last executing test programs: 2.845292338s ago: executing program 1 (id=1753): bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00'}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000100)=@req3={0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x861}, 0x1c) 2.428573214s ago: executing program 4 (id=1769): bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0b00000005000000020000000200000005000000", @ANYRES32, @ANYBLOB="00000000010000000000000000000000000000005db9332da5a7e7f3100ea100e64692cf2db8e83b33eede9972cad91ed080cb6e85", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="181d000010000000a1e8d2518a8b80ba9a0000000900"/32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) syz_io_uring_setup(0x1725, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x400002, 0x3a6}, &(0x7f0000000040)=0x0, 0x0) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3) pause() fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x2c, 0xffffffffffbffff8) r5 = dup2(r3, r4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r5) fcntl$setown(r3, 0x8, r2) tkill(r2, 0x13) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000240)=0xfffffbff, 0x0, 0x4) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f00000002c0)={0x0, 0x86, "325c87f1687b1b77b379a83100184c4d73737ba9ec54b391ab749e7799328c1b3a22dd8a3a0628c05ebcb1389802bf3b0063c6fdac4c0792d72b55d6bfb45fefdd79491161f28669c89b94673d7fdf784e3e5f1e2f1885d484de79a89078290a2f831f03279c21fe1034bd933533fd21a8a51e485e15d29a4a222621662bf21b9362f6e2c9d8"}, &(0x7f00000001c0)=0x8e) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r5, 0x84, 0x78, 0x0, 0x0) unshare(0x28000600) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x18) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xe, &(0x7f0000000100)={[{@resgid}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x100000}}, {@abort}], [{@dont_measure}, {@uid_gt}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}, 0xff, 0x44b, &(0x7f00000004c0)="$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") syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_MKDIRAT={0x25, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x84, 0x0, 0x1}) r8 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r8, 0x114, 0x8, &(0x7f00000008c0), 0x4) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='kfree\x00', r10}, 0x18) bind$inet6(r8, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0xa77}, 0x1c) 1.97467896s ago: executing program 1 (id=1774): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r1}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) sendmsg$DEVLINK_CMD_RATE_DEL(0xffffffffffffffff, 0x0, 0x40000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000000050000002e11bdad414d0000000000000000000400948f6e8ac7bfc2626e5a76d27d0b508f859ad3462d714e0c210b477e5524"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='percpu_free_percpu\x00', r4}, 0x18) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x420, 0x0, 0x2b8, 0x25c, 0x0, 0x7, 0x350, 0x3a8, 0x3a8, 0x350, 0x3a8, 0x7fffffe, 0x0, {[{{@ipv6={@private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'macvlan1\x00', 'dvmrp0\x00'}, 0x16c, 0x218, 0x260, 0xa010000, {}, [@common=@unspec=@quota={{0x38}}, @common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0xc, [@dev, @dev, @empty, @remote, @dev, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1, @rand_addr=' \x01\x00', @private1, @remote, @loopback, @empty, @private2, @dev, @mcast1, @rand_addr=' \x01\x00']}}]}, @unspec=@CT0={0x48}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x480) mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xb0a54e68b1cd2fdb, 0x103) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="020000"], 0x48) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={0x0, r5, 0x0, 0x5}, 0x18) r6 = socket$inet6_dccp(0xa, 0x6, 0x0) bind$inet6(r6, &(0x7f0000000400)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r6, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @loopback}, 0x62) 1.930104361s ago: executing program 1 (id=1776): r0 = socket(0x400000000010, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000440)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000f00)={0x24, r3, 0x1, 0x0, 0xfffffffe, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x48008}, 0x20044000) sendmsg$nl_route_sched(r0, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=@getqdisc={0x28, 0x26, 0x8, 0x70bd26, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0x8, 0xa}, {0x5, 0xfff2}, {0x2, 0xfff2}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x8001) r5 = open(&(0x7f0000000280)='.