last executing test programs: 20.92934341s ago: executing program 3 (id=2779): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000002040)=ANY=[@ANYBLOB="a40000000001050500000000000000000a0000003c0002802c00018014000300fc00000000000000000000000000000014000400000000000000000000000000000000010c00028005000100000000003c0001800c00028005000100000000002c000180140003002001000000000000000000000000000114000400fc010000000000000000000000000000080007"], 0xa4}}, 0x0) 20.876404621s ago: executing program 3 (id=2782): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$BTRFS_IOC_SNAP_CREATE(r0, 0x50009401, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x1, &(0x7f0000002140)=ANY=[]) read$FUSE(r1, &(0x7f000000e440)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_INIT(0xffffffffffffffff, &(0x7f00000002c0)={0x50, 0x0, r2, {0x7, 0x1f, 0x4, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x14c, 0x94a4}}, 0x50) syz_fuse_handle_req(r1, &(0x7f000000a3c0)="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", 0x2000, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={0x78, 0xfffffffffffffff5, 0x0, {0x4000020000000, 0x0, 0x0, {0x2, 0x9, 0x7, 0x840000004, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x8001, 0x1, 0x0, r3}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000005e00)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r5, &(0x7f00000168c0)={0x201d}) ioctl$F2FS_IOC_MOVE_RANGE(r4, 0x541b, &(0x7f0000000080)={0xffffffffffffffff, 0x2000, 0xffffffffffffffff, 0x8}) close_range(r7, 0xffffffffffffffff, 0x200000000000000) 20.853695551s ago: executing program 3 (id=2783): syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x2209052, &(0x7f00000000c0), 0x1, 0x3f7, &(0x7f0000000e00)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143042, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) getresuid(&(0x7f0000000340)=0x0, &(0x7f0000000380), &(0x7f0000000440)) getresgid(&(0x7f0000000540), &(0x7f0000000580)=0x0, &(0x7f00000005c0)) r3 = geteuid() lstat(&(0x7f0000000640)='./file0/../file0\x00', &(0x7f0000001300)) statx(r0, &(0x7f00000006c0)='./file0\x00', 0x0, 0x200, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300), 0x80, &(0x7f0000001440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@fowner_eq={'fowner', 0x3d, r3}}, {@subj_role={'subj_role', 0x3d, 'kmem_cache_free\x00'}}, {@euid_eq={'euid', 0x3d, r4}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@smackfsfloor}, {@smackfsdef={'smackfsdef', 0x3d, ',#'}}]}}) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000680)='ext4_unlink_enter\x00'}, 0x18) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000ffdbdf251e0000000c00060003000001030000000c000600000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="0c0006000100000001000000"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x20004014) syz_emit_ethernet(0x66, &(0x7f0000001380)=ANY=[@ANYBLOB="bbbbbbbbbbbbbbbbbbbbbbbb86dd60003a0400303afffe808d000000000000000000000000bbff0200000000000000000000000000013525293fcf196cf8ae2a515158c255e907fc52e445cd0c103042cdf39d9e39d0a72139b59b733122337b528c97793557d8973ac37d835e3dcd867ffb68109bae409f0061eb023030b40b4bf1b270984dbebc6276bca5e893455e8d2071db54fca93556ed8468c4e5a03e027716f75215"], 0x0) r5 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) connect$unix(r6, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) syz_mount_image$ext4(&(0x7f0000000880)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000003c0), 0xfe, 0x52a, &(0x7f00000008c0)="$eJzs3U9vI2cZAPBnJvEmu5uSFDiUSi0VLcpWsHbS0Dbi0C4S4lYJVO7bKHGiKE4cxU7ZRD2k4gMgIQS9cuKCxAdAQv0IqFIlekeAQAi2cOAADBp7zLpmnD9qbC/J7yeNPfPOzPs87649fudPZgK4tp6LiHsRMRURL0bEfFGeFkOcdId8uY8fvrOeD/mcN/+SRFKURcRCr7687HZnlZunxm0dHe+sNRr1g2K61t7dr7WOju9u765t1bfqeysry6+svrr68urSpbQzb9dr3/zDj3/ws2+99quvfu+39/90Z7p/ftGO80gvEvejzmslZvvK8sAHF6nkMTZVtKcy6UQAADiXvDP72Yj4Uqf/Px9T8d9u8WCXbnb82QEAAACXIXt9Lv6ZRGQAAADAlfV6RMxFklaLawHmIk2r1e41vJ+PW2mj2Wp/ZbN5uLeRz4tYiEq6ud2oLxXX1C5EJcmnl4uLgHvTLw1Mr0TEkxHxo/mbnenqerOxMemDHwAAAHBN3B7Y///7fHf/HwAAALhiFiadAAAAADByw/b/kzHnAQAAAIzOsP3/mTHnAQAAAIzEt994Ix+y2eg+/3rj7aPDnebbdzfqrZ3q7uF6db15sF/daja3Ovfs2z2rvkazuf+12Dt8UGvX7yW11tHx/d3m4V77/rbnBwIAAMCkPPnF9z9KIuLk6zc7Q+7GxlsRU0NWcK8AuDLSiyz8+9HlAYzfsJ954OqbnnQCwOScTDoBYNI+cauPkk5B/8U7af/Cvx5hUgAAwKVa/ELJ+f9iF6Ay6eSAkbrQ+X/gSnH+H66vC57//2BUeQDjV3nUA3ApEFxTZz3qY+jNO8rO/98oWzDLzqwLAAAYqbnOa5JWi3OBc5Gm1WrEE50/9a8km9uN+lJEfCYifjNfmcmnl7vreDwgAAAAAAAAAAAAAAAAAAAAAAAAAJxTliWRAQAAAFdaRPrHpHj+1+L8C3ODxwduJP+Yj+4jvXrPB2wfLOflf+2VR/u9N3/yYK3dPnhp3EcvAAAAgDK9/fTO+/KkswEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgqvn44TvrxXBjnHH//I2IWPhE/PXunOmY7bzPRiUibv0tiem+9ZKImLqE+CfvRsRTZfGTPK1YKLIYjJ9GxM3xxH8my7LS+LcvIT5cZ+/n2597Zd+/NJ7rvJd//6eL4dPqbf9mSuL3tn9TQ7Z/T5wzxtMf/qI2NP67EU9Pl29/evGTIfGfL6uw5B/lre8eH/9PYbfyyH4asRjl8ftj1dq7+7XW0fHd7d21rfpWfW9lZfmV1VdXX15dqm1uN+rFa2kbf/jML/89UPSvrKvT/hgSf+GM9r+Qj1T6CrPBMEWwDx88/Fx3tDJQRSf+nefLP39PnRI//0x8ufgdyOcv9sZPuuP9nv35B8+WJlbE3xjS/rP+/+8Mq7Tj0dIvfuf7vzt1UQBgrFpHxztrjUb9YOQj72VZ9mnquTW+VK/lSK+/dsoyMxeoMMsGS2Yfl5b+P47MRMT4gl7GkS0AAOBx86jTP+lMAAAAAAAAAAAAAAAAAAAA4PpqHUU66tuJDcY8mUxTAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABO9Z8AAAD//xgA1SY=") keyctl$KEYCTL_MOVE(0x4, 0x0, 0x0, 0x0, 0x0) 20.839378151s ago: executing program 3 (id=2785): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r1, 0x0, 0x31, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000300)='neigh_update\x00', r2}, 0x18) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, &(0x7f0000000580)={[{@resgid}, {@noauto_da_alloc}, {@dioread_nolock}, {@test_dummy_encryption}, {@nobarrier}, {@nodelalloc}, {@minixdf}, {@init_itable}]}, 0x1, 0xbb3, &(0x7f00000017c0)="$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") sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r6}, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7020000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x2008002, &(0x7f0000001780)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x7}}, {@nodiscard}, {@auto_da_alloc}]}, 0x1, 0x558, &(0x7f0000000680)="$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") bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000071123900000000009500000000000000410d5a538f0606ae05b9b78481dbf5f42f0f64ec6d31765d125c077b9005af5b3c7b1d0355d1db0e0786f3b61b90ed031cccae5b4ec4ec1e93dbb0d9a9c63cdba29fd41cee1fba5562e7367138c333ba61f1947ffca82396198b2a3bfb37ab085b9c094e99e7a174196dbefa6b2df853d464ea2a6962e95af269a6c64b2b8b4ca4acf21186ca07454e84bc05ea7807501a66e7719b27e15708bd16eb1c0c108b211532bca3b41f0118bf0a4523640a32d69b20636c5df2a2b8a706b28bd8ac3eb514b012"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) syz_mount_image$exfat(0x0, &(0x7f0000000180)='./bus\x00', 0x1004030, 0x0, 0xfb, 0x0, &(0x7f0000000000)) 20.809407232s ago: executing program 3 (id=2786): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r1, 0x0, 0x31, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000300)='neigh_update\x00', r2}, 0x18) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, &(0x7f0000000580)={[{@resgid}, {@noauto_da_alloc}, {@dioread_nolock}, {@test_dummy_encryption}, {@nobarrier}, {@nodelalloc}, {@minixdf}, {@init_itable}]}, 0x1, 0xbb3, &(0x7f00000017c0)="$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") sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r6}, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a500000008000000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x2008002, &(0x7f0000001780)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x7}}, {@nodiscard}, {@auto_da_alloc}]}, 0x1, 0x558, &(0x7f0000000680)="$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") bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000071123900000000009500000000000000410d5a538f0606ae05b9b78481dbf5f42f0f64ec6d31765d125c077b9005af5b3c7b1d0355d1db0e0786f3b61b90ed031cccae5b4ec4ec1e93dbb0d9a9c63cdba29fd41cee1fba5562e7367138c333ba61f1947ffca82396198b2a3bfb37ab085b9c094e99e7a174196dbefa6b2df853d464ea2a6962e95af269a6c64b2b8b4ca4acf21186ca07454e84bc05ea7807501a66e7719b27e15708bd16eb1c0c108b211532bca3b41f0118bf0a4523640a32d69b20636c5df2a2b8a706b28bd8ac3eb514b012"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) syz_mount_image$exfat(0x0, &(0x7f0000000180)='./bus\x00', 0x1004030, 0x0, 0xfb, 0x0, &(0x7f0000000000)) r8 = syz_open_dev$usbfs(&(0x7f0000000340), 0x74, 0x101341) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) ioctl$USBDEVFS_IOCTL(r8, 0x8008551c, &(0x7f0000000040)=@usbdevfs_driver={0xfff, 0x8, 0x0}) 20.742730413s ago: executing program 3 (id=2787): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000050000000029000000000020000010000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0x0, @ANYRESHEX=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000540), 0x10) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0207a20802"], 0x10}}, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000080)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xed, 0x0, 0xffffffffffffdffc, 0x80000000000}, {0x4}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x0, 0x32}, 0x0, @in6=@dev={0xfe, 0x80, '\x00', 0xff}, 0x0, 0x0, 0x2, 0x6, 0xae, 0xffffffff}}, 0xe8) sendmmsg(r2, &(0x7f0000000180), 0x400000000000077, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/wireless\x00') preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000900)=""/212, 0xd4}], 0x1, 0xa2, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), r6) sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000680)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="070200020000fddbdf250100000000000000014100000018001700000016000000207564703a73797a3200000000a20bce4191973046643afc80477cf3127ae9ded1a20b2047eaf4b3d7873419d7d3627a02f1ca7c1fa8c5d3401a8a5eb2c172496ffc50d0210e513944b1e76fef3ce8a83c384c567aa93a3be1999a1adb43034b995afa30dc2ae17abefd38e108ac2eb1386b99760020f93a97ca6a7de43708d10c34dba50151c7eb933fe77ecfb6a5418ff457"], 0x34}}, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r5, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00082dbd7000fcdbdf2501000000000000000b000000000ce11373797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4008080}, 0x800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'/28], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x2d) r10 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r10, 0x29, 0x40, &(0x7f0000000e40)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c0, 0x300, 0x18c, 0x203, 0x300, 0x19030000, 0x3f0, 0x2e0, 0x2e0, 0x3f0, 0x2e0, 0x7fffffe, 0x0, {[{{@uncond, 0x300, 0x2d8, 0x300, 0x0, {0x1000000}, [@common=@unspec=@bpf0={{0x230}, {0x13, [{0xf00}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xe}, {}, {0x0, 0x0, 0x3}, {0x2}, {}, {0x0, 0x0, 0x0, 0x1}, {}, {}, {0x16}, {}, {}, {0x7}, {}, {0x0, 0x0, 0x0, 0x101}, {}, {}, {}, {}, {}, {}, {0xfffe}, {}, {}, {}, {0x0, 0xfd}, {}, {0x7a04}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x1}, {}, {0xb84, 0x0, 0x0, 0xf00}, {0x0, 0x1, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}]}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x0, 0x4}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0xb, 'syz1\x00', {0x6c8}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x520) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r11, 0xffffffffffffffff}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r12, 0x0, 0x20000000}, 0x20) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e0000000400000008000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x8f, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r13, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 12.043639941s ago: executing program 2 (id=2818): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001dc0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="008000ffffffffffffffe4000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = gettid() ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000b28000)=0x20000000000000ff) fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x1, r1, 0x0, 0x60000007, 0x0) poll(&(0x7f0000b2c000)=[{}], 0x2c, 0xffffffffffbffff8) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec850000007500000085"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='signal_generate\x00', r2}, 0x10) r3 = gettid() r4 = getpid() rt_tgsigqueueinfo(r4, r3, 0x5, &(0x7f0000000400)={0x2, 0xffffffff, 0x1}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fa540000850000008200000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) fcntl$setown(0xffffffffffffffff, 0x8, r0) tkill(r0, 0x13) r7 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) writev(r7, &(0x7f0000000480)=[{&(0x7f00000002c0)='\f7', 0x2}], 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r8, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r9 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@dev={0xac, 0x14, 0x14, 0x12}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0xd9, 0x0, 0xffffffffffffffff}, {}, 0x5, 0x0, 0x1, 0x0, 0x0, 0x2}, {{@in6=@ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, 0x1, 0x6c}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0xb7}}, 0xe8) syz_genetlink_get_family_id$fou(0x0, 0xffffffffffffffff) 9.097468765s ago: executing program 1 (id=2824): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r1, 0x0, 0x31, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000300)='neigh_update\x00', r2}, 0x18) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, &(0x7f0000000580)={[{@resgid}, {@noauto_da_alloc}, {@dioread_nolock}, {@test_dummy_encryption}, {@nobarrier}, {@nodelalloc}, {@minixdf}, {@init_itable}]}, 0x1, 0xbb3, &(0x7f00000017c0)="$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") sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r6}, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7020000000000001823", @ANYRES32=r6, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x2008002, &(0x7f0000001780)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x7}}, {@nodiscard}, {@auto_da_alloc}]}, 0x1, 0x558, &(0x7f0000000680)="$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") bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000071123900000000009500000000000000410d5a538f0606ae05b9b78481dbf5f42f0f64ec6d31765d125c077b9005af5b3c7b1d0355d1db0e0786f3b61b90ed031cccae5b4ec4ec1e93dbb0d9a9c63cdba29fd41cee1fba5562e7367138c333ba61f1947ffca82396198b2a3bfb37ab085b9c094e99e7a174196dbefa6b2df853d464ea2a6962e95af269a6c64b2b8b4ca4acf21186ca07454e84bc05ea7807501a66e7719b27e15708bd16eb1c0c108b211532bca3b41f0118bf0a4523640a32d69b20636c5df2a2b8a706b28bd8ac3eb514b012"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) syz_mount_image$exfat(0x0, &(0x7f0000000180)='./bus\x00', 0x1004030, 0x0, 0xfb, 0x0, &(0x7f0000000000)) 9.097116455s ago: executing program 4 (id=2825): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000000)=ANY=[@ANYRESDEC=0x0, @ANYRES32=r2, @ANYRES16=r2], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xf, 0x4, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x10, '\x00', 0x0, r4, 0x0, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000340)='kmem_cache_free\x00', r3}, 0x18) write$cgroup_subtree(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd63"], 0xfdef) 7.489934469s ago: executing program 0 (id=2826): syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./bus\x00', 0x2401480, &(0x7f0000000100)=ANY=[@ANYRES64=0x0], 0xfd, 0x2a1, &(0x7f00000006c0)="$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") sched_setscheduler(0x0, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) (async) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x18) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuset.effective_mems\x00', 0x275a, 0x0) write$cgroup_type(r3, &(0x7f0000000040), 0x9) (async) write$cgroup_type(r3, &(0x7f0000000040), 0x9) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r3, 0x0) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r3, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000000)=0x40) (async) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000000)=0x40) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) sched_setaffinity(0x0, 0xfffffef7, &(0x7f0000000740)=0x410000002) (async) sched_setaffinity(0x0, 0xfffffef7, &(0x7f0000000740)=0x410000002) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 7.489382189s ago: executing program 1 (id=2827): syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x2209052, &(0x7f00000000c0), 0x1, 0x3f7, &(0x7f0000000e00)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143042, 0x0) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) getresuid(&(0x7f0000000340)=0x0, &(0x7f0000000380), &(0x7f0000000440)) getresgid(&(0x7f0000000540), &(0x7f0000000580)=0x0, &(0x7f00000005c0)) r4 = geteuid() lstat(&(0x7f0000000640)='./file0/../file0\x00', &(0x7f0000001300)) statx(r0, &(0x7f00000006c0)='./file0\x00', 0x0, 0x200, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300), 0x80, &(0x7f0000001440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@fowner_eq={'fowner', 0x3d, r4}}, {@subj_role={'subj_role', 0x3d, 'kmem_cache_free\x00'}}, {@euid_eq={'euid', 0x3d, r5}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@smackfsfloor}, {@smackfsdef={'smackfsdef', 0x3d, ',#'}}]}}) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000680)='ext4_unlink_enter\x00'}, 0x18) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000ffdbdf251e0000000c00060003000001030000000c000600000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="0c0006000100000001000000"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x20004014) syz_emit_ethernet(0x66, &(0x7f0000001380)=ANY=[@ANYBLOB="bbbbbbbbbbbbbbbbbbbbbbbb86dd60003a0400303afffe808d000000000000000000000000bbff0200000000000000000000000000013525293fcf196cf8ae2a515158c255e907fc52e445cd0c103042cdf39d9e39d0a72139b59b733122337b528c97793557d8973ac37d835e3dcd867ffb68109bae409f0061eb023030b40b4bf1b270984dbebc6276bca5e893"], 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r6 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r6, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r7, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r8, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r7, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000880)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000003c0), 0xfe, 0x52a, &(0x7f00000008c0)="$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") dup3(r1, r1, 0x0) r9 = add_key$fscrypt_v1(0x0, &(0x7f0000000280)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300", 0x36}, 0x48, 0x0) r10 = add_key$fscrypt_v1(&(0x7f0000000400), &(0x7f00000007c0)={'fscrypt:', @desc2}, &(0x7f0000000480)={0x0, "6035ae1e0fe721441700322225930e6c1e3e2a51a92fd796bc34d7cf6e0236805b4377f7ab1a9b01c103a4c6de6269613800", 0x1}, 0x48, 0xfffffffffffffffb) keyctl$KEYCTL_MOVE(0x4, r10, r9, 0x0, 0x0) 7.488639799s ago: executing program 2 (id=2828): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) fcntl$lock(0xffffffffffffffff, 0x26, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r4}, 0x18) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x840, &(0x7f0000000340), 0x4, 0x241, &(0x7f00000009c0)="$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") r5 = open(&(0x7f00000000c0)='.\x00', 0x800, 0x50) getdents(r5, &(0x7f0000001fc0)=""/184, 0xb8) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x148, 0x1170, 0x1170, 0x148, 0x1170, 0x238, 0x1398, 0x1398, 0x238, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [0x0, 0x322], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x21}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x80, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4e22], [0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8], 0xff}}, @common=@unspec=@connlabel={{0x28}}]}, @common=@unspec=@CLASSIFY={0x28}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, [0xffffff00, 0x0, 0x0, 0xff000000], [], 'veth1_to_hsr\x00', 'vlan1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0xffff, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r7, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r8, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r7, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000001000000e27f00000100"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080012050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 7.488148039s ago: executing program 4 (id=2829): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080000000100000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000e0d00cf8f700000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) pselect6(0x2a, 0x0, 0x0, &(0x7f0000000400)={0x1, 0x5, 0xffffffff, 0x30000, 0x80000001, 0x8, 0x4, 0x5e5e}, &(0x7f0000000480), &(0x7f0000000500)={&(0x7f00000004c0)={[0x4dd]}, 0x8}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) unshare(0x64000600) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=@filter={'filter\x00', 0x42, 0x4, 0x278, 0xffffffff, 0xf8, 0xf8, 0x1b8, 0xffffffff, 0xffffffff, 0x2d8, 0x2d8, 0x2d8, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_to_batadv\x00', 'wlan0\x00', {}, {}, 0x11}, 0x0, 0x70, 0x98, 0x0, {0x100000000000000}}, @REJECT={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}, {{@ip={@multicast2, @private=0xa010102, 0x0, 0x0, 'veth1_virt_wifi\x00', '\x00', {}, {}, 0x0, 0x1}, 0x0, 0x70, 0xb0}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r6, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff097b00000800395032303030"], 0x15) r7 = dup(r6) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r5, @ANYBLOB=',wfdno=', @ANYRESHEX=r7]) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r7, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x41002000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)={0x5c, r8, 0x10, 0x70bd2b, 0x25dfdbff, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x80000000}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x8}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x5}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_DST={0x14, 0x1, @private0}]}, 0x5c}, 0x1, 0x0, 0x0, 0x44}, 0x8080) syz_mount_image$exfat(&(0x7f0000000280), &(0x7f00000000c0)='./file2\x00', 0x80581c, &(0x7f00000018c0)=ANY=[], 0xfd, 0x1501, &(0x7f00000002c0)="$eJzs3Am4T1X3OPC19t6H62b4JpnP2uvwTYZNkoSSZEiSJCRzQpIkSZK4ZEpCEjLeJHPInG665nnInHTzSpIkJCTZ/+c2/P16h5/3fX/9/vq/d32e5zz2cs7aZ+27nu89w/Pc79ddh1VvVKNKfWaGf4f+bYC//JMEAAkAMBAAcgBAAABlc5bNmb4/i8akf+sk4n9JgxlXugJxJUn/Mzbpf8Ym/c/YpP8Zm/Q/Y5P+Z2zS/4xN+i9EhjYr39WyZdxN3v//f079T5Ll+p8h4D/aIf3/T6P/paOl/xmb9D9jk/5nbNL/jCy40gWIK0w+/xmb9F+IDO0Pf6e84dyVfqct27+wCSGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQ/w+c85cYAPhtfKXrEkIIIYQQQgghxB/Hv3ulKxBCCCGEEEIIIcT/PgQFGgwEkAkyQwJkgUS4CrJCNsgOOSAGV0NOuAZywbWQG/JAXsgH+aEAFIQQCCwwRFAICkMcroMicD0UhWJQHEqAg5JQCm6A0nAjlIGboCzcDOXgFigPFX4+Z7rboTLcAVXgTqgK1aA61IC7oCbcDbXgHqgN90IduA/qwv1QDx6A+tAAGsKD0AgegsbQBJpCM2gOLaDlZfKTc/y9/OehB7wAPaEXJEFv6AMvQl/oB/1hAAyEl2AQvAyD4RUYAkNhGLwKw+E1GAGvw0gYBaPhDRgDY2EcjIcJMBGS4U2YBG/BZHj7oWwwFabBdJgBM2EWvAOzYQ7MhXdhHsyHBZCcZREshiXwHiyF9yEFPoBl8CGkwnJYASthFayGNbAW1sF62AAbYRNshi2wFbbBR7AddsBO2AW7YQ/shY9hH3wC++FTSMPP/sX8s7/Ph24ICKhQoUGDmTATJmACJmIiZsWsmB2zYwxjmBNzYi7MhbkxN+bFvJiE+bEgFkRCQkbGQlgI4xjHIlgEi2JRLI7F0aHDUlgKS+ONWAbLYFksi+WwHJbHClgBb8VbsRJWwspYGatgFayKVbE6Vse78C68G2thLayNtbEO1sG6WBfrYT2sj/WxITbERtgIG2NjbIpNsTk2x5bYElthK2yNrbEttsV22A7bY3vsgB2wI3bETtgJO2Nn7IJdsCt2xW74HD6Hz+Pz+AK+gL2wquqNfbAP9sW+2B8H4AB8CQfhy/gyvoJDcCgOw1fxVXwNR+AZHImjcDSOxkpqLI7D8chqIiZjMmaGSTgZJ+MUnIpTcTrOwJk4C2fhbJyDc/BdnIfzcT4uxIW4GJfgElyK72MKpuAyPIupuBxX4EpchatxFa7FdbgWN+BG3ICbcTNuxa34EX6EO3AH7sJduAf34Mf4MX6Cn+AQTMM0PIAH8CAexEN4CA/jYTyCR/AoHsVjeAyP43E8gSfxFJ7E03gaz+BZPAcA5/E8XsALeBEvpn/4VTqjjMqkMqkElaASVaLKqrKq7Cq7iqmYyqlyqlwql8qtcqu8Kq/Kr/KrgqqgIkWKVaQKqUIqruKqiCqiiqqiqrgqrpxyqpQqpUqr0qqMKqPKqptVOXWLKq8qqDbuVnWrqqTausrqDlVFVVFVVTVVXdVQNVRNVVPVUrVUbVVb1VF1VF11v6qnemN/bKDSO9NIDcXGahg2Vc1Uc9VCvYYPq1ZqBLZWbVRb9agahSOxvWrlOqgnVEc1Djupp9R4fFp1UROxq3pWdVPPqe7qedVDtXY9VS81BXurPmo69lX9VH81QM3Gaiq9Y9XVK+r5zEPVMPWqWoyvqRHqdTVSjVKj1RtqjBqrxqnxaoKaqJLVm2qSektNVm+rKWqqmqamqxlqppql3lGz1Rw1V72r5qn5aoFaqBapxWqJek8tVe+rFPWBWqY+VKlquVqhVqpVarVao9aqdWq92qA2qk1qs9qitqpt6iO1Xe1QO9UutVvtUXvVx2qf+kTtV5+qNPWZOqD+og6qz9Uh9YU6rL5UR9RX6qj6Wh1T36jj6lt1Qp1Up9R36rT6Xp1RZ9U59YM6r35UF9RP6qLyCjRqpbU2OtCZdGadoLPoRH2Vzqqz6ew6h47pq3VOfY3Opa/VuXUendfk0/l1AV1Qh5q01awjXUgX1nF9nS6ir9dFdTFdXJfQTpfUpfQNurS+UZfRN+my+mZdTt+iy+sKuqIHfZuupG/XlfUduoq+U1fV1XR1XUPfpWvqu3UtfY+ure/VdfR9uq6+X9fTD+j6uoFuqB/UjfRDurFuopvqZrq5bqFb6od1K/2Ibq3b6Lb6Ud1OP6bb68d1B/2E7qif1J30U7qzflp30c/orvpZ3U0/p7vrn/RF7XVP3Usn6d66j35R99X9dH89QA/UL+lB+mU9WL+ih+iheph+VQ/Xr+kR+nU9Uo/So/Ubeoweq8fp8XqCnqiT9Zt6kn5LT9Zv6yl6qp6mp+sZeqbu/+tMc/+J/Lf+Tv7gn8++VW/TH+nteofeqXfp3XqP3qv36n16n96v9+s0naYP6AP6oD6oD+lD+rA+rI/oI/qoPqqP6WP6uD6uT+iT+gf9nT6tv9dn9Fl9Vv+gz+vz+sKvPwMwaJTRxpjAZDKZTYLJYhLNVSaryWaymxwmZq42Oc01Jpe51uQ2eUxek8/kNwVMQRMaMtawiUwhU9jEzXWmiLneFDXFTHFTwjhT0pQyN/yP8y9XX0vT0rQyrUxr09q0NW1NO9POtDftTQfTwXQ0HU0n08l0Np1NF9PFdDVdTTfTzXQ33U0P08P0ND1NkkkyfcyLpq/pZ/qbAWageckMMoPMYDPYDDFDzDAzzAw3w80IM8KMNCPNaDPajDFjzDgzzkwwE0yyz2EmmUlmsplsppgpZtrAHGaGmWFmmVlmtplt5pq5Zp6ZZxaYBWaRWWSWmCVmqVlqUkyKWWaWmVSz3Cw3K81Ks9qsNmvNWrPerDcbzUaz2Ww2qWab2Wa2m+1mp9lpdpvdZq/Za/aZfWa/2W/STJo5YA6Yg+agOWQOmcPmsDlijpij5qg5Zo6Z4+a4OWFOmFPmlDltTpsz5ow5Z86Z8+a8uWAumIvmYvptX6ACFZjABJmCTEFCkBAkBolB1iBrkD3IHsSCWJAzyBnkCq4Ncgd5grxBviB/UCAoGIQBBTbgIAoKBYWDeHBdUCS4PigaFAuKByUCF5QMSgU3BKWDG4MywU1B2eDmoFxwS1A+qBBUDG4NbgsqBbcHlYM7girBnUHVoFpQPagR3BXUDO4OagX3BLWDe4M6wX1B3eD+oF7wQFA/aBA0DB4MGgUPBY2DJkHToFnQPGgRtPxD5/f+TJ5HXM+wV5gU9g77hC+GfcN+Yf9wQDgwfCkcFL4cDg5fCYeEQ8Nh4avh8PC1cET4ejgyHBWODt8Ix4Rjw3Hh+HBCODFMDt8MJ4VvhZPDt8Mp4dRwWjA9nBHODGeF74Szwznh3PDdcF44P1wQLgwXhYtD/OWWGFLCD8Jl4Ydharg8XBGuDFeFq8M14dpwXbg+3BBuDDeFm8sO+uXQcHu4I9wZ7gp3h3vCveHH4b7wk3B/+GmYFn4WHgj/Eh4MPw8PhV+Eh8MvwyPhV+HR8OvwWPhNeDz8NjwRngxPhd+Fp8PvwzPh2fBc+EN4PvwxvBD+FF4MffrNffrlnQwZykSZKIESKJESKStlpeyUnWIUo5yUk3JRLspNuSkv5aX8lJ8KUkFKx8RUiApRnOJUhIpQUSpKxak4OXJUikpRaSpNZagMlaWyVI7KUXkqTxWpIt1Gt9HtdDvdQXfQnXQnVaNqVINqUE2qSbWoFtWm2lSH6lBdqkv1qB7Vp/rUkBpSI2pEjakxNaWm1JyaU0tqSa2oFbWm1tSW2lI7akftqT11oA7UkTpSJ+pEnakzdaEu1JW6UjfqRt2pO/WgHtSTelISJVEf6kN9qS/1p/40kAbSIBpEg2kwDaEhNIyG0XAaTiNoBI2kUTSa3qAxNJbG0XiaQBMpmZJpEk2iyTSZptAUmkbTaAbNoFk0i2bTbJpLc2kezaMFtIAW0SJaQktoKS2lFEqhZbSMUimVVtAKWkWraA2toXW0jjbQBtpEm2gLbaFttI2203baSTtpN+2mvbSX9tE+2k/7KY3S6AAdoIN0kA7RITpMh+kIHaGjdJSO0TE6TsfpBJ2gU3SKTtNpOkNn6Bydo/P0I12gn+gieUqwWWyivcpmtdlsdpvD/nWc1+az+W0BW9CGNrfN87uYrLVFbTFb3Jawzpa0pewNfxOXtxVsRXurvc1Wsrfbyra8zQL/Na5p77a17D22tr3X1rB3/S6uY++zde1Dtp5tYuvbZrahbWEb2YdsY9vENrXNbHPbwrazj9n29nHbwT5hO9on/yZeat+36+x6u8FutPvsJ/ac/cEetV/b8/ZH29P2sgPtS3aQfdkOtq/YIXbo72MAO9q+YcfYsXacHW8n2Il/E0+z0+0MO9POsu/Y2XbO38RL7Ht2nk2xC+xCu8gu/jlOrynFfmCX2Q9tql1uV9iVdpVdbdfYtf+31pV2s91it9q99mO73e6wO+0uu9vu+TlOX8d++6lNs5/ZI/Yre9B+bg/ZY/aw/fLnOH19x+w39rj91p6wJ+0p+509bb+3Z+zZn9efvvbv7E/2ovUWGFmxZsMBZ+LMnMBZOJGv4qycjbNzDo7x1ZyTr+FcfC3n5jycl/Nxfi7ABTlkYsvMERfiwhzn67gIX89FuRgX5xLsuCSX4hu4NN/IZfgmLss3czm+hctzBa7It/JtXIlv58p8B1fhO7kqV+PqXIPv4pp8N9fie7g238t1+D6uy/dzPX6A63MDbsgPciN+iBtzE27Kzbg5t+CW/DC34ke4Nbfhtvwot+PHuD0/zh34Ce7IT3Infoo789PchZ/hrvwsd+PnuDs/zz34Be7JvTiJe3MffpH7cj/uzwN4IL/Eg/hlHsyv8BAeysP4VR7Or/EIfp1H8igezW/wGB7L43g8T+CJnMxv8iR+iyfz2zyFp/I0ns4zeCbP4nd4Ns/hufwuz+P5vIAX8iJezEv4PV7K73MKf8DL+ENO5eW8glfyKl7Na3gtr+P1vIE38ibezFt4K2/jj3g77+CdvIt38x7eyx/zPv6E9/OnnMaf8QH+Cx/kz/kQf8GH+Us+wl/xUf6aj/E3fJy/5RN8kk/xd3yav+czfJbP8Q98nn/kC/wTX2TPEGGkIh2ZKIgyRZmjhChLlBhdFWWNskXZoxxRLLo6yhldE+WKro1yR3mivFG+KH9UICoYhRFFNuIoigpFhaN4dF1UJLo+KhoVi4pHJSIXlYxKRTdEpaMbozLRTVHZ6OaoXHRLVD6qEFWMbo1uiypFt0eVozuiKtGdUdWoWlQ9qhHdFdWM7o5qRfdEtaN7ozLRfVHd6P6oXvRAVD9qEDWMHowaRQ9FjaMmUdOoWdQ8ahG1jB6OWkWPRK2jNlHb6NGoXfRY1D56POoQPRF1jJ68tL9Y8MvV9K/2J0W9I/3rG7J79KL44viS+HvxpfH34ynxD+LL4h/GU+PL4yviK+Or4qvja+Jr4+vi6+Mb4hvjm+Kb41viW+Pe18gMDtMfhMG4wGVymV2Cy+IS3VUuq8vmsrscLuaudjndNS6Xu9bldnlcXpfP5XcFXEEXOnLWsYtcIVfYxd11roi73hV1xVxxV8I5V9KVci1cS9fStXKPuNaujWvrHnWPusfcY+7xhF8Ld53cU66ze9p1cc+4Z9yzrpt7znV3z7se7gXX0/VySS7J9XF9XF/X1/V3/d1AN9ANcoPcYDfYDXFD3DA3zA13w90IN8KNdCPdaDfajXFj3Dg3zk1wE1yyS3aT3CQ32U12U9wUN81NczPcDDfLzXKz3Ww3181189w8t8AtcIvcIrfELXFL3VKX4lLcMrfMpbpUt8KtcKvcKrfGrXHr3Dq3wW1wm9wmt8VtcdvcNrfdbXc73U632+12e91et8/tc/vdfpfm0twBd8AddAfdIfeFO+y+dEfcV+6o+9odc9+44+5bd8KddKec16fd9+6MO+vOuR/cefeju+B+chedd8mxN2OTYm/FJsfejk2JTY1Ni02PzYjNjM2KvRObHZsTmxt7NzYvNj+2ILYwtii2OLYk9l5saez9WErsg9iy2Iex1Njy2IrYytiq2OqY9wW2R76QL+zj/jpfxF/vi/pivrgv4Z0v6Uv5G3xpf6Mv42/yZf3Nvpy/xZf3FXxF38Q39c18c9/Ct/QP+1b+Ed/at/Ft/aO+nX/Mt/eP+w7+Cd/RP+k7+ad8Z/+07+Kf8V39s/N/7bLv4V/wPX0vn+R7+z7+Rd/X9/P9/QA/0L/kB/mX/WD/ih/ih/ph/lU/3L/mR/jX/Ug/yo/2b/gxfqwf58f7CX6iT/Zv+kn+LT/Zv+2n+Kl+mp/uZ/iZfpZ/x8/2c/xc/66f5+f7BX6hX+QX+yX+Pb/Uv+9T/Ad+mf/Qp/rlfoVf6Vf51X6NX+vX+fV+g9/oN/nNfovf6rf5j/x2v8Pv9Lv8br/H7/Uf+33+E7/ff+rT/Gf+gP+LP+g/94f8F/6w/9If8V/5o/5rf8x/44/7b/0Jf9Kf8t/50/57f8af9ef8D/68/9Ff8D/5i/I3a0IIIYQQ/xR9mf29/87/qV+3dH0AINuOfIf/es5NuX8Z91P7OsYA4IleXRv8tjVokJSU9OuxqRqCwgsBIHYp/+fvH/g1Xg5t4THoAG2g9N+tr5+q+PN93383f/xmgESALL/lpD8eJcJfz3/jP5i/yXt8ufkXAhQtfCkn/US/xZfmL/MP5t/T7jLzZ/k8GaD1f8nJCpfiS/OXgkfgSejwuyOFEEIIIYQQQohf9FPnu13u+Tb9+Ty/uZSTGS7Fl3s+v4zKf8QahBBCCCGEEEII8d97+rnujz/coUObzv/Jg8x/jjL+BAMEgD9BGTL48w+u9G8mIYQQQgghxB/t0k3/la5ECCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYTIuP79bwhT//TBV3qNQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghxJX2fwIAAP//5g1V0w==") mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000f40), &(0x7f0000000f00)='.