x2}, 0x0, 0x0) readv(r3, &(0x7f0000000100)=[{0x0}, {&(0x7f0000000000)=""/148, 0x94}, {&(0x7f0000000380)=""/251, 0xfb}], 0x3) 830.793854ms ago: executing program 0 (id=7635): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) r1 = socket$igmp(0x2, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) setsockopt$MRT_INIT(r1, 0x0, 0xc8, &(0x7f0000000000), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=ANY=[@ANYBLOB="0200000004000000030000000720", @ANYRES32, @ANYBLOB, @ANYBLOB="00000000dd"], 0x50) r2 = epoll_create1(0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x20004450) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x100008b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)=0x1400200bce) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x1) r3 = syz_open_dev$MSR(&(0x7f0000000200), 0x0, 0x0) read$msr(r3, &(0x7f0000002700)=""/102392, 0x18ff8) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003100), 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000600)={0xa0000013}) setsockopt$MRT_ADD_MFC_PROXY(r1, 0x0, 0xd2, &(0x7f0000000280)={@initdev={0xac, 0x1e, 0x0, 0x0}, @empty, 0x0, "614af285791a63abd0f993af8077b5cd01e03d64a831683fdc3fd440829c82ae"}, 0x3c) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x1}, 0x10) write(r5, &(0x7f0000000000)="240000001a005f0214f9f407000904001f000000000000000000000008000400010000", 0x23) 813.638174ms ago: executing program 2 (id=7636): socketpair$unix(0x1, 0x3, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x1, 0x100008b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)=0x1404200bce) sched_setscheduler(0x0, 0x1, &(0x7f0000002200)=0x1) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f000001b700)=""/102392, 0x18ff8) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f0000000140)=[{&(0x7f0000000100)="eb", 0x20000101}], 0x1, 0x0) fcntl$setpipe(r1, 0x407, 0x2000000) 401.582072ms ago: executing program 1 (id=7637): r0 = socket(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000640)=[{{&(0x7f0000000100)={0xa, 0x4e24, 0x0, @remote, 0x5}, 0x1c, 0x0}}], 0x1, 0x400c000) sendmmsg$inet6(r0, &(0x7f0000005240)=[{{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000080)="4f66142d", 0x4}], 0x1}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000c00)="0983639d", 0x4}], 0x1}}], 0x2, 0x8000) 19.60244ms ago: executing program 1 (id=7638): r0 = io_uring_setup(0x1946, &(0x7f0000000a80)={0x0, 0xa94d, 0x1, 0xfffffffd, 0x179}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 0s ago: executing program 2 (id=7639): r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000780), r1) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000009c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_KEY(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000040)={0x24, r2, 0x1, 0x70bd28, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x40044}, 0x20008000) kernel console output (not intermixed with test programs): to_user+0x20/0xa0 [ 381.251655][T19718] simple_read_from_buffer+0xb5/0x130 [ 381.251757][T19718] proc_fail_nth_read+0x10e/0x150 [ 381.251785][T19718] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 381.251828][T19718] vfs_read+0x1a5/0x770 [ 381.251878][T19718] ? __rcu_read_unlock+0x4f/0x70 [ 381.251906][T19718] ? __fget_files+0x184/0x1c0 [ 381.251938][T19718] ksys_read+0xda/0x1a0 [ 381.251961][T19718] __x64_sys_read+0x40/0x50 [ 381.252090][T19718] x64_sys_call+0x27bc/0x2ff0 [ 381.252113][T19718] do_syscall_64+0xd2/0x200 [ 381.252198][T19718] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 381.252230][T19718] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 381.252306][T19718] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 381.252332][T19718] RIP: 0033:0x7f595b3bd8dc [ 381.252412][T19718] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 381.252490][T19718] RSP: 002b:00007f5959e27030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 381.252511][T19718] RAX: ffffffffffffffda RBX: 00007f595b615fa0 RCX: 00007f595b3bd8dc [ 381.252526][T19718] RDX: 000000000000000f RSI: 00007f5959e270a0 RDI: 0000000000000005 [ 381.252537][T19718] RBP: 00007f5959e27090 R08: 0000000000000000 R09: 0000000000000000 [ 381.252548][T19718] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 381.252559][T19718] R13: 00007f595b616038 R14: 00007f595b615fa0 R15: 00007ffd65afa868 [ 381.252577][T19718] [ 381.902925][ T29] kauditd_printk_skb: 333 callbacks suppressed [ 381.902941][ T29] audit: type=1326 audit(382.640:33137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19767 comm="syz.2.5884" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff5d563eec9 code=0x7ffc0000 [ 381.938502][ T29] audit: type=1326 audit(382.640:33138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19767 comm="syz.2.5884" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff5d563eec9 code=0x7ffc0000 [ 381.963296][ T29] audit: type=1326 audit(382.710:33139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19767 comm="syz.2.5884" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff5d563eec9 code=0x7ffc0000 [ 382.018335][ T29] audit: type=1326 audit(382.710:33140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19767 comm="syz.2.5884" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff5d563eec9 code=0x7ffc0000 [ 382.041413][ T29] audit: type=1326 audit(382.710:33141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19767 comm="syz.2.5884" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff5d563eec9 code=0x7ffc0000 [ 382.064491][ T29] audit: type=1326 audit(382.740:33142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19767 comm="syz.2.5884" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff5d563eec9 code=0x7ffc0000 [ 382.087504][ T29] audit: type=1326 audit(382.740:33143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19767 comm="syz.2.5884" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff5d563eec9 code=0x7ffc0000 [ 382.110616][ T29] audit: type=1326 audit(382.740:33144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19767 comm="syz.2.5884" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff5d563eec9 code=0x7ffc0000 [ 382.133724][ T29] audit: type=1326 audit(382.740:33145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19767 comm="syz.2.5884" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7ff5d563eec9 code=0x7ffc0000 [ 382.156793][ T29] audit: type=1326 audit(382.740:33146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19767 comm="syz.2.5884" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff5d563eec9 code=0x7ffc0000 [ 382.189521][T19773] /dev/loop0: Can't lookup blockdev [ 382.323224][T19802] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=40 sclass=netlink_audit_socket pid=19802 comm=syz.4.5897 [ 382.343386][T19804] netlink: 2 bytes leftover after parsing attributes in process `syz.5.5889'. [ 382.404124][T19809] /dev/loop0: Can't lookup blockdev [ 382.805963][T19853] /dev/loop2: Can't lookup blockdev [ 382.812422][T19852] tipc: Enabling of bearer rejected, failed to enable media [ 383.184953][T19878] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5928'. [ 383.208996][T19886] tipc: Enabling of bearer rejected, failed to enable media [ 383.238482][T19890] /dev/loop5: Can't lookup blockdev [ 383.618146][T19916] netlink: 'syz.5.5943': attribute type 10 has an invalid length. [ 383.626099][T19916] netlink: 40 bytes leftover after parsing attributes in process `syz.5.5943'. [ 384.002201][T19916] vlan0: entered promiscuous mode [ 384.007665][T19916] vlan0: entered allmulticast mode [ 384.012800][T19916] veth0_vlan: entered allmulticast mode [ 384.023572][T19916] A link change request failed with some changes committed already. Interface vlan0 may have been left with an inconsistent configuration, please check. [ 384.195977][T19923] FAULT_INJECTION: forcing a failure. [ 384.195977][T19923] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 384.209116][T19923] CPU: 0 UID: 0 PID: 19923 Comm: syz.5.5946 Not tainted syzkaller #0 PREEMPT(voluntary) [ 384.209151][T19923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 384.209212][T19923] Call Trace: [ 384.209219][T19923] [ 384.209226][T19923] __dump_stack+0x1d/0x30 [ 384.209252][T19923] dump_stack_lvl+0xe8/0x140 [ 384.209277][T19923] dump_stack+0x15/0x1b [ 384.209299][T19923] should_fail_ex+0x265/0x280 [ 384.209332][T19923] should_fail+0xb/0x20 [ 384.209415][T19923] should_fail_usercopy+0x1a/0x20 [ 384.209449][T19923] strncpy_from_user+0x25/0x230 [ 384.209496][T19923] path_setxattrat+0xeb/0x310 [ 384.209601][T19923] __x64_sys_lsetxattr+0x71/0x90 [ 384.209632][T19923] x64_sys_call+0x2877/0x2ff0 [ 384.209667][T19923] do_syscall_64+0xd2/0x200 [ 384.209706][T19923] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 384.209739][T19923] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 384.209777][T19923] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 384.209873][T19923] RIP: 0033:0x7f16fd47eec9 [ 384.209894][T19923] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 384.209924][T19923] RSP: 002b:00007f16fbebe038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 384.209949][T19923] RAX: ffffffffffffffda RBX: 00007f16fd6d6090 RCX: 00007f16fd47eec9 [ 384.209966][T19923] RDX: 0000200000000040 RSI: 00002000000000c0 RDI: 0000200000000080 [ 384.209983][T19923] RBP: 00007f16fbebe090 R08: 0000000000000000 R09: 0000000000000000 [ 384.210067][T19923] R10: 0000000000000014 R11: 0000000000000246 R12: 0000000000000001 [ 384.210084][T19923] R13: 00007f16fd6d6128 R14: 00007f16fd6d6090 R15: 00007fff47135048 [ 384.210110][T19923] [ 384.384354][ T1037] usb 3-1: enqueue for inactive port 0 [ 384.389891][ T1037] usb 3-1: enqueue for inactive port 0 [ 384.484290][ T1037] vhci_hcd: vhci_device speed not set [ 384.770938][T19946] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5957'. [ 384.828979][T19951] netlink: 'syz.4.5958': attribute type 4 has an invalid length. [ 385.890528][T19979] rdma_op ffff888103c36d80 conn xmit_rdma 0000000000000000 [ 385.922790][T19983] rdma_op ffff888103c36d80 conn xmit_rdma 0000000000000000 [ 385.934889][T19984] FAULT_INJECTION: forcing a failure. [ 385.934889][T19984] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 385.948125][T19984] CPU: 1 UID: 0 PID: 19984 Comm: syz.4.5967 Not tainted syzkaller #0 PREEMPT(voluntary) [ 385.948235][T19984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 385.948251][T19984] Call Trace: [ 385.948258][T19984] [ 385.948267][T19984] __dump_stack+0x1d/0x30 [ 385.948291][T19984] dump_stack_lvl+0xe8/0x140 [ 385.948315][T19984] dump_stack+0x15/0x1b [ 385.948335][T19984] should_fail_ex+0x265/0x280 [ 385.948394][T19984] should_fail+0xb/0x20 [ 385.948425][T19984] should_fail_usercopy+0x1a/0x20 [ 385.948469][T19984] _copy_to_user+0x20/0xa0 [ 385.948528][T19984] simple_read_from_buffer+0xb5/0x130 [ 385.948631][T19984] proc_fail_nth_read+0x10e/0x150 [ 385.948669][T19984] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 385.948705][T19984] vfs_read+0x1a5/0x770 [ 385.948804][T19984] ? __rcu_read_unlock+0x4f/0x70 [ 385.948882][T19984] ? __fget_files+0x184/0x1c0 [ 385.948913][T19984] ksys_read+0xda/0x1a0 [ 385.948945][T19984] __x64_sys_read+0x40/0x50 [ 385.948974][T19984] x64_sys_call+0x27bc/0x2ff0 [ 385.949066][T19984] do_syscall_64+0xd2/0x200 [ 385.949099][T19984] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 385.949204][T19984] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 385.949242][T19984] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 385.949271][T19984] RIP: 0033:0x7f595b3bd8dc [ 385.949303][T19984] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 385.949322][T19984] RSP: 002b:00007f5959e06030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 385.949345][T19984] RAX: ffffffffffffffda RBX: 00007f595b616090 RCX: 00007f595b3bd8dc [ 385.949362][T19984] RDX: 000000000000000f RSI: 00007f5959e060a0 RDI: 0000000000000007 [ 385.949379][T19984] RBP: 00007f5959e06090 R08: 0000000000000000 R09: 0000000000000000 [ 385.949396][T19984] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 385.949423][T19984] R13: 00007f595b616128 R14: 00007f595b616090 R15: 00007ffd65afa868 [ 385.949509][T19984] [ 386.213986][T19994] netlink: 28 bytes leftover after parsing attributes in process `syz.0.5973'. [ 386.223018][T19994] netlink: 28 bytes leftover after parsing attributes in process `syz.0.5973'. [ 386.232024][T19994] netlink: 28 bytes leftover after parsing attributes in process `syz.0.5973'. [ 386.265318][T19994] netlink: 28 bytes leftover after parsing attributes in process `syz.0.5973'. [ 386.274497][T19994] netlink: 28 bytes leftover after parsing attributes in process `syz.0.5973'. [ 386.283470][T19994] netlink: 28 bytes leftover after parsing attributes in process `syz.0.5973'. [ 386.326257][T19994] netlink: 28 bytes leftover after parsing attributes in process `syz.0.5973'. [ 386.335315][T19994] netlink: 28 bytes leftover after parsing attributes in process `syz.0.5973'. [ 386.344338][T19994] netlink: 28 bytes leftover after parsing attributes in process `syz.0.5973'. [ 386.399425][T20017] netlink: 1022 bytes leftover after parsing attributes in process `syz.2.5982'. [ 386.419443][T20019] FAULT_INJECTION: forcing a failure. [ 386.419443][T20019] name failslab, interval 1, probability 0, space 0, times 0 [ 386.432312][T20019] CPU: 1 UID: 0 PID: 20019 Comm: syz.4.5983 Not tainted syzkaller #0 PREEMPT(voluntary) [ 386.432344][T20019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 386.432360][T20019] Call Trace: [ 386.432367][T20019] [ 386.432376][T20019] __dump_stack+0x1d/0x30 [ 386.432436][T20019] dump_stack_lvl+0xe8/0x140 [ 386.432499][T20019] dump_stack+0x15/0x1b [ 386.432527][T20019] should_fail_ex+0x265/0x280 [ 386.432557][T20019] should_failslab+0x8c/0xb0 [ 386.432587][T20019] kmem_cache_alloc_noprof+0x50/0x310 [ 386.432622][T20019] ? audit_log_start+0x365/0x6c0 [ 386.432723][T20019] audit_log_start+0x365/0x6c0 [ 386.432764][T20019] audit_seccomp+0x48/0x100 [ 386.432793][T20019] ? __seccomp_filter+0x68c/0x10d0 [ 386.432872][T20019] __seccomp_filter+0x69d/0x10d0 [ 386.432987][T20019] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 386.433024][T20019] ? vfs_write+0x7e8/0x960 [ 386.433053][T20019] ? bpf_trace_run2+0x124/0x1c0 [ 386.433088][T20019] __secure_computing+0x82/0x150 [ 386.433117][T20019] syscall_trace_enter+0xcf/0x1e0 [ 386.433205][T20019] do_syscall_64+0xac/0x200 [ 386.433245][T20019] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 386.433282][T20019] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 386.433368][T20019] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 386.433404][T20019] RIP: 0033:0x7f595b3beec9 [ 386.433421][T20019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 386.433522][T20019] RSP: 002b:00007f5959e27038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 386.433541][T20019] RAX: ffffffffffffffda RBX: 00007f595b615fa0 RCX: 00007f595b3beec9 [ 386.433557][T20019] RDX: 0000200000000780 RSI: 0000000000004b48 RDI: 0000000000000003 [ 386.433573][T20019] RBP: 00007f5959e27090 R08: 0000000000000000 R09: 0000000000000000 [ 386.433642][T20019] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 386.433684][T20019] R13: 00007f595b616038 R14: 00007f595b615fa0 R15: 00007ffd65afa868 [ 386.433709][T20019] [ 386.694754][T20029] rdma_op ffff888104238980 conn xmit_rdma 0000000000000000 [ 386.906890][ T29] kauditd_printk_skb: 307 callbacks suppressed [ 386.906905][ T29] audit: type=1400 audit(387.650:33452): avc: denied { prog_load } for pid=20047 comm="syz.4.5996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 386.931829][ T29] audit: type=1400 audit(387.650:33453): avc: denied { bpf } for pid=20047 comm="syz.4.5996" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 386.951974][ T29] audit: type=1400 audit(387.650:33454): avc: denied { perfmon } for pid=20047 comm="syz.4.5996" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 387.049729][T20063] audit: audit_backlog=65 > audit_backlog_limit=64 [ 387.056521][T20063] audit: audit_lost=19 audit_rate_limit=0 audit_backlog_limit=64 [ 387.064413][T20063] audit: backlog limit exceeded [ 387.066006][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 387.071108][ T29] audit: type=1400 audit(387.650:33455): avc: denied { map_create } for pid=20052 comm="syz.2.5997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 387.075805][ C1] audit: audit_lost=20 audit_rate_limit=0 audit_backlog_limit=64 [ 387.075824][ C1] audit: backlog limit exceeded [ 387.220105][T20069] netlink: 'syz.2.6001': attribute type 10 has an invalid length. [ 387.249988][T20071] rdma_op ffff88812880f580 conn xmit_rdma 0000000000000000 [ 387.267080][T20069] team0: Port device dummy0 added [ 387.321946][T20069] netlink: 'syz.2.6001': attribute type 10 has an invalid length. [ 387.362590][T20069] team0: Port device dummy0 removed [ 387.393921][T20069] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 387.455416][T20085] RDS: rds_bind could not find a transport for ::ffff:172.20.20.187, load rds_tcp or rds_rdma? [ 387.781733][T20100] /dev/loop2: Can't lookup blockdev [ 388.092329][T20130] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=40 sclass=netlink_audit_socket pid=20130 comm=syz.4.6024 [ 388.568834][T20162] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=40 sclass=netlink_audit_socket pid=20162 comm=syz.5.6037 [ 390.000822][T20260] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=40 sclass=netlink_audit_socket pid=20260 comm=syz.5.6075 [ 390.536116][T20234] delete_channel: no stack [ 390.788948][T20306] /dev/loop0: Can't lookup blockdev [ 390.832160][T20310] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=40 sclass=netlink_audit_socket pid=20310 comm=syz.0.6094 [ 391.995842][ T29] kauditd_printk_skb: 2160 callbacks suppressed [ 391.995911][ T29] audit: type=1400 audit(392.741:35586): avc: denied { read } for pid=20374 comm="syz.4.6121" dev="nsfs" ino=4026532772 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 392.023044][ T29] audit: type=1400 audit(392.741:35587): avc: denied { open } for pid=20374 comm="syz.4.6121" path="net:[4026532772]" dev="nsfs" ino=4026532772 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 392.045907][ T29] audit: type=1400 audit(392.741:35588): avc: denied { create } for pid=20374 comm="syz.4.6121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 392.065007][ T29] audit: type=1400 audit(392.741:35589): avc: denied { ioctl } for pid=20374 comm="syz.4.6121" path="socket:[81220]" dev="sockfs" ino=81220 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 392.089815][ T29] audit: type=1400 audit(392.841:35590): avc: denied { recv } for pid=29 comm="kauditd" saddr=10.128.0.163 src=30036 daddr=10.128.1.228 dest=39380 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 392.114637][ T29] audit: type=1400 audit(392.841:35591): avc: denied { map_create } for pid=20380 comm="syz.4.6122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 392.133399][ T29] audit: type=1400 audit(392.841:35592): avc: denied { map_read map_write } for pid=20380 comm="syz.4.6122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 392.153082][ T29] audit: type=1400 audit(392.841:35593): avc: denied { prog_load } for pid=20380 comm="syz.4.6122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 392.171727][ T29] audit: type=1400 audit(392.841:35594): avc: denied { bpf } for pid=20380 comm="syz.4.6122" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 392.191829][ T29] audit: type=1400 audit(392.841:35595): avc: denied { perfmon } for pid=20380 comm="syz.4.6122" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 392.320008][T20387] __nla_validate_parse: 36 callbacks suppressed [ 392.320023][T20387] netlink: 28 bytes leftover after parsing attributes in process `syz.4.6125'. [ 392.335316][T20387] netlink: 28 bytes leftover after parsing attributes in process `syz.4.6125'. [ 392.344288][T20387] netlink: 28 bytes leftover after parsing attributes in process `syz.4.6125'. [ 392.370267][T20387] netlink: 28 bytes leftover after parsing attributes in process `syz.4.6125'. [ 392.379327][T20387] netlink: 28 bytes leftover after parsing attributes in process `syz.4.6125'. [ 392.388343][T20387] netlink: 28 bytes leftover after parsing attributes in process `syz.4.6125'. [ 392.428850][T20387] netlink: 28 bytes leftover after parsing attributes in process `syz.4.6125'. [ 392.438020][T20387] netlink: 28 bytes leftover after parsing attributes in process `syz.4.6125'. [ 392.447043][T20387] netlink: 28 bytes leftover after parsing attributes in process `syz.4.6125'. [ 392.551604][T20400] netlink: 28 bytes leftover after parsing attributes in process `syz.5.6130'. [ 393.337530][T13709] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 393.397020][T13709] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 393.415118][T20430] chnl_net:caif_netlink_parms(): no params data found [ 393.451637][T20430] bridge0: port 1(bridge_slave_0) entered blocking state [ 393.458753][T20430] bridge0: port 1(bridge_slave_0) entered disabled state [ 393.466519][T20430] bridge_slave_0: entered allmulticast mode [ 393.473192][T20430] bridge_slave_0: entered promiscuous mode [ 393.480620][T13709] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 393.491732][T20430] bridge0: port 2(bridge_slave_1) entered blocking state [ 393.498901][T20430] bridge0: port 2(bridge_slave_1) entered disabled state [ 393.506299][T20430] bridge_slave_1: entered allmulticast mode [ 393.512909][T20430] bridge_slave_1: entered promiscuous mode [ 393.521320][T13709] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 393.552206][T20430] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 393.563041][T20430] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 393.596857][T20430] team0: Port device team_slave_0 added [ 393.614212][T20411] delete_channel: no stack [ 393.624031][T20430] team0: Port device team_slave_1 added [ 393.630565][T20451] FAULT_INJECTION: forcing a failure. [ 393.630565][T20451] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 393.643781][T20451] CPU: 0 UID: 0 PID: 20451 Comm: syz.5.6143 Not tainted syzkaller #0 PREEMPT(voluntary) [ 393.643897][T20451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 393.643914][T20451] Call Trace: [ 393.643923][T20451] [ 393.643933][T20451] __dump_stack+0x1d/0x30 [ 393.643960][T20451] dump_stack_lvl+0xe8/0x140 [ 393.643985][T20451] dump_stack+0x15/0x1b [ 393.644006][T20451] should_fail_ex+0x265/0x280 [ 393.644105][T20451] should_fail+0xb/0x20 [ 393.644167][T20451] should_fail_usercopy+0x1a/0x20 [ 393.644195][T20451] _copy_from_user+0x1c/0xb0 [ 393.644238][T20451] __sys_connect+0xd0/0x2b0 [ 393.644269][T20451] __x64_sys_connect+0x3f/0x50 [ 393.644295][T20451] x64_sys_call+0x2c08/0x2ff0 [ 393.644322][T20451] do_syscall_64+0xd2/0x200 [ 393.644416][T20451] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 393.644448][T20451] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 393.644531][T20451] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 393.644559][T20451] RIP: 0033:0x7f16fd47eec9 [ 393.644576][T20451] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 393.644594][T20451] RSP: 002b:00007f16fbedf038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 393.644613][T20451] RAX: ffffffffffffffda RBX: 00007f16fd6d5fa0 RCX: 00007f16fd47eec9 [ 393.644626][T20451] RDX: 0000000000000010 RSI: 0000200000000180 RDI: 0000000000000003 [ 393.644702][T20451] RBP: 00007f16fbedf090 R08: 0000000000000000 R09: 0000000000000000 [ 393.644800][T20451] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 393.644874][T20451] R13: 00007f16fd6d6038 R14: 00007f16fd6d5fa0 R15: 00007fff47135048 [ 393.644894][T20451] [ 393.854504][T13709] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 393.866137][T13709] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 393.876250][T13709] bond0 (unregistering): Released all slaves [ 393.900579][T20430] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 393.907670][T20430] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 393.933657][T20430] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 393.947269][T13709] tipc: Left network mode [ 393.948537][T20430] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 393.958635][T20430] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 393.984710][T20430] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 393.991195][T20455] rdma_op ffff888118f71d80 conn xmit_rdma 0000000000000000 [ 394.083189][T20430] hsr_slave_0: entered promiscuous mode [ 394.108524][T20430] hsr_slave_1: entered promiscuous mode [ 394.114691][T20430] debugfs: 'hsr0' already exists in 'hsr' [ 394.120472][T20430] Cannot create hsr debugfs directory [ 394.129635][T13709] hsr_slave_0: left promiscuous mode [ 394.135827][T13709] hsr_slave_1: left promiscuous mode [ 394.141417][T13709] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 394.148880][T13709] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 394.157445][T13709] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 394.165008][T13709] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 394.180980][T13709] veth1_macvtap: left promiscuous mode [ 394.192768][T13709] veth0_macvtap: left promiscuous mode [ 394.198533][T13709] veth1_vlan: left promiscuous mode [ 394.203868][T13709] veth0_vlan: left promiscuous mode [ 394.289341][T13709] team0 (unregistering): Port device team_slave_1 removed [ 394.299826][T13709] team0 (unregistering): Port device team_slave_0 removed [ 394.492562][T20483] rdma_op ffff888102596580 conn xmit_rdma 0000000000000000 [ 394.727073][T20500] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=40 sclass=netlink_audit_socket pid=20500 comm=syz.4.6162 [ 394.759290][T20430] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 394.772973][T20430] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 394.787855][T20430] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 394.800285][T20430] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 394.906556][T20430] 8021q: adding VLAN 0 to HW filter on device bond0 [ 394.923771][T20514] rdma_op ffff888118f72180 conn xmit_rdma 0000000000000000 [ 394.935152][T20430] 8021q: adding VLAN 0 to HW filter on device team0 [ 394.960056][T12577] bridge0: port 1(bridge_slave_0) entered blocking state [ 394.967222][T12577] bridge0: port 1(bridge_slave_0) entered forwarding state [ 395.011108][T13723] bridge0: port 2(bridge_slave_1) entered blocking state [ 395.018269][T13723] bridge0: port 2(bridge_slave_1) entered forwarding state [ 395.242353][T20534] 9pnet_fd: Insufficient options for proto=fd [ 395.288745][T20430] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 395.349522][T20544] rdma_op ffff88810241d180 conn xmit_rdma 0000000000000000 [ 395.408677][T20548] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=40 sclass=netlink_audit_socket pid=20548 comm=syz.4.6181 [ 395.631004][T20430] veth0_vlan: entered promiscuous mode [ 395.648079][T20568] 9pnet_fd: Insufficient options for proto=fd [ 395.651912][T20430] veth1_vlan: entered promiscuous mode [ 395.702032][T20430] veth0_macvtap: entered promiscuous mode [ 395.721328][T20430] veth1_macvtap: entered promiscuous mode [ 395.754387][T20430] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 395.782282][T20430] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 395.829947][T20577] rdma_op ffff888118f71d80 conn xmit_rdma 0000000000000000 [ 395.858647][T12577] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 395.886167][T20581] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=40 sclass=netlink_audit_socket pid=20581 comm=syz.2.6192 [ 395.921908][T12577] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 395.937856][T12577] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 395.947985][T12577] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 396.215862][T20608] rdma_op ffff888102598180 conn xmit_rdma 0000000000000000 [ 396.272916][T20611] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=40 sclass=netlink_audit_socket pid=20611 comm=syz.5.6206 [ 396.538100][T20633] rdma_op ffff88811f9a1d80 conn xmit_rdma 0000000000000000 [ 396.627641][T20642] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 396.630049][T20644] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=40 sclass=netlink_audit_socket pid=20644 comm=syz.2.6221 [ 396.650316][T20642] SELinux: failed to load policy [ 396.856023][T20654] 9pnet_fd: Insufficient options for proto=fd [ 396.892926][T20663] rdma_op ffff8881023fe580 conn xmit_rdma 0000000000000000 [ 396.985320][T20667] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=40 sclass=netlink_audit_socket pid=20667 comm=syz.2.6235 [ 397.002165][T20601] delete_channel: no stack [ 397.008191][ T29] kauditd_printk_skb: 1698 callbacks suppressed [ 397.008208][ T29] audit: type=1400 audit(397.761:37294): avc: denied { prog_load } for pid=20668 comm="syz.1.6236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 397.033527][ T29] audit: type=1400 audit(397.761:37295): avc: denied { bpf } for pid=20668 comm="syz.1.6236" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 397.053683][ T29] audit: type=1400 audit(397.761:37296): avc: denied { perfmon } for pid=20668 comm="syz.1.6236" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 397.085319][ T29] audit: type=1400 audit(397.761:37297): avc: denied { map_create } for pid=20669 comm="syz.0.6234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 397.104156][ T29] audit: type=1400 audit(397.761:37298): avc: denied { map_read map_write } for pid=20669 comm="syz.0.6234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 397.124015][ T29] audit: type=1400 audit(397.761:37299): avc: denied { prog_load } for pid=20669 comm="syz.0.6234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 397.142740][ T29] audit: type=1400 audit(397.761:37300): avc: denied { read write } for pid=20669 comm="syz.0.6234" name="rdma_cm" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 397.166687][ T29] audit: type=1400 audit(397.761:37301): avc: denied { read write open } for pid=20669 comm="syz.0.6234" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 397.192764][ T29] audit: type=1400 audit(397.801:37302): avc: denied { ioctl } for pid=20670 comm="syz.5.6237" path="/dev/loop-control" dev="devtmpfs" ino=99 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 397.218682][ T29] audit: type=1400 audit(397.821:37303): avc: denied { mounton } for pid=20668 comm="syz.1.6236" path="/432/file0" dev="tmpfs" ino=2272 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 397.364726][T20688] rdma_op ffff88811f9a1d80 conn xmit_rdma 0000000000000000 [ 397.423936][T20695] __nla_validate_parse: 35 