\x00', 0x109080, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}, {0x0, 0xfff1}}}, 0x24}}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000070000100000000000000000007000000", @ANYRES32=r7, @ANYBLOB="1000018004000480080001"], 0x28}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r8, &(0x7f00000002c0), 0x40000000000009f, 0x0) fcntl$notify(r5, 0x402, 0x8000003d) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x5d, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000300)='kmem_cache_free\x00', r10}, 0x18) fcntl$notify(r5, 0x402, 0x8000002e) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="240000001d00070f000200000000000007000000", @ANYRES32=r11, @ANYBLOB='\x00\x00g\x00\b\x00\b\x00', @ANYRES32=r1], 0x24}}, 0x0) r12 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r12, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="60000000020601010000000000000000eb7af834050005000a000000050004000000000014000780080006400000000008000840000000f00900020073797a3000000000050001000600000011000300686173683a6e65742c6e6574"], 0x60}}, 0x0) r13 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r13, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[], 0x7c}}, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000000)=0x0, &(0x7f00000000c0)=0x4) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x4) sendmsg$nl_route_sched(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000008c0)=@newtfilter={0x2bc, 0x11, 0xd27, 0x70bd2c, 0x25dfdbff, {0x0, 0x0, 0x0, r11, {0x2, 0x9}, {}, {0x7, 0x3}}, [@filter_kind_options=@f_bpf={{0x8}, {0x290, 0x2, [@TCA_BPF_ACT={0x234, 0x1, [@m_vlan={0x6c, 0x5, 0x0, 0x0, {{0x9}, {0xc, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x7}]}, {0x38, 0x6, "e2d803aa1434b37dbcdf1318bc280520d7758e9ffed645139b927b8271e2092779d3ee9d80672cdd2ef2eaef8ef6cac6b3835912"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_mirred={0x1c4, 0x7, 0x0, 0x0, {{0xb}, {0x144, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x7, 0x33, 0x3, 0x10001, 0xa}, 0x1, r11}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x10001, 0x40, 0x6, 0xde, 0x7c83}, 0x3, r11}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x9, 0x2, 0x30000008, 0x6, 0x9}, 0x2, r11}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x56, 0x8, 0x4, 0xb3, 0x9}, 0x2, r11}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x1, 0x5, 0x3, 0x5, 0x9}, 0x1, r11}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x9, 0xfab1, 0x4, 0x2, 0x9}, 0x3, r14}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x6, 0x1000, 0x0, 0x6, 0x2}, 0x1}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0xfffffffa, 0xa77f, 0x5, 0xb, 0x2}, 0x3, r11}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0xfffffff6, 0x5, 0x6, 0x3, 0xfffffb83}, 0x1, r15}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x7, 0x7f, 0x3, 0x4000000, 0x10000400}, 0x2, r11}}]}, {0x58, 0x6, "b8ca819822d72a14844eec2eaa939b5b7ba606dc09f0d6c683004a183667142125d28755c5f52ba696905dd6c0794eb3c2d10ed9a405c32cff66e58bcb4fff4d27a3c7dc12a35c1367b56aa5209d7c2eb167f52b"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2}}}}]}, @TCA_BPF_OPS={{0x6, 0x4, 0x4}, {0x24, 0x5, [{0x6, 0xf9, 0xf0, 0x5}, {0x2, 0x81, 0x2, 0x7}, {0x3ff, 0x9, 0x0, 0x4}, {0x5, 0x7c, 0x5, 0x80007}]}}, @TCA_BPF_FLAGS_GEN={0x8, 0x9, 0x7}, @TCA_BPF_OPS={{0x6, 0x4, 0x1}, {0xc, 0x5, [{0x1, 0x7, 0x7f, 0x3}]}}, @TCA_BPF_FLAGS={0x8}, @TCA_BPF_CLASSID={0x8, 0x3, {0xfff6, 0x4}}]}}]}, 0x2bc}, 0x1, 0x0, 0x0, 0x10}, 0x0) 1.728322004s ago: executing program 1 (id=1779): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001480)={0x11, 0x4, &(0x7f0000000900)=ANY=[@ANYBLOB="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", @ANYBLOB="6da3d2bb989627ca0faedc3ef71a375fed7dd7cce304d01563a096326b302d94bdb62e8ebd72dd9175179db647d16f13027779d8f5e5143bc9b38fb3c807863ce7242b484be07c7edd1ce80b9810e98b658670a825d406df4c7974f0a7d833110d0075fed4672cd4894023acf3ee65a1fbe39a906c9e2bf1c919f03be8ee7f85873bcf995208d8478624b62fdfbb415c3d26acc6f1b2d6aa1de0da06251a92854876f5bb6ca11a31ee82b3c88c33c15eb173e5a948931ea8c91ad357ab29eedfbb756f42854411a3eec5d79a4ce79f1a778b741577cf1185d01722a421147e7ae4c65fed95618c73967b4e5d2eb9b7241b4ade8ed8ed", @ANYRES8=0x0], &(0x7f0000001540)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='mm_page_alloc\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket(0x1e, 0x80004, 0x0) r2 = socket(0x1e, 0x4, 0x0) r3 = accept4$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000200)=0x14, 0x800) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x7, 0x2000, 0x2400}, 0x10) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000580)=@req3={0xe, 0x2, 0x3, 0x80, 0x8000, 0x8, 0x5}, 0x1c) sendmmsg(r1, &(0x7f00000030c0)=[{{0x0, 0xa9cc7003, &(0x7f0000000400)=[{&(0x7f00000000c0)="ee", 0x3514}], 0x1}}], 0x400000000000181, 0x9200000000000000) r4 = dup3(r2, r1, 0x0) recvmmsg(r4, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000600)=""/179, 0x3514}], 0x1}, 0xffffffff}], 0x1, 0x40000001, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x200, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r7 = gettid() timer_create(0x0, &(0x7f00000003c0)={0x0, 0x21, 0x800000000004, @tid=r7}, &(0x7f0000000380)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r6, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000006c0), 0x48200, 0x0) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000100)=0x2) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000040)=0xe) ioctl$TIOCVHANGUP(r8, 0x5437, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) getdents64(0xffffffffffffffff, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000031c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0x0, r9}, 