\x00', 0x1a4a438, &(0x7f0000000100)=ANY=[@ANYRES64=0x0, @ANYRES16, @ANYRES8=0x0, @ANYRES64], 0xb, 0x0, &(0x7f0000000000)) mmap(&(0x7f0000685000/0x2000)=nil, 0x2000, 0x8, 0x13, 0xffffffffffffffff, 0x47ac2000) 5.781332364s ago: executing program 0 (id=2830): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080000000100000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000e0d00cf8f700000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() sched_setaffinity(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) pselect6(0x2a, 0x0, 0x0, &(0x7f0000000400)={0x1, 0x5, 0xffffffff, 0x3fefd, 0x80000001, 0x8, 0x4, 0x5e5e}, &(0x7f0000000480), &(0x7f0000000500)={&(0x7f00000004c0)={[0x4dd]}, 0x8}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) mmap(&(0x7f0000685000/0x2000)=nil, 0x2000, 0x8, 0x13, 0xffffffffffffffff, 0x47ac2000) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000001, 0x32, 0xffffffffffffffff, 0x0) 5.780746054s ago: executing program 1 (id=2831): r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f00000000c0)='netlink_extack\x00', r1}, 0x10) (async) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="38000000540001f925bd70010000000007000000", @ANYRES32=r3, @ANYBLOB="20000100", @ANYRES32=r3, @ANYBLOB="000002000000000000000000000000000000000108000000"], 0x38}}, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000030c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x0, 0x7fffffff}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) (async) r5 = socket(0x2a, 0x6, 0x0) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'veth0_to_bond\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4400000010000104000000040000000000000000", @ANYRES32=r6, @ANYRES32=0x0], 0x44}}, 0x0) prlimit64(0x0, 0x1, &(0x7f0000000140)={0x6, 0x40000000000018b}, 0x0) (async) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x2010, 0xffffffffffffffff, 0x0) (async) socket$xdp(0x2c, 0x3, 0x0) (async) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000480)='./file0\x00', 0x214004, &(0x7f0000000a00)=ANY=[@ANYRES32=0x0, @ANYRES16=0x0, @ANYBLOB="f04618276b308181b63ff9fa7f2d5a308862ccfccdecb86a6ce5f21e7de58aa0bda6c402eee9dacf6e", @ANYRES64=r3, @ANYBLOB="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", @ANYRES8], 0x4, 0x2eb, &(0x7f00000004c0)="$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") (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) (async) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) (async) recvmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x400034f, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x3000) (async) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 5.780289794s ago: executing program 2 (id=2832): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x1, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a00)={&(0x7f0000000d00)='sched_switch\x00', r0}, 0x10) io_setup(0x8, &(0x7f0000004200)=0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/netstat\x00') io_submit(r4, 0x1, &(0x7f0000004540)=[&(0x7f0000004280)={0x0, 0x0, 0x0, 0x5, 0x0, r5, 0x0}]) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f0000000280)=0x1, 0x4) setsockopt$inet6_udp_int(r6, 0x11, 0x66, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000740)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xc000, &(0x7f00000006c0), 0x2, 0x246, &(0x7f0000000ac0)="$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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x35) pwrite64(r8, &(0x7f0000000140)='2', 0xfdef, 0xfecc) r9 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x4000000000000, 0x40, &(0x7f00000019c0)=@raw={'raw\x00', 0x4001, 0x3, 0xa38, 0x0, 0xb, 0x148, 0x0, 0x148, 0x9a0, 0x240, 0x240, 0x9a0, 0x215, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth0\x00', {}, {}, 0x11}, 0x2e8, 0x880, 0x8e8, 0x0, {0xff0f000000000000}, [@common=@inet=@udp={{0x30}}, @common=@unspec=@u32={{0x7e0}, {[], 0x1}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}, {{@ip={@broadcast, @broadcast, 0x0, 0x0, 'team0\x00', 'netpci0\x00'}, 0xec010000, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0xa98) sendfile(r7, r7, 0x0, 0x800000009) bind$inet6(r6, &(0x7f0000000000)={0xa, 0xe22, 0x5, @empty}, 0x1c) 5.779422234s ago: executing program 4 (id=2833): syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x2209052, &(0x7f00000000c0), 0x1, 0x3f7, &(0x7f0000000e00)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143042, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) getresuid(&(0x7f0000000340)=0x0, &(0x7f0000000380), &(0x7f0000000440)) getresgid(&(0x7f0000000540), &(0x7f0000000580)=0x0, &(0x7f00000005c0)) r3 = geteuid() lstat(&(0x7f0000000640)='./file0/../file0\x00', &(0x7f0000001300)) statx(r0, &(0x7f00000006c0)='./file0\x00', 0x0, 0x200, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300), 0x80, &(0x7f0000001440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@fowner_eq={'fowner', 0x3d, r3}}, {@subj_role={'subj_role', 0x3d, 'kmem_cache_free\x00'}}, {@euid_eq={'euid', 0x3d, r4}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@smackfsfloor}, {@smackfsdef={'smackfsdef', 0x3d, ',#'}}]}}) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000680)='ext4_unlink_enter\x00'}, 0x18) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000ffdbdf251e0000000c00060003000001030000000c000600000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="0c0006000100000001000000"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x20004014) syz_emit_ethernet(0x66, &(0x7f0000001380)=ANY=[@ANYBLOB="bbbbbbbbbbbbbbbbbbbbbbbb86dd60003a0400303afffe808d000000000000000000000000bbff0200000000000000000000000000013525293fcf196cf8ae2a515158c255e907fc52e445cd0c103042cdf39d9e39d0a72139b59b733122337b528c97793557d8973ac37d835e3dcd867ffb68109bae409f0061eb023030b40b4bf1b270984dbebc6276bca5e893455e8d2071db54fca93556ed8468c4e5a03e027716f75215f509e82e37b9fa97dd3907e9abb09dd9ab23"], 0x0) r5 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) connect$unix(r6, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) syz_mount_image$ext4(&(0x7f0000000880)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000003c0), 0xfe, 0x52a, &(0x7f00000008c0)="$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") keyctl$KEYCTL_MOVE(0x4, 0x0, 0x0, 0x0, 0x0) 3.962898931s ago: executing program 0 (id=2834): r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000002040), &(0x7f0000002080)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0], 0x3e, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'veth1_virt_wifi\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) syz_emit_ethernet(0xfdef, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x8e0, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x33, 0x0, @private, @broadcast}, {0x0, 0x0, 0x8}}}}}, 0x0) 3.962564531s ago: executing program 1 (id=2835): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f1e7f2aa3d9b18ed81c0c869b51ec6c0af4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289e01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cf84ded40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c86e00f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb0767192302000000b0eea24492a660583eecb42cbcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec231fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca005ace1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b00002b435ac15fc0288d9b2a169cdcacc413038dafb7a2c8cb482bac0ac502d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4abacac95900fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb2366fde41f94290c2a5ff870ce41fd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f76161d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2ae582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe895012f1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3546c1c776da64fb5abee0acfd235f2f4632c9062ece84c99a061887a20639b41c8c12ee86c50804042b3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f45f90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff0700000000cc9d8046c216c1f895778cb25122a2a9f9b444aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c3405000000000000003871c5f99b355b72d538ba4958ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250ddc8674152f94e3a409e2a3bce109b60000000000000000d6d5210d7503000000a87a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e873f8703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e6c257a45319f18101288d139bd3da20fed05a8fe64680b0a3fc22dd70400000000946912d6c98cd1a9fbe1e7d58c08acaf30235b918a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009556237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854352cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466a53f1c96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a42010082008df75cf43f8ecc8d37261774cc5a3bf6b466cb72812da518ff602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945ecefa26b8471d42645288d7226bbd9ccd628ab84875f2c50ba891cea592b0430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed0254a83100000000f6fbb869604d50a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b0fdf9743af932cd6db49a47613808bad959710300000000000000832d0a45fa4242e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd7a4d67ff2a49c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4e064c98e494198276eb2df7766411bef0ebb5000000000006065d635b0b7a00ee767221d8af9753387e0cd8d718f54a29df6eba3bd4c440e6e2172e3fcc01b8babb757b5c59217b80d0db3ba582814a604e4ef7a803e9ca7c85b35c9b93a9e0885e238b44ae1c2e64cce3b27083b8246829e64056000302bffff15405bd5f2eba20000000000000000000000000000000000009a9823fd8fbc5aa165099c5ed032b48ea12d8e0588dc52702e4084913a06d468d0928bad76d697e1f85ab030e788d38788ee5b5428d4a971cc97db9fd231088e570735ce129e7e77fc2777692664a1488fd8d6dff4dad618fd54f529d4555c6507009ee69dd1bc55258789b24052137e9637f3efbab71720f88c3c44b3b7486f979e8a31b16ac5fb73fe0e5239c000be2733c49546f6e8a9175ec6f14dbf72cac91643b2fd99c29eca28a3c2e60d5e5b8795fae16a7c3ea57e728eca35eaf0155a39f97580e079175426c088a0208040982a0000000000000000000000000051ceaaf0159fe61f2eade7603d0a7a56fb09cd119ac06adb6597155ae47846892bb423c024d8cbe9240b71ec6dc2124d3a19e2d714b273d95d1d3aa737cb04a33615ff2a730e51067d5d675d7122361c37c61a43b5afd865b60d4cae891b73220f17d25985a7f76834995e53a93a1c7b9eef267df691ca983a0b15bda7f6c5c1ca7aa50261a3089a1ebf0734c9b07e8951ff023263ad5aed8cfb49b49e128c697724c057d22c5df5aef27ce3db11d5ad5527d149d076e1a87e2df27c0cb8a67ad026bf953f88f10447e125c2c0f1aebee1f3390a9e3ddad4e2a6e0f6e4569fdefa19e870e04acf9493b963f98e23cfc665e4f465fa3f801e1957c399e45f61d3459b1c606204368bb931345af2823c487d2fd99db6ea6e008e7ffa06ca861551189d155bd077a79fe2c7e961352e56824f727d21d41eae78bfec4a2d7a7edbc8ef958c5ea599f7c25bf71c2340558aa12fdd24a88aaad5921aee7dae6a2f3009d9cb43ab4898d0f0aa565431b6abe585d75db04d1c9ba0b9de4ae8b0d3132bc6810cc9a693979f55174a5fe1df9fdef35bc470f9e6e591982757f45c52c645d891bf63bb21fb66926ebe1a8525611fc3e8bb8795c36dc2a86b5ab46ff33cc74f61751b2dae92676db85c8d0c721b7ea4544bf51c95c86fcac1f434d09d1ee4928aafe23de66fed972e0dddfb33f64e48701b049239e7f552d816441d11c4c2647c014462344359198d97c4b6e9ed31ca18987b64de079b2bed641e8a92f13ca70844c65cb423d01950b0ebf44bd28e09c05d9ae5dd689fb880fb18d042219f5ac60c3a03b085abf3e8e3efc842a8d328733461f04c99607061c65ed14c61322a5ac2d371a95b8ad867ec92d13a4fa4ae033a09673866cd77f4bcdaaa05207166b19a8758d8855400d8c6a7242dc207251e8797eca24ea4f487663e60f2f5e1f1424958fd148f846830e88a42d93e1fe9c0b4a4a268921738938aa9f3cb3811ac87c54c8ebc8bcfb4613cc3a997ff1579edbd4ade8020e3ad001b072b1a751b588ac4639f35a58e00a50c0270608c7a7f10132b1c25b9d66ebbc8bab4ea81232fbef665f6212f875b2a00000000000000aceb111b66a500ca52fd8f848088c67ee65dfdcc4c580e9bc18c1699dca07d019bf1bf9dd3da480d6c155d7e60674ce88ab5ae07a9d16e22792d99986b531ab4e592ab5925da779e700cf20309a2137877690dc5c07956fc82d7b3bb46d3138041af18508938c9be4e5d0a98073463a5cff6c146d020743da474cb81677a6f389f0e00c33b70b7f8bab95435c27167f365a29fb09cbf35bf192f6a65616fa2ad9a6c7ca3a3ecd96aaecd993e8badb40e7eb8a22b0015e70c885cd519e28448168c6d914265998bff74ea1b0e651a6cae9419096248a0e41573827ad60fafce6e6540734c1f23f75337d836c31497e8112969a039d65aa297e2b046b5f4d11116a89f9f65693d4dc3e70fbfe0b2044fdb3f87e887d1daae8e38a0c19f668f776e19a02bb2449ee4384f6536879c85d7e41bc0276ee2b125d41ff358323311703ec01d64a573bdeb75bdcc87d01de38365ab9222713d2d1640a742d62fefb5403b2ed9969c32a0841e8c36b0107bb888eb14ac62e6d4bdfaeb9ee7436b97bf3825a19d6c8997ce285edf1d277ed703f560460417bfe702af833e83c5b987befb6d1fcf765ab7ea537d9dafb622a1ba8686cb9b1c63b84470364942e90d1cf856cead864f5e38c83b9ed86cc5725a20299ce512b165"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = epoll_create1(0x80000) r2 = socket(0x1, 0x80802, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x2, r2, 0x0) syz_usb_connect(0x0, 0x36, &(0x7f0000000300)=ANY=[], 0x0) 3.961680641s ago: executing program 2 (id=2836): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x1, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a00)={&(0x7f0000000d00)='sched_switch\x00', r0}, 0x10) io_setup(0x8, &(0x7f0000004200)=0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/netstat\x00') io_submit(r4, 0x1, &(0x7f0000004540)=[&(0x7f0000004280)={0x0, 0x0, 0x0, 0x5, 0x0, r5, 0x0}]) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f0000000280)=0x1, 0x4) setsockopt$inet6_udp_int(r6, 0x11, 0x66, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000740)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xc000, &(0x7f00000006c0), 0x2, 0x246, &(0x7f0000000ac0)="$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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r7 = open(0x0, 0x145142, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x35) pwrite64(r8, &(0x7f0000000140)='2', 0xfdef, 0xfecc) r9 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x4000000000000, 0x40, &(0x7f00000019c0)=@raw={'raw\x00', 0x4001, 0x3, 0xa38, 0x0, 0xb, 0x148, 0x0, 0x148, 0x9a0, 0x240, 0x240, 0x9a0, 0x215, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth0\x00', {}, {}, 0x11}, 0x2e8, 0x880, 0x8e8, 0x0, {0xff0f000000000000}, [@common=@inet=@udp={{0x30}}, @common=@unspec=@u32={{0x7e0}, {[], 0x1}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}, {{@ip={@broadcast, @broadcast, 0x0, 0x0, 'team0\x00', 'netpci0\x00'}, 0xec010000, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0xa98) sendfile(r7, r7, 0x0, 0x800000009) bind$inet6(r6, &(0x7f0000000000)={0xa, 0xe22, 0x5, @empty}, 0x1c) 3.961145131s ago: executing program 4 (id=2837): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000002c0)=@newlink={0x4c, 0x10, 0x403, 0x2, 0x0, {0x0, 0x0, 0x4, 0x0, 0x300}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_ROUTER={0x5, 0x16, 0x1}, @IFLA_BR_AGEING_TIME={0x8, 0x4, 0x101}, @IFLA_BR_MCAST_STATS_ENABLED={0x5}]}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x8044) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x20042, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup(r4) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x2) sendmsg$AUDIT_GET_FEATURE(r5, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x10, 0x3fb, 0x400, 0x70bd29, 0x25dfdbfc, "", ["", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4}, 0x44) 3.933543511s ago: executing program 0 (id=2838): r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000002040), &(0x7f0000002080)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0], 0x3e, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x2d) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r7, &(0x7f0000000180), 0x400008a, 0x0) openat$sysfs(0xffffffffffffff9c, 0x0, 0x101a02, 0x0) socket$nl_route(0x10, 0x3, 0x0) unshare(0x44040000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'veth1_virt_wifi\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) syz_emit_ethernet(0xfdef, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x33, 0x0, @private, @broadcast}, {0x0, 0x0, 0x8}}}}}, 0x0) 2.01331658s ago: executing program 0 (id=2839): r0 = socket$inet6(0xa, 0x2, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000)=0x2000000, 0x0) timer_settime(0x0, 0x1, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='\v\x00\x00\x00\b\x00\x00\x00'], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0xe, 0x0, 0x7ffc1ffb}]}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000000e00)=@newtaction={0x488, 0x30, 0x12f, 0x3c, 0x0, {}, [{0x474, 0x1, [@m_police={0x470, 0x1, 0x0, 0x0, {{0xb}, {0x444, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xa4f, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x10, 0xfffffffd, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x5, 0x8000000, 0x0, 0x0, 0x11, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x100000, 0xb2e4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x2, 0x934, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x10000000, 0x0, 0x7, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa000, 0x0, 0x0, 0x7, 0x3, 0x8, 0xffffffff, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xffff3bac, 0xd, 0x2, 0x2000, 0x3, 0x0, 0x3, 0x0, 0xffffffd1, 0x480000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a3, 0x0, 0x6, 0x7ff, 0x4, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x713b, 0x0, 0x0, 0x0, 0xffff, 0x1000000, 0xffffffff, 0x2, 0xfffffffd, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce2, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x2000000, 0xfffffff9, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x10000000, 0x7, 0xff, 0x0, 0x7]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x1, 0x0, 0x0, 0x0, {0x3, 0x0, 0x0, 0x0, 0x3, 0xffffc3fd}, {0x0, 0xf6c5d7a4e5a498ca, 0x1000, 0x8}}}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa, {0x0, 0x3}}}}]}]}, 0x488}, 0x1, 0x0, 0x0, 0x4044840}, 0x44004) accept(r0, &(0x7f0000000380)=@in={0x2, 0x0, @empty}, &(0x7f0000000080)=0x80) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) 2.01291297s ago: executing program 1 (id=2840): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080200000100000000000000", @ANYRES32, @ANYBLOB], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) fsopen(0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x80540, 0x188) syz_clone(0x25000000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) read$hiddev(r5, &(0x7f0000000080)=""/39, 0x27) r6 = fsopen(&(0x7f0000000100)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r6, 0x6, 0x0, 0x0, 0x0) r7 = fsmount(r6, 0x0, 0x1) fchdir(r7) 2.01222743s ago: executing program 2 (id=2841): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r1, 0x0, 0x31, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000300)='neigh_update\x00', r2}, 0x18) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, &(0x7f0000000580)={[{@resgid}, {@noauto_da_alloc}, {@dioread_nolock}, {@test_dummy_encryption}, {@nobarrier}, {@nodelalloc}, {@minixdf}, {@init_itable}]}, 0x1, 0xbb3, &(0x7f00000017c0)="$eJzs3M9rHOUbAPBnJj/b5vvdVESsl0ZEWhC3aSXFFsFWKl48CHoVGtJNCdn+IInUpDls9B8Q9Sx4EdSi9GDPvSh49aL1avEgFImNgohGZn8ksdlN0nSTaZvPB97M++4zs+/z7LA785bdBrBjDWR/0oh9EXE6iSjUH08jorva642o1PZbmJ8d+WN+diSJxcXXf00iiYjb87MjjedK6ts99UFvRHz3UhKPvLt63snpmfHhcrk0UR8fmjp38dDk9MyzY+eGz5bOls4fPvr80JGho4PHhtpW658/nbj2+5Ov/Fz567O/r/z2wSdJnIi+emxlHe0yEANLr8lKnREx3O7JctJRr2dlnUnnOgelW5wUAAAtpSvu4R6LQnTE8s1bIb7+PtfkAAAAgLZY7IhYBAAAAB5yyfrr/+o/FAAAAAAPqsb3AG7Pz440Wq5fSNhmt05GRH+t/oV6q0U6o1Ld9kZXROy+ncTKn7UmtcPu2UBE3Pzx2JdZiy36HfJaKnMR8Xiz859U6++v/op7df1pRAy2Yf6BO8YPUv0n2jB/3vUDsDNdP1m7kK2+/qVL9z/R5PrX2eTatRl5X/8a938Lq+7/luvvaHH/99oG57j86UeXWsWy+l+49vIXjZbNn23vqai7cGsu4onOZvUnS/UnLeo/vcE5Cv9cKrWK5V3/4scRB6J5/Q3J2v8/0aHRsXJpsPa36Rxz3w593mr+vOvPzv/uFvWvd/4vbnCON0+dutoqtn796S/dyRvVXnf9kbeHp6YmDkd0J6+ufvzI2rk09mk8R1b/wafWfv83qz/7TKjUX4dsLTBX32bjd+6Y88Url79aq/5s7Zfn+T+zyfP/3gbnePqb9w+2iq1c/2Ytm/9mUlsLAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEBDGhF9kaTFpX6aFosReyLi0didli9MTj0zeuGt82eyWER/dKWjY+XSYEQUauMkGx+u9pfHR+4YPxcReyPiw8Ku6rg4cqF8Ju/iAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAWLInIvoiSYsRkUbEQiFNi8W8swIAAADarn+Tx/W0OQ8AAABg62x2/Q8AAAA8OKz/AQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA2GJ791+/kURE5fiuast012NduWYGbLU07wSA3HTknQCQm868EwByc5drfLcL8BBK1on3toz0tD0XAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAO5fB/Zdv5FEROX4rmrLdNdjXU2P2L+N2QFbKc07ASA3HWsFO7cvD2D7eYvDztV8jQ/sJMk68d7lfSr/jfRsWU4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3H/6qi1JixGRVvtpWixG/C8i+qMrGR0rlwYj4v8R8UOhqycb9+SdNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAG03OT0zPlwulyZ0dHTy7ST3Rxq1Tt6fTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA5GFyemZ8uFwuTUzmnQkAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACQt8npmfHhcrk0sYHO1bvZeUUn7xoBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMjPvwEAAP//kbEJ9g==") sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r6}, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7", @ANYRES32=r6, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x2008002, &(0x7f0000001780)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x7}}, {@nodiscard}, {@auto_da_alloc}]}, 0x1, 0x558, &(0x7f0000000680)="$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") bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000071123900000000009500000000000000410d5a538f0606ae05b9b78481dbf5f42f0f64ec6d31765d125c077b9005af5b3c7b1d0355d1db0e0786f3b61b90ed031cccae5b4ec4ec1e93dbb0d9a9c63cdba29fd41cee1fba5562e7367138c333ba61f1947ffca82396198b2a3bfb37ab085b9c094e99e7a174196dbefa6b2df853d464ea2a6962e95af269a6c64b2b8b4ca4acf21186ca07454e84bc05ea7807501a66e7719b27e15708bd16eb1c0c108b211532bca3b41f0118bf0a4523640a32d69b20636c5df2a2b8a706b28bd8ac3eb514b012"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) syz_mount_image$exfat(0x0, &(0x7f0000000180)='./bus\x00', 0x1004030, 0x0, 0xfb, 0x0, &(0x7f0000000000)) r8 = syz_open_dev$usbfs(&(0x7f0000000340), 0x74, 0x101341) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) ioctl$USBDEVFS_IOCTL(r8, 0x8008551c, &(0x7f0000000040)=@usbdevfs_driver={0xfff, 0x8, 0x0}) 2.01185323s ago: executing program 4 (id=2842): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x4, @void, @value}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_GET_TARGET(r0, &(0x7f00000000c0)={0x0, 0x3c, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x4}, 0x14}}, 0x0) syz_genetlink_get_family_id$nfc(&(0x7f0000000140), r0) open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() open(0x0, 0x84902, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x18) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000034c0)=ANY=[@ANYBLOB="020e0000100000000000000000000000030005000000000002000000ac1e000100000000000000"], 0x80}}, 0x4008844) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000001000000e27f000001000000"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000005700)={{r7, 0xffffffffffffffff}, &(0x7f0000005680), &(0x7f00000056c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r9, 0x890b, &(0x7f0000000000)={0x4000000, {0x2, 0x4e22}, {0x2, 0x0, @local}, {0x2, 0x0, @empty}, 0x170, 0x0, 0x0, 0x0, 0xfff8, 0x0, 0x0, 0x5}) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r10}, 0x10) 2.93462ms ago: executing program 0 (id=2843): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r1, 0x0, 0x31, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={0x0, r2}, 0x18) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, &(0x7f0000000580)={[{@resgid}, {@noauto_da_alloc}, {@dioread_nolock}, {@test_dummy_encryption}, {@nobarrier}, {@nodelalloc}, {@minixdf}, {@init_itable}]}, 0x1, 0xbb3, &(0x7f00000017c0)="$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") sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r4, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r5}, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb702000000000000182300", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x2008002, &(0x7f0000001780)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x7}}, {@nodiscard}, {@auto_da_alloc}]}, 0x1, 0x558, &(0x7f0000000680)="$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") bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000071123900000000009500000000000000410d5a538f0606ae05b9b78481dbf5f42f0f64ec6d31765d125c077b9005af5b3c7b1d0355d1db0e0786f3b61b90ed031cccae5b4ec4ec1e93dbb0d9a9c63cdba29fd41cee1fba5562e7367138c333ba61f1947ffca82396198b2a3bfb37ab085b9c094e99e7a174196dbefa6b2df853d464ea2a6962e95af269a6c64b2b8b4ca4acf21186ca07454e84bc05ea7807501a66e7719b27e15708bd16eb1c0c108b211532bca3b41f0118bf0a4523640a32d69b20636c5df2a2b8a706b28bd8ac3eb514b012"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r7 = syz_open_dev$usbfs(&(0x7f0000000340), 0x74, 0x101341) ioctl$USBDEVFS_IOCTL(r7, 0x8008551c, &(0x7f0000000040)=@usbdevfs_driver={0xfff, 0x8, 0x0}) 1.8358ms ago: executing program 1 (id=2844): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r1, 0x0, 0x31, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000300)='neigh_update\x00', r2}, 0x18) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, &(0x7f0000000580)={[{@resgid}, {@noauto_da_alloc}, {@dioread_nolock}, {@test_dummy_encryption}, {@nobarrier}, {@nodelalloc}, {@minixdf}, {@init_itable}]}, 0x1, 0xbb3, &(0x7f00000017c0)="$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") sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r6}, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7", @ANYRES32=r6, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x2008002, &(0x7f0000001780)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x7}}, {@nodiscard}, {@auto_da_alloc}]}, 0x1, 0x558, &(0x7f0000000680)="$eJzs3c9vI1cdAPDvTH52d9vsQg9QAbtAYUGrtTfedlX10nIBoaoSouKAOGxD4o3C2nGIndKESKR/A0ggcYI/gQMSB6SeOHDjiMQBEOWAVCACbZA4GM14kriJw5rEsdn485Fm58ebme979s6852dnXgBj60ZE7ETEdES8GRFzxfakmOLVzpTt92h3e3Fvd3sxiXb7jb8leXq2LbqOyVwuzjkbEV/9UsQ3k+Nxm5tbDxdqtep6sV5u1dfKzc2t2yv1heXqcnW1Urk3f+/OS3dfrAysrNfrP3v/iyuvfe2Xv/j4e7/Z+fx3s2xdKdK6yzFInaJPHcTJTEbEa+cRbAQmivn0iPPB6aQR8aGI+FR+/c/FRP6/EwC4yNrtuWjPda8DABddmveBJWkpItK0aASUOn14z8altNZotm49aGysLnX6yq7GVPpgpVa9c23md9/Od55KsvX5PC1Pz9crR9bvRsS1iPjBzFP5emmxUVsaTZMHAMbe5e76PyL+OZOmpVJfh/b4Vg8AeGLMjjoDAMDQqf8BYPyo/wFg/PRR/xdf9u+ce14AgOHw+R8Axo/6HwDGj/ofAMbKV15/PZvae8Xzr5fe2tx42Hjr9lK1+bBU31gsLTbW10rLjcZy/sye+uPOV2s01uZfiI23y61qs1Vubm7drzc2Vlv38+d6369ODaVUAMB/c+36u79NImLn5afyKbrGclBXw8WWDnAv4MkycZaDNRDgiWa0LxhffVXheSPh1+eeF2A0ej7Me7bn4gf96H8I4ndG8H/l5kf77/83xjNcLHr2YXydrv//lYHnAxi+U/f//2Gw+QCGr91Ojo75P32QBABcSGf4CV/7e4NqhAAj9bjBvAfy/T8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABcMFci4luRpKV8LPA0+zctlSKejoirMZU8WKlV70TEM3E9IqZmsvX5UWcaADij9C9JMf7XzbnnrxxNnU7+NZPPI+I7P37jh28vtFrr89n2vx9sn9kfPqxyeNwZxhUEAPr3p352yuvvSjHv+iD/aHd7cX86xzwe8/4XDgYfXdzb3c6nTspktNvtdsRs3pa49I8kJotjZiPiuYiYGED8nXci4iO9yp/kfSNXi5FPu+NHEfvpocZPPxA/zdM68+zl+/AA8gLj5t3s/vNqr+svjRv5vPf1P5vfoc4uv//NRuzf+/a64k8WkSZ6xM+u+Rv9xnjhV18+trE910l7J+K5yV7xk4P4yQnxn+8z/u8/9onvv3JCWvsnETejd/zuWOVWfa3c3Ny6vVJfWK4uV1crlXvz9+68dPfFSjnvoy7v91Qf99eXbz1zUt6y8l86IX7nnb98pPzTB8d+ps/y//Tfb37jk4erM0fjf+7Tvd//Z/N579c/qxM/22f8hUs/P3H47iz+0gnlf9z7f6vP+O/9eWupz10BgCFobm49XKjVqutnWsg+hQ7iPMcWsiz2t/N+c/FsQf8Y+cLhy5JEEoMuV9YY62fnqfN6Vc99YfKgrTjYM389O+OQi5MOvBSnWYirxcKjYQUd3T0JGI7Di37UOQEAAAAAAAAAAAAAAE4yjL9hGnUZAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAuLj+EwAA//8GP8IF") bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000071123900000000009500000000000000410d5a538f0606ae05b9b78481dbf5f42f0f64ec6d31765d125c077b9005af5b3c7b1d0355d1db0e0786f3b61b90ed031cccae5b4ec4ec1e93dbb0d9a9c63cdba29fd41cee1fba5562e7367138c333ba61f1947ffca82396198b2a3bfb37ab085b9c094e99e7a174196dbefa6b2df853d464ea2a6962e95af269a6c64b2b8b4ca4acf21186ca07454e84bc05ea7807501a66e7719b27e15708bd16eb1c0c108b211532bca3b41f0118bf0a4523640a32d69b20636c5df2a2b8a706b28bd8ac3eb514b012"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) syz_mount_image$exfat(0x0, &(0x7f0000000180)='./bus\x00', 0x1004030, 0x0, 0xfb, 0x0, &(0x7f0000000000)) r8 = syz_open_dev$usbfs(&(0x7f0000000340), 0x74, 0x101341) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) ioctl$USBDEVFS_IOCTL(r8, 0x8008551c, &(0x7f0000000040)=@usbdevfs_driver={0xfff, 0x8, 0x0}) 566.99µs ago: executing program 2 (id=2845): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x42000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)={0x18, 0x2, 0x1, 0x101, 0x0, 0x0, {0x7, 0x0, 0x7}, [@CTA_TUPLE_REPLY={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000000}, 0x4004000) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x5) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f0000000280), 0x3fffffffffffd17, 0x2, 0x0) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000200)='\'\x00') r6 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000005", @ANYBLOB, @ANYBLOB], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)=@o_path={0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f0000000280)={'batadv_slave_1\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000340)={0xffffffffffffffff, r7, 0x25, 0x8, @val=@netkit={@void, @value}}, 0x1c) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0xed) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r8}, 0x10) r9 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r9) 0s ago: executing program 4 (id=2846): syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x2209052, &(0x7f00000000c0), 0x1, 0x3f7, &(0x7f0000000e00)="$eJzs3U1vG0UfAPD/bt7atE+TSs+Bl4sFSERCJE3aApVAIuLCoT3RA0es2C1RnQYlRqJVxItA3EAC8QHgAHwEjnDgO8AZOEClCOVAys1o7V3HxHbapA6ukt9PGnlmZ+2Z9XjW68nsJIBjqxQRL0fESESci4ipfHuah3i/FbL9trc2lv7e2lhKotF47c8kknxb8VpJ/ngqf4GZNCL9KInHe5S7fuv2jXKtVl3L03P1lbfm1m/dfnZ5pXy9er16c+G58xcuXnzh0sLzAzvWzZXkk6e+ufzbZx9XPv/pj++ns/qezvM6j2NQSlFqvye7XRp0YUN2oiOejA6xIgAA7CnNr/1Hm9f/UzESOxdvU/Hpj0OtHAAAADAQjUbxCAAAABxdid/+AAAAcMQV8wC2tzaWijDE6Qj8xzYXI2K61f5389DKGW3f0zu26/7eQSpFxKsnrixkIQ7pPmwAAACA4+yHxdbCf93jf2k80rHfyYiYLNb2G6DSrnT3+E96Z8BF0mFzMeLFiLjbNf6XFrtMj+Sp/zWHCseSa8u16rmIOBMRMzE2kaXn9yjj3SdufNsvr3P878tfX5/Pys8ed/ZI74xO/Ps5lXK9/CDHzI7NDyIeG+3V/kl7zLdzncyDeGN5+6V+eVn7Z+1dhO725zA1vop4umf/31m5NNl7fda55vlgLj8rTHSX8cvprz/sV35n/89CVn7xtwAOX9b/J/du/+Y6ue31etf3X8Z3f135uV/evdu/9/l/PLnarOB4vu2dcr2+Nh8xnlzu3u7T1Fa8H8X7lbX/zJO9v/+L678k/+4/07E+9H688t7Zq/3y9P/hytq/sq/+v//Im5OPzvQr//76/4VmZYoXcf13b/fbQMOuJwAAAAAAAACDkTbn9iXpbDueprOzrXm+/4/JtLa6Xn/m2urbNyutOYDTMZYW8z+nOuaDzrduI2+nF3alz0fE2Yj4YupkMz27tFqrDPvgAQAA4Jg41ef3f+b3g9zsAQAAADycpoddAQAAAODQ+f0PAAAAR9qDrOtfq64V/yLogE8XETlYZCT/4D0s9Tl6kSGelAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACIfwIAAP//keS8Nw==") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143042, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) getresuid(&(0x7f0000000340)=0x0, &(0x7f0000000380), &(0x7f0000000440)) getresgid(&(0x7f0000000540), &(0x7f0000000580)=0x0, &(0x7f00000005c0)) r3 = geteuid() lstat(&(0x7f0000000640)='./file0/../file0\x00', &(0x7f0000001300)) statx(r0, &(0x7f00000006c0)='./file0\x00', 0x0, 0x200, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300), 0x80, &(0x7f0000001440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@fowner_eq={'fowner', 0x3d, r3}}, {@subj_role={'subj_role', 0x3d, 'kmem_cache_free\x00'}}, {@euid_eq={'euid', 0x3d, r4}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@smackfsfloor}, {@smackfsdef={'smackfsdef', 0x3d, ',#'}}]}}) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000680)='ext4_unlink_enter\x00'}, 0x18) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000ffdbdf251e0000000c00060003000001030000000c000600000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="0c0006000100000001000000"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x20004014) syz_emit_ethernet(0x66, &(0x7f0000001380)=ANY=[@ANYBLOB="bbbbbbbbbbbbbbbbbbbbbbbb86dd60003a0400303afffe808d000000000000000000000000bbff0200000000000000000000000000013525293fcf196cf8ae2a515158c255e907fc52e445cd0c103042cdf39d9e39d0a72139b59b733122337b528c97793557d8973ac37d835e3dcd867ffb68109bae409f0061eb023030b40b4bf1b270984dbebc6276bca5e893455e8d2071db54fca93556ed8468c4e5a03e027716f75215f509e82e37b9fa97dd3907e9abb09dd9ab23"], 0x0) r5 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) connect$unix(r6, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) syz_mount_image$ext4(&(0x7f0000000880)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000003c0), 0xfe, 0x52a, &(0x7f00000008c0)="$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") keyctl$KEYCTL_MOVE(0x4, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): r:fixed_disk_device_t tclass=blk_file permissive=0 [ 100.904353][ T1368] syz.2.327 (1368) used greatest stack depth: 21152 bytes left [ 100.911786][ T30] audit: type=1400 audit(1749986040.960:1467): avc: denied { prog_load } for pid=1372 comm="syz.3.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 100.932775][ T30] audit: type=1400 audit(1749986040.960:1468): avc: denied { prog_load } for pid=1372 comm="syz.3.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 100.958144][ T30] audit: type=1400 audit(1749986040.960:1469): avc: denied { prog_load } for pid=1372 comm="syz.3.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 100.978436][ T30] audit: type=1400 audit(1749986040.960:1470): avc: denied { prog_load } for pid=1372 comm="syz.3.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 100.998691][ T30] audit: type=1400 audit(1749986040.960:1471): avc: denied { map_create } for pid=1372 comm="syz.3.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 101.018639][ T30] audit: type=1400 audit(1749986040.960:1472): avc: denied { create } for pid=1372 comm="syz.3.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 101.040782][ T30] audit: type=1400 audit(1749986040.960:1473): avc: denied { create } for pid=1372 comm="syz.3.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 101.062982][ T30] audit: type=1400 audit(1749986040.980:1474): avc: denied { create } for pid=1375 comm="syz.2.330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 101.097572][ T30] audit: type=1400 audit(1749986040.980:1475): avc: denied { execmem } for pid=1375 comm="syz.2.330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 103.082843][ T1433] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=1433 comm=syz.2.351 [ 104.299397][ T1465] FAULT_INJECTION: forcing a failure. [ 104.299397][ T1465] name failslab, interval 1, probability 0, space 0, times 0 [ 104.338082][ T1465] CPU: 0 PID: 1465 Comm: syz.4.363 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 104.347956][ T1465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 104.358037][ T1465] Call Trace: [ 104.361346][ T1465] [ 104.364307][ T1465] __dump_stack+0x21/0x30 [ 104.368668][ T1465] dump_stack_lvl+0xee/0x150 [ 104.373284][ T1465] ? show_regs_print_info+0x20/0x20 [ 104.378504][ T1465] ? avc_has_perm_noaudit+0x2f4/0x460 [ 104.384206][ T1465] dump_stack+0x15/0x20 [ 104.388722][ T1465] should_fail+0x3c1/0x510 [ 104.393173][ T1465] __should_failslab+0xa4/0xe0 [ 104.398055][ T1465] should_failslab+0x9/0x20 [ 104.402573][ T1465] slab_pre_alloc_hook+0x3b/0xe0 [ 104.407519][ T1465] __kmalloc+0x6d/0x2c0 [ 104.411681][ T1465] ? kvmalloc_node+0x242/0x330 [ 104.416450][ T1465] kvmalloc_node+0x242/0x330 [ 104.421038][ T1465] ? vm_mmap+0xb0/0xb0 [ 104.425109][ T1465] alloc_netdev_mqs+0x8d/0xc90 [ 104.429878][ T1465] ? br_dev_xmit+0x1040/0x1040 [ 104.434658][ T1465] rtnl_create_link+0x2ef/0x9d0 [ 104.439523][ T1465] rtnl_newlink+0x103f/0x17b0 [ 104.444463][ T1465] ? rtnl_newlink+0x891/0x17b0 [ 104.449237][ T1465] ? rtnl_setlink+0x400/0x400 [ 104.453936][ T1465] ? __kernel_text_address+0xa0/0x100 [ 104.459350][ T1465] ? memcpy+0x56/0x70 [ 104.463352][ T1465] ? 