callbacks suppressed [ 397.423952][T20695] netlink: 28 bytes leftover after parsing attributes in process `syz.0.6247'. [ 397.439823][T20695] netlink: 28 bytes leftover after parsing attributes in process `syz.0.6247'. [ 397.449036][T20695] netlink: 28 bytes leftover after parsing attributes in process `syz.0.6247'. [ 397.484446][T20695] netlink: 28 bytes leftover after parsing attributes in process `syz.0.6247'. [ 397.488574][T20701] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=40 sclass=netlink_audit_socket pid=20701 comm=syz.1.6248 [ 397.493456][T20695] netlink: 28 bytes leftover after parsing attributes in process `syz.0.6247'. [ 397.515001][T20695] netlink: 28 bytes leftover after parsing attributes in process `syz.0.6247'. [ 397.618612][T20695] netlink: 28 bytes leftover after parsing attributes in process `syz.0.6247'. [ 397.627762][T20695] netlink: 28 bytes leftover after parsing attributes in process `syz.0.6247'. [ 397.637319][T20695] netlink: 28 bytes leftover after parsing attributes in process `syz.0.6247'. [ 397.641071][T20711] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6253'. [ 397.729278][T20711] hsr_slave_1 (unregistering): left promiscuous mode [ 397.792882][T20722] rdma_op ffff888118f72180 conn xmit_rdma 0000000000000000 [ 398.021215][T20740] 9pnet_fd: Insufficient options for proto=fd [ 398.070270][T20743] bridge_slave_1: left allmulticast mode [ 398.076055][T20743] bridge_slave_1: left promiscuous mode [ 398.081749][T20743] bridge0: port 2(bridge_slave_1) entered disabled state [ 398.095894][T20743] bridge_slave_0: left allmulticast mode [ 398.101690][T20743] bridge_slave_0: left promiscuous mode [ 398.101950][T20743] bridge0: port 1(bridge_slave_0) entered disabled state [ 398.473065][T20769] 9pnet_fd: Insufficient options for proto=fd [ 399.259252][T20815] 9pnet_fd: Insufficient options for proto=fd [ 399.744028][T20848] 9pnet_fd: Insufficient options for proto=fd [ 400.028063][T20875] netlink: 'syz.1.6321': attribute type 4 has an invalid length. [ 400.100308][T20882] 9pnet_fd: Insufficient options for proto=fd [ 400.381600][T20836] delete_channel: no stack [ 400.499912][T20909] FAULT_INJECTION: forcing a failure. [ 400.499912][T20909] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 400.513111][T20909] CPU: 0 UID: 0 PID: 20909 Comm: syz.4.6336 Not tainted syzkaller #0 PREEMPT(voluntary) [ 400.513151][T20909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 400.513166][T20909] Call Trace: [ 400.513173][T20909] [ 400.513182][T20909] __dump_stack+0x1d/0x30 [ 400.513207][T20909] dump_stack_lvl+0xe8/0x140 [ 400.513230][T20909] dump_stack+0x15/0x1b [ 400.513304][T20909] should_fail_ex+0x265/0x280 [ 400.513333][T20909] should_fail+0xb/0x20 [ 400.513363][T20909] should_fail_usercopy+0x1a/0x20 [ 400.513409][T20909] strncpy_from_user+0x25/0x230 [ 400.513519][T20909] ? kmem_cache_alloc_noprof+0x186/0x310 [ 400.513555][T20909] ? getname_flags+0x80/0x3b0 [ 400.513660][T20909] getname_flags+0xae/0x3b0 [ 400.513697][T20909] user_path_at+0x28/0x130 [ 400.513740][T20909] __se_sys_mount+0x25b/0x2e0 [ 400.513768][T20909] ? fput+0x8f/0xc0 [ 400.513874][T20909] __x64_sys_mount+0x67/0x80 [ 400.514027][T20909] x64_sys_call+0x2b4d/0x2ff0 [ 400.514080][T20909] do_syscall_64+0xd2/0x200 [ 400.514126][T20909] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 400.514196][T20909] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 400.514233][T20909] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 400.514260][T20909] RIP: 0033:0x7f595b3beec9 [ 400.514300][T20909] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 400.514323][T20909] RSP: 002b:00007f5959e27038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 400.514347][T20909] RAX: ffffffffffffffda RBX: 00007f595b615fa0 RCX: 00007f595b3beec9 [ 400.514369][T20909] RDX: 0000200000000080 RSI: 0000200000000000 RDI: 0000000000000000 [ 400.514419][T20909] RBP: 00007f5959e27090 R08: 0000200000000340 R09: 0000000000000000 [ 400.514435][T20909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 400.514450][T20909] R13: 00007f595b616038 R14: 00007f595b615fa0 R15: 00007ffd65afa868 [ 400.514475][T20909] [ 400.771282][T20911] 9pnet_fd: Insufficient options for proto=fd [ 400.938409][T20927] bond1: entered allmulticast mode [ 400.943856][T20927] 8021q: adding VLAN 0 to HW filter on device bond1 [ 401.148177][T20899] delete_channel: no stack [ 401.641798][T20946] 9pnet_fd: Insufficient options for proto=fd [ 402.016184][ T29] kauditd_printk_skb: 1954 callbacks suppressed [ 402.016201][ T29] audit: type=1400 audit(402.761:39258): avc: denied { recv } for pid=3290 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.1.228 dest=39380 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 402.069226][ T29] audit: type=1400 audit(402.811:39259): avc: denied { map_create } for pid=20970 comm="syz.4.6362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 402.088468][ T29] audit: type=1400 audit(402.811:39260): avc: denied { map_read map_write } for pid=20970 comm="syz.4.6362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 402.111354][T20972] netlink: 'syz.4.6362': attribute type 4 has an invalid length. [ 402.119918][ T29] audit: type=1400 audit(402.841:39261): avc: denied { map_create } for pid=20973 comm="syz.0.6363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 402.138699][ T29] audit: type=1400 audit(402.841:39262): avc: denied { map_read map_write } for pid=20973 comm="syz.0.6363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 402.158161][ T29] audit: type=1400 audit(402.841:39263): avc: denied { prog_load } for pid=20973 comm="syz.0.6363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 402.176914][ T29] audit: type=1400 audit(402.841:39264): avc: denied { bpf } for pid=20973 comm="syz.0.6363" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 402.197081][ T29] audit: type=1400 audit(402.851:39265): avc: denied { prog_load } for pid=20973 comm="syz.0.6363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 402.215747][ T29] audit: type=1400 audit(402.851:39266): avc: denied { bpf } for pid=20973 comm="syz.0.6363" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 402.235881][ T29] audit: type=1400 audit(402.851:39267): avc: denied { perfmon } for pid=20973 comm="syz.0.6363" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 402.545943][T21003] 9pnet_fd: Insufficient options for proto=fd [ 402.750639][T21020] __nla_validate_parse: 5 callbacks suppressed [ 402.750659][T21020] netlink: 28 bytes leftover after parsing attributes in process `syz.2.6382'. [ 402.766040][T21020] netlink: 28 bytes leftover after parsing attributes in process `syz.2.6382'. [ 402.775321][T21020] netlink: 28 bytes leftover after parsing attributes in process `syz.2.6382'. [ 402.817003][T21020] netlink: 28 bytes leftover after parsing attributes in process `syz.2.6382'. [ 402.826065][T21020] netlink: 28 bytes leftover after parsing attributes in process `syz.2.6382'. [ 402.835383][T21020] netlink: 28 bytes leftover after parsing attributes in process `syz.2.6382'. [ 402.893692][T21020] netlink: 28 bytes leftover after parsing attributes in process `syz.2.6382'. [ 402.902712][T21020] netlink: 28 bytes leftover after parsing attributes in process `syz.2.6382'. [ 402.911733][T21020] netlink: 28 bytes leftover after parsing attributes in process `syz.2.6382'. [ 403.367064][T21062] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=40 sclass=netlink_audit_socket pid=21062 comm=syz.4.6397 [ 403.410864][T21066] netlink: 80 bytes leftover after parsing attributes in process `syz.5.6399'. [ 403.699329][T21084] 9pnet_fd: Insufficient options for proto=fd [ 403.762197][T21088] 9pnet: Could not find request transport: f [ 403.790560][T21032] delete_channel: no stack [ 403.841595][T21095] rdma_op ffff8881199bad80 conn xmit_rdma 0000000000000000 [ 403.884691][T21098] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=40 sclass=netlink_audit_socket pid=21098 comm=syz.4.6410 [ 404.122117][T21111] rdma_op ffff8881199b9d80 conn xmit_rdma 0000000000000000 [ 404.392398][T21127] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=40 sclass=netlink_audit_socket pid=21127 comm=syz.1.6422 [ 404.941211][T21163] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=40 sclass=netlink_audit_socket pid=21163 comm=syz.1.6434 [ 405.627615][T21194] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=40 sclass=netlink_audit_socket pid=21194 comm=syz.4.6445 [ 406.658111][T21265] random: crng reseeded on system resumption [ 406.988797][T13719] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 407.026381][ T29] kauditd_printk_skb: 1930 callbacks suppressed [ 407.026399][ T29] audit: type=1400 audit(407.771:41198): avc: denied { create } for pid=21286 comm="syz.1.6477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 407.060833][ T29] audit: type=1400 audit(407.771:41199): avc: denied { map_read map_write } for pid=21284 comm="syz.5.6476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 407.080555][ T29] audit: type=1400 audit(407.781:41200): avc: denied { prog_load } for pid=21284 comm="syz.5.6476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 407.099230][ T29] audit: type=1400 audit(407.781:41201): avc: denied { bpf } for pid=21284 comm="syz.5.6476" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 407.119366][ T29] audit: type=1400 audit(407.781:41202): avc: denied { perfmon } for pid=21284 comm="syz.5.6476" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 407.139909][ T29] audit: type=1400 audit(407.781:41203): avc: denied { prog_run } for pid=21284 comm="syz.5.6476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 407.158466][ T29] audit: type=1400 audit(407.801:41204): avc: denied { allowed } for pid=21284 comm="syz.5.6476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 407.177509][ T29] audit: type=1400 audit(407.801:41205): avc: denied { create } for pid=21284 comm="syz.5.6476" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 407.199667][ T29] audit: type=1400 audit(407.801:41206): avc: denied { create } for pid=21284 comm="syz.5.6476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 407.219021][ T29] audit: type=1400 audit(407.801:41207): avc: denied { bind } for pid=21284 comm="syz.5.6476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 407.219571][T21253] delete_channel: no stack [ 407.255691][T13719] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 407.290567][T21267] chnl_net:caif_netlink_parms(): no params data found [ 407.341484][T13719] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 407.398499][T13719] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 407.497187][T21267] bridge0: port 1(bridge_slave_0) entered blocking state [ 407.504356][T21267] bridge0: port 1(bridge_slave_0) entered disabled state [ 407.515448][T21267] bridge_slave_0: entered allmulticast mode [ 407.522027][T21267] bridge_slave_0: entered promiscuous mode [ 407.531567][T21267] bridge0: port 2(bridge_slave_1) entered blocking state [ 407.538768][T21267] bridge0: port 2(bridge_slave_1) entered disabled state [ 407.546124][T21267] bridge_slave_1: entered allmulticast mode [ 407.552965][T21267] bridge_slave_1: entered promiscuous mode [ 407.660792][T13719] bond0 (unregistering): Released all slaves [ 407.676250][T21267] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 407.696229][T21267] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 407.763569][T21267] team0: Port device team_slave_0 added [ 407.782610][T21267] team0: Port device team_slave_1 added [ 407.858879][T13719] hsr_slave_0: left promiscuous mode [ 407.865010][T13719] hsr_slave_1: left promiscuous mode [ 407.880710][T13719] veth1_macvtap: left promiscuous mode [ 407.890589][T21329] __nla_validate_parse: 51 callbacks suppressed [ 407.890609][T21329] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6489'. [ 407.894970][T13719] veth0_macvtap: left promiscuous mode [ 407.914734][T13719] veth1_vlan: left promiscuous mode [ 407.920069][T13719] veth0_vlan: left promiscuous mode [ 408.051141][T13719] team0 (unregistering): Port device dummy0 removed [ 408.067947][T21267] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 408.075039][T21267] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 408.101065][T21267] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 408.116969][T21329] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 408.161445][T21329] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 408.185875][ T9] infiniband syz1: ib_query_port failed (-19) [ 408.186245][T21267] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 408.199218][T21267] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 408.225181][T21267] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 408.279854][T21267] hsr_slave_0: entered promiscuous mode [ 408.286040][T21267] hsr_slave_1: entered promiscuous mode [ 408.478988][T21349] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6495'. [ 408.731319][T21267] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 408.754225][T21267] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 408.761578][T21366] netlink: 80 bytes leftover after parsing attributes in process `syz.1.6502'. [ 408.780003][T21267] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 408.800081][T21267] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 408.924516][T21267] 8021q: adding VLAN 0 to HW filter on device bond0 [ 408.942699][T21267] 8021q: adding VLAN 0 to HW filter on device team0 [ 408.961153][T13719] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.968315][T13719] bridge0: port 1(bridge_slave_0) entered forwarding state [ 408.981307][T13719] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.988526][T13719] bridge0: port 2(bridge_slave_1) entered forwarding state [ 409.066042][T21384] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6507'. [ 409.180045][T21267] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 409.468614][T21419] netlink: 80 bytes leftover after parsing attributes in process `syz.2.6515'. [ 409.527305][T21267] veth0_vlan: entered promiscuous mode [ 409.563771][T21267] veth1_vlan: entered promiscuous mode [ 409.679099][T21267] veth0_macvtap: entered promiscuous mode [ 409.711774][T21267] veth1_macvtap: entered promiscuous mode [ 409.751071][T21267] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 409.767625][T21267] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 409.798268][T13709] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 409.826914][T13709] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 409.860320][T13709] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 409.891315][T13721] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 410.049496][T21449] FAULT_INJECTION: forcing a failure. [ 410.049496][T21449] name failslab, interval 1, probability 0, space 0, times 0 [ 410.062287][T21449] CPU: 0 UID: 0 PID: 21449 Comm: syz.4.6471 Not tainted syzkaller #0 PREEMPT(voluntary) [ 410.062315][T21449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 410.062404][T21449] Call Trace: [ 410.062411][T21449] [ 410.062418][T21449] __dump_stack+0x1d/0x30 [ 410.062491][T21449] dump_stack_lvl+0xe8/0x140 [ 410.062515][T21449] dump_stack+0x15/0x1b [ 410.062588][T21449] should_fail_ex+0x265/0x280 [ 410.062614][T21449] should_failslab+0x8c/0xb0 [ 