0x18) r10 = socket$inet(0x2, 0x2, 0x1) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x14}, 0x4010) sendmsg$inet(r10, &(0x7f0000000600)={&(0x7f0000000040)={0x2, 0xffff, @multicast2}, 0x67, &(0x7f0000000240)=[{&(0x7f0000000400)="48a8", 0x2}, {&(0x7f00000004c0)="1ed8b7f9d457", 0x6}, {&(0x7f0000000500)="354252b611ffbbdb8cf8a6e932d883de0c98d15e2cc07a0b5c80b757d1d3e622bc65234f5fefaf5582316003c1da80ed05298b8169cd845e5a1c35d95dfc073cc82622d393c5ff49caa9701552d37604bd1cfc23c4591688bbfad05913b0c57eccf8a85dcf0208ec3d64f545a35f894615cfc464907f94b1dc72", 0x7a}], 0x3, &(0x7f0000000100)=ANY=[@ANYRESHEX=r4], 0x40}, 0x20000000) 1.726269934s ago: executing program 1 (id=1780): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f9ffffffb703000000080000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000040)=""/136, 0xfffffffffffffe05) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r0}, 0x10) setgroups(0x0, 0x0) r1 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = socket(0x400000000010, 0x3, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r5, {0x0, 0x1}, {0xffff, 0xffff}, {0x0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000680)=@newtfilter={0x8c, 0x2c, 0xd27, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r5, {0xb, 0x6}, {}, {0x7}}, [@filter_kind_options=@f_matchall={{0xd}, {0x50, 0x2, [@TCA_MATCHALL_ACT={0x4c, 0x2, [@m_gact={0x48, 0x1, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x655c, 0x2, 0x1ffffffe, 0x9, 0x800}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x2, 0x3}}}}]}]}}, @TCA_RATE={0x6, 0x5, {0x8, 0x7}}]}, 0x8c}, 0x1, 0x0, 0x0, 0x10}, 0x0) fstat(r0, &(0x7f00000001c0)) waitid(0x0, r1, 0x0, 0x4, 0x0) r7 = syz_pidfd_open(r1, 0x0) pidfd_send_signal(r7, 0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x5f, 0x2e, 0x0, 0x61]}}, &(0x7f0000000580)=""/4096, 0x1e, 0x1000, 0x1, 0x10, 0x10000, @value}, 0x28) mq_notify(0xffffffffffffffff, &(0x7f0000000000)={0x110c230000, 0x3, 0x2, @thr={0x0, 0x0}}) 1.427251058s ago: executing program 1 (id=1783): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x4}]}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000c"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00'}, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)=ANY=[@ANYRESHEX=r0], 0xd4}, 0x1, 0x0, 0x0, 0x40000c1}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r1) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000240)={@remote, @multicast1, 0xf}}) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') syz_usb_disconnect(0xffffffffffffffff) socket$key(0xf, 0x3, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) syz_read_part_table(0x61d, &(0x7f00000007c0)="$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") prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f0000000340)=[{0x200000000006, 0x0, 0x0, 0xa70}]}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000031c0)=ANY=[@ANYRES32=r0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') r3 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x2000000000000098, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f00000015c0)='kmem_cache_free\x00', r4}, 0x18) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1205000, 0x0) 1.426757918s ago: executing program 4 (id=1784): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB="0500000004000000080000000b"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x10000002}, 0x18) syz_usb_connect(0x0, 0x5f, 0x0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/zoneinfo\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) ioprio_set$uid(0x3, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000023896) sendmsg$key(r2, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB], 0x10}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000540)={'bond0\x00', &(0x7f0000000040)=@ethtool_sfeatures={0x3b, 0x2, [{0x301}, {0xfffffffd, 0x80000}]}}) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x5, &(0x7f0000006680)) r6 = socket$inet(0x2, 0x2, 0x1) sendmsg$inet(r6, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000180)="96bc1480bb58", 0x6}], 0x1, &(0x7f0000000780)=[@ip_tos_u8={{0x11, 0x0, 0x7}}], 0x18}, 0x0) 1.384364589s ago: executing program 2 (id=1785): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) syz_mount_image$vfat(&(0x7f0000003880), &(0x7f0000000100)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB="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"], 0x1, 0x2bf, &(0x7f00000027c0)="$eJzs3c2KI1UUAOBT6XRSo4tk4UoUC3ThapieJ0gjPTCYlZKFutDBmQHpBGEGGvzBOCtBXLhx6RMIwux8CTe+gQ8guHMWA1cqqZpKxiTTJaTbn+/b9Mm999Q9lVvdTS9y+oOXZqe3i7j74PNfI8+z6IxiFI+yGEYnal/GmtG3AQD8mz1KKX5PS23ysojI91cWALBHrX//P9x7SQDAnr39zrtvHo/HJ28VRR43Zl+dTcq/7Muvy/nju/FRTONOXItBPI5ITyzjGymlebcoDeO12fxsUmbO3v+5uv7xbxGL/KMYxHAxtJ5/c3xyVCyt5M/LOp6r9h+V+ddjEC9s2P/m+OT6hvyY9OL1V1fqvxqD+OXD+DimcXtRRJP/xVFRvJG+++Oz98ryyvxsfjbpL9Y10sEFHw0AAAAAAAAAAAAAAAAAAAAAAP9hV6veOf1Y9O8ph6r+OwePyxeHUdSG6/15lvlZfaGn+gPNU3xf99e5VhRFqhY2+d14sRvdy7lrAAAAAAAAAAAAAAAAAAAA+Ge5/8mnp7em0zv3VoNvImJ95FlBWgZ1N4D6Y/3nTW+Ch4us0crIK7E7q9/s1anCHVvEQb0mi9hZT3kTLYv/u8GVbTX/8GPbC+bPXnNY7pVvW1MeYctN6+NeGYl6JNv8HvafLM7rh+SneiSllHpxzt1726ZSq8evt3Fq0Pooe88vgvmONZFtK+zrl5vvy2oqe/ouemvv81pwWAWx7QTzVs/zX39WZLp1AAAAAAAAAAAAAAAAAADAXjUf+l2+vrI6+WBnaif191oaAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFyY5v//twjmVfKuNZ2IOL017cW9+5d8iwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPwP/BkAAP//X4JY5Q==") r1 = getpid() wait4(r1, 0x0, 0x80000000, &(0x7f0000000340)) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000080)={0x2, 0x40, 0x4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff}, [@ringbuf_output]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'batadv0\x00', 0x0}) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0x0, 0x4}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x2, 0x21, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xafb9, 0x0, 0x0, 0x0, 0x176}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x35}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @ldst={0x4, 0x0, 0x2, 0x1, 0xf, 0x6f, 0x4}, @generic={0x8, 0x8, 0x4, 0x8, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @jmp={0x5, 0x1, 0x4, 0x1, 0x4, 0x8, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffe000, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f00000000c0)='syzkaller\x00', 0xa53e, 0x0, 0x0, 0x40f00, 0x3, '\x00', r2, @fallback=0x15, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0xc, 0xffffff37, 0x10000}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[r0, r0, r0, r0, r0, r3, r0, 0xffffffffffffffff, r0, r0], 0x0, 0x10, 0x7, @void, @value}, 0x94) r4 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) splice(r6, 0x0, r5, 0x0, 0x1, 0x0) fcntl$setpipe(r5, 0x408, 0x7) 1.186400753s ago: executing program 0 (id=1793): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000e00)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x8010) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x6c}, 0x1, 0x0, 0x0, 0x48000}, 0x0) stat(0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000003c0)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='sched_switch\x00', r2, 0x0, 0xffffffffffffffff}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0a0000002b4b0000ff7f0000cc00000000000000", @ANYRES32, @ANYRESDEC], 0x50) r3 = io_uring_setup(0x5f42, &(0x7f00000001c0)={0x0, 0xbd13, 0x2, 0xffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r4) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}, 0xf}, 0x1c) socket(0x25, 0x3, 0xff) listen(r5, 0x0) r6 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r6, &(0x7f0000000140)={0x2, 0x4e22, @loopback}, 0x10) close_range(r3, r5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0x0, @void, @value, @void, @value}, 0x48) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="50010000100013"], 0x150}}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x9, 0xff, 0x7ffc0002}]}) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000850000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r7}, 0x10) pivot_root(0x0, 0x0) r8 = syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000380)={'syztnl1\x00', 0x0, 0x10, 0x706, 0x1, 0x4, {{0xd, 0x4, 0x1, 0x3c, 0x34, 0x67, 0x0, 0x9e, 0x29, 0x0, @loopback, @broadcast, {[@generic={0x44, 0x4, "e1a3"}, @lsrr={0x83, 0x1b, 0x43, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @rand_addr=0x64010102, @rand_addr=0x64010100, @rand_addr=0x64010101, @rand_addr=0x64010101]}]}}}}}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="200026bd7000fcdbdf25010000002000068014000400fc00000000000000000000000000000108000700806d25a4f72e0a02950478de16eb28283483cb65848ef2f731b9b02a0a6e60de80b8b4068ab7e2e3fd3fc1fa0033fc3c38f90c6609187a62ba68d54a49680b8dbd8cfc074d9ba36d155070e9d195c4f6409f3135fc9b0ad30b71682f638f8f7aec22f6ddb36cb242baca1a4b4e3a07ed914d58d1b7a00bf86dd53f116f20ab910a018aedff0b6bc903109e73da23b2961a46c5af45d33fff59fc08744ad7", @ANYRES32=r9, @ANYBLOB="0c00018006000100000000000500050002000000"], 0x48}}, 0x4000000) 1.185881782s ago: executing program 0 (id=1794): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f9ffffffb703000000080000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000040)=""/136, 0xfffffffffffffe05) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r0}, 0x10) setgroups(0x0, 0x0) r1 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = socket(0x400000000010, 0x3, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r5, {0x0, 0x1}, {0xffff, 0xffff}, {0x0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000680)=@newtfilter={0x8c, 0x2c, 0xd27, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r5, {0xb, 0x6}, {}, {0x7}}, [@filter_kind_options=@f_matchall={{0xd}, {0x50, 0x2, [@TCA_MATCHALL_ACT={0x4c, 0x2, [@m_gact={0x48, 0x1, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x655c, 0x2, 0x1ffffffe, 0x9, 0x800}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x2, 0x3}}}}]}]}}, @TCA_RATE={0x6, 0x5, {0x8, 0x7}}]}, 0x8c}, 0x1, 0x0, 0x0, 0x10}, 0x0) fstat(r0, &(0x7f00000001c0)) waitid(0x0, r1, 0x0, 0x4, 0x0) r7 = syz_pidfd_open(r1, 0x0) pidfd_send_signal(r7, 0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x5f, 0x2e, 0x0, 