0xffffffffa002c000 [ 104.467521][ T1465] ? __kasan_check_write+0x14/0x20 [ 104.472640][ T1465] ? wait_for_completion_killable_timeout+0x10/0x10 [ 104.479327][ T1465] ? ns_capable+0x8c/0xf0 [ 104.483657][ T1465] ? netlink_net_capable+0x125/0x160 [ 104.488950][ T1465] ? rtnl_setlink+0x400/0x400 [ 104.493724][ T1465] rtnetlink_rcv_msg+0x9e4/0xb90 [ 104.498674][ T1465] ? rtnetlink_bind+0x80/0x80 [ 104.503356][ T1465] ? memcpy+0x56/0x70 [ 104.507430][ T1465] ? avc_has_perm_noaudit+0x2f4/0x460 [ 104.512903][ T1465] ? arch_stack_walk+0xee/0x140 [ 104.517783][ T1465] ? avc_denied+0x1b0/0x1b0 [ 104.522300][ T1465] ? stack_trace_save+0x98/0xe0 [ 104.527158][ T1465] ? avc_has_perm+0x158/0x240 [ 104.531842][ T1465] ? avc_has_perm_noaudit+0x460/0x460 [ 104.537221][ T1465] ? x64_sys_call+0x4b/0x9a0 [ 104.542289][ T1465] ? selinux_nlmsg_lookup+0x400/0x4c0 [ 104.548101][ T1465] netlink_rcv_skb+0x1e0/0x430 [ 104.552899][ T1465] ? rtnetlink_bind+0x80/0x80 [ 104.557683][ T1465] ? netlink_ack+0xb60/0xb60 [ 104.562405][ T1465] ? __netlink_lookup+0x387/0x3b0 [ 104.567453][ T1465] rtnetlink_rcv+0x1c/0x20 [ 104.571889][ T1465] netlink_unicast+0x87c/0xa40 [ 104.576679][ T1465] netlink_sendmsg+0x86a/0xb70 [ 104.581542][ T1465] ? netlink_getsockopt+0x530/0x530 [ 104.586752][ T1465] ? security_socket_sendmsg+0x82/0xa0 [ 104.592227][ T1465] ? netlink_getsockopt+0x530/0x530 [ 104.597441][ T1465] ____sys_sendmsg+0x5a2/0x8c0 [ 104.602223][ T1465] ? __sys_sendmsg_sock+0x40/0x40 [ 104.607267][ T1465] ? import_iovec+0x7c/0xb0 [ 104.611796][ T1465] ___sys_sendmsg+0x1f0/0x260 [ 104.616477][ T1465] ? __sys_sendmsg+0x250/0x250 [ 104.621265][ T1465] ? __fdget+0x1a1/0x230 [ 104.625605][ T1465] __x64_sys_sendmsg+0x1e2/0x2a0 [ 104.630547][ T1465] ? ___sys_sendmsg+0x260/0x260 [ 104.635406][ T1465] ? ksys_write+0x1eb/0x240 [ 104.639922][ T1465] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 104.646002][ T1465] x64_sys_call+0x4b/0x9a0 [ 104.650428][ T1465] do_syscall_64+0x4c/0xa0 [ 104.654862][ T1465] ? clear_bhb_loop+0x50/0xa0 [ 104.659545][ T1465] ? clear_bhb_loop+0x50/0xa0 [ 104.664238][ T1465] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 104.670145][ T1465] RIP: 0033:0x7f06f4aec929 [ 104.674568][ T1465] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 104.694195][ T1465] RSP: 002b:00007f06f3155038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 104.702629][ T1465] RAX: ffffffffffffffda RBX: 00007f06f4d13fa0 RCX: 00007f06f4aec929 [ 104.710802][ T1465] RDX: 0000000000048000 RSI: 0000200000000080 RDI: 0000000000000003 [ 104.718888][ T1465] RBP: 00007f06f3155090 R08: 0000000000000000 R09: 0000000000000000 [ 104.726865][ T1465] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 104.734969][ T1465] R13: 0000000000000000 R14: 00007f06f4d13fa0 R15: 00007ffeefd7aef8 [ 104.743145][ T1465] [ 105.887577][ T30] kauditd_printk_skb: 313 callbacks suppressed [ 105.887595][ T30] audit: type=1400 audit(1749986045.940:1789): avc: denied { read write } for pid=281 comm="syz-executor" name="loop0" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 105.938123][ T30] audit: type=1400 audit(1749986045.990:1790): avc: denied { create } for pid=1499 comm="syz.0.375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 105.958443][ T30] audit: type=1400 audit(1749986045.990:1791): avc: denied { create } for pid=1499 comm="syz.0.375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 105.979898][ T30] audit: type=1400 audit(1749986046.000:1792): avc: denied { read write } for pid=281 comm="syz-executor" name="loop0" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 106.013685][ T30] audit: type=1400 audit(1749986046.060:1793): avc: denied { read write } for pid=1504 comm="syz.0.376" name="loop0" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 106.047160][ T30] audit: type=1400 audit(1749986046.070:1794): avc: denied { read } for pid=1504 comm="syz.0.376" name="binder0" dev="binder" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 106.070577][ T30] audit: type=1400 audit(1749986046.070:1795): avc: denied { create } for pid=1504 comm="syz.0.376" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 106.090775][ T30] audit: type=1400 audit(1749986046.070:1796): avc: denied { create } for pid=1504 comm="syz.0.376" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 106.111370][ T30] audit: type=1400 audit(1749986046.100:1797): avc: denied { read write } for pid=1504 comm="syz.0.376" name="loop0" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 106.135608][ T30] audit: type=1400 audit(1749986046.110:1798): avc: denied { read write } for pid=281 comm="syz-executor" name="loop0" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 107.492536][ T1540] syz.0.391 (1540) used greatest stack depth: 20896 bytes left [ 107.885916][ T1559] netlink: 'syz.2.400': attribute type 12 has an invalid length. [ 107.895797][ T1561] netlink: 'syz.0.399': attribute type 12 has an invalid length. [ 108.776505][ T1592] netlink: 'syz.1.413': attribute type 12 has an invalid length. [ 109.119173][ T1618] FAULT_INJECTION: forcing a failure. [ 109.119173][ T1618] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 109.154832][ T1618] CPU: 1 PID: 1618 Comm: syz.3.425 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 109.164702][ T1618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 109.174803][ T1618] Call Trace: [ 109.178277][ T1618] [ 109.181225][ T1618] __dump_stack+0x21/0x30 [ 109.185580][ T1618] dump_stack_lvl+0xee/0x150 [ 109.190198][ T1618] ? show_regs_print_info+0x20/0x20 [ 109.195428][ T1618] ? page_ext_put+0x1c/0x30 [ 109.199967][ T1618] dump_stack+0x15/0x20 [ 109.204154][ T1618] should_fail+0x3c1/0x510 [ 109.208604][ T1618] should_fail_alloc_page+0x55/0x80 [ 109.213832][ T1618] prepare_alloc_pages+0x156/0x600 [ 109.218979][ T1618] ? __alloc_pages_bulk+0xab0/0xab0 [ 109.224211][ T1618] __alloc_pages+0x10a/0x440 [ 109.228834][ T1618] ? prep_new_page+0x110/0x110 [ 109.233637][ T1618] new_slab+0xa1/0x4d0 [ 109.237746][ T1618] ___slab_alloc+0x381/0x810 [ 109.242360][ T1618] ? 0xffffffffa002c000 [ 109.246533][ T1618] ? __build_skb+0x2d/0x310 [ 109.251060][ T1618] ? is_bpf_text_address+0x177/0x190 [ 109.256377][ T1618] ? __build_skb+0x2d/0x310 [ 109.260908][ T1618] __slab_alloc+0x49/0x90 [ 109.265266][ T1618] ? __build_skb+0x2d/0x310 [ 109.269801][ T1618] kmem_cache_alloc+0x138/0x260 [ 109.274678][ T1618] __build_skb+0x2d/0x310 [ 109.279038][ T1618] build_skb+0x24/0x200 [ 109.283214][ T1618] ? tun_get_user+0x85d/0x33c0 [ 109.288087][ T1618] tun_get_user+0x879/0x33c0 [ 109.292706][ T1618] ? __kasan_poison_object_data+0x30/0x30 [ 109.298467][ T1618] ? tun_do_read+0x1c40/0x1c40 [ 109.303262][ T1618] ? kstrtouint_from_user+0x1a0/0x200 [ 109.308659][ T1618] ? kstrtol_from_user+0x260/0x260 [ 109.313798][ T1618] ? avc_policy_seqno+0x1b/0x70 [ 109.318671][ T1618] ? selinux_file_permission+0x2aa/0x510 [ 109.324337][ T1618] tun_chr_write_iter+0x1eb/0x2e0 [ 109.329391][ T1618] vfs_write+0x802/0xf70 [ 109.333666][ T1618] ? file_end_write+0x1b0/0x1b0 [ 109.338544][ T1618] ? __fget_files+0x2c4/0x320 [ 109.343253][ T1618] ? __fdget_pos+0x1f7/0x380 [ 109.347867][ T1618] ? ksys_write+0x71/0x240 [ 109.352313][ T1618] ksys_write+0x140/0x240 [ 109.356671][ T1618] ? __ia32_sys_read+0x90/0x90 [ 109.361463][ T1618] ? debug_smp_processor_id+0x17/0x20 [ 109.366861][ T1618] __x64_sys_write+0x7b/0x90 [ 109.371481][ T1618] x64_sys_call+0x8ef/0x9a0 [ 109.376008][ T1618] do_syscall_64+0x4c/0xa0 [ 109.380448][ T1618] ? clear_bhb_loop+0x50/0xa0 [ 109.385151][ T1618] ? clear_bhb_loop+0x50/0xa0 [ 109.389845][ T1618] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 109.395762][ T1618] RIP: 0033:0x7f4a60f303df [ 109.400193][ T1618] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 109.419820][ T1618] RSP: 002b:00007f4a5f59a000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 109.428257][ T1618] RAX: ffffffffffffffda RBX: 00007f4a61158fa0 RCX: 00007f4a60f303df [ 109.436258][ T1618] RDX: 0000000000000066 RSI: 00002000000005c0 RDI: 00000000000000c8 [ 109.444257][ T1618] RBP: 00007f4a5f59a090 R08: 0000000000000000 R09: 0000000000000000 [ 109.452259][ T1618] R10: 0000000000000066 R11: 0000000000000293 R12: 0000000000000001 [ 109.460253][ T1618] R13: 0000000000000000 R14: 00007f4a61158fa0 R15: 00007ffc4b583428 [ 109.468257][ T1618] [ 110.942034][ T30] kauditd_printk_skb: 619 callbacks suppressed [ 110.942049][ T30] audit: type=1400 audit(1749986051.000:2418): avc: denied { read write } for pid=1703 comm="syz.2.463" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 111.017491][ T30] audit: type=1400 audit(1749986051.070:2419): avc: denied { read write } for pid=282 comm="syz-executor" name="loop3" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 111.058828][ T30] audit: type=1400 audit(1749986051.090:2420): avc: denied { read write } for pid=1701 comm="syz.0.462" name="loop0" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 111.108812][ T1709] device syzkaller0 entered promiscuous mode [ 111.119207][ T30] audit: type=1400 audit(1749986051.100:2421): avc: denied { map_create } for pid=1708 comm="syz.3.465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 111.159851][ T30] audit: type=1400 audit(1749986051.100:2422): avc: denied { prog_load } for pid=1708 comm="syz.3.465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 111.179247][ T30] audit: type=1400 audit(1749986051.120:2423): avc: denied { read write } for pid=285 comm="syz-executor" name="loop4" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 111.218231][ T1716] process 'syz.0.468' launched '/dev/fd/8' with NULL argv: empty string added [ 111.223018][ T30] audit: type=1400 audit(1749986051.140:2424): avc: denied { execmem } for pid=1708 comm="syz.3.465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 111.268521][ T30] audit: type=1400 audit(1749986051.140:2425): avc: denied { create } for pid=1708 comm="syz.3.465" dev="anon_inodefs" ino=20600 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 111.308692][ T1722] device wg2 entered promiscuous mode [ 111.322028][ T30] audit: type=1400 audit(1749986051.140:2426): avc: denied { mounton } for pid=1703 comm="syz.2.463" path="/98/file0" dev="tmpfs" ino=584 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 111.345022][ T30] audit: type=1400 audit(1749986051.150:2427): avc: denied { prog_load } for pid=1710 comm="syz.4.466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 111.491196][ T1728] netlink: 4 bytes leftover after parsing attributes in process `syz.2.473'. [ 112.559912][ T1772] netlink: 'syz.2.491': attribute type 12 has an invalid length. [ 113.166872][ T1793] netlink: 'syz.2.499': attribute type 12 has an invalid length. [ 114.005764][ T1857] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.013181][ T1857] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.026877][ T1857] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.034159][ T1857] bridge0: port 2(bridge_slave_1) entered forwarding state [ 114.041546][ T1857] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.048720][ T1857] bridge0: port 1(bridge_slave_0) entered forwarding state [ 114.056268][ T1857] device bridge0 entered promiscuous mode [ 114.544631][ T1882] netlink: 'syz.3.540': attribute type 12 has an invalid length. [ 115.054614][ T1911] netlink: 'syz.0.553': attribute type 12 has an invalid length. [ 115.953555][ T30] kauditd_printk_skb: 874 callbacks suppressed [ 115.953571][ T30] audit: type=1400 audit(1749986056.010:3302): avc: denied { read write } for pid=281 comm="syz-executor" name="loop0" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 115.984476][ T30] audit: type=1400 audit(1749986056.020:3303): avc: denied { prog_load } for pid=1953 comm="syz.0.572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 116.004076][ T30] audit: type=1400 audit(1749986056.020:3304): avc: denied { execmem } for pid=1953 comm="syz.0.572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 116.029073][ T30] audit: type=1400 audit(1749986056.020:3305): avc: denied { read write } for pid=1953 comm="syz.0.572" name="loop0" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 116.053283][ T30] audit: type=1400 audit(1749986056.020:3306): avc: denied { execmem } for pid=1953 comm="syz.0.572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 116.072653][ T30] audit: type=1400 audit(1749986056.020:3307): avc: denied { name_bind } for pid=1953 comm="syz.0.572" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=0 [ 116.108351][ T30] audit: type=1400 audit(1749986056.080:3308): avc: denied { read write } for pid=282 comm="syz-executor" name="loop3" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 116.148802][ T30] audit: type=1400 audit(1749986056.090:3309): avc: denied { map_create } for pid=1955 comm="syz.3.573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 116.182000][ T30] audit: type=1400 audit(1749986056.090:3310): avc: denied { read } for pid=1955 comm="syz.3.573" name="loop-control" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=0 [ 116.230710][ T30] audit: type=1400 audit(1749986056.090:3311): avc: denied { create } for pid=1955 comm="syz.3.573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 116.379513][ T1967] FAULT_INJECTION: forcing a failure. [ 116.379513][ T1967] name failslab, interval 1, probability 0, space 0, times 0 [ 116.408201][ T1967] CPU: 0 PID: 1967 Comm: syz.0.577 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 116.418061][ T1967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 116.428119][ T1967] Call Trace: [ 116.431397][ T1967] [ 116.434330][ T1967] __dump_stack+0x21/0x30 [ 116.438668][ T1967] dump_stack_lvl+0xee/0x150 [ 116.443271][ T1967] ? show_regs_print_info+0x20/0x20 [ 116.448471][ T1967] ? security_file_permission+0x79/0xa0 [ 116.454040][ T1967] dump_stack+0x15/0x20 [ 116.458194][ T1967] should_fail+0x3c1/0x510 [ 116.462620][ T1967] __should_failslab+0xa4/0xe0 [ 116.467397][ T1967] should_failslab+0x9/0x20 [ 116.471920][ T1967] slab_pre_alloc_hook+0x3b/0xe0 [ 116.476884][ T1967] ? __se_sys_mount+0x9c/0x380 [ 116.481657][ T1967] __kmalloc_track_caller+0x6c/0x2c0 [ 116.486962][ T1967] ? mutex_unlock+0x89/0x220 [ 116.491559][ T1967] ? __se_sys_mount+0x9c/0x380 [ 116.496325][ T1967] ? strnlen_user+0xe8/0x1c0 [ 116.500915][ T1967] strndup_user+0x74/0x150 [ 116.505334][ T1967] __se_sys_mount+0x9c/0x380 [ 116.509928][ T1967] ? fput+0x1a/0x20 [ 116.513735][ T1967] ? __x64_sys_mount+0xd0/0xd0 [ 116.518497][ T1967] ? __ia32_sys_read+0x90/0x90 [ 116.523262][ T1967] __x64_sys_mount+0xbf/0xd0 [ 116.527850][ T1967] x64_sys_call+0x6bf/0x9a0 [ 116.532353][ T1967] do_syscall_64+0x4c/0xa0 [ 116.536775][ T1967] ? clear_bhb_loop+0x50/0xa0 [ 116.541453][ T1967] ? clear_bhb_loop+0x50/0xa0 [ 116.546129][ T1967] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 116.552030][ T1967] RIP: 0033:0x7fca29500929 [ 116.556448][ T1967] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 116.576052][ T1967] RSP: 002b:00007fca27b48038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 116.584467][ T1967] RAX: ffffffffffffffda RBX: 00007fca29728080 RCX: 00007fca29500929 [ 116.592441][ T1967] RDX: 0000200000000400 RSI: 0000200000000080 RDI: 0000000000000000 [ 116.600416][ T1967] RBP: 00007fca27b48090 R08: 00002000000002c0 R09: 0000000000000000 [ 116.608389][ T1967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 116.616359][ T1967] R13: 0000000000000000 R14: 00007fca29728080 R15: 00007ffc308af708 [ 116.624460][ T1967] [ 117.947385][ T2018] FAULT_INJECTION: forcing a failure. [ 117.947385][ T2018] name failslab, interval 1, probability 0, space 0, times 0 [ 117.960122][ T2018] CPU: 1 PID: 2018 Comm: syz.2.597 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 117.970043][ T2018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 117.980121][ T2018] Call Trace: [ 117.983421][ T2018] [ 117.986356][ T2018] __dump_stack+0x21/0x30 [ 117.990693][ T2018] dump_stack_lvl+0xee/0x150 [ 117.995295][ T2018] ? show_regs_print_info+0x20/0x20 [ 118.000522][ T2018] dump_stack+0x15/0x20 [ 118.004706][ T2018] should_fail+0x3c1/0x510 [ 118.009151][ T2018] __should_failslab+0xa4/0xe0 [ 118.013951][ T2018] should_failslab+0x9/0x20 [ 118.018479][ T2018] slab_pre_alloc_hook+0x3b/0xe0 [ 118.023443][ T2018] kmem_cache_alloc_trace+0x48/0x270 [ 118.028761][ T2018] ? __se_sys_mount+0x153/0x380 [ 118.033650][ T2018] __se_sys_mount+0x153/0x380 [ 118.038361][ T2018] ? __x64_sys_mount+0xd0/0xd0 [ 118.043247][ T2018] ? __ia32_sys_read+0x90/0x90 [ 118.048045][ T2018] __x64_sys_mount+0xbf/0xd0 [ 118.052666][ T2018] x64_sys_call+0x6bf/0x9a0 [ 118.057209][ T2018] do_syscall_64+0x4c/0xa0 [ 118.061676][ T2018] ? clear_bhb_loop+0x50/0xa0 [ 118.066389][ T2018] ? clear_bhb_loop+0x50/0xa0 [ 118.071095][ T2018] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 118.077032][ T2018] RIP: 0033:0x7f9a97a0e929 [ 118.081502][ T2018] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 118.101224][ T2018] RSP: 002b:00007f9a96077038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 118.109666][ T2018] RAX: ffffffffffffffda RBX: 00007f9a97c35fa0 RCX: 00007f9a97a0e929 [ 118.117676][ T2018] RDX: 0000200000000080 RSI: 0000200000000180 RDI: 0000000000000000 [ 118.125674][ T2018] RBP: 00007f9a96077090 R08: 00002000000001c0 R09: 0000000000000000 [ 118.133667][ T2018] R10: 0000000000000040 R11: 0000000000000246 R12: 0000000000000001 [ 118.141664][ T2018] R13: 0000000000000000 R14: 00007f9a97c35fa0 R15: 00007ffe93508328 [ 118.149669][ T2018] [ 120.079961][ T2101] netlink: 'syz.3.630': attribute type 12 has an invalid length. [ 120.270683][ T2111] netlink: 20 bytes leftover after parsing attributes in process `syz.1.634'. [ 121.130453][ T30] kauditd_printk_skb: 608 callbacks suppressed [ 121.130469][ T30] audit: type=1400 audit(1749986061.190:3920): avc: denied { read write } for pid=2136 comm="syz.3.646" name="loop3" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 121.176599][ T2140] netlink: 'syz.4.647': attribute type 12 has an invalid length. [ 121.187206][ T30] audit: type=1400 audit(1749986061.220:3921): avc: denied { read write } for pid=285 comm="syz-executor" name="loop4" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 121.236735][ T30] audit: type=1400 audit(1749986061.230:3922): avc: denied { prog_load } for pid=2139 comm="syz.4.647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 121.270304][ T30] audit: type=1400 audit(1749986061.230:3923): avc: denied { name_bind } for pid=2139 comm="syz.4.647" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 121.292141][ T30] audit: type=1400 audit(1749986061.230:3924): avc: denied { prog_load } for pid=2139 comm="syz.4.647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 121.322219][ T30] audit: type=1400 audit(1749986061.230:3925): avc: denied { create } for pid=2139 comm="syz.4.647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 121.359283][ T30] audit: type=1400 audit(1749986061.230:3926): avc: denied { prog_load } for pid=2139 comm="syz.4.647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 121.389918][ T30] audit: type=1400 audit(1749986061.230:3927): avc: denied { map_create } for pid=2139 comm="syz.4.647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 121.420793][ T30] audit: type=1400 audit(1749986061.230:3928): avc: denied { prog_load } for pid=2139 comm="syz.4.647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 121.460423][ T30] audit: type=1400 audit(1749986061.230:3929): avc: denied { prog_load } for pid=2139 comm="syz.4.647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 121.696995][ T2162] FAULT_INJECTION: forcing a failure. [ 121.696995][ T2162] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 121.710157][ T2162] CPU: 1 PID: 2162 Comm: syz.3.658 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 121.719984][ T2162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 121.730072][ T2162] Call Trace: [ 121.733374][ T2162] [ 121.736330][ T2162] __dump_stack+0x21/0x30 [ 121.740678][ T2162] dump_stack_lvl+0xee/0x150 [ 121.745291][ T2162] ? show_regs_print_info+0x20/0x20 [ 121.750517][ T2162] ? __kasan_check_write+0x14/0x20 [ 121.755648][ T2162] ? _raw_spin_lock_irq+0x8f/0xe0 [ 121.760701][ T2162] dump_stack+0x15/0x20 [ 121.764880][ T2162] should_fail+0x3c1/0x510 [ 121.769344][ T2162] should_fail_usercopy+0x1a/0x20 [ 121.774398][ T2162] copy_page_from_iter_atomic+0x3fb/0x1350 [ 121.780242][ T2162] ? pipe_zero+0x370/0x370 [ 121.784683][ T2162] generic_perform_write+0x307/0x670 [ 121.789989][ T2162] ? grab_cache_page_write_begin+0xb0/0xb0 [ 121.795816][ T2162] ? file_remove_privs+0x590/0x590 [ 121.800944][ T2162] ? rwsem_write_trylock+0x130/0x300 [ 121.806252][ T2162] ? clear_nonspinnable+0x60/0x60 [ 121.811299][ T2162] __generic_file_write_iter+0x268/0x480 [ 121.816950][ T2162] generic_file_write_iter+0xa9/0x1d0 [ 121.822340][ T2162] do_iter_readv_writev+0x491/0x600 [ 121.827564][ T2162] ? _kstrtoull+0x3c0/0x4d0 [ 121.832088][ T2162] ? generic_file_rw_checks+0x2a0/0x2a0 [ 121.837659][ T2162] ? fsnotify_perm+0x67/0x5b0 [ 121.842352][ T2162] ? security_file_permission+0x79/0xa0 [ 121.847916][ T2162] ? security_file_permission+0x83/0xa0 [ 121.853482][ T2162] do_iter_write+0x1fa/0x7b0 [ 121.858093][ T2162] vfs_writev+0x2c9/0x540 [ 121.862443][ T2162] ? do_writev+0x2b0/0x2b0 [ 121.866875][ T2162] ? vfs_write+0xc17/0xf70 [ 121.871309][ T2162] ? __fget_files+0x2c4/0x320 [ 121.876011][ T2162] ? __fdget+0x1a1/0x230 [ 121.880271][ T2162] ? __se_sys_pwritev2+0xad/0x2b0 [ 121.885316][ T2162] __se_sys_pwritev2+0x1a9/0x2b0 [ 121.890272][ T2162] ? __x64_sys_pwritev2+0xd0/0xd0 [ 121.895316][ T2162] ? __ia32_sys_read+0x90/0x90 [ 121.900095][ T2162] __x64_sys_pwritev2+0xbf/0xd0 [ 121.904965][ T2162] x64_sys_call+0x346/0x9a0 [ 121.909484][ T2162] do_syscall_64+0x4c/0xa0 [ 121.913913][ T2162] ? clear_bhb_loop+0x50/0xa0 [ 121.918602][ T2162] ? clear_bhb_loop+0x50/0xa0 [ 121.923287][ T2162] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 121.929183][ T2162] RIP: 0033:0x7f4a60f31929 [ 121.933603][ T2162] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 121.953224][ T2162] RSP: 002b:00007f4a5f59a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000148 [ 121.961640][ T2162] RAX: ffffffffffffffda RBX: 00007f4a61158fa0 RCX: 00007f4a60f31929 [ 121.969625][ T2162] RDX: 0000000000000001 RSI: 0000200000000100 RDI: 0000000000000003 [ 121.977683][ T2162] RBP: 00007f4a5f59a090 R08: 0000000000000000 R09: 0000000000000000 [ 121.985654][ T2162] R10: 0000000000005412 R11: 0000000000000246 R12: 0000000000000001 [ 121.993626][ T2162] R13: 0000000000000000 R14: 00007f4a61158fa0 R15: 00007ffc4b583428 [ 122.001602][ T2162] [ 122.157779][ T2167] netlink: 'syz.3.659': attribute type 12 has an invalid length. [ 122.748542][ T2210] xt_TCPMSS: Only works on TCP SYN packets [ 123.341040][ T2234] netlink: 'syz.3.689': attribute type 12 has an invalid length. [ 125.535366][ T2307] netlink: 16 bytes leftover after parsing attributes in process `syz.2.721'. [ 125.545713][ T2307] IPv6: sit1: Disabled Multicast RS [ 126.143309][ T30] kauditd_printk_skb: 543 callbacks suppressed [ 126.143324][ T30] audit: type=1400 audit(1749986066.200:4473): avc: denied { read write } for pid=282 comm="syz-executor" name="loop3" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 126.188525][ T30] audit: type=1400 audit(1749986066.230:4474): avc: denied { prog_load } for pid=2315 comm="syz.0.725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 126.211351][ T30] audit: type=1400 audit(1749986066.230:4475): avc: denied { create } for pid=2315 comm="syz.0.725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 126.231236][ T30] audit: type=1400 audit(1749986066.230:4476): avc: denied { prog_load } for pid=2315 comm="syz.0.725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 126.250593][ T30] audit: type=1400 audit(1749986066.230:4477): avc: denied { prog_load } for pid=2315 comm="syz.0.725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 126.269787][ T30] audit: type=1400 audit(1749986066.230:4478): avc: denied { read write } for pid=2315 comm="syz.0.725" name="loop0" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 126.294388][ T30] audit: type=1400 audit(1749986066.240:4479): avc: denied { read write } for pid=2315 comm="syz.0.725" name="loop0" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 126.337291][ T30] audit: type=1400 audit(1749986066.240:4480): avc: denied { execmem } for pid=2315 comm="syz.0.725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 126.356750][ T30] audit: type=1400 audit(1749986066.240:4481): avc: denied { read write } for pid=2318 comm="syz.3.726" name="loop3" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 126.380857][ T30] audit: type=1400 audit(1749986066.270:4482): avc: denied { read } for pid=2318 comm="syz.3.726" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 127.439245][ T2382] netlink: 28 bytes leftover after parsing attributes in process `syz.1.752'. [ 127.825250][ T2406] netlink: 4 bytes leftover after parsing attributes in process `syz.1.762'. [ 128.040433][ T2416] netlink: 'syz.0.766': attribute type 13 has an invalid length. [ 128.077530][ T2416] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.084742][ T2416] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.113405][ T2417] netlink: 'syz.0.766': attribute type 13 has an invalid length. [ 129.542482][ T2507] netlink: 'syz.2.807': attribute type 12 has an invalid length. [ 131.074811][ T30] kauditd_printk_skb: 932 callbacks suppressed [ 131.074827][ T30] audit: type=1400 audit(1749986071.244:5415): avc: denied { read write } for pid=2560 comm="syz.3.830" name="loop3" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 131.141943][ T30] audit: type=1400 audit(1749986071.316:5416): avc: denied { read write } for pid=282 comm="syz-executor" name="loop3" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 131.186703][ T30] audit: type=1400 audit(1749986071.316:5417): avc: denied { prog_load } for pid=2565 comm="syz.3.832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 131.206146][ T30] audit: type=1400 audit(1749986071.316:5418): avc: denied { prog_load } for pid=2565 comm="syz.3.832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 131.225789][ T30] audit: type=1400 audit(1749986071.346:5419): avc: denied { read write } for pid=2565 comm="syz.3.832" name="loop3" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 131.250759][ T30] audit: type=1400 audit(1749986071.387:5420): avc: denied { execmem } for pid=2565 comm="syz.3.832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 131.273199][ T30] audit: type=1400 audit(1749986071.398:5421): avc: denied { read write } for pid=285 comm="syz-executor" name="loop4" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 131.298222][ T30] audit: type=1400 audit(1749986071.398:5422): avc: denied { map_create } for pid=2565 comm="syz.3.832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 131.317824][ T30] audit: type=1400 audit(1749986071.398:5423): avc: denied { prog_load } for pid=2565 comm="syz.3.832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 131.337133][ T30] audit: type=1400 audit(1749986071.398:5424): avc: denied { read write } for pid=2565 comm="syz.3.832" name="loop3" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 131.689380][ T2594] netlink: 'syz.4.845': attribute type 12 has an invalid length. [ 131.750205][ T2598] netlink: 'syz.4.847': attribute type 12 has an invalid length. [ 132.153163][ T2621] netlink: 'syz.0.857': attribute type 12 has an invalid length. [ 132.831469][ T2662] FAULT_INJECTION: forcing a failure. [ 132.831469][ T2662] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 132.861855][ T2662] CPU: 0 PID: 2662 Comm: syz.1.875 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 132.871725][ T2662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 132.881806][ T2662] Call Trace: [ 132.885101][ T2662] [ 132.888047][ T2662] __dump_stack+0x21/0x30 [ 132.892396][ T2662] dump_stack_lvl+0xee/0x150 [ 132.897011][ T2662] ? show_regs_print_info+0x20/0x20 [ 132.902339][ T2662] ? __alloc_pages+0x18f/0x440 [ 132.907138][ T2662] dump_stack+0x15/0x20 [ 132.911332][ T2662] should_fail+0x3c1/0x510 [ 132.915782][ T2662] should_fail_usercopy+0x1a/0x20 [ 132.920854][ T2662] copy_page_from_iter+0x2f6/0x680 [ 132.926014][ T2662] tun_get_user+0x813/0x33c0 [ 132.930638][ T2662] ? __kasan_poison_object_data+0x30/0x30 [ 132.936382][ T2662] ? tun_do_read+0x1c40/0x1c40 [ 132.941171][ T2662] ? kstrtouint_from_user+0x1a0/0x200 [ 132.946574][ T2662] ? kstrtol_from_user+0x260/0x260 [ 132.951710][ T2662] ? avc_policy_seqno+0x1b/0x70 [ 132.956587][ T2662] ? selinux_file_permission+0x2aa/0x510 [ 132.962238][ T2662] tun_chr_write_iter+0x1eb/0x2e0 [ 132.967284][ T2662] vfs_write+0x802/0xf70 [ 132.971542][ T2662] ? file_end_write+0x1b0/0x1b0 [ 132.976407][ T2662] ? __fget_files+0x2c4/0x320 [ 132.981109][ T2662] ? __fdget_pos+0x1f7/0x380 [ 132.985727][ T2662] ? ksys_write+0x71/0x240 [ 132.990164][ T2662] ksys_write+0x140/0x240 [ 132.994513][ T2662] ? __ia32_sys_read+0x90/0x90 [ 132.999296][ T2662] ? debug_smp_processor_id+0x17/0x20 [ 133.004703][ T2662] __x64_sys_write+0x7b/0x90 [ 133.009404][ T2662] x64_sys_call+0x8ef/0x9a0 [ 133.013925][ T2662] do_syscall_64+0x4c/0xa0 [ 133.018359][ T2662] ? clear_bhb_loop+0x50/0xa0 [ 133.023049][ T2662] ? clear_bhb_loop+0x50/0xa0 [ 133.027739][ T2662] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 133.033835][ T2662] RIP: 0033:0x7f77232e13df [ 133.038275][ T2662] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 133.058006][ T2662] RSP: 002b:00007f772194b000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 133.066450][ T2662] RAX: ffffffffffffffda RBX: 00007f7723509fa0 RCX: 00007f77232e13df [ 133.074451][ T2662] RDX: 0000000000000066 RSI: 0000200000000480 RDI: 00000000000000c8 [ 133.082449][ T2662] RBP: 00007f772194b090 R08: 0000000000000000 R09: 0000000000000000 [ 133.090452][ T2662] R10: 0000000000000066 R11: 0000000000000293 R12: 0000000000000001 [ 133.098579][ T2662] R13: 0000000000000000 R14: 00007f7723509fa0 R15: 00007ffc0d823428 [ 133.106578][ T2662] [ 133.433523][ T2690] netlink: 'syz.2.885': attribute type 12 has an invalid length. [ 133.751679][ T2707] FAULT_INJECTION: forcing a failure. [ 133.751679][ T2707] name failslab, interval 1, probability 0, space 0, times 0 [ 133.764480][ T2707] CPU: 1 PID: 2707 Comm: syz.0.892 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 133.774304][ T2707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 133.784361][ T2707] Call Trace: [ 133.787642][ T2707] [ 133.790612][ T2707] __dump_stack+0x21/0x30 [ 133.794946][ T2707] dump_stack_lvl+0xee/0x150 [ 133.799543][ T2707] ? show_regs_print_info+0x20/0x20 [ 133.804778][ T2707] dump_stack+0x15/0x20 [ 133.809056][ T2707] should_fail+0x3c1/0x510 [ 133.813487][ T2707] __should_failslab+0xa4/0xe0 [ 133.818261][ T2707] should_failslab+0x9/0x20 [ 133.822771][ T2707] slab_pre_alloc_hook+0x3b/0xe0 [ 133.827730][ T2707] ? __alloc_skb+0xe0/0x740 [ 133.832235][ T2707] kmem_cache_alloc+0x44/0x260 [ 133.837005][ T2707] __alloc_skb+0xe0/0x740 [ 133.841332][ T2707] audit_log_start+0x3c7/0x8b0 [ 133.846093][ T2707] ? ____kasan_slab_free+0x130/0x160 [ 133.851381][ T2707] ? audit_serial+0x30/0x30 [ 133.855896][ T2707] ? migrate_enable+0x192/0x260 [ 133.860744][ T2707] ? migrate_disable+0x180/0x180 [ 133.865686][ T2707] audit_seccomp+0x62/0x160 [ 133.870212][ T2707] ? migrate_disable+0xd6/0x180 [ 133.875071][ T2707] __seccomp_filter+0xb06/0x1900 [ 133.880015][ T2707] ? file_end_write+0x1b0/0x1b0 [ 133.884863][ T2707] ? __secure_computing+0x290/0x290 [ 133.890128][ T2707] ? __kasan_check_write+0x14/0x20 [ 133.895246][ T2707] ? mutex_unlock+0x89/0x220 [ 133.899837][ T2707] ? __mutex_lock_slowpath+0x10/0x10 [ 133.905122][ T2707] ? fput+0x1a/0x20 [ 133.908942][ T2707] ? ksys_write+0x1eb/0x240 [ 133.913439][ T2707] ? __ia32_sys_read+0x90/0x90 [ 133.918202][ T2707] __secure_computing+0xea/0x290 [ 133.923142][ T2707] syscall_trace_enter+0xcf/0x180 [ 133.928168][ T2707] syscall_enter_from_user_mode+0x1f/0x30 [ 133.933895][ T2707] do_syscall_64+0x24/0xa0 [ 133.938309][ T2707] ? clear_bhb_loop+0x50/0xa0 [ 133.942990][ T2707] ? clear_bhb_loop+0x50/0xa0 [ 133.947666][ T2707] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 133.953564][ T2707] RIP: 0033:0x7fca29500929 [ 133.957978][ T2707] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 133.977581][ T2707] RSP: 002b:00007fca27b69038 EFLAGS: 00000246 ORIG_RAX: 00000000000000c9 [ 133.985994][ T2707] RAX: ffffffffffffffda RBX: 00007fca29727fa0 RCX: 00007fca29500929 [ 133.993970][ T2707] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 134.001948][ T2707] RBP: 00007fca27b69090 R08: 0000000000000000 R09: 0000000000000000 [ 134.009926][ T2707] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 134.017911][ T2707] R13: 0000000000000000 R14: 00007fca29727fa0 R15: 00007ffc308af708 [ 134.025891][ T2707] [ 134.760296][ T2723] netlink: 'syz.0.899': attribute type 12 has an invalid length. [ 134.862866][ T2730] FAULT_INJECTION: forcing a failure. [ 134.862866][ T2730] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 134.876149][ T2730] CPU: 0 PID: 2730 Comm: syz.0.903 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 134.885982][ T2730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 134.896056][ T2730] Call Trace: [ 134.899352][ T2730] [ 134.902297][ T2730] __dump_stack+0x21/0x30 [ 134.906648][ T2730] dump_stack_lvl+0xee/0x150 [ 134.911252][ T2730] ? show_regs_print_info+0x20/0x20 [ 134.916467][ T2730] dump_stack+0x15/0x20 [ 134.920641][ T2730] should_fail+0x3c1/0x510 [ 134.925085][ T2730] should_fail_usercopy+0x1a/0x20 [ 134.930136][ T2730] _copy_to_user+0x20/0x90 [ 134.934574][ T2730] simple_read_from_buffer+0xe9/0x160 [ 134.939963][ T2730] proc_fail_nth_read+0x19a/0x210 [ 134.945023][ T2730] ? proc_fault_inject_write+0x2f0/0x2f0 [ 134.950697][ T2730] ? security_file_permission+0x83/0xa0 [ 134.956396][ T2730] ? proc_fault_inject_write+0x2f0/0x2f0 [ 134.962056][ T2730] vfs_read+0x282/0xbe0 [ 134.966214][ T2730] ? kernel_read+0x1f0/0x1f0 [ 134.970803][ T2730] ? __kasan_check_write+0x14/0x20 [ 134.975941][ T2730] ? mutex_lock+0x95/0x1a0 [ 134.980355][ T2730] ? wait_for_completion_killable_timeout+0x10/0x10 [ 134.989706][ T2730] ? __fget_files+0x2c4/0x320 [ 134.994397][ T2730] ? __fdget_pos+0x2d2/0x380 [ 134.998994][ T2730] ? ksys_read+0x71/0x240 [ 135.003319][ T2730] ksys_read+0x140/0x240 [ 135.007559][ T2730] ? vfs_write+0xf70/0xf70 [ 135.011971][ T2730] ? debug_smp_processor_id+0x17/0x20 [ 135.017353][ T2730] __x64_sys_read+0x7b/0x90 [ 135.021866][ T2730] x64_sys_call+0x96d/0x9a0 [ 135.026367][ T2730] do_syscall_64+0x4c/0xa0 [ 135.030773][ T2730] ? clear_bhb_loop+0x50/0xa0 [ 135.035450][ T2730] ? clear_bhb_loop+0x50/0xa0 [ 135.040124][ T2730] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 135.046013][ T2730] RIP: 0033:0x7fca294ff33c [ 135.050450][ T2730] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 135.070053][ T2730] RSP: 002b:00007fca27b69030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 135.078463][ T2730] RAX: ffffffffffffffda RBX: 00007fca29727fa0 RCX: 00007fca294ff33c [ 135.086430][ T2730] RDX: 000000000000000f RSI: 00007fca27b690a0 RDI: 0000000000000003 [ 135.094395][ T2730] RBP: 00007fca27b69090 R08: 0000000000000000 R09: 0000000000000014 [ 135.102355][ T2730] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 135.110320][ T2730] R13: 0000000000000000 R14: 00007fca29727fa0 R15: 00007ffc308af708 [ 135.118297][ T2730] [ 136.001492][ T30] kauditd_printk_skb: 624 callbacks suppressed [ 136.001507][ T30] audit: type=1400 audit(1749986076.277:6047): avc: denied { read write } for pid=281 comm="syz-executor" name="loop0" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 136.032398][ T30] audit: type=1400 audit(1749986076.277:6048): avc: denied { prog_load } for pid=2752 comm="syz.0.912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 136.051792][ T30] audit: type=1400 audit(1749986076.277:6049): avc: denied { prog_load } for pid=2752 comm="syz.0.912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 136.059119][ T2755] netlink: 'syz.0.913': attribute type 12 has an invalid length. [ 136.071340][ T30] audit: type=1400 audit(1749986076.298:6050): avc: denied { read write } for pid=2752 comm="syz.0.912" name="loop0" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 136.103208][ T30] audit: type=1400 audit(1749986076.308:6051): avc: denied { execmem } for pid=2752 comm="syz.0.912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 136.122817][ T30] audit: type=1400 audit(1749986076.308:6052): avc: denied { map_create } for pid=2752 comm="syz.0.912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 136.142048][ T30] audit: type=1400 audit(1749986076.308:6053): avc: denied { prog_load } for pid=2752 comm="syz.0.912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 136.161242][ T30] audit: type=1400 audit(1749986076.318:6054): avc: denied { read write } for pid=2752 comm="syz.0.912" name="loop0" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 136.185424][ T30] audit: type=1400 audit(1749986076.318:6055): avc: denied { prog_load } for pid=2752 comm="syz.0.912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 136.204810][ T30] audit: type=1400 audit(1749986076.328:6056): avc: denied { read write } for pid=281 comm="syz-executor" name="loop0" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 140.867830][ T2919] FAULT_INJECTION: forcing a failure. [ 140.867830][ T2919] name failslab, interval 1, probability 0, space 0, times 0 [ 140.880523][ T2919] CPU: 1 PID: 2919 Comm: syz.1.975 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 140.890347][ T2919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 140.900431][ T2919] Call Trace: [ 140.903714][ T2919] [ 140.906642][ T2919] __dump_stack+0x21/0x30 [ 140.910970][ T2919] dump_stack_lvl+0xee/0x150 [ 140.915557][ T2919] ? show_regs_print_info+0x20/0x20 [ 140.920752][ T2919] dump_stack+0x15/0x20 [ 140.924904][ T2919] should_fail+0x3c1/0x510 [ 140.929316][ T2919] __should_failslab+0xa4/0xe0 [ 140.934075][ T2919] should_failslab+0x9/0x20 [ 140.938594][ T2919] slab_pre_alloc_hook+0x3b/0xe0 [ 140.943555][ T2919] ? security_file_alloc+0x33/0x120 [ 140.948754][ T2919] kmem_cache_alloc+0x44/0x260 [ 140.953518][ T2919] security_file_alloc+0x33/0x120 [ 140.958539][ T2919] __alloc_file+0xb5/0x2a0 [ 140.962950][ T2919] alloc_empty_file+0x97/0x180 [ 140.967708][ T2919] path_openat+0xf3/0x2f10 [ 140.972120][ T2919] ? __stack_depot_save+0x34/0x480 [ 140.977252][ T2919] ? __kasan_slab_alloc+0xcf/0xf0 [ 140.982274][ T2919] ? __kasan_slab_alloc+0xbd/0xf0 [ 140.987304][ T2919] ? slab_post_alloc_hook+0x4f/0x2b0 [ 140.992605][ T2919] ? kmem_cache_alloc+0xf7/0x260 [ 140.997536][ T2919] ? getname_flags+0xb9/0x500 [ 141.002208][ T2919] ? getname+0x19/0x20 [ 141.006272][ T2919] ? do_sys_openat2+0xd9/0x7b0 [ 141.011035][ T2919] ? __x64_sys_openat+0x136/0x160 [ 141.016060][ T2919] ? x64_sys_call+0x219/0x9a0 [ 141.020740][ T2919] ? do_syscall_64+0x4c/0xa0 [ 141.025352][ T2919] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 141.031432][ T2919] ? do_filp_open+0x3e0/0x3e0 [ 141.036162][ T2919] do_filp_open+0x1b3/0x3e0 [ 141.040677][ T2919] ? vfs_tmpfile+0x2d0/0x2d0 [ 141.045274][ T2919] do_sys_openat2+0x14c/0x7b0 [ 141.049976][ T2919] ? __kasan_check_write+0x14/0x20 [ 141.055102][ T2919] ? do_sys_open+0xe0/0xe0 [ 141.059524][ T2919] ? fput+0x1a/0x20 [ 141.063344][ T2919] ? ksys_write+0x1eb/0x240 [ 141.067846][ T2919] ? __ia32_sys_read+0x90/0x90 [ 141.072621][ T2919] __x64_sys_openat+0x136/0x160 [ 141.077492][ T2919] x64_sys_call+0x219/0x9a0 [ 141.081994][ T2919] do_syscall_64+0x4c/0xa0 [ 141.086425][ T2919] ? clear_bhb_loop+0x50/0xa0 [ 141.091125][ T2919] ? clear_bhb_loop+0x50/0xa0 [ 141.095813][ T2919] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 141.101727][ T2919] RIP: 0033:0x7f77232e2929 [ 141.106161][ T2919] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 141.125761][ T2919] RSP: 002b:00007f772194b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 141.134174][ T2919] RAX: ffffffffffffffda RBX: 00007f7723509fa0 RCX: 00007f77232e2929 [ 141.142164][ T2919] RDX: 0000000000515401 RSI: 00002000000000c0 RDI: 0000000000000003 [ 141.150135][ T2919] RBP: 00007f772194b090 R08: 0000000000000000 R09: 0000000000000000 [ 141.158206][ T2919] R10: 0000000000000408 R11: 0000000000000246 R12: 0000000000000001 [ 141.166182][ T2919] R13: 0000000000000000 R14: 00007f7723509fa0 R15: 00007ffc0d823428 [ 141.174159][ T2919] [ 141.187614][ T30] kauditd_printk_skb: 519 callbacks suppressed [ 141.187631][ T30] audit: type=1400 audit(1749986081.535:6576): avc: denied { prog_load } for pid=2920 comm="syz.1.976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 141.213239][ T30] audit: type=1400 audit(1749986081.535:6577): avc: denied { prog_load } for pid=2920 comm="syz.1.976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 141.232672][ T30] audit: type=1400 audit(1749986081.566:6578): avc: denied { execmem } for pid=2920 comm="syz.1.976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 141.252677][ T30] audit: type=1400 audit(1749986081.566:6579): avc: denied { map_create } for pid=2920 comm="syz.1.976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 141.252706][ T30] audit: type=1400 audit(1749986081.566:6580): avc: denied { prog_load } for pid=2920 comm="syz.1.976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 141.252728][ T30] audit: type=1400 audit(1749986081.566:6581): avc: denied { prog_load } for pid=2920 comm="syz.1.976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 141.252757][ T30] audit: type=1400 audit(1749986081.586:6582): avc: denied { prog_load } for pid=2922 comm="syz.1.977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 141.252782][ T30] audit: type=1400 audit(1749986081.586:6583): avc: denied { create } for pid=2922 comm="syz.1.977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 141.252810][ T30] audit: type=1400 audit(1749986081.586:6584): avc: denied { create } for pid=2922 comm="syz.1.977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 141.252834][ T30] audit: type=1400 audit(1749986081.586:6585): avc: denied { map_create } for pid=2922 comm="syz.1.977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 142.970593][ T2955] FAULT_INJECTION: forcing a failure. [ 142.970593][ T2955] name failslab, interval 1, probability 0, space 0, times 0 [ 142.983325][ T2955] CPU: 0 PID: 2955 Comm: syz.0.989 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 142.993165][ T2955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 143.003215][ T2955] Call Trace: [ 143.006487][ T2955] [ 143.009410][ T2955] __dump_stack+0x21/0x30 [ 143.013744][ T2955] dump_stack_lvl+0xee/0x150 [ 143.018349][ T2955] ? show_regs_print_info+0x20/0x20 [ 143.023561][ T2955] dump_stack+0x15/0x20 [ 143.027714][ T2955] should_fail+0x3c1/0x510 [ 143.032132][ T2955] __should_failslab+0xa4/0xe0 [ 143.036891][ T2955] should_failslab+0x9/0x20 [ 143.041589][ T2955] slab_pre_alloc_hook+0x3b/0xe0 [ 143.046540][ T2955] kmem_cache_alloc_trace+0x48/0x270 [ 143.051829][ T2955] ? alloc_fs_context+0x64/0x7a0 [ 143.056763][ T2955] alloc_fs_context+0x64/0x7a0 [ 143.061526][ T2955] ? kmem_cache_free+0x100/0x320 [ 143.066482][ T2955] fs_context_for_reconfigure+0x73/0x80 [ 143.072024][ T2955] __se_sys_fspick+0x1fc/0x460 [ 143.076782][ T2955] ? __x64_sys_fspick+0x90/0x90 [ 143.081628][ T2955] ? debug_smp_processor_id+0x17/0x20 [ 143.086995][ T2955] __x64_sys_fspick+0x7b/0x90 [ 143.091674][ T2955] x64_sys_call+0x4c7/0x9a0 [ 143.096175][ T2955] do_syscall_64+0x4c/0xa0 [ 143.100579][ T2955] ? clear_bhb_loop+0x50/0xa0 [ 143.105253][ T2955] ? clear_bhb_loop+0x50/0xa0 [ 143.109976][ T2955] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 143.115867][ T2955] RIP: 0033:0x7fca29500929 [ 143.120276][ T2955] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 143.139879][ T2955] RSP: 002b:00007fca27b69038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b1 [ 143.148296][ T2955] RAX: ffffffffffffffda RBX: 00007fca29727fa0 RCX: 00007fca29500929 [ 143.156264][ T2955] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 143.164230][ T2955] RBP: 00007fca27b69090 R08: 0000000000000000 R09: 0000000000000000 [ 143.172199][ T2955] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 143.180440][ T2955] R13: 0000000000000000 R14: 00007fca29727fa0 R15: 00007ffc308af708 [ 143.188421][ T2955] [ 145.808169][ T3052] FAULT_INJECTION: forcing a failure. [ 145.808169][ T3052] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 145.821306][ T3052] CPU: 0 PID: 3052 Comm: syz.1.1029 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 145.831201][ T3052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 145.841254][ T3052] Call Trace: [ 145.844531][ T3052] [ 145.847460][ T3052] __dump_stack+0x21/0x30 [ 145.851790][ T3052] dump_stack_lvl+0xee/0x150 [ 145.856391][ T3052] ? show_regs_print_info+0x20/0x20 [ 145.861587][ T3052] ? format_decode+0x1bb/0x1520 [ 145.866444][ T3052] dump_stack+0x15/0x20 [ 145.870608][ T3052] should_fail+0x3c1/0x510 [ 145.875019][ T3052] should_fail_usercopy+0x1a/0x20 [ 145.880053][ T3052] _copy_from_user+0x20/0xd0 [ 145.884641][ T3052] kstrtouint_from_user+0xbe/0x200 [ 145.889756][ T3052] ? kstrtol_from_user+0x260/0x260 [ 145.894871][ T3052] ? 0xffffffff81000000 [ 145.899019][ T3052] ? _copy_to_user+0x78/0x90 [ 145.903616][ T3052] ? simple_read_from_buffer+0x10f/0x160 [ 145.909249][ T3052] proc_fail_nth_write+0x85/0x1f0 [ 145.914287][ T3052] ? proc_fail_nth_read+0x210/0x210 [ 145.919484][ T3052] ? security_file_permission+0x79/0xa0 [ 145.925042][ T3052] ? security_file_permission+0x83/0xa0 [ 145.930585][ T3052] ? proc_fail_nth_read+0x210/0x210 [ 145.935786][ T3052] vfs_write+0x3ee/0xf70 [ 145.940046][ T3052] ? file_end_write+0x1b0/0x1b0 [ 145.944888][ T3052] ? __kasan_check_write+0x14/0x20 [ 145.949994][ T3052] ? mutex_lock+0x95/0x1a0 [ 145.954407][ T3052] ? wait_for_completion_killable_timeout+0x10/0x10 [ 145.960989][ T3052] ? __fget_files+0x2c4/0x320 [ 145.965668][ T3052] ? __fdget_pos+0x2d2/0x380 [ 145.970255][ T3052] ? ksys_write+0x71/0x240 [ 145.974664][ T3052] ksys_write+0x140/0x240 [ 145.978988][ T3052] ? __ia32_sys_read+0x90/0x90 [ 145.983753][ T3052] ? debug_smp_processor_id+0x17/0x20 [ 145.989124][ T3052] __x64_sys_write+0x7b/0x90 [ 145.993712][ T3052] x64_sys_call+0x8ef/0x9a0 [ 145.998210][ T3052] do_syscall_64+0x4c/0xa0 [ 146.002620][ T3052] ? clear_bhb_loop+0x50/0xa0 [ 146.007293][ T3052] ? clear_bhb_loop+0x50/0xa0 [ 146.011973][ T3052] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 146.017872][ T3052] RIP: 0033:0x7f77232e13df [ 146.022286][ T3052] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 146.041929][ T3052] RSP: 002b:00007f772194b030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 146.050358][ T3052] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f77232e13df [ 146.058331][ T3052] RDX: 0000000000000001 RSI: 00007f772194b0a0 RDI: 0000000000000003 [ 146.066327][ T3052] RBP: 00007f772194b090 R08: 0000000000000000 R09: 0000000000000000 [ 146.074321][ T3052] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 146.082318][ T3052] R13: 0000000000000000 R14: 00007f7723509fa0 R15: 00007ffc0d823428 [ 146.090320][ T3052] [ 146.137479][ T30] kauditd_printk_skb: 400 callbacks suppressed [ 146.137566][ T30] audit: type=1400 audit(1749986086.549:6986): avc: denied { create } for pid=3053 comm="syz.4.1030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 146.164629][ T30] audit: type=1400 audit(1749986086.549:6987): avc: denied { create } for pid=3053 comm="syz.4.1030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 146.216625][ T30] audit: type=1400 audit(1749986086.589:6988): avc: denied { prog_load } for pid=3058 comm="syz.1.1032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 146.247420][ T30] audit: type=1400 audit(1749986086.660:6989): avc: denied { read write } for pid=281 comm="syz-executor" name="loop0" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 146.294620][ T30] audit: type=1400 audit(1749986086.680:6990): avc: denied { prog_load } for pid=3060 comm="syz.0.1033" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 146.313969][ T30] audit: type=1400 audit(1749986086.700:6991): avc: denied { read write } for pid=3060 comm="syz.0.1033" name="loop0" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 146.340886][ T30] audit: type=1400 audit(1749986086.720:6992): avc: denied { read write } for pid=285 comm="syz-executor" name="loop4" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 146.366186][ T30] audit: type=1400 audit(1749986086.751:6993): avc: denied { execmem } for pid=3060 comm="syz.0.1033" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 146.385807][ T30] audit: type=1400 audit(1749986086.751:6994): avc: denied { create } for pid=3062 comm="syz.4.1034" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 146.406252][ T30] audit: type=1400 audit(1749986086.751:6995): avc: denied { map_create } for pid=3060 comm="syz.0.1033" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 147.291124][ T3097] device syzkaller0 entered promiscuous mode [ 147.891654][ T3134] FAULT_INJECTION: forcing a failure. [ 147.891654][ T3134] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 147.921802][ T3134] CPU: 0 PID: 3134 Comm: syz.2.1061 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 147.931762][ T3134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 147.941925][ T3134] Call Trace: [ 147.945223][ T3134] [ 147.948168][ T3134] __dump_stack+0x21/0x30 [ 147.952521][ T3134] dump_stack_lvl+0xee/0x150 [ 147.957130][ T3134] ? show_regs_print_info+0x20/0x20 [ 147.962363][ T3134] ? avc_has_perm+0x158/0x240 [ 147.967064][ T3134] dump_stack+0x15/0x20 [ 147.971232][ T3134] should_fail+0x3c1/0x510 [ 147.975671][ T3134] should_fail_usercopy+0x1a/0x20 [ 147.980720][ T3134] _copy_from_user+0x20/0xd0 [ 147.985343][ T3134] do_sys_poll+0x247/0x1140 [ 147.989862][ T3134] ? 0xffffffffa002c000 [ 147.994036][ T3134] ? stack_trace_save+0xe0/0xe0 [ 147.998911][ T3134] ? poll_select_finish+0x5e0/0x5e0 [ 148.004143][ T3134] ? __kasan_check_write+0x14/0x20 [ 148.009283][ T3134] ? proc_fail_nth_write+0x17a/0x1f0 [ 148.014606][ T3134] ? proc_fail_nth_read+0x210/0x210 [ 148.019833][ T3134] ? __kasan_check_write+0x14/0x20 [ 148.024978][ T3134] ? set_user_sigmask+0x157/0x1b0 [ 148.030027][ T3134] ? sigprocmask+0x1b0/0x1b0 [ 148.034635][ T3134] ? mutex_unlock+0x89/0x220 [ 148.039479][ T3134] ? __mutex_lock_slowpath+0x10/0x10 [ 148.044796][ T3134] __se_sys_ppoll+0x1fc/0x260 [ 148.049507][ T3134] ? __x64_sys_ppoll+0xd0/0xd0 [ 148.054295][ T3134] ? ksys_write+0x1eb/0x240 [ 148.058819][ T3134] ? __ia32_sys_read+0x90/0x90 [ 148.063600][ T3134] __x64_sys_ppoll+0xbf/0xd0 [ 148.068212][ T3134] x64_sys_call+0x38c/0x9a0 [ 148.072732][ T3134] do_syscall_64+0x4c/0xa0 [ 148.077165][ T3134] ? clear_bhb_loop+0x50/0xa0 [ 148.081862][ T3134] ? clear_bhb_loop+0x50/0xa0 [ 148.086558][ T3134] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 148.092474][ T3134] RIP: 0033:0x7f9a97a0e929 [ 148.096908][ T3134] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 148.116529][ T3134] RSP: 002b:00007f9a96056038 EFLAGS: 00000246 ORIG_RAX: 000000000000010f [ 148.124979][ T3134] RAX: ffffffffffffffda RBX: 00007f9a97c36080 RCX: 00007f9a97a0e929 [ 148.132976][ T3134] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000200000000100 [ 148.140967][ T3134] RBP: 00007f9a96056090 R08: 0000000000000008 R09: 0000000000000000 [ 148.148956][ T3134] R10: 0000200000000080 R11: 0000000000000246 R12: 0000000000000001 [ 148.156945][ T3134] R13: 0000000000000000 R14: 00007f9a97c36080 R15: 00007ffe93508328 [ 148.164943][ T3134] [ 148.609799][ T3171] netlink: 6 bytes leftover after parsing attributes in process `syz.0.1077'. [ 148.620032][ T3171] netlink: 6 bytes leftover after parsing attributes in process `syz.0.1077'. [ 148.787818][ T3183] FAULT_INJECTION: forcing a failure. [ 148.787818][ T3183] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 148.801575][ T3183] CPU: 1 PID: 3183 Comm: syz.0.1083 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 148.811510][ T3183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 148.821598][ T3183] Call Trace: [ 148.824897][ T3183] [ 148.827850][ T3183] __dump_stack+0x21/0x30 [ 148.832201][ T3183] dump_stack_lvl+0xee/0x150 [ 148.836812][ T3183] ? show_regs_print_info+0x20/0x20 [ 148.842044][ T3183] dump_stack+0x15/0x20 [ 148.846222][ T3183] should_fail+0x3c1/0x510 [ 148.850672][ T3183] should_fail_usercopy+0x1a/0x20 [ 148.855726][ T3183] strncpy_from_user+0x24/0x2e0 [ 148.860603][ T3183] ? kmem_cache_alloc+0xf7/0x260 [ 148.865569][ T3183] getname_flags+0xf4/0x500 [ 148.870095][ T3183] __x64_sys_linkat+0xc0/0x100 [ 148.874890][ T3183] x64_sys_call+0x2dd/0x9a0 [ 148.879426][ T3183] do_syscall_64+0x4c/0xa0 [ 148.883953][ T3183] ? clear_bhb_loop+0x50/0xa0 [ 148.888660][ T3183] ? clear_bhb_loop+0x50/0xa0 [ 148.893363][ T3183] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 148.899291][ T3183] RIP: 0033:0x7fca29500929 [ 148.903737][ T3183] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 148.923540][ T3183] RSP: 002b:00007fca27b69038 EFLAGS: 00000246 ORIG_RAX: 0000000000000109 [ 148.931980][ T3183] RAX: ffffffffffffffda RBX: 00007fca29727fa0 RCX: 00007fca29500929 [ 148.939979][ T3183] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: ffffffffffffffff [ 148.947983][ T3183] RBP: 00007fca27b69090 R08: 0000000000000000 R09: 0000000000000000 [ 148.955986][ T3183] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 148.963979][ T3183] R13: 0000000000000000 R14: 00007fca29727fa0 R15: 00007ffc308af708 [ 148.971978][ T3183] [ 151.114262][ T30] kauditd_printk_skb: 531 callbacks suppressed [ 151.114277][ T30] audit: type=1400 audit(1749986091.558:7527): avc: denied { read write } for pid=3238 comm="syz.4.1103" name="loop4" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 151.185377][ T30] audit: type=1400 audit(1749986091.588:7528): avc: denied { prog_load } for pid=3240 comm="syz.1.1104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 151.224695][ T30] audit: type=1400 audit(1749986091.588:7529): avc: denied { prog_load } for pid=3240 comm="syz.1.1104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 151.264609][ T30] audit: type=1400 audit(1749986091.638:7530): avc: denied { prog_load } for pid=3238 comm="syz.4.1103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 151.297605][ T30] audit: type=1400 audit(1749986091.648:7531): avc: denied { read write } for pid=3230 comm="syz.2.1100" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 151.322036][ T30] audit: type=1400 audit(1749986091.658:7532): avc: denied { execmem } for pid=3240 comm="syz.1.1104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 151.341507][ T30] audit: type=1400 audit(1749986091.658:7533): avc: denied { map_create } for pid=3240 comm="syz.1.1104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 151.361276][ T30] audit: type=1400 audit(1749986091.658:7534): avc: denied { prog_load } for pid=3240 comm="syz.1.1104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 151.380556][ T30] audit: type=1400 audit(1749986091.668:7535): avc: denied { prog_load } for pid=3240 comm="syz.1.1104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 151.400186][ T30] audit: type=1400 audit(1749986091.668:7536): avc: denied { write } for pid=3240 comm="syz.1.1104" name="001" dev="devtmpfs" ino=175 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 [ 156.092180][ T30] kauditd_printk_skb: 625 callbacks suppressed [ 156.092197][ T30] audit: type=1400 audit(1749986096.566:8162): avc: denied { prog_load } for pid=3433 comm="syz.4.1182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 156.117975][ T30] audit: type=1400 audit(1749986096.566:8163): avc: denied { prog_load } for pid=3433 comm="syz.4.1182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 156.137289][ T30] audit: type=1400 audit(1749986096.586:8164): avc: denied { read write } for pid=3433 comm="syz.4.1182" name="loop4" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 156.161508][ T30] audit: type=1400 audit(1749986096.606:8165): avc: denied { execmem } for pid=3433 comm="syz.4.1182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 156.191276][ T30] audit: type=1400 audit(1749986096.666:8166): avc: denied { map_create } for pid=3433 comm="syz.4.1182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 156.210718][ T30] audit: type=1400 audit(1749986096.666:8167): avc: denied { prog_load } for pid=3433 comm="syz.4.1182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 156.229993][ T30] audit: type=1400 audit(1749986096.687:8168): avc: denied { read write } for pid=3433 comm="syz.4.1182" name="loop4" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 156.254315][ T30] audit: type=1400 audit(1749986096.687:8169): avc: denied { prog_load } for pid=3433 comm="syz.4.1182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 156.273549][ T30] audit: type=1326 audit(1749986096.707:8170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3432 comm="syz.4.1181" exe="/root/syz-executor" sig=0 arch=c000003e syscall=60 compat=0 ip=0x7f06f4aec929 code=0x7ffc0000 [ 156.618042][ T30] audit: type=1400 audit(1749986097.098:8171): avc: denied { read write } for pid=281 comm="syz-executor" name="loop0" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 159.454660][ T3542] netlink: 'syz.2.1225': attribute type 12 has an invalid length. [ 161.095762][ T30] kauditd_printk_skb: 454 callbacks suppressed [ 161.095778][ T30] audit: type=1400 audit(1749986101.586:8626): avc: denied { map_create } for pid=3579 comm="syz.4.1240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 161.130843][ T30] audit: type=1400 audit(1749986101.617:8627): avc: denied { prog_load } for pid=3579 comm="syz.4.1240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 161.149998][ T30] audit: type=1400 audit(1749986101.617:8628): avc: denied { prog_load } for pid=3579 comm="syz.4.1240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 161.175178][ T30] audit: type=1400 audit(1749986101.617:8629): avc: denied { create } for pid=3579 comm="syz.4.1240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=0 [ 161.211473][ T30] audit: type=1400 audit(1749986101.617:8630): avc: denied { read write } for pid=3579 comm="syz.4.1240" name="loop4" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 161.273033][ T30] audit: type=1400 audit(1749986101.667:8631): avc: denied { read write } for pid=284 comm="syz-executor" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 161.318232][ T30] audit: type=1400 audit(1749986101.697:8632): avc: denied { prog_load } for pid=3583 comm="syz.2.1242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 161.348894][ T30] audit: type=1400 audit(1749986101.697:8633): avc: denied { execmem } for pid=3581 comm="syz.1.1241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 161.368376][ T30] audit: type=1400 audit(1749986101.697:8634): avc: denied { read write } for pid=3581 comm="syz.1.1241" name="ptp0" dev="devtmpfs" ino=260 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=0 [ 161.408160][ T30] audit: type=1326 audit(1749986101.697:8635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3583 comm="syz.2.1242" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a97a0e929 code=0x7ffc0000 [ 163.714035][ T3671] Zero length message leads to an empty skb [ 165.691051][ T3737] netlink: 'syz.3.1306': attribute type 12 has an invalid length. [ 165.771387][ T3746] FAULT_INJECTION: forcing a failure. [ 165.771387][ T3746] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 165.803838][ T3746] CPU: 0 PID: 3746 Comm: syz.3.1308 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 165.813787][ T3746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 165.823974][ T3746] Call Trace: [ 165.827271][ T3746] [ 165.830218][ T3746] __dump_stack+0x21/0x30 [ 165.834588][ T3746] dump_stack_lvl+0xee/0x150 [ 165.839201][ T3746] ? show_regs_print_info+0x20/0x20 [ 165.844425][ T3746] dump_stack+0x15/0x20 [ 165.848655][ T3746] should_fail+0x3c1/0x510 [ 165.853093][ T3746] should_fail_usercopy+0x1a/0x20 [ 165.858140][ T3746] _copy_from_iter+0x387/0x1050 [ 165.863014][ T3746] ? copy_mc_pipe_to_iter+0x770/0x770 [ 165.868524][ T3746] ? check_stack_object+0x81/0x140 [ 165.873658][ T3746] ? __check_object_size+0x2f4/0x3c0 [ 165.878965][ T3746] ip_generic_getfrag+0xf7/0x2a0 [ 165.883939][ T3746] ? ip_skb_dst_mtu+0x630/0x630 [ 165.888811][ T3746] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 165.894645][ T3746] ? skb_put+0x10e/0x1f0 [ 165.898905][ T3746] __ip6_append_data+0x297f/0x37e0 [ 165.904040][ T3746] ? __kmalloc+0x16a/0x2c0 [ 165.908501][ T3746] ? ip6_setup_cork+0x1290/0x1290 [ 165.913555][ T3746] ? ip6_setup_cork+0xd10/0x1290 [ 165.918525][ T3746] ip6_make_skb+0x37a/0x6c0 [ 165.923060][ T3746] ? ip_skb_dst_mtu+0x630/0x630 [ 165.927937][ T3746] ? ip_skb_dst_mtu+0x630/0x630 [ 165.932817][ T3746] ? ip6_flush_pending_frames+0x360/0x360 [ 165.938554][ T3746] ? ip6_sk_dst_lookup_flow+0x504/0x820 [ 165.944128][ T3746] udpv6_sendmsg+0x1b03/0x2670 [ 165.948917][ T3746] ? memcpy+0x56/0x70 [ 165.952920][ T3746] ? ip_skb_dst_mtu+0x630/0x630 [ 165.957794][ T3746] ? avc_denied+0x1b0/0x1b0 [ 165.962322][ T3746] ? udp_v6_early_demux+0xbc0/0xbc0 [ 165.967556][ T3746] ? avc_has_perm_noaudit+0x460/0x460 [ 165.972964][ T3746] ? inet_send_prepare+0x60/0x4c0 [ 165.978020][ T3746] inet6_sendmsg+0xa5/0xc0 [ 165.982469][ T3746] ? inet6_compat_ioctl+0x300/0x300 [ 165.987869][ T3746] ____sys_sendmsg+0x5a2/0x8c0 [ 165.992666][ T3746] ? __sys_sendmsg_sock+0x40/0x40 [ 165.997732][ T3746] ? import_iovec+0x7c/0xb0 [ 166.002274][ T3746] ___sys_sendmsg+0x1f0/0x260 [ 166.006981][ T3746] ? _kstrtoull+0x3c0/0x4d0 [ 166.011516][ T3746] ? __sys_sendmsg+0x250/0x250 [ 166.016314][ T3746] ? __fdget+0x1a1/0x230 [ 166.020587][ T3746] __sys_sendmmsg+0x278/0x480 [ 166.025296][ T3746] ? __ia32_sys_sendmsg+0x2a0/0x2a0 [ 166.030529][ T3746] ? __ia32_sys_read+0x90/0x90 [ 166.035325][ T3746] __x64_sys_sendmmsg+0xa0/0xb0 [ 166.040212][ T3746] x64_sys_call+0x6c6/0x9a0 [ 166.044744][ T3746] do_syscall_64+0x4c/0xa0 [ 166.049331][ T3746] ? clear_bhb_loop+0x50/0xa0 [ 166.054038][ T3746] ? clear_bhb_loop+0x50/0xa0 [ 166.058752][ T3746] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 166.064678][ T3746] RIP: 0033:0x7f4a60f31929 [ 166.069135][ T3746] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 166.088776][ T3746] RSP: 002b:00007f4a5f579038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 166.097196][ T3746] RAX: ffffffffffffffda RBX: 00007f4a61159080 RCX: 00007f4a60f31929 [ 166.105176][ T3746] RDX: 0400000000000172 RSI: 0000200000003cc0 RDI: 0000000000000005 [ 166.113154][ T3746] RBP: 00007f4a5f579090 R08: 0000000000000000 R09: 0000000000000000 [ 166.121146][ T3746] R10: 0000000004001c00 R11: 0000000000000246 R12: 0000000000000001 [ 166.129122][ T3746] R13: 0000000000000000 R14: 00007f4a61159080 R15: 00007ffc4b583428 [ 166.137105][ T3746] [ 166.173048][ T30] kauditd_printk_skb: 507 callbacks suppressed [ 166.173063][ T30] audit: type=1400 audit(1749986106.681:9143): avc: denied { map_create } for pid=3748 comm="syz.2.1311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 166.199293][ T30] audit: type=1400 audit(1749986106.681:9144): avc: denied { prog_load } for pid=3748 comm="syz.2.1311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 166.220694][ T30] audit: type=1400 audit(1749986106.681:9145): avc: denied { prog_load } for pid=3748 comm="syz.2.1311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 166.245662][ T30] audit: type=1400 audit(1749986106.752:9146): avc: denied { execmem } for pid=3755 comm="syz.1.1314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 166.265089][ T30] audit: type=1400 audit(1749986106.752:9147): avc: denied { prog_load } for pid=3755 comm="syz.1.1314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 166.284858][ T30] audit: type=1400 audit(1749986106.752:9148): avc: denied { write } for pid=3755 comm="syz.1.1314" name="001" dev="devtmpfs" ino=181 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 [ 166.308299][ T30] audit: type=1400 audit(1749986106.752:9149): avc: denied { map_create } for pid=3755 comm="syz.1.1314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 166.329023][ T30] audit: type=1400 audit(1749986106.762:9150): avc: denied { prog_load } for pid=3757 comm="syz.1.1315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 166.348394][ T30] audit: type=1400 audit(1749986106.762:9151): avc: denied { map_create } for pid=3757 comm="syz.1.1315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 166.455128][ T30] audit: type=1400 audit(1749986106.962:9152): avc: denied { prog_load } for pid=3759 comm="syz.1.1316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 166.816042][ T3767] netlink: 'syz.3.1319': attribute type 12 has an invalid length. [ 167.524347][ T3798] netlink: 'syz.2.1333': attribute type 12 has an invalid length. [ 168.757868][ T3847] FAULT_INJECTION: forcing a failure. [ 168.757868][ T3847] name failslab, interval 1, probability 0, space 0, times 0 [ 168.770711][ T3847] CPU: 0 PID: 3847 Comm: syz.1.1354 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 168.780634][ T3847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 168.790739][ T3847] Call Trace: [ 168.794029][ T3847] [ 168.796981][ T3847] __dump_stack+0x21/0x30 [ 168.801318][ T3847] dump_stack_lvl+0xee/0x150 [ 168.806017][ T3847] ? show_regs_print_info+0x20/0x20 [ 168.811224][ T3847] ? number+0xd1d/0xf70 [ 168.815383][ T3847] dump_stack+0x15/0x20 [ 168.819541][ T3847] should_fail+0x3c1/0x510 [ 168.824047][ T3847] __should_failslab+0xa4/0xe0 [ 168.828812][ T3847] should_failslab+0x9/0x20 [ 168.833320][ T3847] slab_pre_alloc_hook+0x3b/0xe0 [ 168.838269][ T3847] ? sidtab_sid2str_get+0x120/0x2c0 [ 168.843473][ T3847] __kmalloc_track_caller+0x6c/0x2c0 [ 168.848759][ T3847] ? sidtab_sid2str_get+0x120/0x2c0 [ 168.853965][ T3847] kmemdup+0x26/0x60 [ 168.857865][ T3847] sidtab_sid2str_get+0x120/0x2c0 [ 168.862892][ T3847] security_sid_to_context_core+0x2ac/0x480 [ 168.868797][ T3847] security_sid_to_context+0x33/0x40 [ 168.874128][ T3847] selinux_secid_to_secctx+0x2c/0x40 [ 168.879699][ T3847] security_secid_to_secctx+0x74/0xb0 [ 168.885094][ T3847] audit_log_task_context+0xc6/0x1e0 [ 168.890400][ T3847] ? audit_log_key+0x130/0x130 [ 168.895171][ T3847] ? audit_log_start+0x7aa/0x8b0 [ 168.900112][ T3847] audit_log_task+0x185/0x2e0 [ 168.904797][ T3847] ? audit_core_dumps+0x110/0x110 [ 168.909822][ T3847] ? migrate_enable+0x192/0x260 [ 168.914672][ T3847] ? migrate_disable+0x180/0x180 [ 168.919611][ T3847] audit_seccomp+0x7f/0x160 [ 168.924204][ T3847] __seccomp_filter+0xb06/0x1900 [ 168.929147][ T3847] ? file_end_write+0x1b0/0x1b0 [ 168.933999][ T3847] ? __secure_computing+0x290/0x290 [ 168.939200][ T3847] ? __kasan_check_write+0x14/0x20 [ 168.944405][ T3847] ? mutex_unlock+0x89/0x220 [ 168.949000][ T3847] ? __mutex_lock_slowpath+0x10/0x10 [ 168.954295][ T3847] ? fput+0x1a/0x20 [ 168.958114][ T3847] ? ksys_write+0x1eb/0x240 [ 168.962619][ T3847] __secure_computing+0xea/0x290 [ 168.967563][ T3847] syscall_trace_enter+0xcf/0x180 [ 168.972591][ T3847] syscall_enter_from_user_mode+0x1f/0x30 [ 168.978319][ T3847] do_syscall_64+0x24/0xa0 [ 168.982741][ T3847] ? clear_bhb_loop+0x50/0xa0 [ 168.987421][ T3847] ? clear_bhb_loop+0x50/0xa0 [ 168.992099][ T3847] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 168.998024][ T3847] RIP: 0033:0x7f77232e2929 [ 169.002459][ T3847] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 169.022071][ T3847] RSP: 002b:00007f772194b038 EFLAGS: 00000246 ORIG_RAX: 000000000000011a [ 169.030490][ T3847] RAX: ffffffffffffffda RBX: 00007f7723509fa0 RCX: 00007f77232e2929 [ 169.038472][ T3847] RDX: 0000000000000008 RSI: 00002000000001c0 RDI: ffffffffffffffff [ 169.046450][ T3847] RBP: 00007f772194b090 R08: 0000000000000000 R09: 0000000000000000 [ 169.054424][ T3847] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 169.062522][ T3847] R13: 0000000000000000 R14: 00007f7723509fa0 R15: 00007ffc0d823428 [ 169.070502][ T3847] [ 169.914708][ T3909] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1378'. [ 169.926983][ T3909] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1378'. [ 169.977953][ T3913] netlink: 96 bytes leftover after parsing attributes in process `syz.4.1380'. [ 170.280367][ T3918] FAULT_INJECTION: forcing a failure. [ 170.280367][ T3918] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 170.313608][ T3918] CPU: 1 PID: 3918 Comm: syz.2.1382 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 170.323675][ T3918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 170.333771][ T3918] Call Trace: [ 170.337067][ T3918] [ 170.340009][ T3918] __dump_stack+0x21/0x30 [ 170.344355][ T3918] dump_stack_lvl+0xee/0x150 [ 170.348968][ T3918] ? show_regs_print_info+0x20/0x20 [ 170.354300][ T3918] ? avc_has_perm+0x158/0x240 [ 170.359009][ T3918] dump_stack+0x15/0x20 [ 170.363192][ T3918] should_fail+0x3c1/0x510 [ 170.367639][ T3918] should_fail_alloc_page+0x55/0x80 [ 170.372874][ T3918] prepare_alloc_pages+0x156/0x600 [ 170.378015][ T3918] ? __alloc_pages_bulk+0xab0/0xab0 [ 170.383242][ T3918] ? 0xffffffffa002c000 [ 170.387431][ T3918] ? is_bpf_text_address+0x177/0x190 [ 170.392746][ T3918] __alloc_pages+0x10a/0x440 [ 170.397358][ T3918] ? prep_new_page+0x110/0x110 [ 170.402155][ T3918] skb_page_frag_refill+0x202/0x3a0 [ 170.407391][ T3918] tun_get_user+0x785/0x33c0 [ 170.412001][ T3918] ? __kasan_poison_object_data+0x30/0x30 [ 170.417741][ T3918] ? kmem_cache_free+0x100/0x320 [ 170.422723][ T3918] ? __x64_sys_openat+0x136/0x160 [ 170.427776][ T3918] ? x64_sys_call+0x219/0x9a0 [ 170.432477][ T3918] ? tun_do_read+0x1c40/0x1c40 [ 170.437274][ T3918] ? kstrtouint_from_user+0x1a0/0x200 [ 170.442672][ T3918] ? kstrtol_from_user+0x260/0x260 [ 170.447814][ T3918] ? avc_policy_seqno+0x1b/0x70 [ 170.452695][ T3918] ? selinux_file_permission+0x2aa/0x510 [ 170.458356][ T3918] tun_chr_write_iter+0x1eb/0x2e0 [ 170.463414][ T3918] vfs_write+0x802/0xf70 [ 170.467680][ T3918] ? file_end_write+0x1b0/0x1b0 [ 170.472562][ T3918] ? __fget_files+0x2c4/0x320 [ 170.477278][ T3918] ? __fdget_pos+0x1f7/0x380 [ 170.481915][ T3918] ? ksys_write+0x71/0x240 [ 170.486357][ T3918] ksys_write+0x140/0x240 [ 170.490725][ T3918] ? __ia32_sys_read+0x90/0x90 [ 170.495508][ T3918] ? debug_smp_processor_id+0x17/0x20 [ 170.500905][ T3918] __x64_sys_write+0x7b/0x90 [ 170.505518][ T3918] x64_sys_call+0x8ef/0x9a0 [ 170.510040][ T3918] do_syscall_64+0x4c/0xa0 [ 170.514482][ T3918] ? clear_bhb_loop+0x50/0xa0 [ 170.519178][ T3918] ? clear_bhb_loop+0x50/0xa0 [ 170.523883][ T3918] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 170.529794][ T3918] RIP: 0033:0x7f9a97a0d3df [ 170.534230][ T3918] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 170.553852][ T3918] RSP: 002b:00007f9a96077000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 170.562291][ T3918] RAX: ffffffffffffffda RBX: 00007f9a97c35fa0 RCX: 00007f9a97a0d3df [ 170.570287][ T3918] RDX: 000000000000006e RSI: 0000200000000200 RDI: 00000000000000c8 [ 170.578280][ T3918] RBP: 00007f9a96077090 R08: 0000000000000000 R09: 0000000000000000 [ 170.586274][ T3918] R10: 000000000000006e R11: 0000000000000293 R12: 0000000000000001 [ 170.594264][ T3918] R13: 0000000000000001 R14: 00007f9a97c35fa0 R15: 00007ffe93508328 [ 170.602263][ T3918] [ 171.024600][ T3949] netlink: 'syz.1.1395': attribute type 12 has an invalid length. [ 171.132529][ T3962] FAULT_INJECTION: forcing a failure. [ 171.132529][ T3962] name failslab, interval 1, probability 0, space 0, times 0 [ 171.145288][ T3962] CPU: 1 PID: 3962 Comm: syz.3.1401 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 171.155209][ T3962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 171.165305][ T3962] Call Trace: [ 171.168605][ T3962] [ 171.171558][ T3962] __dump_stack+0x21/0x30 [ 171.176047][ T3962] dump_stack_lvl+0xee/0x150 [ 171.180664][ T3962] ? show_regs_print_info+0x20/0x20 [ 171.185972][ T3962] dump_stack+0x15/0x20 [ 171.190151][ T3962] should_fail+0x3c1/0x510 [ 171.194588][ T3962] __should_failslab+0xa4/0xe0 [ 171.199375][ T3962] should_failslab+0x9/0x20 [ 171.203908][ T3962] slab_pre_alloc_hook+0x3b/0xe0 [ 171.208870][ T3962] ? getname_flags+0xb9/0x500 [ 171.213579][ T3962] kmem_cache_alloc+0x44/0x260 [ 171.218367][ T3962] getname_flags+0xb9/0x500 [ 171.222952][ T3962] getname+0x19/0x20 [ 171.226953][ T3962] do_sys_openat2+0xd9/0x7b0 [ 171.231563][ T3962] ? __kasan_check_write+0x14/0x20 [ 171.236694][ T3962] ? fput_many+0x15a/0x1a0 [ 171.241163][ T3962] ? do_sys_open+0xe0/0xe0 [ 171.245599][ T3962] ? fput+0x1a/0x20 [ 171.249425][ T3962] ? ksys_write+0x1eb/0x240 [ 171.253947][ T3962] ? __ia32_sys_read+0x90/0x90 [ 171.258724][ T3962] __x64_sys_creat+0x8e/0xb0 [ 171.263321][ T3962] x64_sys_call+0x94a/0x9a0 [ 171.267824][ T3962] do_syscall_64+0x4c/0xa0 [ 171.272241][ T3962] ? clear_bhb_loop+0x50/0xa0 [ 171.276939][ T3962] ? clear_bhb_loop+0x50/0xa0 [ 171.281618][ T3962] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 171.287518][ T3962] RIP: 0033:0x7f4a60f31929 [ 171.291944][ T3962] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 171.311555][ T3962] RSP: 002b:00007f4a5f59a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 171.319973][ T3962] RAX: ffffffffffffffda RBX: 00007f4a61158fa0 RCX: 00007f4a60f31929 [ 171.327945][ T3962] RDX: 0000000000000000 RSI: 0000000000000067 RDI: 00002000000000c0 [ 171.335916][ T3962] RBP: 00007f4a5f59a090 R08: 0000000000000000 R09: 0000000000000000 [ 171.343890][ T3962] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 171.351861][ T3962] R13: 0000000000000000 R14: 00007f4a61158fa0 R15: 00007ffc4b583428 [ 171.359848][ T3962] [ 171.373732][ T30] kauditd_printk_skb: 736 callbacks suppressed [ 171.373747][ T30] audit: type=1400 audit(1749986111.882:9888): avc: denied { read write } for pid=284 comm="syz-executor" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 171.414079][ T30] audit: type=1400 audit(1749986111.882:9889): avc: denied { read write } for pid=282 comm="syz-executor" name="loop3" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 171.442633][ T30] audit: type=1400 audit(1749986111.892:9890): avc: denied { prog_load } for pid=3963 comm="syz.3.1403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 171.463237][ T30] audit: type=1400 audit(1749986111.892:9891): avc: denied { create } for pid=3963 comm="syz.3.1403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 171.482971][ T30] audit: type=1400 audit(1749986111.892:9892): avc: denied { map_create } for pid=3963 comm="syz.3.1403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 171.502270][ T30] audit: type=1400 audit(1749986111.892:9893): avc: denied { prog_load } for pid=3963 comm="syz.3.1403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 171.522354][ T30] audit: type=1400 audit(1749986111.922:9894): avc: denied { prog_load } for pid=3963 comm="syz.3.1403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 171.541780][ T30] audit: type=1400 audit(1749986111.922:9895): avc: denied { read write } for pid=3965 comm="syz.2.1402" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 171.572472][ T30] audit: type=1400 audit(1749986111.933:9896): avc: denied { read write } for pid=282 comm="syz-executor" name="loop3" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 171.609643][ T30] audit: type=1400 audit(1749986111.963:9897): avc: denied { read write } for pid=284 comm="syz-executor" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 171.636579][ T3978] netlink: 'syz.3.1408': attribute type 12 has an invalid length. [ 172.054712][ T4011] netlink: 'syz.4.1421': attribute type 12 has an invalid length. [ 172.777572][ T4029] device pim6reg1 entered promiscuous mode [ 172.856432][ T4033] FAULT_INJECTION: forcing a failure. [ 172.856432][ T4033] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 172.869563][ T4033] CPU: 0 PID: 4033 Comm: syz.0.1429 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 172.879562][ T4033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 172.889641][ T4033] Call Trace: [ 172.892939][ T4033] [ 172.895882][ T4033] __dump_stack+0x21/0x30 [ 172.900233][ T4033] dump_stack_lvl+0xee/0x150 [ 172.904841][ T4033] ? show_regs_print_info+0x20/0x20 [ 172.910058][ T4033] ? stack_trace_save+0x98/0xe0 [ 172.914939][ T4033] dump_stack+0x15/0x20 [ 172.919124][ T4033] should_fail+0x3c1/0x510 [ 172.923568][ T4033] should_fail_usercopy+0x1a/0x20 [ 172.928604][ T4033] _copy_from_user+0x20/0xd0 [ 172.933208][ T4033] iovec_from_user+0x1bc/0x2f0 [ 172.938004][ T4033] ? __copy_msghdr_from_user+0x302/0x5e0 [ 172.943639][ T4033] ? _kstrtoull+0x3c0/0x4d0 [ 172.948145][ T4033] __import_iovec+0x71/0x400 [ 172.952739][ T4033] ? __ia32_sys_shutdown+0x1e0/0x1e0 [ 172.958026][ T4033] ? kstrtouint_from_user+0x1a0/0x200 [ 172.963397][ T4033] import_iovec+0x7c/0xb0 [ 172.967735][ T4033] ___sys_sendmsg+0x1b9/0x260 [ 172.972410][ T4033] ? __sys_sendmsg+0x250/0x250 [ 172.977176][ T4033] ? __fdget+0x1a1/0x230 [ 172.981419][ T4033] __x64_sys_sendmsg+0x1e2/0x2a0 [ 172.986356][ T4033] ? ___sys_sendmsg+0x260/0x260 [ 172.991209][ T4033] ? ksys_write+0x1eb/0x240 [ 172.995731][ T4033] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 173.001802][ T4033] x64_sys_call+0x4b/0x9a0 [ 173.006221][ T4033] do_syscall_64+0x4c/0xa0 [ 173.010637][ T4033] ? clear_bhb_loop+0x50/0xa0 [ 173.015320][ T4033] ? clear_bhb_loop+0x50/0xa0 [ 173.019998][ T4033] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 173.025892][ T4033] RIP: 0033:0x7fca29500929 [ 173.030323][ T4033] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 173.049947][ T4033] RSP: 002b:00007fca27b69038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 173.058375][ T4033] RAX: ffffffffffffffda RBX: 00007fca29727fa0 RCX: 00007fca29500929 [ 173.066347][ T4033] RDX: 0000000020004804 RSI: 0000200000006040 RDI: 0000000000000005 [ 173.074320][ T4033] RBP: 00007fca27b69090 R08: 0000000000000000 R09: 0000000000000000 [ 173.082297][ T4033] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 173.090333][ T4033] R13: 0000000000000000 R14: 00007fca29727fa0 R15: 00007ffc308af708 [ 173.098431][ T4033] [ 173.637777][ T4061] FAULT_INJECTION: forcing a failure. [ 173.637777][ T4061] name failslab, interval 1, probability 0, space 0, times 0 [ 173.650595][ T4061] CPU: 0 PID: 4061 Comm: syz.2.1441 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 173.660524][ T4061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 173.670609][ T4061] Call Trace: [ 173.673909][ T4061] [ 173.676858][ T4061] __dump_stack+0x21/0x30 [ 173.681212][ T4061] dump_stack_lvl+0xee/0x150 [ 173.685818][ T4061] ? show_regs_print_info+0x20/0x20 [ 173.691036][ T4061] ? kasan_set_track+0x5b/0x70 [ 173.695816][ T4061] ? kasan_set_track+0x4a/0x70 [ 173.700599][ T4061] dump_stack+0x15/0x20 [ 173.704776][ T4061] should_fail+0x3c1/0x510 [ 173.709215][ T4061] __should_failslab+0xa4/0xe0 [ 173.714003][ T4061] should_failslab+0x9/0x20 [ 173.718562][ T4061] slab_pre_alloc_hook+0x3b/0xe0 [ 173.723532][ T4061] ? vm_area_dup+0x26/0x210 [ 173.728063][ T4061] kmem_cache_alloc+0x44/0x260 [ 173.732878][ T4061] vm_area_dup+0x26/0x210 [ 173.737343][ T4061] __split_vma+0xac/0x3e0 [ 173.741706][ T4061] split_vma+0x7c/0xd0 [ 173.745803][ T4061] mprotect_fixup+0x493/0x7d0 [ 173.750514][ T4061] ? security_file_permission+0x83/0xa0 [ 173.756100][ T4061] ? change_protection+0x1510/0x1510 [ 173.761420][ T4061] ? security_file_mprotect+0x84/0xa0 [ 173.766825][ T4061] do_mprotect_pkey+0x70b/0xa80 [ 173.771703][ T4061] ? __mutex_lock_slowpath+0x10/0x10 [ 173.777030][ T4061] ? prot_none_test+0x10/0x10 [ 173.781736][ T4061] ? debug_smp_processor_id+0x17/0x20 [ 173.787126][ T4061] __x64_sys_mprotect+0x80/0x90 [ 173.792003][ T4061] x64_sys_call+0x912/0x9a0 [ 173.796528][ T4061] do_syscall_64+0x4c/0xa0 [ 173.800965][ T4061] ? clear_bhb_loop+0x50/0xa0 [ 173.805666][ T4061] ? clear_bhb_loop+0x50/0xa0 [ 173.810361][ T4061] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 173.816277][ T4061] RIP: 0033:0x7f9a97a0e929 [ 173.820715][ T4061] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 173.840338][ T4061] RSP: 002b:00007f9a96077038 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 173.848781][ T4061] RAX: ffffffffffffffda RBX: 00007f9a97c35fa0 RCX: 00007f9a97a0e929 [ 173.856786][ T4061] RDX: 0000000000000003 RSI: 0000000000003000 RDI: 0000200000107000 [ 173.864804][ T4061] RBP: 00007f9a96077090 R08: 0000000000000000 R09: 0000000000000000 [ 173.872810][ T4061] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 173.880822][ T4061] R13: 0000000000000000 R14: 00007f9a97c35fa0 R15: 00007ffe93508328 [ 173.888831][ T4061] [ 174.134722][ T4073] netlink: 'syz.2.1447': attribute type 12 has an invalid length. [ 174.159507][ T4075] netlink: 'syz.2.1448': attribute type 12 has an invalid length. [ 175.160232][ T4104] netlink: 'syz.0.1459': attribute type 12 has an invalid length. [ 175.494046][ T4132] netlink: 'syz.1.1471': attribute type 12 has an invalid length. [ 176.364165][ T4161] netlink: 'syz.4.1484': attribute type 12 has an invalid length. [ 176.377356][ T30] kauditd_printk_skb: 679 callbacks suppressed [ 176.377381][ T30] audit: type=1400 audit(1749986116.910:10577): avc: denied { read write } for pid=285 comm="syz-executor" name="loop4" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 176.408455][ T30] audit: type=1400 audit(1749986116.930:10578): avc: denied { read write } for pid=4162 comm="syz.4.1485" name="loop4" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 176.433007][ T30] audit: type=1400 audit(1749986116.950:10579): avc: denied { map_create } for pid=4162 comm="syz.4.1485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 176.455635][ T30] audit: type=1400 audit(1749986116.950:10580): avc: denied { prog_load } for pid=4162 comm="syz.4.1485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 176.475079][ T30] audit: type=1400 audit(1749986116.950:10581): avc: denied { read write } for pid=282 comm="syz-executor" name="loop3" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 176.499544][ T30] audit: type=1400 audit(1749986116.950:10582): avc: denied { prog_load } for pid=4162 comm="syz.4.1485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 176.520852][ T30] audit: type=1400 audit(1749986116.960:10583): avc: denied { read write } for pid=284 comm="syz-executor" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 176.548554][ T30] audit: type=1400 audit(1749986116.960:10584): avc: denied { prog_load } for pid=4164 comm="syz.2.1487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 176.569513][ T30] audit: type=1400 audit(1749986116.960:10585): avc: denied { prog_load } for pid=4164 comm="syz.2.1487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 176.590735][ T30] audit: type=1400 audit(1749986116.980:10586): avc: denied { read write } for pid=4164 comm="syz.2.1487" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 176.810071][ T4184] FAULT_INJECTION: forcing a failure. [ 176.810071][ T4184] name failslab, interval 1, probability 0, space 0, times 0 [ 176.822967][ T4184] CPU: 1 PID: 4184 Comm: syz.1.1494 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 176.832894][ T4184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 176.842979][ T4184] Call Trace: [ 176.846255][ T4184] [ 176.849186][ T4184] __dump_stack+0x21/0x30 [ 176.853514][ T4184] dump_stack_lvl+0xee/0x150 [ 176.858109][ T4184] ? show_regs_print_info+0x20/0x20 [ 176.863314][ T4184] ? file_end_write+0x1b0/0x1b0 [ 176.868352][ T4184] dump_stack+0x15/0x20 [ 176.872513][ T4184] should_fail+0x3c1/0x510 [ 176.876932][ T4184] __should_failslab+0xa4/0xe0 [ 176.881714][ T4184] should_failslab+0x9/0x20 [ 176.886223][ T4184] slab_pre_alloc_hook+0x3b/0xe0 [ 176.891167][ T4184] ? getname_flags+0xb9/0x500 [ 176.895843][ T4184] kmem_cache_alloc+0x44/0x260 [ 176.900637][ T4184] getname_flags+0xb9/0x500 [ 176.905142][ T4184] __x64_sys_rename+0x5f/0x90 [ 176.909819][ T4184] x64_sys_call+0x680/0x9a0 [ 176.914324][ T4184] do_syscall_64+0x4c/0xa0 [ 176.918743][ T4184] ? clear_bhb_loop+0x50/0xa0 [ 176.923430][ T4184] ? clear_bhb_loop+0x50/0xa0 [ 176.928103][ T4184] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 176.933996][ T4184] RIP: 0033:0x7f77232e2929 [ 176.938436][ T4184] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 176.958246][ T4184] RSP: 002b:00007f772194b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 176.966676][ T4184] RAX: ffffffffffffffda RBX: 00007f7723509fa0 RCX: 00007f77232e2929 [ 176.974647][ T4184] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000000 [ 176.982620][ T4184] RBP: 00007f772194b090 R08: 0000000000000000 R09: 0000000000000000 [ 176.990599][ T4184] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 176.998661][ T4184] R13: 0000000000000000 R14: 00007f7723509fa0 R15: 00007ffc0d823428 [ 177.006640][ T4184] [ 178.273556][ T4249] FAULT_INJECTION: forcing a failure. [ 178.273556][ T4249] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 178.287114][ T4249] CPU: 0 PID: 4249 Comm: syz.4.1522 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 178.297037][ T4249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 178.307113][ T4249] Call Trace: [ 178.310408][ T4249] [ 178.313357][ T4249] __dump_stack+0x21/0x30 [ 178.317704][ T4249] dump_stack_lvl+0xee/0x150 [ 178.322308][ T4249] ? show_regs_print_info+0x20/0x20 [ 178.327529][ T4249] ? audit_log_end+0x1c0/0x230 [ 178.332308][ T4249] dump_stack+0x15/0x20 [ 178.336484][ T4249] should_fail+0x3c1/0x510 [ 178.340919][ T4249] should_fail_usercopy+0x1a/0x20 [ 178.346068][ T4249] _copy_from_user+0x20/0xd0 [ 178.350679][ T4249] __se_sys_io_uring_setup+0xb2/0x29a0 [ 178.356161][ T4249] ? file_end_write+0x1b0/0x1b0 [ 178.361041][ T4249] ? __secure_computing+0x290/0x290 [ 178.366264][ T4249] ? __kasan_check_write+0x14/0x20 [ 178.371414][ T4249] ? mutex_unlock+0x89/0x220 [ 178.376027][ T4249] ? __mutex_lock_slowpath+0x10/0x10 [ 178.381338][ T4249] ? __x64_sys_io_uring_setup+0x70/0x70 [ 178.386907][ T4249] ? __secure_computing+0xea/0x290 [ 178.392047][ T4249] __x64_sys_io_uring_setup+0x5b/0x70 [ 178.397440][ T4249] x64_sys_call+0x5f4/0x9a0 [ 178.401974][ T4249] do_syscall_64+0x4c/0xa0 [ 178.406412][ T4249] ? clear_bhb_loop+0x50/0xa0 [ 178.411131][ T4249] ? clear_bhb_loop+0x50/0xa0 [ 178.415957][ T4249] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 178.421880][ T4249] RIP: 0033:0x7f06f4aec929 [ 178.426325][ T4249] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 178.445958][ T4249] RSP: 002b:00007f06f3155038 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 178.454406][ T4249] RAX: ffffffffffffffda RBX: 00007f06f4d13fa0 RCX: 00007f06f4aec929 [ 178.462409][ T4249] RDX: 0000000000000000 RSI: 0000200000000100 RDI: 0000000000000ad5 [ 178.470407][ T4249] RBP: 00007f06f3155090 R08: 0000000000000000 R09: 0000000000000000 [ 178.478404][ T4249] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 178.486493][ T4249] R13: 0000000000000000 R14: 00007f06f4d13fa0 R15: 00007ffeefd7aef8 [ 178.494484][ T4249] [ 179.267138][ T4281] syz.4.1535 uses obsolete (PF_INET,SOCK_PACKET) [ 181.170355][ T4348] FAULT_INJECTION: forcing a failure. [ 181.170355][ T4348] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 181.210726][ T4348] CPU: 0 PID: 4348 Comm: syz.2.1562 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 181.220674][ T4348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 181.230753][ T4348] Call Trace: [ 181.234075][ T4348] [ 181.237113][ T4348] __dump_stack+0x21/0x30 [ 181.241467][ T4348] dump_stack_lvl+0xee/0x150 [ 181.246076][ T4348] ? show_regs_print_info+0x20/0x20 [ 181.251296][ T4348] dump_stack+0x15/0x20 [ 181.255487][ T4348] should_fail+0x3c1/0x510 [ 181.259923][ T4348] should_fail_usercopy+0x1a/0x20 [ 181.264970][ T4348] _copy_from_user+0x20/0xd0 [ 181.269594][ T4348] do_seccomp+0x455/0x1410 [ 181.274040][ T4348] ? __seccomp_filter+0xb06/0x1900 [ 181.279173][ T4348] ? prctl_set_seccomp+0x60/0x60 [ 181.284132][ T4348] ? file_end_write+0x1b0/0x1b0 [ 181.289011][ T4348] ? cap_task_prctl+0xb2/0x950 [ 181.293791][ T4348] ? security_task_prctl+0xd4/0x100 [ 181.299023][ T4348] prctl_set_seccomp+0x4c/0x60 [ 181.303809][ T4348] __se_sys_prctl+0x4e4/0x10a0 [ 181.308591][ T4348] ? __x64_sys_prctl+0xd0/0xd0 [ 181.313376][ T4348] ? __secure_computing+0xea/0x290 [ 181.318511][ T4348] __x64_sys_prctl+0xbf/0xd0 [ 181.323126][ T4348] x64_sys_call+0x633/0x9a0 [ 181.327650][ T4348] do_syscall_64+0x4c/0xa0 [ 181.332087][ T4348] ? clear_bhb_loop+0x50/0xa0 [ 181.336786][ T4348] ? clear_bhb_loop+0x50/0xa0 [ 181.341479][ T4348] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 181.347396][ T4348] RIP: 0033:0x7f9a97a0e929 [ 181.351830][ T4348] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 181.371457][ T4348] RSP: 002b:00007f9a96077038 EFLAGS: 00000246 ORIG_RAX: 000000000000009d [ 181.379900][ T4348] RAX: ffffffffffffffda RBX: 00007f9a97c35fa0 RCX: 00007f9a97a0e929 [ 181.387887][ T4348] RDX: 0000200000000180 RSI: 0000000000000002 RDI: 0000000000000016 [ 181.395875][ T4348] RBP: 00007f9a96077090 R08: 0000000000000000 R09: 0000000000000000 [ 181.403865][ T4348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 181.411860][ T4348] R13: 0000000000000000 R14: 00007f9a97c35fa0 R15: 00007ffe93508328 [ 181.419855][ T4348] [ 181.431450][ T30] kauditd_printk_skb: 651 callbacks suppressed [ 181.431465][ T30] audit: type=1326 audit(1749986121.966:11238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4347 comm="syz.2.1562" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f9a97a0d33c code=0x7ffc0000 [ 181.461799][ T30] audit: type=1400 audit(1749986121.976:11239): avc: denied { execmem } for pid=4349 comm="syz.1.1563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 181.489075][ T30] audit: type=1326 audit(1749986121.996:11240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4347 comm="syz.2.1562" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f9a97a0d3df code=0x7ffc0000 [ 181.524856][ T30] audit: type=1326 audit(1749986121.996:11241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4347 comm="syz.2.1562" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f9a97a0d58a code=0x7ffc0000 [ 181.549614][ T30] audit: type=1326 audit(1749986121.996:11242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4347 comm="syz.2.1562" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a97a0e929 code=0x7ffc0000 [ 181.573920][ T30] audit: type=1326 audit(1749986121.996:11243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4347 comm="syz.2.1562" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a97a0e929 code=0x7ffc0000 [ 181.606269][ T30] audit: type=1400 audit(1749986122.046:11244): avc: denied { read write } for pid=284 comm="syz-executor" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 181.649045][ T30] audit: type=1400 audit(1749986122.056:11245): avc: denied { read write } for pid=4352 comm="syz.2.1564" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 181.683713][ T30] audit: type=1400 audit(1749986122.056:11246): avc: denied { read } for pid=4352 comm="syz.2.1564" name="binder0" dev="binder" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 181.707157][ T30] audit: type=1400 audit(1749986122.056:11247): avc: denied { create } for pid=4352 comm="syz.2.1564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 182.008301][ T4373] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=258 sclass=netlink_route_socket pid=4373 comm=syz.1.1572 [ 184.170152][ T4438] FAULT_INJECTION: forcing a failure. [ 184.170152][ T4438] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 184.183824][ T4438] CPU: 0 PID: 4438 Comm: syz.2.1599 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 184.193749][ T4438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 184.203847][ T4438] Call Trace: [ 184.207144][ T4438] [ 184.210096][ T4438] __dump_stack+0x21/0x30 [ 184.214471][ T4438] dump_stack_lvl+0xee/0x150 [ 184.219078][ T4438] ? show_regs_print_info+0x20/0x20 [ 184.224310][ T4438] ? __kasan_slab_free+0x11/0x20 [ 184.229275][ T4438] ? kmem_cache_free+0x100/0x320 [ 184.234235][ T4438] ? putname+0x111/0x160 [ 184.238491][ T4438] ? do_sys_openat2+0x6a7/0x7b0 [ 184.243362][ T4438] ? x64_sys_call+0x219/0x9a0 [ 184.248058][ T4438] dump_stack+0x15/0x20 [ 184.252238][ T4438] should_fail+0x3c1/0x510 [ 184.256676][ T4438] should_fail_usercopy+0x1a/0x20 [ 184.261720][ T4438] _copy_from_user+0x20/0xd0 [ 184.266333][ T4438] iovec_from_user+0x1bc/0x2f0 [ 184.271116][ T4438] __import_iovec+0x71/0x400 [ 184.275724][ T4438] import_iovec+0x7c/0xb0 [ 184.280080][ T4438] vfs_writev+0x112/0x540 [ 184.284427][ T4438] ? do_writev+0x2b0/0x2b0 [ 184.288863][ T4438] ? __fget_files+0x2c4/0x320 [ 184.293566][ T4438] ? __fdget_pos+0x1f7/0x380 [ 184.298171][ T4438] ? do_writev+0x76/0x2b0 [ 184.302516][ T4438] do_writev+0x14a/0x2b0 [ 184.306776][ T4438] ? do_readv+0x3e0/0x3e0 [ 184.311220][ T4438] ? debug_smp_processor_id+0x17/0x20 [ 184.316609][ T4438] __x64_sys_writev+0x7d/0x90 [ 184.321302][ T4438] x64_sys_call+0x974/0x9a0 [ 184.325821][ T4438] do_syscall_64+0x4c/0xa0 [ 184.330252][ T4438] ? clear_bhb_loop+0x50/0xa0 [ 184.334945][ T4438] ? clear_bhb_loop+0x50/0xa0 [ 184.339633][ T4438] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 184.345547][ T4438] RIP: 0033:0x7f9a97a0e929 [ 184.349994][ T4438] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 184.369622][ T4438] RSP: 002b:00007f9a96077038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 184.378194][ T4438] RAX: ffffffffffffffda RBX: 00007f9a97c35fa0 RCX: 00007f9a97a0e929 [ 184.386197][ T4438] RDX: 0000000000000001 RSI: 0000200000000040 RDI: 0000000000000003 [ 184.394198][ T4438] RBP: 00007f9a96077090 R08: 0000000000000000 R09: 0000000000000000 [ 184.402193][ T4438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 184.410189][ T4438] R13: 0000000000000000 R14: 00007f9a97c35fa0 R15: 00007ffe93508328 [ 184.418193][ T4438] [ 185.608525][ T4492] netlink: 'syz.3.1621': attribute type 12 has an invalid length. [ 186.531629][ T30] kauditd_printk_skb: 570 callbacks suppressed [ 186.531644][ T30] audit: type=1400 audit(1749986127.070:11818): avc: denied { read write } for pid=282 comm="syz-executor" name="loop3" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 186.578156][ T30] audit: type=1400 audit(1749986127.120:11819): avc: denied { prog_load } for pid=4539 comm="syz.3.1640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 186.599059][ T30] audit: type=1400 audit(1749986127.120:11820): avc: denied { execmem } for pid=4539 comm="syz.3.1640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 186.618590][ T30] audit: type=1400 audit(1749986127.120:11821): avc: denied { write } for pid=4539 comm="syz.3.1640" name="netstat" dev="proc" ino=4026532347 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 [ 186.642234][ T30] audit: type=1400 audit(1749986127.120:11822): avc: denied { read write } for pid=4539 comm="syz.3.1640" name="loop3" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 186.667965][ T30] audit: type=1400 audit(1749986127.120:11823): avc: denied { execmem } for pid=4539 comm="syz.3.1640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 186.687526][ T30] audit: type=1400 audit(1749986127.120:11824): avc: denied { name_bind } for pid=4539 comm="syz.3.1640" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=0 [ 186.709590][ T30] audit: type=1400 audit(1749986127.250:11825): avc: denied { read write } for pid=282 comm="syz-executor" name="loop3" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 186.746452][ T30] audit: type=1400 audit(1749986127.260:11826): avc: denied { prog_load } for pid=4541 comm="syz.3.1641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 186.776681][ T30] audit: type=1400 audit(1749986127.260:11827): avc: denied { read write } for pid=4541 comm="syz.3.1641" name="loop3" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 189.320466][ T4626] netlink: 16 bytes leftover after parsing attributes in process `syz.4.1676'. [ 191.533674][ T30] kauditd_printk_skb: 648 callbacks suppressed [ 191.533690][ T30] audit: type=1400 audit(1749986132.063:12476): avc: denied { read } for pid=4698 comm="syz.4.1706" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 191.578680][ T30] audit: type=1400 audit(1749986132.103:12477): avc: denied { create } for pid=4698 