410.062639][T21449] kmem_cache_alloc_noprof+0x50/0x310 [ 410.062668][T21449] ? audit_log_start+0x365/0x6c0 [ 410.062740][T21449] audit_log_start+0x365/0x6c0 [ 410.062787][T21449] audit_seccomp+0x48/0x100 [ 410.062820][T21449] ? __seccomp_filter+0x68c/0x10d0 [ 410.062895][T21449] __seccomp_filter+0x69d/0x10d0 [ 410.062976][T21449] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 410.063005][T21449] ? vfs_write+0x7e8/0x960 [ 410.063026][T21449] ? __rcu_read_unlock+0x4f/0x70 [ 410.063064][T21449] ? __fget_files+0x184/0x1c0 [ 410.063130][T21449] __secure_computing+0x82/0x150 [ 410.063155][T21449] syscall_trace_enter+0xcf/0x1e0 [ 410.063230][T21449] do_syscall_64+0xac/0x200 [ 410.063276][T21449] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 410.063306][T21449] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 410.063359][T21449] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 410.063405][T21449] RIP: 0033:0x7fcdb025eec9 [ 410.063425][T21449] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 410.063503][T21449] RSP: 002b:00007fcdaecc7038 EFLAGS: 00000246 ORIG_RAX: 000000000000001d [ 410.063530][T21449] RAX: ffffffffffffffda RBX: 00007fcdb04b5fa0 RCX: 00007fcdb025eec9 [ 410.063547][T21449] RDX: 0000000000000400 RSI: 0000000000003000 RDI: 0000000000000000 [ 410.063564][T21449] RBP: 00007fcdaecc7090 R08: 0000000000000000 R09: 0000000000000000 [ 410.063595][T21449] R10: 0000200000ffa000 R11: 0000000000000246 R12: 0000000000000001 [ 410.063611][T21449] R13: 00007fcdb04b6038 R14: 00007fcdb04b5fa0 R15: 00007ffe63446828 [ 410.063636][T21449] [ 410.080963][T21455] netlink: 'syz.1.6527': attribute type 4 has an invalid length. [ 410.120884][T21454] rdma_op ffff88811a965980 conn xmit_rdma 0000000000000000 [ 410.264284][T21463] netlink: 28 bytes leftover after parsing attributes in process `syz.5.6531'. [ 410.295048][T21463] netlink: 28 bytes leftover after parsing attributes in process `syz.5.6531'. [ 410.305138][T21463] netlink: 28 bytes leftover after parsing attributes in process `syz.5.6531'. [ 410.382374][T21463] netlink: 28 bytes leftover after parsing attributes in process `syz.5.6531'. [ 410.391985][T21463] netlink: 28 bytes leftover after parsing attributes in process `syz.5.6531'. [ 410.697659][T21491] netlink: 'syz.2.6543': attribute type 4 has an invalid length. [ 410.774788][T21498] rdma_op ffff88811a966d80 conn xmit_rdma 0000000000000000 [ 411.130246][T21527] netlink: 'syz.5.6557': attribute type 4 has an invalid length. [ 411.178786][T21533] rdma_op ffff88811a965980 conn xmit_rdma 0000000000000000 [ 411.549436][T21559] netlink: 'syz.4.6572': attribute type 4 has an invalid length. [ 411.611835][T21564] rdma_op ffff88811854f180 conn xmit_rdma 0000000000000000 [ 411.630143][T21499] delete_channel: no stack [ 412.007857][T21585] netlink: 'syz.1.6584': attribute type 4 has an invalid length. [ 412.017079][T21587] rdma_op ffff88812bfa5980 conn xmit_rdma 0000000000000000 [ 412.037493][ T29] kauditd_printk_skb: 1894 callbacks suppressed [ 412.037508][ T29] audit: type=1400 audit(412.782:43100): avc: denied { create } for pid=21583 comm="syz.1.6584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 412.073331][ T29] audit: type=1400 audit(412.812:43101): avc: denied { recv } for pid=3290 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.1.228 dest=39380 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 412.098449][ T29] audit: type=1400 audit(412.812:43102): avc: denied { recv } for pid=3290 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.1.228 dest=39380 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 412.123620][ T29] audit: type=1400 audit(412.812:43103): avc: denied { setopt } for pid=21583 comm="syz.1.6584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 412.185110][T21591] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=40 sclass=netlink_audit_socket pid=21591 comm=syz.0.6587 [ 412.203053][ T29] audit: type=1400 audit(412.852:43104): avc: denied { recv } for pid=21542 comm="syz.5.6565" saddr=10.128.0.163 src=30036 daddr=10.128.1.228 dest=39380 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 412.228094][ T29] audit: type=1400 audit(412.872:43105): avc: denied { recv } for pid=21542 comm="syz.5.6565" saddr=10.128.0.163 src=30036 daddr=10.128.1.228 dest=39380 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 412.253112][ T29] audit: type=1400 audit(412.892:43106): avc: denied { map_create } for pid=21590 comm="syz.0.6587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 412.271928][ T29] audit: type=1400 audit(412.902:43107): avc: denied { recv } for pid=3290 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.1.228 dest=39380 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 412.297048][ T29] audit: type=1400 audit(412.902:43108): avc: denied { recv } for pid=3290 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.1.228 dest=39380 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 412.323103][ T29] audit: type=1400 audit(412.912:43109): avc: denied { map_create } for pid=21592 comm="syz.4.6588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 412.803485][T21617] 9pnet_fd: Insufficient options for proto=fd [ 412.861896][T21619] netlink: 'syz.4.6599': attribute type 4 has an invalid length. [ 412.874844][T21621] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=40 sclass=netlink_audit_socket pid=21621 comm=syz.1.6600 [ 413.375312][T21633] 9pnet: Could not find request transport: fd0x0000000000000003 [ 413.538671][T21653] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=40 sclass=netlink_audit_socket pid=21653 comm=syz.4.6612 [ 413.555257][T21654] netlink: 'syz.0.6613': attribute type 4 has an invalid length. [ 413.617984][T21660] __nla_validate_parse: 26 callbacks suppressed [ 413.618002][T21660] netlink: 80 bytes leftover after parsing attributes in process `syz.1.6614'. [ 413.659794][T21663] netlink: 28 bytes leftover after parsing attributes in process `syz.0.6617'. [ 413.668849][T21663] netlink: 28 bytes leftover after parsing attributes in process `syz.0.6617'. [ 413.677907][T21663] netlink: 28 bytes leftover after parsing attributes in process `syz.0.6617'. [ 413.727913][T21663] netlink: 28 bytes leftover after parsing attributes in process `syz.0.6617'. [ 413.736973][T21663] netlink: 28 bytes leftover after parsing attributes in process `syz.0.6617'. [ 413.746021][T21663] netlink: 28 bytes leftover after parsing attributes in process `syz.0.6617'. [ 413.852887][T21663] netlink: 28 bytes leftover after parsing attributes in process `syz.0.6617'. [ 413.861882][T21663] netlink: 28 bytes leftover after parsing attributes in process `syz.0.6617'. [ 413.866248][T21672] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6619'. [ 414.015071][T21679] 9pnet: Could not find request transport: fd0x0000000000000003 [ 414.107858][T21691] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=40 sclass=netlink_audit_socket pid=21691 comm=syz.5.6625 [ 414.767634][T21722] 9pnet_fd: Insufficient options for proto=fd [ 414.969858][T21728] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=40 sclass=netlink_audit_socket pid=21728 comm=syz.0.6639 [ 414.974631][T21693] delete_channel: no stack [ 415.272904][T21746] rdma_op ffff88812bfa6580 conn xmit_rdma 0000000000000000 [ 415.361684][T21750] 9pnet_fd: Insufficient options for proto=fd [ 415.598402][T21766] netlink: 'syz.1.6653': attribute type 4 has an invalid length. [ 416.053181][T21795] netlink: 'syz.5.6666': attribute type 4 has an invalid length. [ 416.554999][T21834] 9pnet_fd: Insufficient options for proto=fd [ 417.044348][ T29] kauditd_printk_skb: 1676 callbacks suppressed [ 417.044367][ T29] audit: type=1400 audit(417.782:44786): avc: denied { map_create } for pid=21876 comm="syz.1.6700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 417.069399][ T29] audit: type=1400 audit(417.792:44787): avc: denied { prog_load } for pid=21876 comm="syz.1.6700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 417.088633][ T29] audit: type=1400 audit(417.792:44788): avc: denied { bpf } for pid=21876 comm="syz.1.6700" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 417.127368][ T29] audit: type=1400 audit(417.792:44789): avc: denied { perfmon } for pid=21876 comm="syz.1.6700" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 417.147927][ T29] audit: type=1400 audit(417.792:44790): avc: denied { bpf } for pid=21876 comm="syz.1.6700" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 417.168683][ T29] audit: type=1400 audit(417.792:44791): avc: denied { read } for pid=21876 comm="syz.1.6700" dev="nsfs" ino=4026532625 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 417.189489][ T29] audit: type=1400 audit(417.792:44792): avc: denied { read open } for pid=21876 comm="syz.1.6700" path="net:[4026532625]" dev="nsfs" ino=4026532625 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 417.213067][ T29] audit: type=1400 audit(417.792:44793): avc: denied { create } for pid=21876 comm="syz.1.6700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 417.232143][ T29] audit: type=1400 audit(417.792:44794): avc: denied { bind } for pid=21876 comm="syz.1.6700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 417.250961][ T29] audit: type=1400 audit(417.822:44795): avc: denied { map_create } for pid=21878 comm="syz.1.6701" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 418.955120][T22003] __nla_validate_parse: 105 callbacks suppressed [ 418.955170][T22003] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6752'. [ 419.373140][T22035] FAULT_INJECTION: forcing a failure. [ 419.373140][T22035] name failslab, interval 1, probability 0, space 0, times 0 [ 419.385829][T22035] CPU: 0 UID: 0 PID: 22035 Comm: syz.5.6763 Not tainted syzkaller #0 PREEMPT(voluntary) [ 419.385930][T22035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 419.385947][T22035] Call Trace: [ 419.385956][T22035] [ 419.385966][T22035] __dump_stack+0x1d/0x30 [ 419.385993][T22035] dump_stack_lvl+0xe8/0x140 [ 419.386108][T22035] dump_stack+0x15/0x1b [ 419.386129][T22035] should_fail_ex+0x265/0x280 [ 419.386163][T22035] should_failslab+0x8c/0xb0 [ 419.386198][T22035] kmem_cache_alloc_noprof+0x50/0x310 [ 419.386299][T22035] ? audit_log_start+0x365/0x6c0 [ 419.386343][T22035] audit_log_start+0x365/0x6c0 [ 419.386388][T22035] audit_seccomp+0x48/0x100 [ 419.386423][T22035] ? __seccomp_filter+0x68c/0x10d0 [ 419.386533][T22035] __seccomp_filter+0x69d/0x10d0 [ 419.386565][T22035] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 419.386610][T22035] ? vfs_write+0x7e8/0x960 [ 419.386647][T22035] __secure_computing+0x82/0x150 [ 419.386676][T22035] syscall_trace_enter+0xcf/0x1e0 [ 419.386778][T22035] do_syscall_64+0xac/0x200 [ 419.386818][T22035] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 419.386849][T22035] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 419.386921][T22035] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 419.386946][T22035] RIP: 0033:0x7f16fd47eec9 [ 419.386966][T22035] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 419.387042][T22035] RSP: 002b:00007f16fbedf038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f1 [ 419.387068][T22035] RAX: ffffffffffffffda RBX: 00007f16fd6d5fa0 RCX: 00007f16fd47eec9 [ 419.387086][T22035] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000000 [ 419.387135][T22035] RBP: 00007f16fbedf090 R08: 0000000000000000 R09: 0000000000000000 [ 419.387148][T22035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 419.387160][T22035] R13: 00007f16fd6d6038 R14: 00007f16fd6d5fa0 R15: 00007fff47135048 [ 419.387244][T22035] [ 419.998284][T22058] hub 6-0:1.0: USB hub found [ 420.012387][T22058] hub 6-0:1.0: 8 ports detected [ 420.117474][T22067] netlink: 80 bytes leftover after parsing attributes in process `syz.4.6775'. [ 420.121983][T22068] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=40 sclass=netlink_audit_socket pid=22068 comm=syz.0.6776 [ 420.485358][T22092] FAULT_INJECTION: forcing a failure. [ 420.485358][T22092] name failslab, interval 1, probability 0, space 0, times 0 [ 420.498058][T22092] CPU: 0 UID: 0 PID: 22092 Comm: syz.1.6786 Not tainted syzkaller #0 PREEMPT(voluntary) [ 420.498094][T22092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 420.498112][T22092] Call Trace: [ 420.498120][T22092] [ 420.498128][T22092] __dump_stack+0x1d/0x30 [ 420.498150][T22092] dump_stack_lvl+0xe8/0x140 [ 420.498169][T22092] dump_stack+0x15/0x1b [ 420.498186][T22092] should_fail_ex+0x265/0x280 [ 420.498218][T22092] should_failslab+0x8c/0xb0 [ 420.498250][T22092] kmem_cache_alloc_noprof+0x50/0x310 [ 420.498286][T22092] ? mas_alloc_nodes+0x265/0x520 [ 420.498326][T22092] mas_alloc_nodes+0x265/0x520 [ 420.498366][T22092] mas_preallocate+0x33e/0x520 [ 420.498399][T22092] mmap_region+0xbdd/0x1630 [ 420.498457][T22092] do_mmap+0x9b3/0xbe0 [ 420.498503][T22092] vm_mmap_pgoff+0x17a/0x2e0 [ 420.498543][T22092] ksys_mmap_pgoff+0xc2/0x310 [ 420.498562][T22092] ? __x64_sys_mmap+0x49/0x70 [ 420.498592][T22092] x64_sys_call+0x14a3/0x2ff0 [ 420.498619][T22092] do_syscall_64+0xd2/0x200 [ 420.498655][T22092] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 420.498680][T22092] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 420.498708][T22092] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 420.498733][T22092] RIP: 0033:0x7f62297def03 [ 420.498753][T22092] Code: f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 41 89 ca 41 f7 c1 ff 0f 00 00 75 14 b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 25 c3 0f 1f 40 00 48 c7 c0 a8 ff ff ff 64 c7 [ 420.498772][T22092] RSP: 002b:00007f622823ee18 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 420.498791][T22092] RAX: ffffffffffffffda RBX: 0000000000000471 RCX: 00007f62297def03 [ 420.498804][T22092] RDX: 0000000000000003 RSI: 0000000008400000 RDI: 0000000000000000 [ 420.498820][T22092] RBP: 0000200000000bc2 R08: 00000000ffffffff R09: 0000000000000000 [ 420.498834][T22092] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000000004 [ 420.498847][T22092] R13: 00007f622823eef0 R14: 00007f622823eeb0 R15: 0000200000000680 [ 420.498866][T22092] [ 420.852443][T22106] netlink: 80 bytes leftover after parsing attributes in process `syz.1.6792'. [ 420.908803][T22110] netlink: 28 bytes leftover after parsing attributes in process `syz.5.6794'. [ 420.917914][T22110] netlink: 28 bytes leftover after parsing attributes in process `syz.5.6794'. [ 420.927241][T22110] netlink: 28 bytes leftover after parsing attributes in process `syz.5.6794'. [ 420.970844][T22110] netlink: 28 bytes leftover after parsing attributes in process `syz.5.6794'. [ 420.980093][T22110] netlink: 28 bytes leftover after parsing attributes in process `syz.5.6794'. [ 420.989163][T22110] netlink: 28 bytes leftover after parsing attributes in process `syz.5.6794'. [ 421.087445][T22110] netlink: 28 bytes leftover after parsing attributes in process `syz.5.6794'. [ 421.239105][T22130] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=40 sclass=netlink_audit_socket pid=22130 comm=syz.1.6801 [ 422.068255][ T29] kauditd_printk_skb: 2077 callbacks suppressed [ 422.068354][ T29] audit: type=1400 audit(422.812:46871): avc: denied { create } for pid=22190 comm="syz.4.6829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 422.112068][T22192] tipc: Started in network mode [ 422.117080][T22192] tipc: Node identity ac14140f, cluster identity 4711 [ 422.159835][T22192] tipc: New replicast peer: 255.255.255.255 [ 422.160436][ T29] audit: type=1400 audit(422.812:46872): avc: denied { open } for pid=22190 comm="syz.4.6829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 422.166573][T22192] tipc: Enabled bearer , priority 10 [ 422.184656][ T29] audit: type=1400 audit(422.812:46873): avc: denied { perfmon } for pid=22190 comm="syz.4.6829" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 422.211050][ T29] audit: type=1400 audit(422.812:46874): avc: denied { kernel } for pid=22190 comm="syz.4.6829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 422.230131][ T29] audit: type=1400 audit(422.822:46875): avc: denied { map_create } for pid=22190 comm="syz.4.6829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 422.244637][T22192] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 422.248912][ T29] audit: type=1400 audit(422.822:46876): avc: denied { map_read map_write } for pid=22190 comm="syz.4.6829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 422.275763][ T29] audit: type=1400 audit(422.822:46877): avc: denied { prog_load } for pid=22190 comm="syz.4.6829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 422.294428][ T29] audit: type=1400 audit(422.822:46878): avc: denied { bpf } for pid=22190 comm="syz.4.6829" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 422.298463][T22202] audit: audit_backlog=65 > audit_backlog_limit=64 [ 422.319581][ T29] audit: type=1400 audit(422.822:46879): avc: denied { prog_run } for pid=22190 comm="syz.4.6829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 422.347490][T22192] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 422.394524][T22204] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=40 sclass=netlink_audit_socket pid=22204 comm=syz.0.6833 [ 423.292885][ T5839] tipc: Node number set to 2886997007 [ 423.591779][T22282] bridge_slave_1: left allmulticast mode [ 423.597562][T22282] bridge_slave_1: left promiscuous mode [ 423.603572][T22282] bridge0: port 2(bridge_slave_1) entered disabled state [ 423.626373][T22282] bridge_slave_0: left allmulticast mode [ 423.632531][T22282] bridge_slave_0: left promiscuous mode [ 423.638544][T22282] bridge0: port 1(bridge_slave_0) entered disabled state [ 423.717797][T22290] tipc: Started in network mode [ 423.722763][T22290] tipc: Node identity ac14140f, cluster identity 4711 [ 423.729937][T22290] tipc: New replicast peer: 255.255.255.255 [ 423.736295][T22290] tipc: Enabled bearer , priority 10 [ 424.347816][T22334] __nla_validate_parse: 25 callbacks suppressed [ 424.347910][T22334] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6882'. [ 424.394169][T22340] tipc: Enabling of bearer rejected, already enabled [ 424.535836][T22346] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6884'. [ 424.612102][T22355] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=40 sclass=netlink_audit_socket pid=22355 comm=syz.0.6888 [ 424.807888][T22369] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6895'. [ 424.852075][ T3409] tipc: Node number set to 2886997007 [ 425.019582][T22385] tipc: Enabling of bearer rejected, already enabled [ 425.143622][T22385] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6899'. [ 425.406785][T22420] netlink: 80 bytes leftover after parsing attributes in process `syz.2.6912'. [ 425.778679][T22436] hub 6-0:1.0: USB hub found [ 425.784470][T22436] hub 6-0:1.0: 8 ports detected [ 425.810661][T22441] hub 6-0:1.0: USB hub found [ 425.815519][T22441] hub 6-0:1.0: 8 ports detected [ 426.134239][T22432] chnl_net:caif_netlink_parms(): no params data found [ 426.185064][T22432] bridge0: port 1(bridge_slave_0) entered blocking state [ 426.192489][T22432] bridge0: port 1(bridge_slave_0) entered disabled state [ 426.219992][T22432] bridge_slave_0: entered allmulticast mode [ 426.226707][T22432] bridge_slave_0: entered promiscuous mode [ 426.246315][T22432] bridge0: port 2(bridge_slave_1) entered blocking state [ 426.253435][T22432] bridge0: port 2(bridge_slave_1) entered disabled state [ 426.260796][T22432] bridge_slave_1: entered allmulticast mode [ 426.267450][T22432] bridge_slave_1: entered promiscuous mode [ 426.289952][T22432] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 426.302420][T22432] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 426.326591][T22432] team0: Port device team_slave_0 added [ 426.335715][T22432] team0: Port device team_slave_1 added [ 426.380956][T22432] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 426.388366][T22432] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 426.414787][T22432] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 426.431913][T22432] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 426.438887][T22432] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 426.465233][T22432] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 426.503654][T22432] hsr_slave_0: entered promiscuous mode [ 426.509863][T22432] hsr_slave_1: entered promiscuous mode [ 426.516848][T22432] debugfs: 'hsr0' already exists in 'hsr' [ 426.522657][T22432] Cannot create hsr debugfs directory [ 426.529385][T22478] hub 6-0:1.0: USB hub found [ 426.537768][T22478] hub 6-0:1.0: 8 ports detected [ 426.633331][T22432] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 426.675167][T22432] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 426.686101][T22491] 9pnet_fd: Insufficient options for proto=fd [ 426.754556][T22432] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 426.814076][T22432] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 426.929559][T22432] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 426.950574][T22432] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 426.967034][T22432] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 426.998083][T22432] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 427.079334][ T29] kauditd_printk_skb: 1884 callbacks suppressed [ 427.079350][ T29] audit: type=1400 audit(427.823:48747): avc: denied { map_create } for pid=22517 comm="syz.4.6944" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 427.106061][ T29] audit: type=1400 audit(427.823:48748): avc: denied { create } for pid=22517 comm="syz.4.6944" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 427.125184][ T29] audit: type=1400 audit(427.823:48749): avc: denied { connect } for pid=22517 comm="syz.4.6944" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 427.144344][ T29] audit: type=1400 audit(427.823:48750): avc: denied { ioctl } for pid=22517 comm="syz.4.6944" path="socket:[89035]" dev="sockfs" ino=89035 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 427.168707][ T29] audit: type=1400 audit(427.823:48751): avc: denied { write } for pid=22517 comm="syz.4.6944" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 427.174554][T22432] 8021q: adding VLAN 0 to HW filter on device bond0 [ 427.215038][T22520] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6945'. [ 427.218867][T22432] 8021q: adding VLAN 0 to HW filter on device team0 [ 427.230715][ T29] audit: type=1400 audit(427.883:48752): avc: denied { recv } for pid=21267 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.1.228 dest=39380 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 427.249557][T22432] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 427.256241][ T29] audit: type=1400 audit(427.893:48753): avc: denied { recv } for pid=22432 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.1.228 dest=39380 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 427.266266][T22432] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 427.291420][ T29] audit: type=1400 audit(427.943:48754): avc: denied { prog_load } for pid=22519 comm="syz.4.6945" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 427.304889][T13719] bridge0: port 1(bridge_slave_0) entered blocking state [ 427.320461][ T29] audit: type=1400 audit(427.943:48755): avc: denied { bpf } for pid=22519 comm="syz.4.6945" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 427.327447][T13719] bridge0: port 1(bridge_slave_0) entered forwarding state [ 427.351222][ T29] audit: type=1400 audit(427.943:48756): avc: denied { perfmon } for pid=22519 comm="syz.4.6945" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 427.369119][T13719] bridge0: port 2(bridge_slave_1) entered blocking state [ 427.382472][T13719] bridge0: port 2(bridge_slave_1) entered forwarding state [ 427.537382][T13709] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 427.572964][T13709] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 427.594008][T13709] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 427.609066][T13709] bond0 (unregistering): Released all slaves [ 427.667020][T13709] tipc: Disabling bearer [ 427.672143][T13709] tipc: Left network mode [ 427.779006][T22432] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 427.876474][T13709] hsr_slave_0: left promiscuous mode [ 427.892831][T13709] hsr_slave_1: left promiscuous mode [ 427.916601][T13709] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 427.924060][T13709] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 427.952476][T13709] veth1_macvtap: left promiscuous mode [ 427.966305][T13709] veth0_macvtap: left promiscuous mode [ 427.988668][T13709] veth1_vlan: left promiscuous mode [ 427.995828][T13709] veth0_vlan: left promiscuous mode [ 428.046666][T22562] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6956'. [ 428.101771][T13709] team0 (unregistering): Port device team_slave_1 removed [ 428.116357][T13709] team0 (unregistering): Port device team_slave_0 removed [ 428.141848][T22566] netlink: 28 bytes leftover after parsing attributes in process `syz.4.6962'. [ 428.150859][T22566] netlink: 28 bytes leftover after parsing attributes in process `syz.4.6962'. [ 428.159957][T22566] netlink: 28 bytes leftover after parsing attributes in process `syz.4.6962'. [ 428.356768][T22432] veth0_vlan: entered promiscuous mode [ 428.378137][T22432] veth1_vlan: entered promiscuous mode [ 428.434428][T22432] veth0_macvtap: entered promiscuous mode [ 428.448773][T22432] veth1_macvtap: entered promiscuous mode [ 428.532521][T22432] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 428.541677][T22432] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 428.582968][T13750] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 428.600582][T13750] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 428.616291][T13750] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 428.627393][T13750] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 428.651601][T22594] hub 6-0:1.0: USB hub found [ 428.669770][T22594] hub 6-0:1.0: 8 ports detected [ 428.776317][T22599] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(5) [ 428.782966][T22599] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 428.790490][T22599] vhci_hcd vhci_hcd.0: Device attached [ 428.819163][T22609] vhci_hcd: unknown pdu 2 [ 428.836970][T13709] vhci_hcd: stop threads [ 428.841256][T13709] vhci_hcd: release socket [ 428.845723][T13709] vhci_hcd: disconnect device [ 429.231096][T13721] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 429.293717][T13721] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 429.356321][T13721] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 429.398223][T13721] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 429.499301][T22658] 9pnet_fd: Insufficient options for proto=fd [ 429.602341][T13721]  (unregistering): (slave bond_slave_0): Releasing backup interface [ 429.629024][T13721]  (unregistering): (slave bond_slave_1): Releasing backup interface [ 429.651622][T13721]  (unregistering): Released all slaves [ 429.668627][T22632] chnl_net:caif_netlink_parms(): no params data found [ 429.709921][T13721] tipc: Disabling bearer [ 429.714968][T13721] tipc: Left network mode [ 429.807298][T13721] hsr_slave_0: left promiscuous mode [ 429.815052][T13721] hsr_slave_1: left promiscuous mode [ 429.820896][T13721] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 429.828381][T13721] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 429.836372][T13721] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 429.843821][T13721] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 429.854478][T13721] veth1_macvtap: left promiscuous mode [ 429.860142][T13721] veth0_macvtap: left promiscuous mode [ 429.865866][T13721] veth1_vlan: left promiscuous mode [ 429.871124][T13721] veth0_vlan: left promiscuous mode [ 429.995625][T22632] bridge0: port 1(bridge_slave_0) entered blocking state [ 430.002895][T22632] bridge0: port 1(bridge_slave_0) entered disabled state [ 430.010023][T22632] bridge_slave_0: entered allmulticast mode [ 430.017289][T22632] bridge_slave_0: entered promiscuous mode [ 430.029568][T22632] bridge0: port 2(bridge_slave_1) entered blocking state [ 430.036826][T22632] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.044631][T22632] bridge_slave_1: entered allmulticast mode [ 430.052685][T22632] bridge_slave_1: entered promiscuous mode [ 430.084296][T22632] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 430.106790][T22632] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 430.198958][T22632] team0: Port device team_slave_0 added [ 430.228834][T22632] team0: Port device team_slave_1 added [ 430.296655][T22632] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 430.303701][T22632] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 430.329744][T22632] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 430.395977][T22699] syzkaller0: entered promiscuous mode [ 430.401902][T22699] syzkaller0: entered allmulticast mode [ 430.417806][T22699] __nla_validate_parse: 15 callbacks suppressed [ 430.417821][T22699] netlink: 16 bytes leftover after parsing attributes in process `syz.4.7000'. [ 430.422265][T22632] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 430.440200][T22632] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 430.466154][T22632] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 430.621876][T22632] hsr_slave_0: entered promiscuous mode [ 430.627030][T22716] netlink: 80 bytes leftover after parsing attributes in process `syz.0.7005'. [ 430.628150][T22632] hsr_slave_1: entered promiscuous mode [ 430.648210][T22632] debugfs: 'hsr0' already exists in 'hsr' [ 430.654034][T22632] Cannot create hsr debugfs directory [ 431.097492][T22726] netlink: 80 bytes leftover after parsing attributes in process `syz.4.7008'. [ 431.137773][T22728] netlink: 4 bytes leftover after parsing attributes in process `syz.0.7010'. [ 431.254526][T22632] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 431.276567][T22632] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 431.300127][T22632] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 431.390386][T22632] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 431.504981][T22743] hub 6-0:1.0: USB hub found [ 431.514627][T22632] 8021q: adding VLAN 0 to HW filter on device bond0 [ 431.521738][T22743] hub 6-0:1.0: 8 ports detected [ 431.550195][T22632] 8021q: adding VLAN 0 to HW filter on device team0 [ 431.568374][T13709] bridge0: port 1(bridge_slave_0) entered blocking state [ 431.575533][T13709] bridge0: port 1(bridge_slave_0) entered forwarding state [ 431.615408][T13709] bridge0: port 2(bridge_slave_1) entered