0x61]}}, &(0x7f0000000580)=""/4096, 0x1e, 0x1000, 0x1, 0x10, 0x10000, @value}, 0x28) mq_notify(0xffffffffffffffff, &(0x7f0000000000)={0x110c230000, 0x3, 0x2, @thr={0x0, 0x0}}) 1.056297034s ago: executing program 0 (id=1797): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000b00)=ANY=[@ANYBLOB="18010000200000000000000000000000850000006d0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000006d00000095", @ANYBLOB="5f52265148e45f224b7c0323b257e6d92cba95e8cdbf6acdad57e6477703e19a8e2d1aee6c0fbacf444933fdf83585b188bb1350115d0f019865d7f9f884d10992979729d0ae490f278d83df4d06819d4bd77b1b64bade0a8476836eb258f30a69ddbc202505f9d7496d59df4815b6f09b167de14fbadb46f5dace468d7fdd9de82bce5a9ed7a9938c4c878c5f37e7fe1dbeca923e04db286086a9ee597c8b289cbfdbb71ff06938c459097b712718438275a596b5b67f7448eb54c5e1a16cceea78f1aed12792f9563a08aa2091665cca72d37fa1acb3", @ANYRESOCT], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='tlb_flush\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01000000", @ANYRES32=0x1, @ANYBLOB="0000000000000000000000800000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r2, &(0x7f00000001c0), &(0x7f0000000280)=""/61}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x41, &(0x7f0000000040)=0x2b38, 0x4) ioctl$SIOCGSTAMPNS(r4, 0x8907, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x5000) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f00000001c0)={0x0, 0xfff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r6 = io_uring_setup(0x1694, 0x0) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/pm_debug_messages', 0x100102, 0x0) sendfile(r7, r7, 0x0, 0x6) ioctl$SIOCSIFHWADDR(r7, 0x8924, &(0x7f0000000300)={'veth1_vlan\x00', @random="336634eb0da8"}) msgrcv(0x0, &(0x7f0000000340)={0x0, ""/55}, 0x3f, 0x1, 0x1000) bpf$PROG_LOAD(0x5, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS2(r6, 0x2, &(0x7f0000002700)={0x0, 0x0, 0x0, &(0x7f0000002680), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) 621.101431ms ago: executing program 4 (id=1807): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x2, &(0x7f0000000040)=@raw=[@map_fd={0x18, 0x7}], &(0x7f0000000080)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41000, 0x1c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x2, 0x1, 0x8, 0x3}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1], &(0x7f00000001c0)=[{0x4, 0x4, 0xd}, {0x0, 0x3, 0x4, 0xb}, {0x0, 0x5, 0x7, 0xb}, {0x3, 0x2, 0x7, 0xb}, {0x2, 0x1, 0xa, 0x1}], 0x10, 0x50b, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='mr_dereg\x00', r0, 0x0, 0x10}, 0x18) socket$inet6(0xa, 0x800, 0x3) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000006c0)=ANY=[@ANYBLOB="9feb01001800000000000000f8000000f8000000040000001000000000000009010000000300000008000006040000000100cf0007000000070000000500000007000000f9ffffff030000000500000006000000080000000e000000e00f0000050000007f0000000d000000480000001000000000000002000000000a0000000000000e02000000020000000200000005000013080000000d0000000b000000000400000300000081000000f103000007000000ff7f14ea65c7f0aef6af38c5231024d9ff0000090000000100004008000000010000000600000008000000030000000000000002000085070000001000000005000000060000000b00000005000000fdffffff0700000000000008050000000f"], 0x0, 0x114, 0x0, 0x0, 0xff, 0x0, @void, @value}, 0x28) 608.024111ms ago: executing program 4 (id=1808): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f9ffffffb703000000080000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000040)=""/136, 0xfffffffffffffe05) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r0}, 0x10) setgroups(0x0, 0x0) r1 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = socket(0x400000000010, 0x3, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r5, {0x0, 0x1}, {0xffff, 0xffff}, {0x0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000680)=@newtfilter={0x8c, 0x2c, 0xd27, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r5, {0xb, 0x6}, {}, {0x7}}, [@filter_kind_options=@f_matchall={{0xd}, {0x50, 0x2, [@TCA_MATCHALL_ACT={0x4c, 0x2, [@m_gact={0x48, 0x1, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x655c, 0x2, 0x1ffffffe, 0x9, 0x800}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x2, 0x3}}}}]}]}}, @TCA_RATE={0x6, 0x5, {0x8, 0x7}}]}, 0x8c}, 0x1, 0x0, 0x0, 0x10}, 0x0) fstat(r0, &(0x7f00000001c0)) waitid(0x0, r1, 0x0, 0x4, 0x0) r7 = syz_pidfd_open(r1, 0x0) pidfd_send_signal(r7, 0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x5f, 0x2e, 0x0, 0x61]}}, &(0x7f0000000580)=""/4096, 0x1e, 0x1000, 0x1, 0x10, 0x10000, @value}, 0x28) mq_notify(0xffffffffffffffff, &(0x7f0000000000)={0x110c230000, 0x3, 0x2, @thr={0x0, 0x0}}) 571.355622ms ago: executing program 2 (id=1812): ioperm(0x0, 0xd, 0x4000000000000020) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (fail_nth: 6) 512.453392ms ago: executing program 3 (id=1813): bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) syz_io_uring_setup(0x7b58, &(0x7f0000000300)={0x0, 0xfffffffd, 0x10100, 0x2}, 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000100), 0x4, 0x30dc6) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="aefdda9d240303005a90f57f07703aeff0f64eb9ee07962c220a2e11b44e65d76641cb010852f426072a", 