comm="syz.4.1706" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 191.599038][ T30] audit: type=1400 audit(1749986132.103:12478): avc: denied { create } for pid=4698 comm="syz.4.1706" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 191.619098][ T30] audit: type=1400 audit(1749986132.103:12479): avc: denied { execmem } for pid=4698 comm="syz.4.1706" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 191.638562][ T30] audit: type=1400 audit(1749986132.103:12480): avc: denied { read write } for pid=4698 comm="syz.4.1706" name="loop4" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 191.663013][ T30] audit: type=1400 audit(1749986132.113:12481): avc: denied { read write } for pid=285 comm="syz-executor" name="loop4" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 191.687334][ T30] audit: type=1400 audit(1749986132.143:12482): avc: denied { prog_load } for pid=4700 comm="syz.4.1707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 191.706857][ T30] audit: type=1400 audit(1749986132.183:12483): avc: denied { execmem } for pid=4700 comm="syz.4.1707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 191.739429][ T30] audit: type=1400 audit(1749986132.273:12484): avc: denied { read write } for pid=281 comm="syz-executor" name="loop0" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 191.780147][ T30] audit: type=1400 audit(1749986132.273:12485): avc: denied { write } for pid=4700 comm="syz.4.1707" name="netstat" dev="proc" ino=4026532661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 [ 192.732030][ T4730] FAULT_INJECTION: forcing a failure. [ 192.732030][ T4730] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 192.808696][ T4730] CPU: 1 PID: 4730 Comm: syz.3.1716 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 192.818742][ T4730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 192.828816][ T4730] Call Trace: [ 192.832111][ T4730] [ 192.835060][ T4730] __dump_stack+0x21/0x30 [ 192.839418][ T4730] dump_stack_lvl+0xee/0x150 [ 192.844043][ T4730] ? show_regs_print_info+0x20/0x20 [ 192.849254][ T4730] ? __kasan_slab_free+0x11/0x20 [ 192.854204][ T4730] ? kmem_cache_free+0x100/0x320 [ 192.859148][ T4730] ? putname+0x111/0x160 [ 192.863391][ T4730] ? do_sys_openat2+0x6a7/0x7b0 [ 192.868358][ T4730] ? x64_sys_call+0x219/0x9a0 [ 192.873052][ T4730] dump_stack+0x15/0x20 [ 192.877215][ T4730] should_fail+0x3c1/0x510 [ 192.881644][ T4730] should_fail_usercopy+0x1a/0x20 [ 192.886673][ T4730] _copy_from_user+0x20/0xd0 [ 192.891264][ T4730] iovec_from_user+0x1bc/0x2f0 [ 192.896027][ T4730] __import_iovec+0x71/0x400 [ 192.900622][ T4730] import_iovec+0x7c/0xb0 [ 192.904952][ T4730] vfs_writev+0x112/0x540 [ 192.909281][ T4730] ? do_writev+0x2b0/0x2b0 [ 192.913694][ T4730] ? __kasan_check_write+0x14/0x20 [ 192.918804][ T4730] ? mutex_lock+0x95/0x1a0 [ 192.923220][ T4730] ? wait_for_completion_killable_timeout+0x10/0x10 [ 192.929903][ T4730] ? __fget_files+0x2c4/0x320 [ 192.934606][ T4730] ? __fdget_pos+0x2d2/0x380 [ 192.939219][ T4730] ? do_writev+0x76/0x2b0 [ 192.943574][ T4730] do_writev+0x14a/0x2b0 [ 192.947818][ T4730] ? do_readv+0x3e0/0x3e0 [ 192.952148][ T4730] ? debug_smp_processor_id+0x17/0x20 [ 192.957519][ T4730] __x64_sys_writev+0x7d/0x90 [ 192.962196][ T4730] x64_sys_call+0x974/0x9a0 [ 192.966697][ T4730] do_syscall_64+0x4c/0xa0 [ 192.971112][ T4730] ? clear_bhb_loop+0x50/0xa0 [ 192.975790][ T4730] ? clear_bhb_loop+0x50/0xa0 [ 192.980464][ T4730] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 192.986364][ T4730] RIP: 0033:0x7f4a60f31929 [ 192.990775][ T4730] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 193.010387][ T4730] RSP: 002b:00007f4a5f558038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 193.018851][ T4730] RAX: ffffffffffffffda RBX: 00007f4a61159160 RCX: 00007f4a60f31929 [ 193.026840][ T4730] RDX: 0000000000000001 RSI: 0000200000000280 RDI: 0000000000000006 [ 193.034845][ T4730] RBP: 00007f4a5f558090 R08: 0000000000000000 R09: 0000000000000000 [ 193.042839][ T4730] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 193.050836][ T4730] R13: 0000000000000000 R14: 00007f4a61159160 R15: 00007ffc4b583428 [ 193.058811][ T4730] [ 196.623380][ T30] kauditd_printk_skb: 467 callbacks suppressed [ 196.623397][ T30] audit: type=1400 audit(1749986137.163:12953): avc: denied { read write } for pid=282 comm="syz-executor" name="loop3" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 196.707525][ T30] audit: type=1400 audit(1749986137.203:12954): avc: denied { read write } for pid=284 comm="syz-executor" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 196.762728][ T30] audit: type=1400 audit(1749986137.203:12955): avc: denied { map_create } for pid=4863 comm="syz.2.1770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 196.802546][ T30] audit: type=1400 audit(1749986137.203:12956): avc: denied { prog_load } for pid=4863 comm="syz.2.1770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 196.852142][ T30] audit: type=1400 audit(1749986137.233:12957): avc: denied { map_create } for pid=4863 comm="syz.2.1770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 196.888364][ T30] audit: type=1400 audit(1749986137.233:12958): avc: denied { prog_load } for pid=4863 comm="syz.2.1770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 196.929187][ T30] audit: type=1400 audit(1749986137.233:12959): avc: denied { prog_load } for pid=4863 comm="syz.2.1770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 196.966162][ T30] audit: type=1400 audit(1749986137.233:12960): avc: denied { create } for pid=4863 comm="syz.2.1770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 196.989856][ T30] audit: type=1400 audit(1749986137.233:12961): avc: denied { read write } for pid=282 comm="syz-executor" name="loop3" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 197.014667][ T30] audit: type=1400 audit(1749986137.243:12962): avc: denied { map_create } for pid=4871 comm="syz.3.1771" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 197.054108][ T4891] netlink: 'syz.3.1777': attribute type 12 has an invalid length. [ 197.945997][ T4934] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1792'. [ 197.958705][ T4934] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4934 comm=syz.1.1792 [ 199.850448][ T5014] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 199.916271][ T5018] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 200.076543][ T5029] netlink: 'syz.4.1834': attribute type 12 has an invalid length. [ 200.343000][ T5058] netlink: 'syz.0.1847': attribute type 12 has an invalid length. [ 200.628041][ T5077] netlink: 20 bytes leftover after parsing attributes in process `syz.4.1855'. [ 200.795049][ T5085] netlink: 'syz.3.1859': attribute type 12 has an invalid length. [ 201.641069][ T30] kauditd_printk_skb: 819 callbacks suppressed [ 201.641085][ T30] audit: type=1400 audit(1749986142.173:13782): avc: denied { read write } for pid=5107 comm="syz.0.1868" name="loop0" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 201.672431][ T30] audit: type=1400 audit(1749986142.183:13783): avc: denied { execmem } for pid=5107 comm="syz.0.1868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 201.692513][ T30] audit: type=1400 audit(1749986142.183:13784): avc: denied { map_create } for pid=5107 comm="syz.0.1868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 201.711982][ T30] audit: type=1400 audit(1749986142.183:13785): avc: denied { prog_load } for pid=5107 comm="syz.0.1868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 201.731352][ T30] audit: type=1400 audit(1749986142.183:13786): avc: denied { read write } for pid=5107 comm="syz.0.1868" name="loop0" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 201.744628][ T5114] netlink: 'syz.1.1871': attribute type 12 has an invalid length. [ 201.756423][ T30] audit: type=1400 audit(1749986142.183:13787): avc: denied { prog_load } for pid=5107 comm="syz.0.1868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 201.783716][ T30] audit: type=1400 audit(1749986142.183:13788): avc: denied { read write } for pid=281 comm="syz-executor" name="loop0" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 201.808522][ T30] audit: type=1400 audit(1749986142.233:13789): avc: denied { read write } for pid=5109 comm="syz.0.1869" name="loop0" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 201.832895][ T30] audit: type=1400 audit(1749986142.233:13790): avc: denied { map_create } for pid=5109 comm="syz.0.1869" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 201.852724][ T30] audit: type=1400 audit(1749986142.233:13791): avc: denied { prog_load } for pid=5109 comm="syz.0.1869" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 202.294622][ T5139] netlink: 20 bytes leftover after parsing attributes in process `syz.3.1878'. [ 202.735983][ T5145] FAULT_INJECTION: forcing a failure. [ 202.735983][ T5145] name failslab, interval 1, probability 0, space 0, times 0 [ 202.748694][ T5145] CPU: 0 PID: 5145 Comm: syz.1.1881 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 202.758626][ T5145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 202.768806][ T5145] Call Trace: [ 202.772112][ T5145] [ 202.775061][ T5145] __dump_stack+0x21/0x30 [ 202.779419][ T5145] dump_stack_lvl+0xee/0x150 [ 202.784049][ T5145] ? show_regs_print_info+0x20/0x20 [ 202.789277][ T5145] dump_stack+0x15/0x20 [ 202.793566][ T5145] should_fail+0x3c1/0x510 [ 202.798009][ T5145] __should_failslab+0xa4/0xe0 [ 202.802802][ T5145] should_failslab+0x9/0x20 [ 202.807336][ T5145] slab_pre_alloc_hook+0x3b/0xe0 [ 202.812305][ T5145] ? security_file_alloc+0x33/0x120 [ 202.817531][ T5145] kmem_cache_alloc+0x44/0x260 [ 202.822320][ T5145] security_file_alloc+0x33/0x120 [ 202.827369][ T5145] __alloc_file+0xb5/0x2a0 [ 202.831813][ T5145] alloc_empty_file+0x97/0x180 [ 202.836593][ T5145] path_openat+0xf3/0x2f10 [ 202.841194][ T5145] ? __stack_depot_save+0x34/0x480 [ 202.846514][ T5145] ? __kasan_slab_alloc+0xcf/0xf0 [ 202.851564][ T5145] ? __kasan_slab_alloc+0xbd/0xf0 [ 202.856611][ T5145] ? slab_post_alloc_hook+0x4f/0x2b0 [ 202.861929][ T5145] ? kmem_cache_alloc+0xf7/0x260 [ 202.866887][ T5145] ? getname_flags+0xb9/0x500 [ 202.871580][ T5145] ? getname+0x19/0x20 [ 202.875684][ T5145] ? do_sys_openat2+0xd9/0x7b0 [ 202.880467][ T5145] ? __x64_sys_openat+0x136/0x160 [ 202.885520][ T5145] ? x64_sys_call+0x219/0x9a0 [ 202.890212][ T5145] ? do_syscall_64+0x4c/0xa0 [ 202.894816][ T5145] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 202.900912][ T5145] ? do_filp_open+0x3e0/0x3e0 [ 202.905610][ T5145] do_filp_open+0x1b3/0x3e0 [ 202.910131][ T5145] ? vfs_tmpfile+0x2d0/0x2d0 [ 202.914836][ T5145] do_sys_openat2+0x14c/0x7b0 [ 202.919538][ T5145] ? __kasan_check_write+0x14/0x20 [ 202.924679][ T5145] ? do_sys_open+0xe0/0xe0 [ 202.929125][ T5145] ? fput+0x1a/0x20 [ 202.932971][ T5145] ? ksys_write+0x1eb/0x240 [ 202.937501][ T5145] ? __ia32_sys_read+0x90/0x90 [ 202.942292][ T5145] __x64_sys_openat+0x136/0x160 [ 202.947175][ T5145] x64_sys_call+0x219/0x9a0 [ 202.951712][ T5145] do_syscall_64+0x4c/0xa0 [ 202.956165][ T5145] ? clear_bhb_loop+0x50/0xa0 [ 202.960866][ T5145] ? clear_bhb_loop+0x50/0xa0 [ 202.965577][ T5145] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 202.971497][ T5145] RIP: 0033:0x7f77232e2929 [ 202.975942][ T5145] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 202.995574][ T5145] RSP: 002b:00007f772194b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 203.004017][ T5145] RAX: ffffffffffffffda RBX: 00007f7723509fa0 RCX: 00007f77232e2929 [ 203.012015][ T5145] RDX: 000000000000275a RSI: 0000200000000b40 RDI: ffffffffffffff9c [ 203.020016][ T5145] RBP: 00007f772194b090 R08: 0000000000000000 R09: 0000000000000000 [ 203.028147][ T5145] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 203.036148][ T5145] R13: 0000000000000000 R14: 00007f7723509fa0 R15: 00007ffc0d823428 [ 203.044157][ T5145] [ 203.085914][ T5150] netlink: 'syz.1.1883': attribute type 12 has an invalid length. [ 203.392600][ T5175] netlink: 'syz.4.1895': attribute type 12 has an invalid length. [ 203.680530][ T5201] netlink: 'syz.4.1907': attribute type 12 has an invalid length. [ 204.183713][ T5227] netlink: 'syz.2.1918': attribute type 12 has an invalid length. [ 205.647005][ T5253] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1925'. [ 205.669998][ T5253] netem: change failed [ 205.680757][ T5253] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1925'. [ 205.802298][ T5260] netlink: 'syz.3.1930': attribute type 12 has an invalid length. [ 206.377682][ T5284] FAULT_INJECTION: forcing a failure. [ 206.377682][ T5284] name failslab, interval 1, probability 0, space 0, times 0 [ 206.390889][ T5284] CPU: 0 PID: 5284 Comm: syz.4.1940 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 206.400814][ T5284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 206.410890][ T5284] Call Trace: [ 206.414187][ T5284] [ 206.417132][ T5284] __dump_stack+0x21/0x30 [ 206.421476][ T5284] dump_stack_lvl+0xee/0x150 [ 206.426079][ T5284] ? show_regs_print_info+0x20/0x20 [ 206.431299][ T5284] dump_stack+0x15/0x20 [ 206.435473][ T5284] should_fail+0x3c1/0x510 [ 206.439917][ T5284] __should_failslab+0xa4/0xe0 [ 206.444711][ T5284] should_failslab+0x9/0x20 [ 206.449234][ T5284] slab_pre_alloc_hook+0x3b/0xe0 [ 206.454190][ T5284] ? security_file_alloc+0x33/0x120 [ 206.459404][ T5284] kmem_cache_alloc+0x44/0x260 [ 206.464184][ T5284] security_file_alloc+0x33/0x120 [ 206.469239][ T5284] __alloc_file+0xb5/0x2a0 [ 206.473668][ T5284] alloc_empty_file+0x97/0x180 [ 206.478446][ T5284] alloc_file+0x59/0x540 [ 206.482702][ T5284] alloc_file_pseudo+0x17a/0x1f0 [ 206.487658][ T5284] ? alloc_empty_file_noaccount+0x80/0x80 [ 206.490459][ T5292] netlink: 'syz.3.1942': attribute type 12 has an invalid length. [ 206.493395][ T5284] ? __kasan_check_write+0x14/0x20 [ 206.493422][ T5284] ? clear_nlink+0x8a/0xe0 [ 206.493441][ T5284] __shmem_file_setup+0x1df/0x2b0 [ 206.493464][ T5284] shmem_file_setup+0x2f/0x40 [ 206.520489][ T5284] __se_sys_memfd_create+0x1e6/0x3b0 [ 206.525806][ T5284] __x64_sys_memfd_create+0x5b/0x70 [ 206.531036][ T5284] x64_sys_call+0x473/0x9a0 [ 206.535564][ T5284] do_syscall_64+0x4c/0xa0 [ 206.539999][ T5284] ? clear_bhb_loop+0x50/0xa0 [ 206.544702][ T5284] ? clear_bhb_loop+0x50/0xa0 [ 206.549393][ T5284] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 206.555309][ T5284] RIP: 0033:0x7f06f4aec929 [ 206.559735][ T5284] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 206.579358][ T5284] RSP: 002b:00007f06f3154e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 206.587800][ T5284] RAX: ffffffffffffffda RBX: 00000000000004e1 RCX: 00007f06f4aec929 [ 206.595799][ T5284] RDX: 00007f06f3154ef0 RSI: 0000000000000000 RDI: 00007f06f4b6f4cc [ 206.603788][ T5284] RBP: 0000200000000a40 R08: 00007f06f3154bb7 R09: 00007f06f3154e40 [ 206.611779][ T5284] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000500 [ 206.619781][ T5284] R13: 00007f06f3154ef0 R14: 00007f06f3154eb0 R15: 00002000000003c0 [ 206.627778][ T5284] [ 206.649917][ T30] kauditd_printk_skb: 740 callbacks suppressed [ 206.649934][ T30] audit: type=1400 audit(1749986147.183:14532): avc: denied { execmem } for pid=5293 comm="syz.3.1943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 206.681840][ T30] audit: type=1400 audit(1749986147.183:14533): avc: denied { map_create } for pid=5293 comm="syz.3.1943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 206.721232][ T30] audit: type=1400 audit(1749986147.183:14534): avc: denied { prog_load } for pid=5293 comm="syz.3.1943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 206.758375][ T5306] xt_hashlimit: max too large, truncated to 1048576 [ 206.765521][ T30] audit: type=1400 audit(1749986147.183:14535): avc: denied { read write } for pid=5293 comm="syz.3.1943" name="loop3" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 206.828647][ T30] audit: type=1400 audit(1749986147.183:14536): avc: denied { prog_load } for pid=5293 comm="syz.3.1943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 206.868306][ T30] audit: type=1400 audit(1749986147.203:14537): avc: denied { read write } for pid=282 comm="syz-executor" name="loop3" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 206.912508][ T30] audit: type=1400 audit(1749986147.213:14538): avc: denied { map_create } for pid=5297 comm="syz.0.1944" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 206.950329][ T30] audit: type=1400 audit(1749986147.213:14539): avc: denied { prog_load } for pid=5299 comm="syz.3.1947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 206.988320][ T30] audit: type=1400 audit(1749986147.213:14540): avc: denied { prog_load } for pid=5297 comm="syz.0.1944" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 207.022503][ T30] audit: type=1400 audit(1749986147.213:14541): avc: denied { execmem } for pid=5297 comm="syz.0.1944" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 207.109019][ T5320] netlink: 'syz.1.1953': attribute type 12 has an invalid length. [ 207.750745][ T5351] netlink: 'syz.4.1965': attribute type 12 has an invalid length. [ 208.328794][ T5375] FAULT_INJECTION: forcing a failure. [ 208.328794][ T5375] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 208.357204][ T5375] CPU: 1 PID: 5375 Comm: syz.4.1975 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 208.367236][ T5375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 208.377309][ T5375] Call Trace: [ 208.380603][ T5375] [ 208.383547][ T5375] __dump_stack+0x21/0x30 [ 208.387914][ T5375] dump_stack_lvl+0xee/0x150 [ 208.392531][ T5375] ? show_regs_print_info+0x20/0x20 [ 208.397746][ T5375] ? __kernel_text_address+0xa0/0x100 [ 208.403167][ T5375] dump_stack+0x15/0x20 [ 208.407349][ T5375] should_fail+0x3c1/0x510 [ 208.411789][ T5375] should_fail_usercopy+0x1a/0x20 [ 208.416835][ T5375] _copy_from_user+0x20/0xd0 [ 208.421488][ T5375] __copy_msghdr_from_user+0xaf/0x5e0 [ 208.426889][ T5375] ? __ia32_sys_shutdown+0x1e0/0x1e0 [ 208.432215][ T5375] ? kasan_set_track+0x5b/0x70 [ 208.437090][ T5375] ? kasan_set_track+0x4a/0x70 [ 208.441881][ T5375] ? kasan_set_free_info+0x23/0x40 [ 208.447017][ T5375] ? ____kasan_slab_free+0x125/0x160 [ 208.452322][ T5375] ? __kasan_slab_free+0x11/0x20 [ 208.457282][ T5375] ? kmem_cache_free+0x100/0x320 [ 208.462244][ T5375] ___sys_sendmsg+0x156/0x260 [ 208.466946][ T5375] ? _kstrtoull+0x3c0/0x4d0 [ 208.471473][ T5375] ? __sys_sendmsg+0x250/0x250 [ 208.476269][ T5375] ? __fdget+0x1a1/0x230 [ 208.480534][ T5375] __sys_sendmmsg+0x278/0x480 [ 208.485233][ T5375] ? __ia32_sys_sendmsg+0x2a0/0x2a0 [ 208.490473][ T5375] ? __ia32_sys_read+0x90/0x90 [ 208.495264][ T5375] __x64_sys_sendmmsg+0xa0/0xb0 [ 208.500147][ T5375] x64_sys_call+0x6c6/0x9a0 [ 208.504679][ T5375] do_syscall_64+0x4c/0xa0 [ 208.509117][ T5375] ? clear_bhb_loop+0x50/0xa0 [ 208.513825][ T5375] ? clear_bhb_loop+0x50/0xa0 [ 208.518516][ T5375] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 208.524442][ T5375] RIP: 0033:0x7f06f4aec929 [ 208.528877][ T5375] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 208.548548][ T5375] RSP: 002b:00007f06f3155038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 208.556989][ T5375] RAX: ffffffffffffffda RBX: 00007f06f4d13fa0 RCX: 00007f06f4aec929 [ 208.565129][ T5375] RDX: 000000000800001d RSI: 0000200000007fc0 RDI: 0000000000000003 [ 208.573136][ T5375] RBP: 00007f06f3155090 R08: 0000000000000000 R09: 0000000000000000 [ 208.581141][ T5375] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 208.589134][ T5375] R13: 0000000000000000 R14: 00007f06f4d13fa0 R15: 00007ffeefd7aef8 [ 208.597127][ T5375] [ 209.542402][ T5408] netlink: 'syz.3.1987': attribute type 2 has an invalid length. [ 209.900392][ T5431] FAULT_INJECTION: forcing a failure. [ 209.900392][ T5431] name failslab, interval 1, probability 0, space 0, times 0 [ 209.913195][ T5431] CPU: 1 PID: 5431 Comm: syz.4.1997 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 209.923114][ T5431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 209.933197][ T5431] Call Trace: [ 209.936495][ T5431] [ 209.939439][ T5431] __dump_stack+0x21/0x30 [ 209.943785][ T5431] dump_stack_lvl+0xee/0x150 [ 209.948393][ T5431] ? show_regs_print_info+0x20/0x20 [ 209.953611][ T5431] dump_stack+0x15/0x20 [ 209.957794][ T5431] should_fail+0x3c1/0x510 [ 209.962239][ T5431] __should_failslab+0xa4/0xe0 [ 209.967023][ T5431] should_failslab+0x9/0x20 [ 209.971542][ T5431] slab_pre_alloc_hook+0x3b/0xe0 [ 209.976502][ T5431] ? security_file_alloc+0x33/0x120 [ 209.981724][ T5431] kmem_cache_alloc+0x44/0x260 [ 209.986516][ T5431] security_file_alloc+0x33/0x120 [ 209.991559][ T5431] __alloc_file+0xb5/0x2a0 [ 209.995994][ T5431] alloc_empty_file+0x97/0x180 [ 210.000778][ T5431] alloc_file+0x59/0x540 [ 210.005040][ T5431] alloc_file_pseudo+0x17a/0x1f0 [ 210.009992][ T5431] ? alloc_empty_file_noaccount+0x80/0x80 [ 210.015886][ T5431] ? __kasan_check_write+0x14/0x20 [ 210.021112][ T5431] ? clear_nlink+0x8a/0xe0 [ 210.025561][ T5431] __shmem_file_setup+0x1df/0x2b0 [ 210.030637][ T5431] shmem_file_setup+0x2f/0x40 [ 210.035337][ T5431] __se_sys_memfd_create+0x1e6/0x3b0 [ 210.040654][ T5431] __x64_sys_memfd_create+0x5b/0x70 [ 210.045891][ T5431] x64_sys_call+0x473/0x9a0 [ 210.050431][ T5431] do_syscall_64+0x4c/0xa0 [ 210.054878][ T5431] ? clear_bhb_loop+0x50/0xa0 [ 210.059587][ T5431] ? clear_bhb_loop+0x50/0xa0 [ 210.064293][ T5431] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 210.070214][ T5431] RIP: 0033:0x7f06f4aec929 [ 210.074650][ T5431] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 210.094285][ T5431] RSP: 002b:00007f06f3154e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 210.102726][ T5431] RAX: ffffffffffffffda RBX: 0000000000001520 RCX: 00007f06f4aec929 [ 210.110713][ T5431] RDX: 00007f06f3154ef0 RSI: 0000000000000000 RDI: 00007f06f4b6f4cc [ 210.118704][ T5431] RBP: 0000200000000440 R08: 00007f06f3154bb7 R09: 00007f06f3154e40 [ 210.126715][ T5431] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000000 [ 210.134709][ T5431] R13: 00007f06f3154ef0 R14: 00007f06f3154eb0 R15: 0000200000001980 [ 210.142712][ T5431] [ 210.235884][ T5447] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1999'. [ 210.276935][ T5447] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5447 comm=syz.0.1999 [ 210.502372][ T5464] FAULT_INJECTION: forcing a failure. [ 210.502372][ T5464] name failslab, interval 1, probability 0, space 0, times 0 [ 210.522509][ T5464] CPU: 0 PID: 5464 Comm: syz.2.2009 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 210.533077][ T5464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 210.543149][ T5464] Call Trace: [ 210.546443][ T5464] [ 210.549386][ T5464] __dump_stack+0x21/0x30 [ 210.553843][ T5464] dump_stack_lvl+0xee/0x150 [ 210.558462][ T5464] ? show_regs_print_info+0x20/0x20 [ 210.563680][ T5464] ? x64_sys_call+0x219/0x9a0 [ 210.568393][ T5464] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 210.574486][ T5464] dump_stack+0x15/0x20 [ 210.578671][ T5464] should_fail+0x3c1/0x510 [ 210.583115][ T5464] __should_failslab+0xa4/0xe0 [ 210.587922][ T5464] should_failslab+0x9/0x20 [ 210.592453][ T5464] slab_pre_alloc_hook+0x3b/0xe0 [ 210.597434][ T5464] ? audit_log_start+0x3a4/0x8b0 [ 210.602393][ T5464] kmem_cache_alloc+0x44/0x260 [ 210.607178][ T5464] audit_log_start+0x3a4/0x8b0 [ 210.611964][ T5464] ? audit_serial+0x30/0x30 [ 210.616492][ T5464] ? slow_avc_audit+0x220/0x220 [ 210.621361][ T5464] common_lsm_audit+0xd1/0x1600 [ 210.626234][ T5464] ? is_bpf_text_address+0x177/0x190 [ 210.631542][ T5464] ? avc_audit_pre_callback+0x2a0/0x2a0 [ 210.637114][ T5464] ? ipv6_skb_to_auditdata+0xcd0/0xcd0 [ 210.642595][ T5464] ? unwind_get_return_address+0x4d/0x90 [ 210.648250][ T5464] ? stack_trace_save+0xe0/0xe0 [ 210.653119][ T5464] ? arch_stack_walk+0xee/0x140 [ 210.657994][ T5464] slow_avc_audit+0x1ac/0x220 [ 210.662696][ T5464] ? avc_get_hash_stats+0x180/0x180 [ 210.667913][ T5464] ? avc_has_perm_noaudit+0x2f4/0x460 [ 210.673316][ T5464] ? do_sys_openat2+0x6a7/0x7b0 [ 210.678190][ T5464] ? x64_sys_call+0x219/0x9a0 [ 210.682889][ T5464] avc_has_perm+0x1e6/0x240 [ 210.687419][ T5464] ? avc_has_perm_noaudit+0x460/0x460 [ 210.692806][ T5464] ? mutex_lock+0x95/0x1a0 [ 210.697247][ T5464] sel_write_load+0x22d/0x5e0 [ 210.701949][ T5464] ? sel_make_dir+0x280/0x280 [ 210.706653][ T5464] ? security_file_permission+0x83/0xa0 [ 210.712228][ T5464] ? sel_make_dir+0x280/0x280 [ 210.716935][ T5464] vfs_write+0x3ee/0xf70 [ 210.721202][ T5464] ? file_end_write+0x1b0/0x1b0 [ 210.726071][ T5464] ? __kasan_check_write+0x14/0x20 [ 210.731212][ T5464] ? mutex_lock+0x95/0x1a0 [ 210.735655][ T5464] ? wait_for_completion_killable_timeout+0x10/0x10 [ 210.742269][ T5464] ? __fget_files+0x2c4/0x320 [ 210.746977][ T5464] ? __fdget_pos+0x2d2/0x380 [ 210.751592][ T5464] ? ksys_write+0x71/0x240 [ 210.756027][ T5464] ksys_write+0x140/0x240 [ 210.760375][ T5464] ? __ia32_sys_read+0x90/0x90 [ 210.765159][ T5464] ? debug_smp_processor_id+0x17/0x20 [ 210.770551][ T5464] __x64_sys_write+0x7b/0x90 [ 210.775158][ T5464] x64_sys_call+0x8ef/0x9a0 [ 210.779679][ T5464] do_syscall_64+0x4c/0xa0 [ 210.784292][ T5464] ? clear_bhb_loop+0x50/0xa0 [ 210.788989][ T5464] ? clear_bhb_loop+0x50/0xa0 [ 210.793691][ T5464] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 210.799615][ T5464] RIP: 0033:0x7f9a97a0e929 [ 210.804055][ T5464] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 210.823691][ T5464] RSP: 002b:00007f9a96077038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 210.830146][ T5467] netlink: 'syz.3.2010': attribute type 2 has an invalid length. [ 210.832140][ T5464] RAX: ffffffffffffffda RBX: 00007f9a97c35fa0 RCX: 00007f9a97a0e929 [ 210.832159][ T5464] RDX: 0000000000002000 RSI: 0000200000000000 RDI: 0000000000000003 [ 210.855935][ T5464] RBP: 00007f9a96077090 R08: 0000000000000000 R09: 0000000000000000 [ 210.863923][ T5464] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 210.871909][ T5464] R13: 0000000000000000 R14: 00007f9a97c35fa0 R15: 00007ffe93508328 [ 210.879917][ T5464] [ 210.884410][ T5468] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=5468 comm=syz.4.2008 [ 211.065557][ T8] Bluetooth: hci0: Frame reassembly failed (-84) [ 211.510094][ T5511] binfmt_misc: register: failed to install interpreter file ./file2 [ 211.653867][ T30] kauditd_printk_skb: 762 callbacks suppressed [ 211.653882][ T30] audit: type=1400 audit(1749986152.193:15302): avc: denied { map_create } for pid=5525 comm="syz.1.2031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 211.679518][ T30] audit: type=1400 audit(1749986152.193:15303): avc: denied { read } for pid=5525 comm="syz.1.2031" name="loop-control" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=0 [ 211.704053][ T30] audit: type=1400 audit(1749986152.193:15304): avc: denied { create } for pid=5525 comm="syz.1.2031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 211.827505][ T30] audit: type=1400 audit(1749986152.363:15305): avc: denied { map_create } for pid=5525 comm="syz.1.2031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 211.852938][ T30] audit: type=1400 audit(1749986152.393:15306): avc: denied { prog_load } for pid=5525 comm="syz.1.2031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 211.872391][ T30] audit: type=1400 audit(1749986152.393:15307): avc: denied { prog_load } for pid=5525 comm="syz.1.2031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 211.933918][ T30] audit: type=1400 audit(1749986152.473:15308): avc: denied { read write } for pid=281 comm="syz-executor" name="loop0" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 211.963110][ T30] audit: type=1400 audit(1749986152.503:15309): avc: denied { map_create } for pid=5529 comm="syz.0.2032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 211.975029][ T5530] netlink: 28 bytes leftover after parsing attributes in process `syz.0.2032'. [ 211.983246][ T30] audit: type=1400 audit(1749986152.513:15310): avc: denied { prog_load } for pid=5529 comm="syz.0.2032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 212.000211][ T5530] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2032'. [ 212.011619][ T30] audit: type=1400 audit(1749986152.513:15311): avc: denied { prog_load } for pid=5529 comm="syz.0.2032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 212.035019][ T5530] A link change request failed with some changes committed already. Interface vlan0 may have been left with an inconsistent configuration, please check. [ 213.132485][ T6] Bluetooth: hci0: command 0x1003 tx timeout [ 213.138799][ T5488] Bluetooth: hci0: sending frame failed (-49) [ 215.212499][ T309] Bluetooth: hci0: command 0x1001 tx timeout [ 215.219763][ T5488] Bluetooth: hci0: sending frame failed (-49) [ 215.987673][ T5635] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5635 comm=syz.1.2069 [ 216.884596][ T30] kauditd_printk_skb: 397 callbacks suppressed [ 216.884614][ T30] audit: type=1400 audit(1749986157.423:15709): avc: denied { execmem } for pid=5650 comm="syz.1.2074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 216.958880][ T30] audit: type=1400 audit(1749986157.483:15710): avc: denied { read write } for pid=282 comm="syz-executor" name="loop3" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 216.983550][ T30] audit: type=1400 audit(1749986157.493:15711): avc: denied { create } for pid=5652 comm="syz.3.2075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 217.003411][ T30] audit: type=1400 audit(1749986157.493:15712): avc: denied { read write } for pid=5652 comm="syz.3.2075" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 217.028819][ T30] audit: type=1400 audit(1749986157.493:15713): avc: denied { read write } for pid=5652 comm="syz.3.2075" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 217.052754][ T30] audit: type=1400 audit(1749986157.493:15714): avc: denied { read write } for pid=5652 comm="syz.3.2075" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 217.076710][ T30] audit: type=1400 audit(1749986157.493:15715): avc: denied { read write } for pid=5652 comm="syz.3.2075" name="loop3" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 217.101088][ T30] audit: type=1400 audit(1749986157.563:15716): avc: denied { prog_load } for pid=5650 comm="syz.1.2074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 217.120664][ T30] audit: type=1400 audit(1749986157.563:15717): avc: denied { prog_load } for pid=5650 comm="syz.1.2074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 217.140130][ T30] audit: type=1400 audit(1749986157.563:15718): avc: denied { prog_load } for pid=5650 comm="syz.1.2074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 217.292493][ T457] Bluetooth: hci0: command 0x1009 tx timeout [ 217.405712][ T5660] netlink: 'syz.0.2078': attribute type 12 has an invalid length. [ 217.684652][ T5678] netlink: 40 bytes leftover after parsing attributes in process `syz.3.2084'. [ 217.702569][ T5678] netlink: 40 bytes leftover after parsing attributes in process `syz.3.2084'. [ 217.711558][ T5678] netlink: 40 bytes leftover after parsing attributes in process `syz.3.2084'. [ 217.736636][ T5680] ip6t_rpfilter: unknown options [ 217.741898][ T5678] A link change request failed with some changes committed already. Interface ip6tnl0 may have been left with an inconsistent configuration, please check. [ 218.604427][ T5695] netlink: 'syz.4.2090': attribute type 12 has an invalid length. [ 219.671094][ T5724] netlink: 'syz.1.2101': attribute type 12 has an invalid length. [ 220.397878][ T5753] netlink: 'syz.4.2113': attribute type 12 has an invalid length. [ 221.135274][ T5770] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2120'. [ 221.144282][ T5770] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2120'. [ 221.893924][ T30] kauditd_printk_skb: 707 callbacks suppressed [ 221.893941][ T30] audit: type=1400 audit(1749986162.433:16426): avc: denied { execmem } for pid=5796 comm="syz.4.2130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 221.935878][ T30] audit: type=1400 audit(1749986162.433:16427): avc: denied { read write } for pid=284 comm="syz-executor" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 221.969170][ T30] audit: type=1400 audit(1749986162.453:16428): avc: denied { map_create } for pid=5798 comm="syz.2.2131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 221.988798][ T30] audit: type=1400 audit(1749986162.453:16429): avc: denied { prog_load } for pid=5798 comm="syz.2.2131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 222.008321][ T30] audit: type=1400 audit(1749986162.453:16430): avc: denied { map_create } for pid=5798 comm="syz.2.2131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 222.029740][ T30] audit: type=1400 audit(1749986162.453:16431): avc: denied { prog_load } for pid=5798 comm="syz.2.2131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 222.049404][ T30] audit: type=1400 audit(1749986162.453:16432): avc: denied { map_create } for pid=5798 comm="syz.2.2131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 222.068865][ T30] audit: type=1400 audit(1749986162.453:16433): avc: denied { create } for pid=5798 comm="syz.2.2131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 222.089646][ T30] audit: type=1400 audit(1749986162.453:16434): avc: denied { create } for pid=5798 comm="syz.2.2131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 222.121776][ T30] audit: type=1400 audit(1749986162.453:16435): avc: denied { map_create } for pid=5796 comm="syz.4.2130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 223.556763][ T5856] netlink: 'syz.1.2155': attribute type 12 has an invalid length. [ 224.605528][ T5889] netlink: 'syz.0.2168': attribute type 12 has an invalid length. [ 224.625522][ T5891] FAULT_INJECTION: forcing a failure. [ 224.625522][ T5891] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 224.638711][ T5891] CPU: 1 PID: 5891 Comm: syz.0.2169 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 224.648616][ T5891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 224.658673][ T5891] Call Trace: [ 224.661963][ T5891] [ 224.664885][ T5891] __dump_stack+0x21/0x30 [ 224.669230][ T5891] dump_stack_lvl+0xee/0x150 [ 224.673816][ T5891] ? show_regs_print_info+0x20/0x20 [ 224.679016][ T5891] ? generic_access_phys+0x360/0x360 [ 224.684315][ T5891] dump_stack+0x15/0x20 [ 224.688466][ T5891] should_fail+0x3c1/0x510 [ 224.692974][ T5891] should_fail_usercopy+0x1a/0x20 [ 224.697997][ T5891] _copy_to_user+0x20/0x90 [ 224.702463][ T5891] proc_pid_cmdline_read+0x54f/0x7a0 [ 224.707768][ T5891] ? comm_show+0x110/0x110 [ 224.712188][ T5891] ? fsnotify_perm+0x200/0x5b0 [ 224.716983][ T5891] ? security_file_permission+0x83/0xa0 [ 224.722558][ T5891] ? comm_show+0x110/0x110 [ 224.727003][ T5891] vfs_read+0x282/0xbe0 [ 224.731199][ T5891] ? kernel_read+0x1f0/0x1f0 [ 224.735812][ T5891] ? __kasan_check_write+0x14/0x20 [ 224.740947][ T5891] ? mutex_lock+0x95/0x1a0 [ 224.745388][ T5891] ? wait_for_completion_killable_timeout+0x10/0x10 [ 224.752006][ T5891] ? __fget_files+0x2c4/0x320 [ 224.756712][ T5891] ? __fdget_pos+0x2d2/0x380 [ 224.761306][ T5891] ? ksys_read+0x71/0x240 [ 224.765634][ T5891] ksys_read+0x140/0x240 [ 224.769879][ T5891] ? vfs_write+0xf70/0xf70 [ 224.774302][ T5891] ? debug_smp_processor_id+0x17/0x20 [ 224.779670][ T5891] __x64_sys_read+0x7b/0x90 [ 224.784194][ T5891] x64_sys_call+0x96d/0x9a0 [ 224.788699][ T5891] do_syscall_64+0x4c/0xa0 [ 224.793111][ T5891] ? clear_bhb_loop+0x50/0xa0 [ 224.797794][ T5891] ? clear_bhb_loop+0x50/0xa0 [ 224.802504][ T5891] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 224.808411][ T5891] RIP: 0033:0x7fca29500929 [ 224.812850][ T5891] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 224.832480][ T5891] RSP: 002b:00007fca27b69038 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 224.840901][ T5891] RAX: ffffffffffffffda RBX: 00007fca29727fa0 RCX: 00007fca29500929 [ 224.848875][ T5891] RDX: 00000000fffffc7a RSI: 0000200000000000 RDI: 0000000000000003 [ 224.856844][ T5891] RBP: 00007fca27b69090 R08: 0000000000000000 R09: 0000000000000000 [ 224.864822][ T5891] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 224.872815][ T5891] R13: 0000000000000000 R14: 00007fca29727fa0 R15: 00007ffc308af708 [ 224.881113][ T5891] [ 224.902279][ T5896] bridge0: port 3(vlan2) entered blocking state [ 224.908678][ T5896] bridge0: port 3(vlan2) entered disabled state [ 224.915585][ T5896] device vlan2 entered promiscuous mode [ 224.921295][ T5896] device dummy0 entered promiscuous mode [ 224.927369][ T5896] bridge0: port 3(vlan2) entered blocking state [ 224.933651][ T5896] bridge0: port 3(vlan2) entered forwarding state [ 224.964281][ T5901] netlink: 'syz.0.2172': attribute type 4 has an invalid length. [ 225.827047][ T5920] netlink: 'syz.0.2180': attribute type 12 has an invalid length. [ 226.846074][ T5956] netlink: 'syz.0.2193': attribute type 12 has an invalid length. [ 227.038847][ T30] kauditd_printk_skb: 508 callbacks suppressed [ 227.038863][ T30] audit: type=1400 audit(1749986167.573:16944): avc: denied { read write } for pid=284 comm="syz-executor" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 227.069789][ T30] audit: type=1400 audit(1749986167.583:16945): avc: denied { create } for pid=5961 comm="syz.2.2196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 227.089831][ T30] audit: type=1400 audit(1749986167.583:16946): avc: denied { create } for pid=5961 comm="syz.2.2196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 227.110989][ T30] audit: type=1400 audit(1749986167.583:16947): avc: denied { execmem } for pid=5961 comm="syz.2.2196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 227.130370][ T30] audit: type=1400 audit(1749986167.583:16948): avc: denied { create } for pid=5961 comm="syz.2.2196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 227.150138][ T30] audit: type=1400 audit(1749986167.583:16949): avc: denied { create } for pid=5961 comm="syz.2.2196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 227.170075][ T30] audit: type=1400 audit(1749986167.583:16950): avc: denied { map_create } for pid=5961 comm="syz.2.2196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 227.189604][ T30] audit: type=1400 audit(1749986167.583:16951): avc: denied { prog_load } for pid=5961 comm="syz.2.2196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 227.208952][ T30] audit: type=1400 audit(1749986167.593:16952): avc: denied { read write } for pid=284 comm="syz-executor" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 227.233263][ T30] audit: type=1400 audit(1749986167.603:16953): avc: denied { prog_load } for pid=5963 comm="syz.2.2197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 227.662726][ T5981] netlink: 'syz.1.2204': attribute type 12 has an invalid length. [ 227.687380][ T5985] netlink: 'syz.1.2206': attribute type 12 has an invalid length. [ 228.596883][ T6007] FAULT_INJECTION: forcing a failure. [ 228.596883][ T6007] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 228.611392][ T6007] CPU: 1 PID: 6007 Comm: syz.3.2214 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 228.621327][ T6007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 228.631387][ T6007] Call Trace: [ 228.634669][ T6007] [ 228.637604][ T6007] __dump_stack+0x21/0x30 [ 228.641930][ T6007] dump_stack_lvl+0xee/0x150 [ 228.646518][ T6007] ? show_regs_print_info+0x20/0x20 [ 228.651729][ T6007] dump_stack+0x15/0x20 [ 228.655876][ T6007] should_fail+0x3c1/0x510 [ 228.660287][ T6007] should_fail_usercopy+0x1a/0x20 [ 228.665304][ T6007] _copy_to_user+0x20/0x90 [ 228.669723][ T6007] simple_read_from_buffer+0xe9/0x160 [ 228.675091][ T6007] proc_fail_nth_read+0x19a/0x210 [ 228.680114][ T6007] ? proc_fault_inject_write+0x2f0/0x2f0 [ 228.685742][ T6007] ? security_file_permission+0x83/0xa0 [ 228.691288][ T6007] ? proc_fault_inject_write+0x2f0/0x2f0 [ 228.696919][ T6007] vfs_read+0x282/0xbe0 [ 228.701069][ T6007] ? kernel_read+0x1f0/0x1f0 [ 228.705655][ T6007] ? __kasan_check_write+0x14/0x20 [ 228.710764][ T6007] ? mutex_lock+0x95/0x1a0 [ 228.715177][ T6007] ? wait_for_completion_killable_timeout+0x10/0x10 [ 228.721770][ T6007] ? __fget_files+0x2c4/0x320 [ 228.726441][ T6007] ? __fdget_pos+0x2d2/0x380 [ 228.731026][ T6007] ? ksys_read+0x71/0x240 [ 228.735350][ T6007] ksys_read+0x140/0x240 [ 228.739588][ T6007] ? vfs_write+0xf70/0xf70 [ 228.744023][ T6007] ? debug_smp_processor_id+0x17/0x20 [ 228.749393][ T6007] __x64_sys_read+0x7b/0x90 [ 228.753892][ T6007] x64_sys_call+0x96d/0x9a0 [ 228.758391][ T6007] do_syscall_64+0x4c/0xa0 [ 228.762803][ T6007] ? clear_bhb_loop+0x50/0xa0 [ 228.767477][ T6007] ? clear_bhb_loop+0x50/0xa0 [ 228.772152][ T6007] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 228.778049][ T6007] RIP: 0033:0x7f4a60f3033c [ 228.782459][ T6007] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 228.802062][ T6007] RSP: 002b:00007f4a5f59a030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 228.810471][ T6007] RAX: ffffffffffffffda RBX: 00007f4a61158fa0 RCX: 00007f4a60f3033c [ 228.818440][ T6007] RDX: 000000000000000f RSI: 00007f4a5f59a0a0 RDI: 0000000000000003 [ 228.826421][ T6007] RBP: 00007f4a5f59a090 R08: 0000000000000000 R09: 0000000000000000 [ 228.834407][ T6007] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 228.842372][ T6007] R13: 0000000000000000 R14: 00007f4a61158fa0 R15: 00007ffc4b583428 [ 228.850349][ T6007] [ 228.910302][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 228.918636][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.926079][ T6015] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1549 sclass=netlink_route_socket pid=6015 comm=syz.1.2217 [ 228.927612][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 228.948548][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 228.957027][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.965225][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 228.973717][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.981841][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 231.824472][ T6096] netlink: 24 bytes leftover after parsing attributes in process `syz.0.2247'. [ 232.059609][ T30] kauditd_printk_skb: 491 callbacks suppressed [ 232.059627][ T30] audit: type=1400 audit(1749986172.593:17445): avc: denied { execmem } for pid=6105 comm="syz.3.2252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 232.097404][ T30] audit: type=1400 audit(1749986172.613:17446): avc: denied { read write } for pid=6095 comm="syz.0.2247" name="loop0" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 232.123045][ T30] audit: type=1400 audit(1749986172.613:17447): avc: denied { prog_load } for pid=6095 comm="syz.0.2247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 232.154776][ T30] audit: type=1400 audit(1749986172.633:17448): avc: denied { prog_load } for pid=6104 comm="syz.1.2251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 232.183269][ T30] audit: type=1400 audit(1749986172.633:17449): avc: denied { read write } for pid=6095 comm="syz.0.2247" name="loop0" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 232.208902][ T30] audit: type=1400 audit(1749986172.663:17450): avc: denied { map_create } for pid=6105 comm="syz.3.2252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 232.251669][ T30] audit: type=1400 audit(1749986172.683:17451): avc: denied { prog_load } for pid=6105 comm="syz.3.2252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 232.288274][ T30] audit: type=1400 audit(1749986172.683:17452): avc: denied { read write } for pid=6105 comm="syz.3.2252" name="loop3" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 232.327039][ T30] audit: type=1400 audit(1749986172.683:17453): avc: denied { prog_load } for pid=6105 comm="syz.3.2252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 232.346469][ T30] audit: type=1400 audit(1749986172.683:17454): avc: denied { write } for pid=6105 comm="syz.3.2252" name="001" dev="devtmpfs" ino=175 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 [ 232.857561][ T6128] A link change request failed with some changes committed already. Interface gre0 may have been left with an inconsistent configuration, please check. [ 233.065268][ T6138] FAULT_INJECTION: forcing a failure. [ 233.065268][ T6138] name failslab, interval 1, probability 0, space 0, times 0 [ 233.078159][ T6138] CPU: 0 PID: 6138 Comm: syz.4.2263 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 233.088076][ T6138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 233.098149][ T6138] Call Trace: [ 233.101448][ T6138] [ 233.104392][ T6138] __dump_stack+0x21/0x30 [ 233.108743][ T6138] dump_stack_lvl+0xee/0x150 [ 233.113355][ T6138] ? show_regs_print_info+0x20/0x20 [ 233.118576][ T6138] ? __secure_computing+0x290/0x290 [ 233.123802][ T6138] dump_stack+0x15/0x20 [ 233.127979][ T6138] should_fail+0x3c1/0x510 [ 233.132415][ T6138] __should_failslab+0xa4/0xe0 [ 233.137197][ T6138] should_failslab+0x9/0x20 [ 233.141724][ T6138] slab_pre_alloc_hook+0x3b/0xe0 [ 233.146684][ T6138] __kmalloc+0x6d/0x2c0 [ 233.150858][ T6138] ? __se_sys_memfd_create+0xf2/0x3b0 [ 233.156244][ T6138] ? strnlen_user+0x13b/0x1c0 [ 233.160947][ T6138] __se_sys_memfd_create+0xf2/0x3b0 [ 233.166161][ T6138] __x64_sys_memfd_create+0x5b/0x70 [ 233.171378][ T6138] x64_sys_call+0x473/0x9a0 [ 233.175893][ T6138] do_syscall_64+0x4c/0xa0 [ 233.180329][ T6138] ? clear_bhb_loop+0x50/0xa0 [ 233.185024][ T6138] ? clear_bhb_loop+0x50/0xa0 [ 233.189713][ T6138] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 233.195626][ T6138] RIP: 0033:0x7f06f4aec929 [ 233.200066][ T6138] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 233.219691][ T6138] RSP: 002b:00007f06f3154e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 233.228139][ T6138] RAX: ffffffffffffffda RBX: 0000000000000448 RCX: 00007f06f4aec929 [ 233.236136][ T6138] RDX: 00007f06f3154ef0 RSI: 0000000000000000 RDI: 00007f06f4b6f4cc [ 233.244128][ T6138] RBP: 00002000000009c0 R08: 00007f06f3154bb7 R09: 00007f06f3154e40 [ 233.252117][ T6138] R10: 000000000000000a R11: 0000000000000202 R12: 00002000000059c0 [ 233.260102][ T6138] R13: 00007f06f3154ef0 R14: 00007f06f3154eb0 R15: 00002000000000c0 [ 233.268094][ T6138] [ 233.670751][ T6167] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2271'. [ 234.504096][ T6194] FAULT_INJECTION: forcing a failure. [ 234.504096][ T6194] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 234.517471][ T6194] CPU: 1 PID: 6194 Comm: syz.2.2285 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 234.527396][ T6194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 234.537473][ T6194] Call Trace: [ 234.540784][ T6194] [ 234.543729][ T6194] __dump_stack+0x21/0x30 [ 234.548082][ T6194] dump_stack_lvl+0xee/0x150 [ 234.552697][ T6194] ? show_regs_print_info+0x20/0x20 [ 234.557916][ T6194] dump_stack+0x15/0x20 [ 234.562088][ T6194] should_fail+0x3c1/0x510 [ 234.566551][ T6194] should_fail_usercopy+0x1a/0x20 [ 234.571596][ T6194] _copy_to_user+0x20/0x90 [ 234.576034][ T6194] simple_read_from_buffer+0xe9/0x160 [ 234.581434][ T6194] proc_fail_nth_read+0x19a/0x210 [ 234.586488][ T6194] ? proc_fault_inject_write+0x2f0/0x2f0 [ 234.592161][ T6194] ? security_file_permission+0x83/0xa0 [ 234.597734][ T6194] ? proc_fault_inject_write+0x2f0/0x2f0 [ 234.603394][ T6194] vfs_read+0x282/0xbe0 [ 234.607574][ T6194] ? kernel_read+0x1f0/0x1f0 [ 234.612182][ T6194] ? __kasan_check_write+0x14/0x20 [ 234.617335][ T6194] ? mutex_lock+0x95/0x1a0 [ 234.621771][ T6194] ? wait_for_completion_killable_timeout+0x10/0x10 [ 234.628378][ T6194] ? __fget_files+0x2c4/0x320 [ 234.633085][ T6194] ? __fdget_pos+0x2d2/0x380 [ 234.637703][ T6194] ? ksys_read+0x71/0x240 [ 234.642050][ T6194] ksys_read+0x140/0x240 [ 234.646321][ T6194] ? vfs_write+0xf70/0xf70 [ 234.650752][ T6194] ? debug_smp_processor_id+0x17/0x20 [ 234.656146][ T6194] __x64_sys_read+0x7b/0x90 [ 234.660672][ T6194] x64_sys_call+0x96d/0x9a0 [ 234.665194][ T6194] do_syscall_64+0x4c/0xa0 [ 234.669623][ T6194] ? clear_bhb_loop+0x50/0xa0 [ 234.674322][ T6194] ? clear_bhb_loop+0x50/0xa0 [ 234.679024][ T6194] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 234.684939][ T6194] RIP: 0033:0x7f9a97a0d33c [ 234.689373][ T6194] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 234.708999][ T6194] RSP: 002b:00007f9a96077030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 234.717440][ T6194] RAX: ffffffffffffffda RBX: 00007f9a97c35fa0 RCX: 00007f9a97a0d33c [ 234.725434][ T6194] RDX: 000000000000000f RSI: 00007f9a960770a0 RDI: 0000000000000004 [ 234.733431][ T6194] RBP: 00007f9a96077090 R08: 0000000000000000 R09: 0000000000000000 [ 234.741424][ T6194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 234.749418][ T6194] R13: 0000000000000000 R14: 00007f9a97c35fa0 R15: 00007ffe93508328 [ 234.757410][ T6194] [ 235.102341][ T6202] netlink: 20 bytes leftover after parsing attributes in process `syz.4.2288'. [ 235.297833][ T6205] netlink: 'syz.1.2289': attribute type 12 has an invalid length. [ 235.583741][ T6216] netlink: 20 bytes leftover after parsing attributes in process `syz.1.2293'. [ 236.004734][ T6224] netlink: 'syz.4.2296': attribute type 12 has an invalid length. [ 236.747082][ T6260] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2309'. [ 236.902620][ T6262] netlink: 16 bytes leftover after parsing attributes in process `syz.4.2310'. [ 237.024201][ T6267] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2312'. [ 237.192373][ T30] kauditd_printk_skb: 559 callbacks suppressed [ 237.192391][ T30] audit: type=1400 audit(1749986177.723:18014): avc: denied { read write } for pid=281 comm="syz-executor" name="loop0" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 237.252485][ T30] audit: type=1400 audit(1749986177.763:18015): avc: denied { map_create } for pid=6268 comm="syz.0.2313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 237.283889][ T30] audit: type=1400 audit(1749986177.763:18016): avc: denied { prog_load } for pid=6268 comm="syz.0.2313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 237.303447][ T30] audit: type=1400 audit(1749986177.763:18017): avc: denied { prog_load } for pid=6268 comm="syz.0.2313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 237.323095][ T30] audit: type=1400 audit(1749986177.783:18018): avc: denied { map_create } for pid=6268 comm="syz.0.2313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 237.342879][ T30] audit: type=1400 audit(1749986177.783:18019): avc: denied { prog_load } for pid=6268 comm="syz.0.2313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 237.362177][ T30] audit: type=1400 audit(1749986177.783:18020): avc: denied { prog_load } for pid=6268 comm="syz.0.2313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 237.381554][ T30] audit: type=1400 audit(1749986177.783:18021): avc: denied { create } for pid=6268 comm="syz.0.2313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=0 [ 237.402066][ T30] audit: type=1400 audit(1749986177.783:18022): avc: denied { prog_load } for pid=6268 comm="syz.0.2313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 237.421299][ T30] audit: type=1400 audit(1749986177.783:18023): avc: denied { prog_load } for pid=6268 comm="syz.0.2313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 238.509002][ T6304] netlink: 12 bytes leftover after parsing attributes in process `syz.0.2327'. [ 239.061417][ T6314] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2332'. [ 240.765590][ T6406] capability: warning: `syz.3.2371' uses 32-bit capabilities (legacy support in use) [ 241.488296][ T6419] syz.1.2377 (6419): attempted to duplicate a private mapping with mremap. This is not supported. [ 241.845293][ T6439] netlink: 96 bytes leftover after parsing attributes in process `syz.2.2385'. [ 242.193159][ T30] kauditd_printk_skb: 862 callbacks suppressed [ 242.193176][ T30] audit: type=1400 audit(1749986182.733:18886): avc: denied { execmem } for pid=6448 comm="syz.4.2389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 242.220298][ T30] audit: type=1400 audit(1749986182.743:18887): avc: denied { map_create } for pid=6448 comm="syz.4.2389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 242.241069][ T30] audit: type=1400 audit(1749986182.743:18888): avc: denied { prog_load } for pid=6448 comm="syz.4.2389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 242.260685][ T30] audit: type=1400 audit(1749986182.753:18889): avc: denied { read write } for pid=6448 comm="syz.4.2389" name="loop4" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 242.285172][ T30] audit: type=1400 audit(1749986182.763:18890): avc: denied { prog_load } for pid=6448 comm="syz.4.2389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 242.310608][ T30] audit: type=1400 audit(1749986182.763:18891): avc: denied { write } for pid=6448 comm="syz.4.2389" name="001" dev="devtmpfs" ino=175 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 [ 242.352646][ T30] audit: type=1400 audit(1749986182.773:18892): avc: denied { read write } for pid=285 comm="syz-executor" name="loop4" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 242.377719][ T30] audit: type=1400 audit(1749986182.803:18893): avc: denied { prog_load } for pid=6450 comm="syz.4.2390" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 242.397331][ T30] audit: type=1400 audit(1749986182.833:18894): avc: denied { read write } for pid=6450 comm="syz.4.2390" name="loop4" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 242.422189][ T30] audit: type=1400 audit(1749986182.833:18895): avc: denied { read } for pid=6450 comm="syz.4.2390" name="loop8" dev="devtmpfs" ino=124 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 243.693848][ T6517] netlink: 'syz.0.2419': attribute type 12 has an invalid length. [ 244.208434][ T6566] FAULT_INJECTION: forcing a failure. [ 244.208434][ T6566] name failslab, interval 1, probability 0, space 0, times 0 [ 244.221143][ T6566] CPU: 1 PID: 6566 Comm: syz.3.2439 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 244.231061][ T6566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 244.241353][ T6566] Call Trace: [ 244.244657][ T6566] [ 244.247591][ T6566] __dump_stack+0x21/0x30 [ 244.251920][ T6566] dump_stack_lvl+0xee/0x150 [ 244.256508][ T6566] ? show_regs_print_info+0x20/0x20 [ 244.261714][ T6566] dump_stack+0x15/0x20 [ 244.265863][ T6566] should_fail+0x3c1/0x510 [ 244.270276][ T6566] __should_failslab+0xa4/0xe0 [ 244.275065][ T6566] should_failslab+0x9/0x20 [ 244.279616][ T6566] slab_pre_alloc_hook+0x3b/0xe0 [ 244.284556][ T6566] ? dst_alloc+0x15c/0x1d0 [ 244.288980][ T6566] kmem_cache_alloc+0x44/0x260 [ 244.293767][ T6566] dst_alloc+0x15c/0x1d0 [ 244.298016][ T6566] ip_route_output_key_hash_rcu+0x11db/0x2060 [ 244.304101][ T6566] ip_route_output_flow+0x123/0x2d0 [ 244.309314][ T6566] ? ipv4_sk_update_pmtu+0x1320/0x1320 [ 244.314781][ T6566] ? memcpy+0x56/0x70 [ 244.318764][ T6566] udp_sendmsg+0x1241/0x20b0 [ 244.323356][ T6566] ? avc_denied+0x1b0/0x1b0 [ 244.327882][ T6566] ? ip_skb_dst_mtu+0x630/0x630 [ 244.332729][ T6566] ? udp_cmsg_send+0x330/0x330 [ 244.337491][ T6566] ? avc_has_perm+0x158/0x240 [ 244.342162][ T6566] ? avc_has_perm_noaudit+0x460/0x460 [ 244.347532][ T6566] ? irqentry_exit+0x37/0x40 [ 244.352118][ T6566] ? inet_send_prepare+0x60/0x4c0 [ 244.357140][ T6566] inet_sendmsg+0xa5/0xc0 [ 244.361463][ T6566] ? inet_send_prepare+0x4c0/0x4c0 [ 244.366569][ T6566] ____sys_sendmsg+0x5a2/0x8c0 [ 244.371332][ T6566] ? __sys_sendmsg_sock+0x40/0x40 [ 244.376351][ T6566] ? import_iovec+0x7c/0xb0 [ 244.380853][ T6566] ___sys_sendmsg+0x1f0/0x260 [ 244.385532][ T6566] ? _kstrtoull+0x3c0/0x4d0 [ 244.390260][ T6566] ? __sys_sendmsg+0x250/0x250 [ 244.395040][ T6566] ? __fdget+0x1a1/0x230 [ 244.399291][ T6566] __sys_sendmmsg+0x278/0x480 [ 244.403968][ T6566] ? __ia32_sys_sendmsg+0x2a0/0x2a0 [ 244.409170][ T6566] ? __ia32_sys_read+0x90/0x90 [ 244.413961][ T6566] __x64_sys_sendmmsg+0xa0/0xb0 [ 244.418823][ T6566] x64_sys_call+0x6c6/0x9a0 [ 244.423364][ T6566] do_syscall_64+0x4c/0xa0 [ 244.427786][ T6566] ? clear_bhb_loop+0x50/0xa0 [ 244.432464][ T6566] ? clear_bhb_loop+0x50/0xa0 [ 244.437154][ T6566] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 244.443048][ T6566] RIP: 0033:0x7f4a60f31929 [ 244.447462][ T6566] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 244.467063][ T6566] RSP: 002b:00007f4a5f59a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 244.475476][ T6566] RAX: ffffffffffffffda RBX: 00007f4a61158fa0 RCX: 00007f4a60f31929 [ 244.483448][ T6566] RDX: 000000000800001d RSI: 0000200000007fc0 RDI: 0000000000000003 [ 244.491416][ T6566] RBP: 00007f4a5f59a090 R08: 0000000000000000 R09: 0000000000000000 [ 244.499540][ T6566] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 244.507522][ T6566] R13: 0000000000000000 R14: 00007f4a61158fa0 R15: 00007ffc4b583428 [ 244.515510][ T6566] [ 244.968458][ T6591] FAULT_INJECTION: forcing a failure. [ 244.968458][ T6591] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 244.981680][ T6591] CPU: 1 PID: 6591 Comm: syz.1.2448 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 244.991595][ T6591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 245.001674][ T6591] Call Trace: [ 245.004979][ T6591] [ 245.007922][ T6591] __dump_stack+0x21/0x30 [ 245.012294][ T6591] dump_stack_lvl+0xee/0x150 [ 245.016908][ T6591] ? show_regs_print_info+0x20/0x20 [ 245.022219][ T6591] dump_stack+0x15/0x20 [ 245.026414][ T6591] should_fail+0x3c1/0x510 [ 245.030860][ T6591] should_fail_usercopy+0x1a/0x20 [ 245.035914][ T6591] _copy_from_user+0x20/0xd0 [ 245.040556][ T6591] __se_sys_mount+0x176/0x380 [ 245.045266][ T6591] ? __x64_sys_mount+0xd0/0xd0 [ 245.050078][ T6591] ? __ia32_sys_read+0x90/0x90 [ 245.054868][ T6591] __x64_sys_mount+0xbf/0xd0 [ 245.059482][ T6591] x64_sys_call+0x6bf/0x9a0 [ 245.064018][ T6591] do_syscall_64+0x4c/0xa0 [ 245.068466][ T6591] ? clear_bhb_loop+0x50/0xa0 [ 245.073165][ T6591] ? clear_bhb_loop+0x50/0xa0 [ 245.077867][ T6591] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 245.083792][ T6591] RIP: 0033:0x7f77232e2929 [ 245.088238][ T6591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 245.107869][ T6591] RSP: 002b:00007f772194b038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 245.116314][ T6591] RAX: ffffffffffffffda RBX: 00007f7723509fa0 RCX: 00007f77232e2929 [ 245.124320][ T6591] RDX: 00002000000001c0 RSI: 0000200000000180 RDI: 0000000000000000 [ 245.132318][ T6591] RBP: 00007f772194b090 R08: 0000200000000300 R09: 0000000000000000 [ 245.140313][ T6591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 245.148392][ T6591] R13: 0000000000000000 R14: 00007f7723509fa0 R15: 00007ffc0d823428 [ 245.156398][ T6591] [ 245.512275][ T6602] netlink: 'syz.1.2453': attribute type 12 has an invalid length. [ 245.537823][ T6604] netlink: 'syz.1.2454': attribute type 12 has an invalid length. [ 245.744318][ T6626] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2463'. [ 245.806403][ T6630] netlink: 'syz.2.2465': attribute type 12 has an invalid length. [ 247.206829][ T30] kauditd_printk_skb: 889 callbacks suppressed [ 247.206845][ T30] audit: type=1400 audit(1749986187.743:19785): avc: denied { read write } for pid=285 comm="syz-executor" name="loop4" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 247.237805][ T30] audit: type=1400 audit(1749986187.753:19786): avc: denied { map_create } for pid=6664 comm="syz.4.2479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 247.257419][ T30] audit: type=1400 audit(1749986187.753:19787): avc: denied { execmem } for pid=6664 comm="syz.4.2479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 247.277526][ T30] audit: type=1400 audit(1749986187.813:19788): avc: denied { prog_load } for pid=6664 comm="syz.4.2479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 247.297812][ T30] audit: type=1400 audit(1749986187.833:19789): avc: denied { prog_load } for pid=6664 comm="syz.4.2479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 247.317762][ T30] audit: type=1400 audit(1749986187.853:19790): avc: denied { prog_load } for pid=6664 comm="syz.4.2479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 247.337498][ T30] audit: type=1400 audit(1749986187.873:19791): avc: denied { prog_load } for pid=6664 comm="syz.4.2479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 247.470768][ T30] audit: type=1400 audit(1749986188.003:19792): avc: denied { read write } for pid=285 comm="syz-executor" name="loop4" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 247.512521][ T30] audit: type=1326 audit(1749986188.043:19793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6667 comm="syz.4.2480" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f06f4aec929 code=0x7ffc0000 [ 247.582471][ T30] audit: type=1326 audit(1749986188.043:19794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6667 comm="syz.4.2480" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f06f4aec929 code=0x7ffc0000 [ 247.904721][ T6693] netlink: 'syz.0.2490': attribute type 27 has an invalid length. [ 247.913465][ T6693] device wg2 left promiscuous mode [ 247.922176][ T6693] netlink: 20 bytes leftover after parsing attributes in process `syz.0.2490'. [ 247.932695][ T6693] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 247.954339][ T6693] device veth0_vlan left promiscuous mode [ 247.960259][ T6693] device veth0_vlan entered promiscuous mode [ 247.967761][ T6693] device veth1_macvtap left promiscuous mode [ 247.974572][ T6693] device veth1_macvtap entered promiscuous mode [ 247.984502][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 247.992058][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 247.999662][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 248.007858][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.014966][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.023131][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 248.031686][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 248.040415][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.047592][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 248.055084][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 248.063681][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 248.071771][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 248.080033][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 248.088223][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 248.096506][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 248.104607][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 248.113145][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 248.121187][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 248.129489][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 248.137762][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 248.146200][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 248.154467][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 248.162926][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 248.170895][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 248.179128][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 248.187240][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 248.195393][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 248.203796][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 248.212097][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 248.220222][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 248.228161][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 248.235810][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 248.243315][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 248.251483][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 248.259736][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 248.267400][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [ 248.275012][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [ 248.282542][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [ 248.290032][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth4: link becomes ready [ 248.298300][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 248.307224][ T6693] syz.0.2490 (6693) used greatest stack depth: 20544 bytes left [ 248.603012][ T6705] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 248.725478][ T6712] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=56344 sclass=netlink_route_socket pid=6712 comm=syz.3.2498 [ 250.160404][ T6743] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2508'. [ 