blocking state [ 431.622594][T13709] bridge0: port 2(bridge_slave_1) entered forwarding state [ 431.688601][T22632] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 431.724920][T22756] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 431.734328][T22756] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 431.791365][T22760] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=40 sclass=netlink_audit_socket pid=22760 comm=syz.0.7020 [ 431.845411][T22764] netlink: 'syz.0.7021': attribute type 4 has an invalid length. [ 431.905382][T22632] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 431.930871][T22770] netlink: 80 bytes leftover after parsing attributes in process `syz.0.7023'. [ 432.082040][ T29] kauditd_printk_skb: 1478 callbacks suppressed [ 432.082120][ T29] audit: type=1400 audit(432.833:50235): avc: denied { map_read map_write } for pid=22771 comm="syz.5.7024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 432.130680][ T29] audit: type=1400 audit(432.843:50236): avc: denied { map_create } for pid=22776 comm="syz.0.7025" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 432.149879][ T29] audit: type=1400 audit(432.843:50237): avc: denied { prog_load } for pid=22776 comm="syz.0.7025" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 432.168573][ T29] audit: type=1400 audit(432.843:50238): avc: denied { bpf } for pid=22776 comm="syz.0.7025" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 432.188703][ T29] audit: type=1400 audit(432.843:50239): avc: denied { perfmon } for pid=22776 comm="syz.0.7025" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 432.209169][ T29] audit: type=1400 audit(432.843:50240): avc: denied { bpf } for pid=22776 comm="syz.0.7025" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 432.229290][ T29] audit: type=1400 audit(432.843:50241): avc: denied { prog_run } for pid=22776 comm="syz.0.7025" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 432.253146][ T29] audit: type=1400 audit(432.863:50242): avc: denied { egress } for pid=1037 comm="kworker/1:2" daddr=ff02::16 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 432.275105][ T29] audit: type=1400 audit(432.863:50243): avc: denied { sendto } for pid=1037 comm="kworker/1:2" daddr=ff02::16 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 432.296872][ T29] audit: type=1400 audit(432.863:50244): avc: denied { prog_load } for pid=22771 comm="syz.5.7024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 432.364507][T22632] veth0_vlan: entered promiscuous mode [ 432.374809][T22632] veth1_vlan: entered promiscuous mode [ 432.415407][T22632] veth0_macvtap: entered promiscuous mode [ 432.449257][T22632] veth1_macvtap: entered promiscuous mode [ 432.487655][T22632] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 432.517657][T22632] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 432.535682][T13755] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 432.547874][T13755] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 432.567654][T13755] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 432.599637][T13755] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 432.736457][T22791] netlink: 80 bytes leftover after parsing attributes in process `syz.1.6978'. [ 432.977076][T22797] netlink: 'syz.2.7031': attribute type 4 has an invalid length. [ 433.226117][T22812] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=40 sclass=netlink_audit_socket pid=22812 comm=syz.2.7038 [ 433.443292][T22828] netlink: 'syz.4.7044': attribute type 4 has an invalid length. [ 433.571144][T22835] netlink: 80 bytes leftover after parsing attributes in process `syz.4.7046'. [ 433.682682][T22837] hub 6-0:1.0: USB hub found [ 433.691123][T22837] hub 6-0:1.0: 8 ports detected [ 433.728853][T13723] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 433.796221][T22845] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7051'. [ 433.815814][T13723] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 433.858130][T22845] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 433.894872][T22845] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 433.924612][T22856] netlink: 80 bytes leftover after parsing attributes in process `syz.2.7054'. [ 433.946304][T13723] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 434.016709][T22862] 9pnet_fd: Insufficient options for proto=fd [ 434.027864][T13723] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 434.137989][T22870] netlink: 'syz.2.7058': attribute type 4 has an invalid length. [ 434.265232][T13723] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 434.297067][T13723] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 434.318270][T13723] bond0 (unregistering): Released all slaves [ 434.422633][T13723] hsr_slave_0: left promiscuous mode [ 434.429514][T13723] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 434.437085][T13723] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 434.451941][T13723] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 434.459337][T13723] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 434.470382][T13723] veth1_macvtap: left promiscuous mode [ 434.476072][T13723] veth0_macvtap: left promiscuous mode [ 434.481899][T13723] veth1_vlan: left promiscuous mode [ 434.541686][T13721] smc: removing ib device syz! [ 434.593401][T22882] hub 6-0:1.0: USB hub found [ 434.600705][T22882] hub 6-0:1.0: 8 ports detected [ 434.653857][T22844] chnl_net:caif_netlink_parms(): no params data found [ 434.812095][T22844] bridge0: port 1(bridge_slave_0) entered blocking state [ 434.819270][T22844] bridge0: port 1(bridge_slave_0) entered disabled state [ 434.852576][T22901] netlink: 80 bytes leftover after parsing attributes in process `syz.2.7067'. [ 434.864913][T22844] bridge_slave_0: entered allmulticast mode [ 434.875277][T22844] bridge_slave_0: entered promiscuous mode [ 434.895868][T22844] bridge0: port 2(bridge_slave_1) entered blocking state [ 434.903123][T22844] bridge0: port 2(bridge_slave_1) entered disabled state [ 434.910978][T22844] bridge_slave_1: entered allmulticast mode [ 434.919546][T22844] bridge_slave_1: entered promiscuous mode [ 434.958554][T22844] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 434.965251][T22903] netlink: 'syz.1.7068': attribute type 4 has an invalid length. [ 434.993917][T22844] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 435.051576][T22844] team0: Port device team_slave_0 added [ 435.060059][T22844] team0: Port device team_slave_1 added [ 435.107134][T22844] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 435.114250][T22844] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 435.140240][T22844] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 435.161507][T22844] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 435.168484][T22844] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 435.194674][T22844] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 435.347916][T22844] hsr_slave_0: entered promiscuous mode [ 435.371947][T22844] hsr_slave_1: entered promiscuous mode [ 435.377885][T22844] debugfs: 'hsr0' already exists in 'hsr' [ 435.383658][T22844] Cannot create hsr debugfs directory [ 435.570670][T22939] netlink: 'syz.0.7079': attribute type 4 has an invalid length. [ 435.680091][T22949] sctp: [Deprecated]: syz.0.7084 (pid 22949) Use of int in max_burst socket option. [ 435.680091][T22949] Use struct sctp_assoc_value instead [ 435.700931][T22949] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22949 comm=syz.0.7084 [ 435.709706][T22947] hub 6-0:1.0: USB hub found [ 435.726083][T22947] hub 6-0:1.0: 8 ports detected [ 435.840774][T22844] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 435.849722][T22844] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 435.864378][T22844] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 435.888137][T22844] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 435.995710][T22844] 8021q: adding VLAN 0 to HW filter on device bond0 [ 436.035246][T22844] 8021q: adding VLAN 0 to HW filter on device team0 [ 436.047741][T12577] bridge0: port 1(bridge_slave_0) entered blocking state [ 436.054989][T12577] bridge0: port 1(bridge_slave_0) entered forwarding state [ 436.078104][T12577] bridge0: port 2(bridge_slave_1) entered blocking state [ 436.085230][T12577] bridge0: port 2(bridge_slave_1) entered forwarding state [ 436.335841][T22982] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 436.346258][T22982] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 436.378929][T22982] bond1: left allmulticast mode [ 436.386568][T13755] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 436.397033][T13755] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 436.413903][T22844] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 436.448186][T13755] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 436.472538][T13750] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 436.874548][T23016] __nla_validate_parse: 9 callbacks suppressed [ 436.874563][T23016] netlink: 80 bytes leftover after parsing attributes in process `syz.1.7101'. [ 436.895317][T22844] veth0_vlan: entered promiscuous mode [ 436.934167][T22844] veth1_vlan: entered promiscuous mode [ 437.003945][T22844] veth0_macvtap: entered promiscuous mode [ 437.019988][T22844] veth1_macvtap: entered promiscuous mode [ 437.076531][T22844] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 437.091391][ T29] kauditd_printk_skb: 1706 callbacks suppressed [ 437.091409][ T29] audit: type=1400 audit(437.833:51951): avc: denied { recv } for pid=3290 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.1.228 dest=39380 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 437.145333][T22844] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 437.158469][ T29] audit: type=1400 audit(437.843:51952): avc: denied { recv } for pid=3290 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.1.228 dest=39380 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 437.183729][ T29] audit: type=1326 audit(437.873:51953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23027 comm="syz.0.7106" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f13c539eec9 code=0x7ffc0000 [ 437.206742][ T29] audit: type=1326 audit(437.883:51954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23027 comm="syz.0.7106" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f13c539eec9 code=0x7ffc0000 [ 437.229896][ T29] audit: type=1326 audit(437.883:51955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23027 comm="syz.0.7106" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f13c539eec9 code=0x7ffc0000 [ 437.252954][ T29] audit: type=1326 audit(437.883:51956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23027 comm="syz.0.7106" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f13c539eec9 code=0x7ffc0000 [ 437.276272][ T29] audit: type=1326 audit(437.883:51957): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23027 comm="syz.0.7106" exe="/root/syz-executor" sig=0 arch=c000003e syscall=285 compat=0 ip=0x7f13c539eec9 code=0x7ffc0000 [ 437.299349][ T29] audit: type=1326 audit(437.883:51958): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23027 comm="syz.0.7106" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f13c539eec9 code=0x7ffc0000 [ 437.322356][ T29] audit: type=1326 audit(437.883:51959): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23027 comm="syz.0.7106" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f13c539eec9 code=0x7ffc0000 [ 437.345351][ T29] audit: type=1326 audit(437.883:51960): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23027 comm="syz.0.7106" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f13c539eec9 code=0x7ffc0000 [ 437.371071][T12577] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 437.380235][T23026] netlink: 8 bytes leftover after parsing attributes in process `syz.1.7105'. [ 437.389350][T13750] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 437.402319][T13750] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 437.413469][T13750] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 437.953200][T23060] netlink: 80 bytes leftover after parsing attributes in process `syz.1.7117'. [ 438.387250][T23091] netlink: 80 bytes leftover after parsing attributes in process `syz.0.7131'. [ 438.703083][T23109] netlink: 80 bytes leftover after parsing attributes in process `syz.4.7138'. [ 438.737645][T23113] batadv1: entered promiscuous mode [ 438.985751][T23125] netlink: 20 bytes leftover after parsing attributes in process `syz.0.7145'. [ 439.258780][T23146] hub 6-0:1.0: USB hub found [ 439.268392][T23146] hub 6-0:1.0: 8 ports detected [ 439.399621][T23153] netlink: 20 bytes leftover after parsing attributes in process `syz.5.7156'. [ 439.561146][T23155] netlink: 8 bytes leftover after parsing attributes in process `syz.4.7157'. [ 440.001267][T23177] netlink: 80 bytes leftover after parsing attributes in process `syz.4.7166'. [ 440.299331][T23189] netlink: 4 bytes leftover after parsing attributes in process `syz.0.7171'. [ 440.737832][T23206] hub 6-0:1.0: USB hub found [ 440.747786][T23206] hub 6-0:1.0: 8 ports detected [ 440.761871][T23208] netlink: 'syz.2.7174': attribute type 9 has an invalid length. [ 440.778008][T23208] pimreg: entered allmulticast mode [ 441.525017][T23248] bridge_slave_1: left allmulticast mode [ 441.530715][T23248] bridge_slave_1: left promiscuous mode [ 441.536813][T23248] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.545192][T23248] bridge_slave_0: left allmulticast mode [ 441.550867][T23248] bridge_slave_0: left promiscuous mode [ 441.556779][T23248] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.894665][T23223] delete_channel: no stack [ 442.652468][ T29] kauditd_printk_skb: 1875 callbacks suppressed [ 442.652504][ T29] audit: type=1400 audit(442.663:53836): avc: denied { recv } for pid=23256 comm="syz.5.7199" saddr=10.128.0.163 src=30036 daddr=10.128.1.228 dest=39380 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 442.683896][ T29] audit: type=1400 audit(442.903:53837): avc: denied { map_create } for pid=23255 comm="syz.1.7198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 442.702763][ T29] audit: type=1400 audit(442.903:53838): avc: denied { bpf } for pid=23255 comm="syz.1.7198" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 442.723024][ T29] audit: type=1400 audit(442.903:53839): avc: denied { map_read map_write } for pid=23255 comm="syz.1.7198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 442.743313][ T29] audit: type=1400 audit(443.003:53840): avc: denied { prog_load } for pid=23255 comm="syz.1.7198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 442.762431][ T29] audit: type=1400 audit(443.003:53841): avc: denied { bpf } for pid=23255 comm="syz.1.7198" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 442.782677][ T29] audit: type=1400 audit(443.003:53842): avc: denied { prog_load } for pid=23256 comm="syz.5.7199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 442.801311][ T29] audit: type=1400 audit(443.003:53843): avc: denied { bpf } for pid=23256 comm="syz.5.7199" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 442.821545][ T29] audit: type=1400 audit(443.133:53844): avc: denied { egress } for pid=23255 comm="syz.1.7198" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 442.844746][ T29] audit: type=1400 audit(443.133:53845): avc: denied { sendto } for pid=23255 comm="syz.1.7198" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 443.080379][T23275] __nla_validate_parse: 4 callbacks suppressed [ 443.080396][T23275] netlink: 80 bytes leftover after parsing attributes in process `syz.2.7206'. [ 443.110787][T23276] netlink: 28 bytes leftover after parsing attributes in process `syz.5.7205'. [ 443.119815][T23276] netlink: 28 bytes leftover after parsing attributes in process `syz.5.7205'. [ 443.128824][T23276] netlink: 28 bytes leftover after parsing attributes in process `syz.5.7205'. [ 443.201017][T23276] netlink: 28 bytes leftover after parsing attributes in process `syz.5.7205'. [ 443.210057][T23276] netlink: 28 bytes leftover after parsing attributes in process `syz.5.7205'. [ 443.219154][T23276] netlink: 28 bytes leftover after parsing attributes in process `syz.5.7205'. [ 443.325415][T23276] netlink: 28 bytes leftover after parsing attributes in process `syz.5.7205'. [ 443.334505][T23276] netlink: 28 bytes leftover after parsing attributes in process `syz.5.7205'. [ 443.343603][T23276] netlink: 28 bytes leftover after parsing attributes in process `syz.5.7205'. [ 444.282474][T23305] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 446.704471][T23431] bridge_slave_1: left allmulticast mode [ 446.710201][T23431] bridge_slave_1: left promiscuous mode [ 446.715951][T23431] bridge0: port 2(bridge_slave_1) entered disabled state [ 446.737219][T23431] bridge_slave_0: left allmulticast mode [ 446.742968][T23431] bridge_slave_0: left promiscuous mode [ 446.748733][T23431] bridge0: port 1(bridge_slave_0) entered disabled state [ 447.170838][T23447] FAULT_INJECTION: forcing a failure. [ 447.170838][T23447] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 447.183988][T23447] CPU: 1 UID: 0 PID: 23447 Comm: syz.5.7273 Not tainted syzkaller #0 PREEMPT(voluntary) [ 447.184093][T23447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 447.184111][T23447] Call Trace: [ 447.184120][T23447] [ 447.184130][T23447] __dump_stack+0x1d/0x30 [ 447.184152][T23447] dump_stack_lvl+0xe8/0x140 [ 447.184173][T23447] dump_stack+0x15/0x1b [ 447.184207][T23447] should_fail_ex+0x265/0x280 [ 447.184248][T23447] should_fail+0xb/0x20 [ 447.184274][T23447] should_fail_usercopy+0x1a/0x20 [ 447.184309][T23447] strncpy_from_user+0x25/0x230 [ 447.184377][T23447] ? kmem_cache_alloc_noprof+0x186/0x310 [ 447.184413][T23447] ? getname_flags+0x80/0x3b0 [ 447.184471][T23447] getname_flags+0xae/0x3b0 [ 447.184510][T23447] user_path_at+0x28/0x130 [ 447.184645][T23447] do_fchmodat+0x9c/0x180 [ 447.184680][T23447] __x64_sys_fchmodat+0x42/0x50 [ 447.184719][T23447] x64_sys_call+0x288d/0x2ff0 [ 447.184753][T23447] do_syscall_64+0xd2/0x200 [ 447.184794][T23447] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 447.184827][T23447] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 447.184939][T23447] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 447.184967][T23447] RIP: 0033:0x7f635672eec9 [ 447.184984][T23447] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 447.185007][T23447] RSP: 002b:00007f6355197038 EFLAGS: 00000246 ORIG_RAX: 000000000000010c [ 447.185034][T23447] RAX: ffffffffffffffda RBX: 00007f6356985fa0 RCX: 00007f635672eec9 [ 447.185051][T23447] RDX: 00000000fffffffb RSI: 0000200000000000 RDI: ffffffffffffff9c [ 447.185069][T23447] RBP: 00007f6355197090 R08: 0000000000000000 R09: 0000000000000000 [ 447.185134][T23447] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 447.185152][T23447] R13: 00007f6356986038 R14: 00007f6356985fa0 R15: 00007ffecea5b558 [ 447.185178][T23447] [ 447.669819][ T29] kauditd_printk_skb: 1281 callbacks suppressed [ 447.669887][ T29] audit: type=1400 audit(448.414:55125): avc: denied { prog_load } for pid=23463 comm="syz.0.7278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 447.694850][ T29] audit: type=1400 audit(448.414:55126): avc: denied { bpf } for pid=23463 comm="syz.0.7278" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 447.715069][ T29] audit: type=1400 audit(448.414:55127): avc: denied { perfmon } for pid=23463 comm="syz.0.7278" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 447.761591][ T29] audit: type=1400 audit(448.424:55128): avc: denied { read } for pid=23462 comm="syz.1.7279" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 447.784401][ T29] audit: type=1400 audit(448.424:55129): avc: denied { read open } for pid=23462 comm="syz.1.7279" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 447.808074][ T29] audit: type=1400 audit(448.424:55130): avc: denied { map_create } for pid=23462 comm="syz.1.7279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 447.826826][ T29] audit: type=1400 audit(448.424:55131): avc: denied { perfmon } for pid=23462 comm="syz.1.7279" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 447.847479][ T29] audit: type=1400 audit(448.424:55132): avc: denied { map_read map_write } for pid=23462 comm="syz.1.7279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 447.866933][ T29] audit: type=1400 audit(448.424:55133): avc: denied { prog_load } for pid=23462 comm="syz.1.7279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 447.885737][ T29] audit: type=1400 audit(448.424:55134): avc: denied { bpf } for pid=23462 comm="syz.1.7279" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 448.732559][T23495] __nla_validate_parse: 15 callbacks suppressed [ 448.732573][T23495] netlink: 4 bytes leftover after parsing attributes in process `syz.4.7288'. [ 449.052809][T23527] program syz.4.7297 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 449.235514][T23532] netlink: 4 bytes leftover after parsing attributes in process `syz.0.7301'. [ 450.693408][T23591] netlink: 80 bytes leftover after parsing attributes in process `syz.0.7323'. [ 452.242758][T23626] netlink: 8 bytes leftover after parsing attributes in process `syz.2.7337'. [ 452.254948][T23622] random: crng reseeded on system resumption [ 452.369738][T23635] netlink: 80 bytes leftover after parsing attributes in process `syz.2.7341'. [ 452.483589][T23642] netlink: 80 bytes leftover after parsing attributes in process `syz.2.7344'. [ 452.673659][ T29] kauditd_printk_skb: 1194 callbacks suppressed [ 452.673677][ T29] audit: type=1400 audit(453.424:56329): avc: denied { prog_load } for pid=23647 comm="syz.0.7346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 452.698722][ T29] audit: type=1400 audit(453.424:56330): avc: denied { bpf } for pid=23647 comm="syz.0.7346" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 452.718939][ T29] audit: type=1400 audit(453.424:56331): avc: denied { perfmon } for pid=23647 comm="syz.0.7346" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 452.762188][ T29] audit: type=1400 audit(453.504:56332): avc: denied { perfmon } for pid=23647 comm="syz.0.7346" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 452.782722][ T29] audit: type=1400 audit(453.504:56333): avc: denied { bpf } for pid=23647 comm="syz.0.7346" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 452.803019][ T29] audit: type=1400 audit(453.504:56334): avc: denied { create } for pid=23645 comm="syz.1.7347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 452.822225][ T29] audit: type=1400 audit(453.504:56335): avc: denied { prog_run } for pid=23647 comm="syz.0.7346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 452.840799][ T29] audit: type=1400 audit(453.504:56336): avc: denied { ioctl } for pid=23645 comm="syz.1.7347" path="socket:[95877]" dev="sockfs" ino=95877 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 452.866999][ T29] audit: type=1400 audit(453.594:56337): avc: denied { map_create } for pid=23648 comm="syz.2.7348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 452.885799][ T29] audit: type=1400 audit(453.594:56338): avc: denied { bpf } for pid=23648 comm="syz.2.7348" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 453.101703][T23668] netlink: 80 bytes leftover after parsing attributes in process `syz.0.7355'. [ 453.502333][T23700] netlink: 80 bytes leftover after parsing attributes in process `syz.5.7369'. [ 454.395104][T23736] netlink: 4 bytes leftover after parsing attributes in process `syz.4.7385'. [ 454.722716][T23769] netlink: 80 bytes leftover after parsing attributes in process `syz.0.7397'. [ 454.990118][T23795] netlink: 8 bytes leftover after parsing attributes in process `syz.2.7408'. [ 455.006780][T23795] netlink: 24 bytes leftover after parsing attributes in process `syz.2.7408'. [ 455.386705][T23808] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7412'. [ 455.449637][T23814] 9pnet_fd: Insufficient options for proto=fd [ 455.956306][T23833] netlink: 80 bytes leftover after parsing attributes in process `syz.4.7421'. [ 456.239973][T23842] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7425'. [ 456.378893][T23856] 9pnet_fd: Insufficient options for proto=fd [ 456.571633][T23860] netlink: 12 bytes leftover after parsing attributes in process `syz.0.7432'. [ 456.784758][T23880] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7435'. [ 456.973162][T23884] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7438'. [ 457.275880][T23899] 9pnet_fd: Insufficient options for proto=fd [ 458.261860][ T29] kauditd_printk_skb: 1546 callbacks suppressed [ 458.261880][ T29] audit: type=1400 audit(458.634:57885): avc: denied { map_create } for pid=23905 comm="syz.2.7446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 458.287024][ T29] audit: type=1400 audit(458.634:57886): avc: denied { bpf } for pid=23905 comm="syz.2.7446" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 458.307258][ T29] audit: type=1400 audit(458.634:57887): avc: denied { map_read map_write } for pid=23905 comm="syz.2.7446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 458.326751][ T29] audit: type=1400 audit(458.684:57888): avc: denied { recv } for pid=23905 comm="syz.2.7446" saddr=10.128.0.163 src=30036 daddr=10.128.1.228 dest=39380 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 458.351808][ T29] audit: type=1400 audit(458.754:57889): avc: denied { prog_load } for pid=23905 comm="syz.2.7446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 458.370521][ T29] audit: type=1400 audit(458.754:57890): avc: denied { bpf } for pid=23905 comm="syz.2.7446" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 458.390732][ T29] audit: type=1400 audit(458.854:57891): avc: denied { perfmon } for pid=23905 comm="syz.2.7446" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 458.411372][ T29] audit: type=1400 audit(458.854:57892): avc: denied { perfmon } for pid=23905 comm="syz.2.7446" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 458.431862][ T29] audit: type=1400 audit(458.854:57893): avc: denied { bpf } for pid=23905 comm="syz.2.7446" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 458.452045][ T29] audit: type=1400 audit(458.854:57894): avc: denied { prog_run } for pid=23905 comm="syz.2.7446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 458.754720][T23917] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 458.762440][T23917] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 458.792597][T23917] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 458.800197][T23917] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 459.005202][T23938] 9pnet_fd: Insufficient options for proto=fd [ 460.101709][T23969] __nla_validate_parse: 1 callbacks suppressed [ 460.101726][T23969] netlink: 4 bytes leftover after parsing attributes in process `syz.4.7466'. [ 460.258134][T23981] 9pnet_fd: Insufficient options for proto=fd [ 461.199007][T24005] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7480'. [ 461.245841][T24016] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 461.253437][T24016] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 461.264895][T24016] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 461.272344][T24016] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 461.772710][T24048] netlink: 4 bytes leftover after parsing attributes in process `syz.4.7491'. [ 462.162715][T24053] netlink: 4 bytes leftover after parsing attributes in process `syz.4.7494'. [ 463.277951][ T29] kauditd_printk_skb: 1326 callbacks suppressed [ 463.277967][ T29] audit: type=1400 audit(464.025:59176): avc: denied { prog_load } for pid=24099 comm="syz.0.7509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 463.303531][ T29] audit: type=1400 audit(464.025:59177): avc: denied { bpf } for pid=24099 comm="syz.0.7509" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 463.357960][T24101] netlink: 4 bytes leftover after parsing attributes in process `syz.0.7509'. [ 463.384033][ T29] audit: type=1400 audit(464.025:59178): avc: denied { perfmon } for pid=24099 comm="syz.0.7509" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 463.404643][ T29] audit: type=1400 audit(464.025:59179): avc: denied { read } for pid=24090 comm="syz.2.7507" dev="nsfs" ino=4026532767 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 463.425725][ T29] audit: type=1400 audit(464.025:59180): avc: denied { open } for pid=24090 comm="syz.2.7507" path="net:[4026532767]" dev="nsfs" ino=4026532767 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 463.448573][ T29] audit: type=1400 audit(464.035:59181): avc: denied { create } for pid=24090 comm="syz.2.7507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 463.468054][ T29] audit: type=1400 audit(464.055:59182): avc: denied { recv } for pid=29 comm="kauditd" saddr=10.128.0.163 src=30036 daddr=10.128.1.228 dest=39380 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 463.492565][ T29] audit: type=1400 audit(464.065:59183): avc: denied { map_create } for pid=24099 comm="syz.0.7509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 463.512175][ T29] audit: type=1400 audit(464.065:59184): avc: denied { map_read map_write } for pid=24099 comm="syz.0.7509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 463.531846][ T29] audit: type=1400 audit(464.065:59185): avc: denied { prog_load } for pid=24099 comm="syz.0.7509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 463.678740][T24106] FAULT_INJECTION: forcing a failure. [ 463.678740][T24106] name failslab, interval 1, probability 0, space 0, times 0 [ 463.691417][T24106] CPU: 1 UID: 0 PID: 24106 Comm: syz.5.7510 Not tainted syzkaller #0 PREEMPT(voluntary) [ 463.691482][T24106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 463.691499][T24106] Call Trace: [ 463.691527][T24106] [ 463.691536][T24106] __dump_stack+0x1d/0x30 [ 463.691564][T24106] dump_stack_lvl+0xe8/0x140 [ 463.691586][T24106] dump_stack+0x15/0x1b [ 463.691606][T24106] should_fail_ex+0x265/0x280 [ 463.691638][T24106] should_failslab+0x8c/0xb0 [ 463.691672][T24106] kmem_cache_alloc_noprof+0x50/0x310 [ 463.691775][T24106] ? alloc_empty_file+0x76/0x200 [ 463.691818][T24106] alloc_empty_file+0x76/0x200 [ 463.691853][T24106] path_openat+0x68/0x2170 [ 463.692007][T24106] ? __rcu_read_unlock+0x34/0x70 [ 463.692035][T24106] ? filemap_map_pages+0x86b/0xab0 [ 463.692072][T24106] ? css_rstat_updated+0xb7/0x240 [ 463.692104][T24106] do_filp_open+0x109/0x230 [ 463.692137][T24106] do_sys_openat2+0xa6/0x110 [ 463.692190][T24106] __x64_sys_openat+0xf2/0x120 [ 463.692276][T24106] x64_sys_call+0x2e9c/0x2ff0 [ 