0x2a}], 0x1) (async) read(r0, &(0x7f0000003400)=""/4047, 0xfcf) (async) socket$l2tp6(0xa, 0x2, 0x73) (async, rerun: 64) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async, rerun: 64) r2 = socket$netlink(0x10, 0x3, 0x0) (rerun: 64) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdf5, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r9 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r9, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) (async) setsockopt$inet_msfilter(r9, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="e00000027fa80a010100000004"], 0x57) (async) r10 = socket$nl_route(0x10, 0x3, 0x0) writev(r10, &(0x7f00000003c0)=[{&(0x7f0000000340)="390000001300034700bb65e1c3e4ffff01000000010000005600000002000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) (async) setsockopt$inet_mreqsrc(r9, 0x0, 0x24, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7, 0x0, 0x2}, 0x18) (async) r11 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r11, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001540)={&(0x7f0000000dc0)=ANY=[@ANYRESDEC, @ANYRES32=r4, @ANYRES32=r8, @ANYBLOB="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"], 0x124}}, 0x0) (async) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000c00)=ANY=[@ANYBLOB="380000006d000100"/20, @ANYRES32=r5, @ANYBLOB="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"], 0x38}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00'}, 0x18) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x2008002, &(0x7f00000000c0)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1000}}, {@nodiscard}, {@quota}]}, 0x1, 0x558, &(0x7f0000000680)="$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") mkdir(&(0x7f0000000140)='./file0\x00', 0x1) (async) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="18010000120000000000000000000000850000006d000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 303.498015ms ago: executing program 2 (id=1814): socketpair(0x1d, 0x2, 0x70, &(0x7f0000000280)) 292.215345ms ago: executing program 3 (id=1815): r0 = gettid() timer_create(0x2, &(0x7f0000000ec0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000000000)=0x0) timer_settime(r1, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r2 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000080), 0x40000) readv(r2, &(0x7f0000000080)=[{&(0x7f0000000380)=""/79, 0x4f}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) request_key(&(0x7f0000000080)='asymmetric\x00', 0x0, 0x0, 0xfffffffffffffffe) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = semget$private(0x0, 0x6, 0x3b1) semop(r3, &(0x7f0000000000)=[{0x0, 0xea, 0x1000}, {0x0, 0x0, 0x1000}], 0x2) semtimedop(r3, &(0x7f00000000c0), 0x0, 0x0) semctl$GETZCNT(r3, 0x0, 0xf, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x15, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x10000000000}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={0xffffffffffffffff, 0xfeffff, 0xa9, 0x0, &(0x7f0000000700)="c45c57ce395de5b289f07d637a223920f181c2e57d71483cfb2d075a3ff07258e080a194805cdb0c26d3f7ffb1e0d9cf4fa36dcb2168b72de48ac8f93e6804f1c4d70898d0810e044d7e1778eaac5dfdcc9f1208905522025bcfdf1b6f969b094d5c022c2b7ffefde71e0627b9a2069cc1e0175c4b8860aad4b0a103c589f676b6c4e85eb3950c533b6e62c39ccf9ae9bfe54ee5887358d44f46337fbe090d7c7e55847edee8130ffd", 0x0, 0xf0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000480), 0x1, 0x3e3, &(0x7f00000004c0)="$eJzs3M1uG0UcAPD/bp20TUvtShz4uFiARCRE0qQtUAkkIi4c2hM9cMSK0xLVaVBjJFpFfAjEDSQQDwAH4BE4woF3gDNwgEoRyoGUm9Hau46J7bRpHYyS308aeWZn65nd6ax3J7MTwKFVjYiXI+JIRJyJiHK+Pc1DvN8J2X5bm+uLf2+uLybRar32ZxJJvq34riT/PJF/wXQakX6UxOMDyl27eetardFYupGnZ5srb82u3bz17PJK7erS1aXr88+dPXf+/AsX5p8f2bFurCSfPPXNxd8++7j++U9/fF/J6nsyz+s9jlGpRrV7Tna6MOrCxuxYTzwpjbEiAADsKs3v/Uvt+/9yHIntm7dyfPrjWCsHAAAAjESrVXwCAAAAB1fi2R8AAAAOuGIewNbm+mIRxjgdgf/YxkJEVDrtfycPnZxS953eiR3v945SNSJePXZpPguxT+9hAwAAABxmPyx0Fv7rH/9L45Ge/Y5HxFSxtt8IVXek+8d/0tsjLpIeGwsRL0bEnb7xv7TYpXIkTz3UHiqcSK4sN5bORMSpiJiOiaNZem6XMt594tq3w/J6x/++/PX1uaz87HN7j/R26ei//0291qw9yDGzbeODiMdKg9o/6Y759q6TeT/eWN56aVhe1v5Zexehv/3ZT62vIp4e2P+3Vy5Ndl+fdbZ9PZgtrgr9fjn59YfDyu/t/1nIyi/+FsD+y/r/1O7t314nt7te79rey/jur0s/D8u7e/sPvv5PJpfbFZzMt71TazZvzEVMJhf7t/vf1FWcj+J8Ze0//eTg3//i/i/Jf/tP9awPvRevvHf68rA8/X+8svav76n/7z3y5tSj08PKv7f+f65dmeJL3P/d3b020LjrCQAAAAAAAMBopO25fUk6042n6cxMZ57vwzGVNlbXms9cWX37er0zB7ASE2kx06vcMx90rvMaeTc9vyN9NiJOR8QX5ePt9MziaqM+7oMHAACAQ+LEkOf/zO/387IHAAAA8P9UGXcFAAAAgH3n+R8AAAAOtAdZ119EROSgRsZ9ZQIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA43P4JAAD//+0cwvs=") r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x42, 0x1) pwritev2(r4, &(0x7f0000000000), 0x0, 0xa96, 0x900000, 0x0) fallocate(r4, 0x3, 0x2, 0x8000c62) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_ifreq(r5, 0x891b, &(0x7f0000000000)={'ip6gretap0\x00', @ifru_mtu=0x6}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000003000010850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r7}, 0x10) r8 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') ioctl$sock_netdev_private(r5, 0x8914, 0x0) 