250.623221][ T6769] FAULT_INJECTION: forcing a failure. [ 250.623221][ T6769] name failslab, interval 1, probability 0, space 0, times 0 [ 250.636984][ T6769] CPU: 0 PID: 6769 Comm: syz.0.2520 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 250.646913][ T6769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 250.656989][ T6769] Call Trace: [ 250.660286][ T6769] [ 250.663237][ T6769] __dump_stack+0x21/0x30 [ 250.667590][ T6769] dump_stack_lvl+0xee/0x150 [ 250.672219][ T6769] ? show_regs_print_info+0x20/0x20 [ 250.677447][ T6769] dump_stack+0x15/0x20 [ 250.681629][ T6769] should_fail+0x3c1/0x510 [ 250.686077][ T6769] __should_failslab+0xa4/0xe0 [ 250.691093][ T6769] should_failslab+0x9/0x20 [ 250.695642][ T6769] slab_pre_alloc_hook+0x3b/0xe0 [ 250.700608][ T6769] ? cond_bools_copy+0x4c/0xc0 [ 250.705415][ T6769] __kmalloc_track_caller+0x6c/0x2c0 [ 250.710727][ T6769] ? cond_bools_copy+0x4c/0xc0 [ 250.715521][ T6769] kmemdup+0x26/0x60 [ 250.719445][ T6769] cond_bools_copy+0x4c/0xc0 [ 250.724063][ T6769] hashtab_duplicate+0x18f/0x530 [ 250.729018][ T6769] ? cond_policydb_destroy_dup+0x40/0x40 [ 250.734678][ T6769] ? cond_insertf+0x340/0x340 [ 250.739387][ T6769] cond_policydb_dup+0x131/0xd20 [ 250.744344][ T6769] ? __kmalloc_track_caller+0x13c/0x2c0 [ 250.749920][ T6769] security_set_bools+0xe8/0x610 [ 250.755069][ T6769] ? skip_atoi+0x110/0x110 [ 250.759508][ T6769] ? __kasan_check_write+0x14/0x20 [ 250.764655][ T6769] sel_commit_bools_write+0x35a/0x480 [ 250.770050][ T6769] ? selinux_file_permission+0x2aa/0x510 [ 250.775702][ T6769] ? sel_read_policyvers+0xf0/0xf0 [ 250.780845][ T6769] ? security_file_permission+0x79/0xa0 [ 250.786430][ T6769] ? security_file_permission+0x83/0xa0 [ 250.792006][ T6769] ? sel_read_policyvers+0xf0/0xf0 [ 250.797147][ T6769] vfs_write+0x3ee/0xf70 [ 250.801414][ T6769] ? file_end_write+0x1b0/0x1b0 [ 250.806286][ T6769] ? __kasan_check_write+0x14/0x20 [ 250.811424][ T6769] ? mutex_lock+0x95/0x1a0 [ 250.815861][ T6769] ? wait_for_completion_killable_timeout+0x10/0x10 [ 250.822472][ T6769] ? __fget_files+0x2c4/0x320 [ 250.827174][ T6769] ? __fdget_pos+0x2d2/0x380 [ 250.831789][ T6769] ? ksys_write+0x71/0x240 [ 250.836227][ T6769] ksys_write+0x140/0x240 [ 250.840574][ T6769] ? __ia32_sys_read+0x90/0x90 [ 250.845367][ T6769] ? debug_smp_processor_id+0x17/0x20 [ 250.850767][ T6769] __x64_sys_write+0x7b/0x90 [ 250.855387][ T6769] x64_sys_call+0x8ef/0x9a0 [ 250.859914][ T6769] do_syscall_64+0x4c/0xa0 [ 250.864367][ T6769] ? clear_bhb_loop+0x50/0xa0 [ 250.869063][ T6769] ? clear_bhb_loop+0x50/0xa0 [ 250.873772][ T6769] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 250.879701][ T6769] RIP: 0033:0x7fca29500929 [ 250.884137][ T6769] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 250.903770][ T6769] RSP: 002b:00007fca27b69038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 250.912317][ T6769] RAX: ffffffffffffffda RBX: 00007fca29727fa0 RCX: 00007fca29500929 [ 250.920319][ T6769] RDX: 0000000000000003 RSI: 0000200000000800 RDI: 0000000000000003 [ 250.928327][ T6769] RBP: 00007fca27b69090 R08: 0000000000000000 R09: 0000000000000000 [ 250.936324][ T6769] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 250.944325][ T6769] R13: 0000000000000000 R14: 00007fca29727fa0 R15: 00007ffc308af708 [ 250.952327][ T6769] [ 251.210886][ T6818] netlink: 'syz.0.2538': attribute type 15 has an invalid length. [ 251.510573][ T6825] netlink: 260 bytes leftover after parsing attributes in process `syz.0.2541'. [ 252.000557][ T6841] FAULT_INJECTION: forcing a failure. [ 252.000557][ T6841] name failslab, interval 1, probability 0, space 0, times 0 [ 252.013958][ T6841] CPU: 1 PID: 6841 Comm: syz.3.2548 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 252.023866][ T6841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 252.033928][ T6841] Call Trace: [ 252.037224][ T6841] [ 252.040166][ T6841] __dump_stack+0x21/0x30 [ 252.044504][ T6841] dump_stack_lvl+0xee/0x150 [ 252.049111][ T6841] ? show_regs_print_info+0x20/0x20 [ 252.054340][ T6841] dump_stack+0x15/0x20 [ 252.058497][ T6841] should_fail+0x3c1/0x510 [ 252.062913][ T6841] __should_failslab+0xa4/0xe0 [ 252.067677][ T6841] should_failslab+0x9/0x20 [ 252.072188][ T6841] slab_pre_alloc_hook+0x3b/0xe0 [ 252.077135][ T6841] ? dst_alloc+0x15c/0x1d0 [ 252.081554][ T6841] kmem_cache_alloc+0x44/0x260 [ 252.086325][ T6841] dst_alloc+0x15c/0x1d0 [ 252.090573][ T6841] ip_route_output_key_hash_rcu+0x11db/0x2060 [ 252.096658][ T6841] ip_route_output_flow+0x123/0x2d0 [ 252.101860][ T6841] ? ipv4_sk_update_pmtu+0x1320/0x1320 [ 252.107340][ T6841] ? memcpy+0x56/0x70 [ 252.111323][ T6841] udp_sendmsg+0x1241/0x20b0 [ 252.115939][ T6841] ? avc_denied+0x1b0/0x1b0 [ 252.120489][ T6841] ? ip_skb_dst_mtu+0x630/0x630 [ 252.125346][ T6841] ? udp_cmsg_send+0x330/0x330 [ 252.130113][ T6841] ? avc_has_perm+0x158/0x240 [ 252.134793][ T6841] ? avc_has_perm_noaudit+0x460/0x460 [ 252.140219][ T6841] ? irqentry_exit+0x37/0x40 [ 252.144829][ T6841] ? inet_send_prepare+0x60/0x4c0 [ 252.149853][ T6841] inet_sendmsg+0xa5/0xc0 [ 252.154185][ T6841] ? inet_send_prepare+0x4c0/0x4c0 [ 252.159305][ T6841] ____sys_sendmsg+0x5a2/0x8c0 [ 252.164070][ T6841] ? __sys_sendmsg_sock+0x40/0x40 [ 252.169096][ T6841] ? import_iovec+0x7c/0xb0 [ 252.173604][ T6841] ___sys_sendmsg+0x1f0/0x260 [ 252.178279][ T6841] ? _kstrtoull+0x3c0/0x4d0 [ 252.182782][ T6841] ? __sys_sendmsg+0x250/0x250 [ 252.187551][ T6841] ? __fdget+0x1a1/0x230 [ 252.191811][ T6841] __sys_sendmmsg+0x278/0x480 [ 252.196499][ T6841] ? __ia32_sys_sendmsg+0x2a0/0x2a0 [ 252.201708][ T6841] ? __ia32_sys_read+0x90/0x90 [ 252.206474][ T6841] __x64_sys_sendmmsg+0xa0/0xb0 [ 252.211327][ T6841] x64_sys_call+0x6c6/0x9a0 [ 252.215855][ T6841] do_syscall_64+0x4c/0xa0 [ 252.220270][ T6841] ? clear_bhb_loop+0x50/0xa0 [ 252.224944][ T6841] ? clear_bhb_loop+0x50/0xa0 [ 252.229617][ T6841] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 252.235513][ T6841] RIP: 0033:0x7f4a60f31929 [ 252.239922][ T6841] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 252.259525][ T6841] RSP: 002b:00007f4a5f59a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 252.267942][ T6841] RAX: ffffffffffffffda RBX: 00007f4a61158fa0 RCX: 00007f4a60f31929 [ 252.275914][ T6841] RDX: 000000000800001d RSI: 0000200000007fc0 RDI: 0000000000000004 [ 252.283885][ T6841] RBP: 00007f4a5f59a090 R08: 0000000000000000 R09: 0000000000000000 [ 252.291854][ T6841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 252.299822][ T6841] R13: 0000000000000000 R14: 00007f4a61158fa0 R15: 00007ffc4b583428 [ 252.307796][ T6841] [ 252.317366][ T30] kauditd_printk_skb: 561 callbacks suppressed [ 252.317382][ T30] audit: type=1400 audit(1749986448.852:20356): avc: denied { read write } for pid=282 comm="syz-executor" name="loop3" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 252.347906][ T30] audit: type=1400 audit(1749986448.862:20357): avc: denied { read write } for pid=6842 comm="syz.3.2549" name="loop3" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 252.372078][ T30] audit: type=1400 audit(1749986448.872:20358): avc: denied { read write } for pid=282 comm="syz-executor" name="loop3" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 252.396345][ T30] audit: type=1400 audit(1749986448.872:20359): avc: denied { prog_load } for pid=6844 comm="syz.3.2550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 252.415926][ T30] audit: type=1400 audit(1749986448.872:20360): avc: denied { prog_load } for pid=6844 comm="syz.3.2550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 252.436269][ T30] audit: type=1400 audit(1749986448.892:20361): avc: denied { read write } for pid=6844 comm="syz.3.2550" name="loop3" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 252.460880][ T30] audit: type=1400 audit(1749986448.932:20362): avc: denied { execmem } for pid=6844 comm="syz.3.2550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 252.487530][ T30] audit: type=1400 audit(1749986448.932:20363): avc: denied { map_create } for pid=6844 comm="syz.3.2550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 252.507566][ T30] audit: type=1400 audit(1749986448.932:20364): avc: denied { prog_load } for pid=6844 comm="syz.3.2550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 252.529738][ T30] audit: type=1400 audit(1749986448.962:20365): avc: denied { read write } for pid=6844 comm="syz.3.2550" name="loop3" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 252.546310][ T6857] netlink: 'syz.2.2556': attribute type 12 has an invalid length. [ 254.081096][ T6891] netlink: 'syz.3.2569': attribute type 6 has an invalid length. [ 254.311479][ T6909] FAULT_INJECTION: forcing a failure. [ 254.311479][ T6909] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 254.325290][ T6909] CPU: 1 PID: 6909 Comm: syz.4.2576 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 254.335253][ T6909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 254.345346][ T6909] Call Trace: [ 254.348654][ T6909] [ 254.351615][ T6909] __dump_stack+0x21/0x30 [ 254.356028][ T6909] dump_stack_lvl+0xee/0x150 [ 254.360675][ T6909] ? show_regs_print_info+0x20/0x20 [ 254.365915][ T6909] dump_stack+0x15/0x20 [ 254.370117][ T6909] should_fail+0x3c1/0x510 [ 254.374573][ T6909] should_fail_usercopy+0x1a/0x20 [ 254.379641][ T6909] _copy_from_user+0x20/0xd0 [ 254.384269][ T6909] strndup_user+0xb1/0x150 [ 254.388724][ T6909] __se_sys_mount+0x9c/0x380 [ 254.393354][ T6909] ? fput+0x1a/0x20 [ 254.397195][ T6909] ? __x64_sys_mount+0xd0/0xd0 [ 254.401990][ T6909] ? __ia32_sys_read+0x90/0x90 [ 254.406791][ T6909] __x64_sys_mount+0xbf/0xd0 [ 254.411418][ T6909] x64_sys_call+0x6bf/0x9a0 [ 254.415954][ T6909] do_syscall_64+0x4c/0xa0 [ 254.420412][ T6909] ? clear_bhb_loop+0x50/0xa0 [ 254.425123][ T6909] ? clear_bhb_loop+0x50/0xa0 [ 254.429828][ T6909] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 254.435760][ T6909] RIP: 0033:0x7f06f4aec929 [ 254.440208][ T6909] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 254.459853][ T6909] RSP: 002b:00007f06f3155038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 254.468311][ T6909] RAX: ffffffffffffffda RBX: 00007f06f4d13fa0 RCX: 00007f06f4aec929 [ 254.476323][ T6909] RDX: 0000200000000040 RSI: 0000200000000100 RDI: 0000200000000140 [ 254.484326][ T6909] RBP: 00007f06f3155090 R08: 0000000000000000 R09: 0000000000000000 [ 254.492326][ T6909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 254.500331][ T6909] R13: 0000000000000000 R14: 00007f06f4d13fa0 R15: 00007ffeefd7aef8 [ 254.508342][ T6909] [ 255.178696][ T6927] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2583'. [ 256.871319][ T7012] netlink: 'syz.2.2612': attribute type 3 has an invalid length. [ 256.888315][ T7012] FAULT_INJECTION: forcing a failure. [ 256.888315][ T7012] name failslab, interval 1, probability 0, space 0, times 0 [ 256.900952][ T7012] CPU: 1 PID: 7012 Comm: syz.2.2612 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 256.910861][ T7012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 256.920935][ T7012] Call Trace: [ 256.924243][ T7012] [ 256.927188][ T7012] __dump_stack+0x21/0x30 [ 256.931532][ T7012] dump_stack_lvl+0xee/0x150 [ 256.936155][ T7012] ? show_regs_print_info+0x20/0x20 [ 256.941369][ T7012] ? __kernel_text_address+0xa0/0x100 [ 256.946766][ T7012] dump_stack+0x15/0x20 [ 256.950938][ T7012] should_fail+0x3c1/0x510 [ 256.955371][ T7012] __should_failslab+0xa4/0xe0 [ 256.960158][ T7012] should_failslab+0x9/0x20 [ 256.964701][ T7012] slab_pre_alloc_hook+0x3b/0xe0 [ 256.969659][ T7012] ? __sigqueue_alloc+0x137/0x210 [ 256.974708][ T7012] kmem_cache_alloc+0x44/0x260 [ 256.979489][ T7012] __sigqueue_alloc+0x137/0x210 [ 256.984356][ T7012] __send_signal+0x212/0xc30 [ 256.988999][ T7012] ? __kasan_check_write+0x14/0x20 [ 256.994145][ T7012] send_signal+0x422/0x580 [ 256.998590][ T7012] do_send_sig_info+0xd6/0x210 [ 257.003382][ T7012] send_sigio_to_task+0x34d/0x490 [ 257.008438][ T7012] ? send_sigio+0x230/0x230 [ 257.012967][ T7012] ? _raw_read_lock+0x40/0x40 [ 257.017669][ T7012] ? __kasan_check_write+0x14/0x20 [ 257.022817][ T7012] ? _raw_read_lock_irqsave+0x88/0xe0 [ 257.028213][ T7012] ? _raw_read_lock+0x40/0x40 [ 257.032909][ T7012] ? should_failslab+0x9/0x20 [ 257.037613][ T7012] send_sigio+0xb9/0x230 [ 257.041879][ T7012] kill_fasync+0x13a/0x210 [ 257.046331][ T7012] lease_break_callback+0x26/0x30 [ 257.051376][ T7012] __break_lease+0x4d0/0x1170 [ 257.056122][ T7012] ? locks_wake_up_blocks+0x2b0/0x2b0 [ 257.061516][ T7012] ? capable_wrt_inode_uidgid+0xdd/0x120 [ 257.067170][ T7012] ? security_inode_permission+0xb0/0x100 [ 257.072923][ T7012] break_lease+0xb2/0xd0 [ 257.077191][ T7012] vfs_truncate+0x21f/0x300 [ 257.081708][ T7012] do_sys_truncate+0xdc/0x190 [ 257.086396][ T7012] ? break_lease+0xd0/0xd0 [ 257.090830][ T7012] ? debug_smp_processor_id+0x17/0x20 [ 257.096224][ T7012] __x64_sys_truncate+0x5b/0x70 [ 257.101095][ T7012] x64_sys_call+0x212/0x9a0 [ 257.105620][ T7012] do_syscall_64+0x4c/0xa0 [ 257.110057][ T7012] ? clear_bhb_loop+0x50/0xa0 [ 257.114747][ T7012] ? clear_bhb_loop+0x50/0xa0 [ 257.119440][ T7012] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 257.125351][ T7012] RIP: 0033:0x7f9a97a0e929 [ 257.129783][ T7012] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 257.149407][ T7012] RSP: 002b:00007f9a96056038 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 257.157846][ T7012] RAX: ffffffffffffffda RBX: 00007f9a97c36080 RCX: 00007f9a97a0e929 [ 257.165833][ T7012] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000040 [ 257.173824][ T7012] RBP: 00007f9a96056090 R08: 0000000000000000 R09: 0000000000000000 [ 257.181829][ T7012] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 257.189813][ T7012] R13: 0000000000000000 R14: 00007f9a97c36080 R15: 00007ffe93508328 [ 257.197815][ T7012] [ 257.357880][ T30] kauditd_printk_skb: 554 callbacks suppressed [ 257.357920][ T30] audit: type=1400 audit(1749986453.894:20920): avc: denied { map_create } for pid=7020 comm="syz.1.2617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 257.390733][ T30] audit: type=1400 audit(1749986453.924:20921): avc: denied { prog_load } for pid=7020 comm="syz.1.2617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 257.410036][ T30] audit: type=1400 audit(1749986453.924:20922): avc: denied { create } for pid=7020 comm="syz.1.2617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 257.462314][ C0] Adjusting tsc more than 11% (8583078 vs 8464875) [ 257.489834][ T30] audit: type=1400 audit(1749986454.025:20923): avc: denied { read write } for pid=281 comm="syz-executor" name="loop0" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 257.545295][ T30] audit: type=1400 audit(1749986454.071:20924): avc: denied { prog_load } for pid=7025 comm="syz.0.2618" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 257.576907][ T30] audit: type=1400 audit(1749986454.071:20925): avc: denied { execmem } for pid=7025 comm="syz.0.2618" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 257.611723][ T30] audit: type=1400 audit(1749986454.071:20926): avc: denied { prog_load } for pid=7025 comm="syz.0.2618" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 257.631751][ T30] audit: type=1400 audit(1749986454.071:20927): avc: denied { read write } for pid=7025 comm="syz.0.2618" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 257.655979][ T30] audit: type=1400 audit(1749986454.071:20928): avc: denied { name_bind } for pid=7025 comm="syz.0.2618" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 257.683001][ T30] audit: type=1400 audit(1749986454.071:20929): avc: denied { read write } for pid=7025 comm="syz.0.2618" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 258.150913][ T7049] netlink: 'syz.1.2627': attribute type 12 has an invalid length. [ 258.519838][ T7061] netlink: 'syz.2.2631': attribute type 3 has an invalid length. [ 258.900228][ T7071] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7071 comm=syz.4.2634 [ 259.287391][ T7091] netlink: 16 bytes leftover after parsing attributes in process `syz.2.2643'. [ 259.608238][ T7121] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2656'. [ 259.617795][ T7121] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2656'. [ 259.637010][ T7121] device wg2 entered promiscuous mode [ 261.481640][ T7187] tun0: tun_chr_ioctl cmd 1074025680 [ 261.972104][ T30] kauditd_printk_skb: 701 callbacks suppressed [ 261.972121][ T30] audit: type=1400 audit(1749986458.911:21631): avc: denied { prog_load } for pid=7229 comm="syz.0.2699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 262.018262][ T30] audit: type=1400 audit(1749986458.943:21632): avc: denied { read write } for pid=281 comm="syz-executor" name="loop0" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 262.043209][ T30] audit: type=1400 audit(1749986458.943:21633): avc: denied { prog_load } for pid=7232 comm="syz.0.2700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 262.063136][ T30] audit: type=1400 audit(1749986458.943:21634): avc: denied { prog_load } for pid=7232 comm="syz.0.2700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 262.086194][ T30] audit: type=1400 audit(1749986458.986:21635): avc: denied { read write } for pid=7232 comm="syz.0.2700" name="loop0" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 262.111272][ T30] audit: type=1400 audit(1749986459.029:21636): avc: denied { execmem } for pid=7232 comm="syz.0.2700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 262.132958][ T30] audit: type=1400 audit(1749986459.029:21637): avc: denied { map_create } for pid=7232 comm="syz.0.2700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 262.152658][ T30] audit: type=1400 audit(1749986459.029:21638): avc: denied { prog_load } for pid=7232 comm="syz.0.2700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 262.172194][ T30] audit: type=1400 audit(1749986459.029:21639): avc: denied { read write } for pid=7232 comm="syz.0.2700" name="loop0" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 262.196660][ T30] audit: type=1400 audit(1749986459.029:21640): avc: denied { prog_load } for pid=7232 comm="syz.0.2700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 262.429839][ T7239] netlink: 24 bytes leftover after parsing attributes in process `syz.1.2702'. [ 262.990702][ T7283] netlink: 16 bytes leftover after parsing attributes in process `syz.0.2722'. [ 263.001880][ T7283] IPv6: sit1: Disabled Multicast RS [ 263.331416][ T7305] FAULT_INJECTION: forcing a failure. [ 263.331416][ T7305] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 263.344554][ T7305] CPU: 1 PID: 7305 Comm: syz.1.2730 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 263.354485][ T7305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 263.364593][ T7305] Call Trace: [ 263.367869][ T7305] [ 263.370796][ T7305] __dump_stack+0x21/0x30 [ 263.375125][ T7305] dump_stack_lvl+0xee/0x150 [ 263.379721][ T7305] ? show_regs_print_info+0x20/0x20 [ 263.384952][ T7305] dump_stack+0x15/0x20 [ 263.389109][ T7305] should_fail+0x3c1/0x510 [ 263.393534][ T7305] should_fail_usercopy+0x1a/0x20 [ 263.398556][ T7305] _copy_to_user+0x20/0x90 [ 263.402976][ T7305] simple_read_from_buffer+0xe9/0x160 [ 263.408364][ T7305] proc_fail_nth_read+0x19a/0x210 [ 263.413391][ T7305] ? proc_fault_inject_write+0x2f0/0x2f0 [ 263.419022][ T7305] ? security_file_permission+0x83/0xa0 [ 263.424587][ T7305] ? proc_fault_inject_write+0x2f0/0x2f0 [ 263.430224][ T7305] vfs_read+0x282/0xbe0 [ 263.434383][ T7305] ? kernel_read+0x1f0/0x1f0 [ 263.438969][ T7305] ? __kasan_check_write+0x14/0x20 [ 263.444080][ T7305] ? mutex_lock+0x95/0x1a0 [ 263.448504][ T7305] ? wait_for_completion_killable_timeout+0x10/0x10 [ 263.455104][ T7305] ? __fget_files+0x2c4/0x320 [ 263.459794][ T7305] ? __fdget_pos+0x2d2/0x380 [ 263.464389][ T7305] ? ksys_read+0x71/0x240 [ 263.468731][ T7305] ksys_read+0x140/0x240 [ 263.472991][ T7305] ? vfs_write+0xf70/0xf70 [ 263.477414][ T7305] ? debug_smp_processor_id+0x17/0x20 [ 263.482924][ T7305] __x64_sys_read+0x7b/0x90 [ 263.487442][ T7305] x64_sys_call+0x96d/0x9a0 [ 263.492244][ T7305] do_syscall_64+0x4c/0xa0 [ 263.496673][ T7305] ? clear_bhb_loop+0x50/0xa0 [ 263.501356][ T7305] ? clear_bhb_loop+0x50/0xa0 [ 263.506035][ T7305] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 263.511939][ T7305] RIP: 0033:0x7f77232e133c [ 263.516450][ T7305] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 263.536066][ T7305] RSP: 002b:00007f772194b030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 263.544487][ T7305] RAX: ffffffffffffffda RBX: 00007f7723509fa0 RCX: 00007f77232e133c [ 263.552465][ T7305] RDX: 000000000000000f RSI: 00007f772194b0a0 RDI: 0000000000000003 [ 263.560446][ T7305] RBP: 00007f772194b090 R08: 0000000000000000 R09: 0000000000000000 [ 263.568569][ T7305] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 263.576556][ T7305] R13: 0000000000000000 R14: 00007f7723509fa0 R15: 00007ffc0d823428 [ 263.584539][ T7305] [ 265.123280][ T7353] binfmt_misc: register: failed to install interpreter file ./file2 [ 265.205057][ T7363] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2753'. [ 265.474792][ T7383] netlink: 'syz.0.2761': attribute type 6 has an invalid length. [ 266.541637][ T7415] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2774'. [ 266.558272][ T7415] xt_SECMARK: invalid security context 'unconfined' [ 266.659028][ T7425] netlink: 'syz.0.2778': attribute type 12 has an invalid length. [ 266.819594][ T30] kauditd_printk_skb: 1024 callbacks suppressed [ 266.819611][ T30] audit: type=1400 audit(1749986463.914:22665): avc: denied { read write } for pid=7440 comm="syz.3.2786" name="loop3" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 266.844194][ T7444] xt_bpf: check failed: parse error [ 266.850584][ T30] audit: type=1400 audit(1749986463.914:22666): avc: denied { prog_load } for pid=7440 comm="syz.3.2786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 266.874721][ T30] audit: type=1400 audit(1749986463.914:22667): avc: denied { write } for pid=7440 comm="syz.3.2786" name="001" dev="devtmpfs" ino=175 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 [ 266.904282][ T30] audit: type=1400 audit(1749986463.924:22668): avc: denied { read write } for pid=282 comm="syz-executor" name="loop3" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 266.938107][ T30] audit: type=1400 audit(1749986463.934:22669): avc: denied { map_create } for pid=7443 comm="syz.3.2787" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 266.957646][ T30] audit: type=1400 audit(1749986463.934:22670): avc: denied { prog_load } for pid=7443 comm="syz.3.2787" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 266.977056][ T30] audit: type=1400 audit(1749986463.934:22671): avc: denied { create } for pid=7443 comm="syz.3.2787" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 266.996782][ T30] audit: type=1400 audit(1749986463.934:22672): avc: denied { create } for pid=7443 comm="syz.3.2787" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 267.016428][ T30] audit: type=1400 audit(1749986463.934:22673): avc: denied { create } for pid=7443 comm="syz.3.2787" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 267.037264][ T30] audit: type=1400 audit(1749986463.934:22674): avc: denied { create } for pid=7443 comm="syz.3.2787" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 267.529483][ T45] device bridge_slave_1 left promiscuous mode [ 267.535703][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.543335][ T45] device bridge_slave_0 left promiscuous mode [ 267.549518][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.557480][ T45] device veth0_vlan left promiscuous mode [ 267.873982][ T7456] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2789'. [ 271.891859][ T30] kauditd_printk_skb: 120 callbacks suppressed [ 271.891878][ T30] audit: type=1400 audit(1749986469.026:22795): avc: denied { execmem } for pid=7493 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 271.923150][ T30] audit: type=1400 audit(1749986469.036:22796): avc: denied { prog_load } for pid=7498 comm="syz.2.2806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 271.942636][ T30] audit: type=1400 audit(1749986469.036:22797): avc: denied { map_create } for pid=7498 comm="syz.2.2806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 271.961915][ T30] audit: type=1400 audit(1749986469.036:22798): avc: denied { prog_load } for pid=7498 comm="syz.2.2806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 271.981188][ T30] audit: type=1400 audit(1749986469.036:22799): avc: denied { prog_load } for pid=7498 comm="syz.2.2806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 272.000490][ T30] audit: type=1400 audit(1749986469.036:22800): avc: denied { prog_load } for pid=7498 comm="syz.2.2806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 272.019768][ T30] audit: type=1400 audit(1749986469.036:22801): avc: denied { prog_load } for pid=7498 comm="syz.2.2806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 272.039298][ T30] audit: type=1400 audit(1749986469.036:22802): avc: denied { write } for pid=7498 comm="syz.2.2806" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=0 [ 272.062403][ T30] audit: type=1400 audit(1749986469.036:22803): avc: denied { prog_load } for pid=7498 comm="syz.2.2806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 272.081597][ T30] audit: type=1400 audit(1749986469.036:22804): avc: denied { read write } for pid=7498 comm="syz.2.2806" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 273.033733][ T7503] netlink: 'syz.4.2811': attribute type 12 has an invalid length. [ 274.254598][ T7511] device pim6reg1 entered promiscuous mode [ 276.957636][ T30] kauditd_printk_skb: 173 callbacks suppressed [ 276.957652][ T30] audit: type=1400 audit(1749986730.094:22978): avc: denied { execmem } for pid=7534 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 276.990160][ T30] audit: type=1400 audit(1749986730.104:22979): avc: denied { map_create } for pid=7539 comm="syz.1.2821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 277.009882][ T30] audit: type=1400 audit(1749986730.114:22980): avc: denied { prog_load } for pid=7539 comm="syz.1.2821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 277.023668][ T7538] audit: audit_backlog=65 > audit_backlog_limit=64 [ 277.029353][ T30] audit: type=1400 audit(1749986730.114:22981): avc: denied { prog_load } for pid=7539 comm="syz.1.2821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 277.035743][ T7538] audit: audit_lost=6 audit_rate_limit=0 audit_backlog_limit=64 [ 277.055106][ T30] audit: type=1400 audit(1749986730.124:22982): avc: denied { prog_load } for pid=7536 comm="syz.4.2822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 277.062616][ T7538] audit: backlog limit exceeded [ 277.082435][ T30] audit: type=1326 audit(1749986730.124:22983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7539 comm="syz.1.2821" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f77232e2929 code=0x7ffc0000 [ 277.110390][ T30] audit: type=1400 audit(1749986730.124:22984): avc: denied { read write } for pid=7535 comm="syz.0.2820" name="loop0" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 281.974496][ T30] kauditd_printk_skb: 135 callbacks suppressed [ 281.974512][ T30] audit: type=1400 audit(1749986735.114:23120): avc: denied { read write } for pid=284 comm="syz-executor" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 283.631631][ T30] audit: type=1400 audit(1749986736.774:23121): avc: denied { execmem } for pid=7577 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 283.658596][ T7581] device bridge4 entered promiscuous mode [ 283.666392][ T30] audit: type=1400 audit(1749986736.784:23122): avc: denied { prog_load } for pid=7578 comm="syz.1.2835" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 283.688240][ T30] audit: type=1400 audit(1749986736.784:23123): avc: denied { read write } for pid=7583 comm="syz.0.2834" name="fuse" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 283.712479][ T30] audit: type=1400 audit(1749986736.784:23124): avc: denied { read write } for pid=7578 comm="syz.1.2835" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 283.736204][ T30] audit: type=1400 audit(1749986736.794:23125): avc: denied { mounton } for pid=7583 comm="syz.0.2834" path="/610/file0" dev="tmpfs" ino=3457 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 283.759415][ T30] audit: type=1400 audit(1749986736.794:23126): avc: denied { map_create } for pid=7583 comm="syz.0.2834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 283.778755][ T30] audit: type=1400 audit(1749986736.794:23127): avc: denied { prog_load } for pid=7580 comm="syz.2.2836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 283.797993][ T30] audit: type=1400 audit(1749986736.794:23128): avc: denied { prog_load } for pid=7579 comm="syz.4.2837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 283.817310][ T30] audit: type=1400 audit(1749986736.794:23129): avc: denied { map_create } for pid=7579 comm="syz.4.2837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 287.591737][ T30] kauditd_printk_skb: 65 callbacks suppressed [ 287.591754][ T30] audit: type=1400 audit(1749986740.734:23195): avc: denied { execmem } for pid=7601 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 287.659928][ T30] audit: type=1400 audit(1749986740.734:23196): avc: denied { map_create } for pid=7603 comm="syz.2.2845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 287.706712][ T30] audit: type=1400 audit(1749986740.734:23197): avc: denied { prog_load } for pid=7602 comm="syz.1.2844" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 287.746224][ T30] audit: type=1400 audit(1749986740.734:23198): avc: denied { prog_load } for pid=7602 comm="syz.1.2844" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 287.789573][ T30] audit: type=1400 audit(1749986740.734:23199): avc: denied { read } for pid=7603 comm="syz.2.2845" name="loop-control" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=0 [ 287.815334][ T30] audit: type=1400 audit(1749986740.734:23200): avc: denied { create } for pid=7603 comm="syz.2.2845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 287.836793][ T30] audit: type=1400 audit(1749986740.734:23201): avc: denied { prog_load } for pid=7607 comm="syz.0.2843" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 287.869538][ T30] audit: type=1400 audit(1749986740.734:23202): avc: denied { prog_load } for pid=7607 comm="syz.0.2843" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 287.906556][ T30] audit: type=1400 audit(1749986740.764:23203): avc: denied { read write } for pid=7604 comm="syz.4.2846" name="loop4" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 287.959660][ T30] audit: type=1400 audit(1749986740.764:23204): avc: denied { write } for pid=273 comm="syz-executor" path="pipe:[13891]" dev="pipefs" ino=13891 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 288.851519][ T8] device vlan2 left promiscuous mode [ 288.856832][ T8] device dummy0 left promiscuous mode [ 288.862440][ T8] bridge0: port 3(vlan2) entered disabled state [ 288.869291][ T8] device bridge_slave_1 left promiscuous mode [ 288.875553][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.883271][ T8] device bridge_slave_0 left promiscuous mode [ 288.889517][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.897682][ T8] device veth1_macvtap left promiscuous mode [ 288.903759][ T8] device veth0_vlan left promiscuous mode [ 290.651386][ T8] device bridge_slave_1 left promiscuous mode [ 290.657557][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.665299][ T8] device bridge_slave_0 left promiscuous mode [ 290.671477][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.679863][ T8] device bridge_slave_1 left promiscuous mode [ 290.685994][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.693898][ T8] device bridge_slave_0 left promiscuous mode [ 290.700156][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.708512][ T8] device veth1_macvtap left promiscuous mode [ 290.714650][ T8] device veth0_vlan left promiscuous mode [ 290.720870][ T8] device veth1_macvtap left promiscuous mode [ 290.726886][ T8] device veth0_vlan left promiscuous mode