463.692323][T24106] do_syscall_64+0xd2/0x200 [ 463.692359][T24106] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 463.692391][T24106] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 463.692499][T24106] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 463.692523][T24106] RIP: 0033:0x7f635672d710 [ 463.692543][T24106] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 69 95 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 bc 95 02 00 8b 44 [ 463.692563][T24106] RSP: 002b:00007f6355196b70 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 463.692587][T24106] RAX: ffffffffffffffda RBX: 00000000001a3c82 RCX: 00007f635672d710 [ 463.692638][T24106] RDX: 00000000001a3c82 RSI: 00007f6355196c10 RDI: 00000000ffffff9c [ 463.692654][T24106] RBP: 00007f6355196c10 R08: 0000000000000000 R09: 002367732f766564 [ 463.692670][T24106] R10: 0000000000000000 R11: 0000000000000293 R12: cccccccccccccccd [ 463.692682][T24106] R13: 00007f6356986038 R14: 00007f6356985fa0 R15: 00007ffecea5b558 [ 463.692700][T24106] [ 464.928029][T24150] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 464.955975][T24150] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 465.861915][T24197] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 465.884142][T24197] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 466.007540][T24203] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 466.038640][T24203] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 467.254760][T24232] netlink: 4 bytes leftover after parsing attributes in process `syz.4.7558'. [ 467.644155][T24242] usb usb8: usbfs: process 24242 (syz.5.7562) did not claim interface 0 before use [ 467.657179][T24242] usb usb8: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 467.765173][T24250] netlink: 140 bytes leftover after parsing attributes in process `syz.4.7566'. [ 467.777317][T24250] netlink: 140 bytes leftover after parsing attributes in process `syz.4.7566'. [ 467.790770][T24250] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 467.798351][T24250] batadv_slave_0: entered promiscuous mode [ 468.293311][ T29] kauditd_printk_skb: 661 callbacks suppressed [ 468.293374][ T29] audit: type=1400 audit(469.045:59847): avc: denied { recv } for pid=24246 comm="syz.5.7565" saddr=10.128.0.163 src=30036 daddr=10.128.1.228 dest=39380 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 468.333998][ T29] audit: type=1400 audit(469.045:59848): avc: denied { recv } for pid=24246 comm="syz.5.7565" saddr=10.128.0.163 src=30036 daddr=10.128.1.228 dest=39380 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 468.359126][ T29] audit: type=1400 audit(469.045:59849): avc: denied { recv } for pid=24246 comm="syz.5.7565" saddr=10.128.0.163 src=30036 daddr=10.128.1.228 dest=39380 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 468.363900][T24271] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 468.415831][ T29] audit: type=1400 audit(469.085:59850): avc: denied { write } for pid=24266 comm="syz.0.7573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 468.435893][ T29] audit: type=1400 audit(469.105:59851): avc: denied { read write } for pid=24259 comm="syz.1.7569" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 468.448866][T24271] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 468.459094][ T29] audit: type=1400 audit(469.105:59852): avc: denied { open } for pid=24259 comm="syz.1.7569" path="/dev/raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 468.481214][T24278] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(6) [ 468.490297][ T29] audit: type=1400 audit(469.115:59853): avc: denied { ioctl } for pid=24259 comm="syz.1.7569" path="/dev/raw-gadget" dev="devtmpfs" ino=142 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 468.496721][T24278] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 468.521824][ T29] audit: type=1400 audit(469.115:59854): avc: denied { ioctl } for pid=24259 comm="syz.1.7569" path="/dev/raw-gadget" dev="devtmpfs" ino=142 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 468.528701][T24278] vhci_hcd vhci_hcd.0: Device attached [ 468.553141][ T29] audit: type=1400 audit(469.155:59855): avc: denied { sys_module } for pid=24266 comm="syz.0.7573" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 468.579079][ T29] audit: type=1400 audit(469.155:59856): avc: denied { module_request } for pid=24266 comm="syz.0.7573" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 468.799640][ T3409] usb 1-1: new low-speed USB device number 2 using vhci_hcd [ 468.987634][T24300] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 468.996189][T24300] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 469.084721][T24280] vhci_hcd: connection reset by peer [ 469.090578][T13723] vhci_hcd: stop threads [ 469.094869][T13723] vhci_hcd: release socket [ 469.099309][T13723] vhci_hcd: disconnect device [ 471.222627][T24381] netlink: 28 bytes leftover after parsing attributes in process `syz.5.7612'. [ 472.372417][T24403] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 472.435502][T24403] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 472.640836][T24407] netlink: 12 bytes leftover after parsing attributes in process `syz.0.7622'. [ 472.914712][T24418] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 472.933911][T24418] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 472.965717][T24422] netlink: 44 bytes leftover after parsing attributes in process `syz.0.7628'. [ 472.975749][T24422] netlink: 12 bytes leftover after parsing attributes in process `syz.0.7628'. [ 473.327972][ T29] kauditd_printk_skb: 355 callbacks suppressed [ 473.327993][ T29] audit: type=1400 audit(474.075:60212): avc: denied { prog_load } for pid=24431 comm="syz.5.7634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 473.352913][ T29] audit: type=1400 audit(474.075:60213): avc: denied { bpf } for pid=24431 comm="syz.5.7634" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 473.701314][ T29] audit: type=1400 audit(474.205:60214): avc: denied { recv } for pid=24435 comm="syz.2.7636" saddr=10.128.0.163 src=30036 daddr=10.128.1.228 dest=39380 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 473.726373][ T29] audit: type=1400 audit(474.255:60215): avc: denied { recv } for pid=24431 comm="syz.5.7634" saddr=10.128.0.163 src=30036 daddr=10.128.1.228 dest=39380 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 473.751602][ T29] audit: type=1400 audit(474.255:60216): avc: denied { recv } for pid=24434 comm="syz.0.7635" saddr=10.128.0.163 src=30036 daddr=10.128.1.228 dest=39380 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 473.776758][ T29] audit: type=1400 audit(474.295:60217): avc: denied { create } for pid=24443 comm="syz.1.7637" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 473.795922][ T29] audit: type=1400 audit(474.315:60218): avc: denied { write } for pid=24443 comm="syz.1.7637" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 473.815078][ T29] audit: type=1326 audit(474.425:60219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24434 comm="syz.0.7635" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f13c539eec9 code=0x7ffc0000 [ 473.838096][ T29] audit: type=1326 audit(474.425:60220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24434 comm="syz.0.7635" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f13c539eec9 code=0x7ffc0000 [ 473.922267][T22844] ================================================================== [ 473.930406][T22844] BUG: KCSAN: data-race in shmem_getattr / shmem_recalc_inode [ 473.937917][T22844] [ 473.940264][T22844] read-write to 0xffff88811994aba8 of 8 bytes by task 24441 on cpu 0: [ 473.948436][T22844] shmem_recalc_inode+0x3b/0x200 [ 473.953423][T22844] shmem_get_folio_gfp+0x7a3/0xd60 [ 473.958574][T22844] shmem_write_begin+0xa8/0x190 [ 473.963459][T22844] generic_perform_write+0x184/0x490 [ 473.968779][T22844] shmem_file_write_iter+0xc5/0xf0 [ 473.973953][T22844] __kernel_write_iter+0x2d3/0x540 [ 473.979105][T22844] dump_user_range+0x61e/0x8f0 [ 473.983913][T22844] elf_core_dump+0x1e00/0x1f90 [ 473.988726][T22844] coredump_write+0xb0a/0xe30 [ 473.993440][T22844] vfs_coredump+0x142f/0x20c0 [ 473.998150][T22844] get_signal+0xd85/0xf70 [ 474.002506][T22844] arch_do_signal_or_restart+0x96/0x480 [ 474.008082][T22844] irqentry_exit_to_user_mode+0x5e/0xa0 [ 474.013686][T22844] irqentry_exit+0x12/0x50 [ 474.015656][ T3409] usb 1-1: enqueue for inactive port 0 [ 474.018139][T22844] asm_exc_page_fault+0x26/0x30 [ 474.018164][T22844] [ 474.018171][T22844] read to 0xffff88811994aba8 of 8 bytes by task 22844 on cpu 1: [ 474.018187][T22844] shmem_getattr+0x41/0x200 [ 474.023728][ T3409] usb 1-1: enqueue for inactive port 0 [ 474.028507][T22844] vfs_getattr_nosec+0x146/0x1e0 [ 474.053381][T22844] vfs_statx+0x113/0x390 [ 474.057667][T22844] vfs_fstatat+0x115/0x170 [ 474.062139][T22844] __se_sys_newfstatat+0x55/0x260 [ 474.067257][T22844] __x64_sys_newfstatat+0x55/0x70 [ 474.072329][T22844] x64_sys_call+0x135a/0x2ff0 [ 474.077030][T22844] do_syscall_64+0xd2/0x200 [ 474.081564][T22844] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 474.087474][T22844] [ 474.089808][T22844] value changed: 0x00000000000037dd -> 0x00000000000037de [ 474.096922][T22844] [ 474.099259][T22844] Reported by Kernel Concurrency Sanitizer on: [ 474.099289][ T3409] vhci_hcd: vhci_device speed not set [ 474.105422][T22844] CPU: 1 UID: 0 PID: 22844 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(voluntary) SYZFAIL: failed to send rpc fd=3 want=43992 sent=0 n=-1 (errno 32: Broken pipe) [ 474.120762][T22844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 474.130842][T22844] ================================================================== [ 474.250408][ T29] audit: type=1400 audit(474.635:60221): avc: denied { recv } for pid=3290 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.1.228 dest=39380 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 474.652943][T13719] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 474.663449][T13719] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 474.673856][T13719] bond0 (unregistering): Released all slaves [ 474.683588][T13719] bond1 (unregistering): Released all slaves [ 474.725116][T13719] hsr_slave_0: left promiscuous mode [ 474.731000][T13719] hsr_slave_1: left promiscuous mode [ 474.736719][T13719] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 474.771973][T13719] team0 (unregistering): Port device team_slave_1 removed [ 474.783799][T13719] team0 (unregistering): Port device team_slave_0 removed [ 475.113385][T13719] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 475.181958][T13719] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 475.231447][T13719] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 475.293259][T13719] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 475.345423][T13719] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 475.381961][T13719] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 475.441743][T13719] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 475.501993][T13719] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 475.564970][T13719] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 475.601781][T13719] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 475.642847][T13719] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 475.681944][T13719] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 475.795797][T13719] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 475.822362][T13719] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 475.881760][T13719] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 475.931774][T13719] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 475.993309][T13719] bridge_slave_1: left allmulticast mode [ 475.998991][T13719] bridge_slave_1: left promiscuous mode [ 476.004678][T13719] bridge0: port 2(bridge_slave_1) entered disabled state [ 476.012478][T13719] bridge_slave_0: left allmulticast mode [ 476.018180][T13719] bridge_slave_0: left promiscuous mode [ 476.023852][T13719] bridge0: port 1(bridge_slave_0) entered disabled state [ 476.124558][T13719] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 476.135030][T13719] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 476.144695][T13719] bond0 (unregistering): Released all slaves [ 476.202306][T13719] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 476.212229][T13719] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 476.221808][T13719] bond0 (unregistering): Released all slaves [ 476.244303][T13719] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 476.253969][T13719] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 476.263405][T13719] bond0 (unregistering): Released all slaves [ 476.289532][T13719] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 476.300916][T13719] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 476.310563][T13719] bond0 (unregistering): Released all slaves [ 476.334364][T13719] tipc: Disabling bearer [ 476.339485][T13719] tipc: Left network mode [ 476.348235][T13719] hsr_slave_0: left promiscuous mode [ 476.353941][T13719] hsr_slave_1: left promiscuous mode [ 476.359833][T13719] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 476.368857][T13719] hsr_slave_0: left promiscuous mode [ 476.374673][T13719] hsr_slave_1: left promiscuous mode [ 476.382057][T13719] hsr_slave_0: left promiscuous mode [ 476.387649][T13719] hsr_slave_1: left promiscuous mode [ 476.393562][T13719] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 476.400990][T13719] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 476.411040][T13719] hsr_slave_0: left promiscuous mode [ 476.416699][T13719] hsr_slave_1: left promiscuous mode [ 476.431890][T13719] veth1_macvtap: left promiscuous mode [ 476.437406][T13719] veth0_macvtap: left promiscuous mode [ 476.442954][T13719] veth1_vlan: left promiscuous mode [ 476.448179][T13719] veth0_vlan: left promiscuous mode [ 476.453846][T13719] veth1_macvtap: left promiscuous mode [ 476.459421][T13719] veth0_macvtap: left promiscuous mode [ 476.464968][T13719] veth1_vlan: left promiscuous mode [ 476.470621][T13719] veth0_vlan: left promiscuous mode [ 476.476330][T13719] veth1_macvtap: left promiscuous mode [ 476.481942][T13719] veth0_macvtap: left promiscuous mode [ 476.487466][T13719] veth1_vlan: left promiscuous mode [ 476.492804][T13719] veth0_vlan: left promiscuous mode [ 476.498670][T13719] veth1_macvtap: left promiscuous mode [ 476.504186][T13719] veth0_macvtap: left promiscuous mode [ 476.509726][T13719] veth1_vlan: left promiscuous mode [ 476.514937][T13719] veth0_vlan: left promiscuous mode [ 476.665776][T13719] team0 (unregistering): Port device team_slave_1 removed [ 476.675378][T13719] team0 (unregistering): Port device team_slave_0 removed [ 476.726795][T13719] team0 (unregistering): Port device team_slave_1 removed [ 476.737005][T13719] team0 (unregistering): Port device team_slave_0 removed [ 476.787833][T13719] team0 (unregistering): Port device team_slave_1 removed [ 476.799040][T13719] team0 (unregistering): Port device team_slave_0 removed [ 476.828187][T13719] pimreg (unregistering): left allmulticast mode [ 476.857671][T13719] team0 (unregistering): Port device team_slave_1 removed [ 476.867278][T13719] team0 (unregistering): Port device team_slave_0 removed