248.565086ms ago: executing program 2 (id=1816): socket$packet(0x11, 0x3, 0x300) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x6, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup(r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x4, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x401c5820, &(0x7f0000000080)={@id={0x2, 0x0, @a}}) 248.156696ms ago: executing program 2 (id=1817): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3800000068000100030010000000008000000000000000000c00020001000000150000000c000c80f2ffffffffffffff0600030001"], 0x38}, 0x1, 0x0, 0x0, 0x4008000}, 0x4000) r2 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000180)={0x0, r0}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01101800000000000000180000001800000003000000060000000000000204000000000000000000000205000000006100"], &(0x7f0000000040)=""/38, 0x33, 0x26, 0x0, 0x19, 0x10000, @value=r2}, 0x28) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000005c0)='./file1\x00', 0x1818e58, &(0x7f0000000140)={[{@nobarrier}, {@grpid}]}, 0x22, 0x63f, &(0x7f0000000d80)="$eJzs3c9rXFsdAPDvvZPkJWl86RMRX1AMuHgP5KVJfVh1Y1sXdlGwYBciLhqapIZOf5CkYGvBBFwoKIi4LdKN/4B76d6dCOrOtVBFKha0dB73zp1mMplfaTIzSe7nA5M599wzOeebOyf33HvnzA2gtOazH2nE+xGvbyQRs03rZqK+cr4o9+Lfj29mjyRqte/+K4mkyGuUT4rnM8XCZET86XLEpyv76918+Oj2crVW95OIc1t37p/bfPjoo/U7y7dWb63eXTr/tY8vLH596eOlpoa+vTPF85Wr3/n8L3/6w6+u/bn6URIX4/r4j1eiJY6jMh/z8boIsTl/LCIuZIk2f5eT5hSEUGqV4v04HhGfjdmo5Et1s7H+i5E2DhioWiWi1l3SqwBwUuneUFaNcUDj2L6/4+DrAx6VDM/zS/UDoP3xjxWnHCbzY6PpF0nTkVH93MbZI6g/q+PV48knrx7PPYk95yFevtk6Y0dQTyfbOxHxuXbxJ3nbzuaRZvGne47104hYjIiJon3fOkQbkqb0IM7DdHOQ+Ju3Qxb/xeI5y7/8lvW3ntYadvwAlNOzS8WOfDtb2t3/ZWOPxvgn2ox/Zg5/SSY36v1f5/FfY38/mY970pZxWDZmudb+V463Zvz951d+3an++vhv7knjkdXfGAsOw/OdiLmW+H+WBVuMf7L4kzbbPyty42J/dXz7L/+80mndqOOvPY34oO3xz+6oNEt1uT55bm29urpY/9m2jj/88Qe/61R/+/jfGUCk7WXbf7pD/E3bP219XfY3ud/+V+60Zvz+2tM7neqf6bn9039MJPXjzYki50c7W1sbSxETydWiSJG/vLW1cb57vPUyL2v581I9/g+/1L7/73n/t0Q11fiX2Yf737v9otO6t3n/N11Mfl3rsw2dZPGv9N7++/p/lverPuv47/cffKHTum7xTx0mMAAAAAAAACihNL8Gm6QLb9JpurBQny/7mZhOq/c2t768du/B3ZWID/PPQ46nkSb5R0Zm68vJ2np1dan4PGxj+XzL8lci4r2I+E1lKl9euHmvujLq4AEAAAAAAAAAAAAAAAAAAOCYOFPM/2/cp/o/lfr8f6Aket9gbt/9H4BTYpA3mASOt7z/d9vFvzu8tgDDZf8P5aX/Q3np/1Be+j+Ul/4P5aX/Q3np/1Be+j8AAAAAnErvffHZ35KI2P7GVP7ITBTrTPqF0238QKUrA2sHMHx6NJTXm0v/BvtQOn2N//9XfDng4JsDjEDSLjMfHNS6d/5nbV+5a+fwbQMAAAAAAAAAAAAA6j54v/P8/4PNDQZOGtP+oLwOMf/fVwfACeer/6G8HOMDPWbxx2SnFb3m/wMAAAAAAAAAAAAAR2YmfyTpQjEXeCbSdGEh4lMRcTbGk7X16upiRLwbEX+tjL+TLS+NutEAAAAAAAAAAAAAAAAAAABwymw+fHR7uVpd3WhO/H9fzulONO6C2rtwrY8yXRPfjAO+KpLh/1mmImLkG2VgibGmnCRiO9vyx6JhG5txPJqRJ0b8jwkAAAAAAAAAAAAAAAAAAEqoae5xe3O/HXKLAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGD4du//3yOxMl1/QV+F9yZGHSMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcDJ9EgAA//+YYDw3") 247.709246ms ago: executing program 2 (id=1818): r0 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) bpf$MAP_CREATE(0x0, 0x0, 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000004f4b000000000000000000180100002020702000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000fdffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="2000000069000305000000000000000000000000000000000800010002"], 0x20}}, 0x0) 238.888806ms ago: executing program 4 (id=1819): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0600000004000000fd0f000002"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f9ffffffb703000000080000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) setgroups(0x0, 0x0) r2 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = socket(0x400000000010, 0x3, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r7}, 0x10) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r6, {0x0, 0x1}, {0xffff, 0xffff}, {0x0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000680)=@newtfilter={0x8c, 0x2c, 0xd27, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r6, {0xb, 0x6}, {}, {0x7}}, [@filter_kind_options=@f_matchall={{0xd}, {0x50, 0x2, [@TCA_MATCHALL_ACT={0x4c, 0x2, [@m_gact={0x48, 0x1, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x655c, 0x2, 0x1ffffffe, 0x9, 0x800}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x2, 0x3}}}}]}]}}, @TCA_RATE={0x6, 0x5, {0x8, 0x7}}]}, 0x8c}, 0x1, 0x0, 0x0, 0x10}, 0x0) fstat(r1, &(0x7f00000001c0)) waitid(0x0, r2, 0x0, 0x4, 0x0) r8 = syz_pidfd_open(r2, 0x0) pidfd_send_signal(r8, 0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x5f, 0x2e, 0x0, 0x61]}}, &(0x7f0000000580)=""/4096, 0x1e, 0x1000, 0x1, 0x10, 0x10000, @value}, 0x28) mq_notify(0xffffffffffffffff, &(0x7f0000000000)={0x110c230000, 0x3, 0x2, @thr={0x0, 0x0}}) 197.809057ms ago: executing program 0 (id=1820): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x2b8}, 0x1, 0x0, 0x0, 0x20000000}, 0x4048010) r3 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x702, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000080)=0x474c, 0x4) bind$inet(r3, &(0x7f0000000380)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000480)={0x2, 0x4e20, @multicast2}, 0x10) sendmmsg(r3, &(0x7f0000007fc0), 0x800001d, 0x0) setsockopt$inet_int(r3, 0x0, 0x17, &(0x7f0000000040)=0xe, 0x36) setsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000180)=0x5, 0x4) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r5 = dup2(r4, r4) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x200000a, 0x1, 0x8}) ioctl$BLKTRACESETUP(r4, 0x1276, 0x0) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000180000000000000000000000000b6f7e8000000000000"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='kfree\x00', r7}, 0x10) r8 = getpid() setreuid(0xee00, 0x0) r9 = syz_pidfd_open(r8, 0x0) setns(r9, 0x24020000) syz_clone3(0x0, 0x0) 128.616748ms ago: executing program 3 (id=1821): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040), 0x81, 0x101201) sendto$inet6(r1, &(0x7f0000000080)="cbffd772fb828693afbfefc3c9d59d8a0e2191a399ded9a0d6ffc5a78c1703919e9eb66b99f91fc7b0a10b43c167775b6232342083685ac66f3cc55c7c62fab0dfbe92070049df894b254ff00019c3a5cbcb0b240e328cd868a9889de5181a34b010103f60a073c3d94b0982f3a97eda698eac69bbf1c1076d35757e5f18a86ef9c1da035753957953957239cd1a50c270add30bf6266737da49369cfefe0be13c6c2ad05a73cf59f495e1ea8e50e9b2d348b80a01500464318e3b47aae72f86a080e0cb78d2d376be3cfc7e6df522cd029a079108c42b4d881030e042c97c88b7475d32c27c944bb4772965de30d8eb48", 0xf1, 0x4000040, &(0x7f0000000180)={0xa, 0x4e20, 0xfff, @remote, 0x59aa}, 0x1c) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="1400000010000100000000f4ffffffffffffff0a64000000060a0b04000000000000000002000005300004802c0001800c0001007061796c6f6164001c00024000000001080003400000005708000240000000040900010073797a300000000008000b40000000030c0006400000000000000001140000001100010000000000000000000000000a00000000"], 0x8c}, 0x1, 0x0, 0x0, 0x850}, 0x0) 128.293758ms ago: executing program 3 (id=1822): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socket$kcm(0x10, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$inet(r1, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[], 0x30}, 0x7e8166965e22236a) 83.412328ms ago: executing program 4 (id=1823): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) syz_mount_image$vfat(&(0x7f0000003880), &(0x7f0000000100)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB="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"], 0x1, 0x2bf, &(0x7f00000027c0)="$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") r1 = getpid() wait4(r1, 0x0, 0x80000000, &(0x7f0000000340)) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000080)={0x2, 0x40, 0x4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff}, [@ringbuf_output]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'batadv0\x00', 0x0}) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0x0, 0x4}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x2, 0x21, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xafb9, 0x0, 0x0, 0x0, 0x176}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x35}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @ldst={0x4, 0x0, 0x2, 0x1, 0xf, 0x6f, 0x4}, @generic={0x8, 0x8, 0x4, 0x8, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @jmp={0x5, 0x1, 0x4, 0x1, 0x4, 0x8, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffe000, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f00000000c0)='syzkaller\x00', 0xa53e, 0x0, 0x0, 0x40f00, 0x3, '\x00', r2, @fallback=0x15, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0xc, 0xffffff37, 0x10000}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[r0, r0, r0, r0, r0, r3, r0, 0xffffffffffffffff, r0, r0], 0x0, 0x10, 0x7, @void, @value}, 0x94) r4 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) splice(r6, 0x0, r5, 0x0, 0x1, 0x0) fcntl$setpipe(r5, 0x408, 0x7) 82.040948ms ago: executing program 0 (id=1824): r0 = socket$igmp6(0xa, 0x3, 0x3a) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x8, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp=r2}]}, 0x1c}}, 0x20040005) setsockopt$MRT6_PIM(r0, 0x29, 0xcf, 0x0, 0x0) 49.495949ms ago: executing program 3 (id=1825): connect$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast1}}, 0x24) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$EXT4_IOC_GETFSUUID(0xffffffffffffffff, 0x8008662c, 0x0) r0 = io_uring_setup(0x5b77, &(0x7f00000001c0)={0x0, 0x1000d631, 0x80, 0x2, 0x140}) fcntl$notify(0xffffffffffffffff, 0x402, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='GPL\x00', 0x2, 0x0, 0x0, 0x1e00, 0x24, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x18) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0xfffffffffffffedf, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000000900010073797a310000000040000000030a01020000000000000000010000000900030073797a320000000014000480080002400000000008000140000000050900010073797a31000000004c000000050a01020000100000000000010020000c00024000000000000000010900010073797a310000000020000480140003006e657464657673696d300000000000000800014000000005"], 0xd4}}, 0x0) open(&(0x7f0000000140)='./file0\x00', 0xc5c3, 0x31) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kfree\x00', r3, 0x0, 0x8000000000000000}, 0x18) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f0000000040)={[{@norecovery}, {@grpquota}, {@debug}, {@discard}]}, 0xee, 0x498, &(0x7f0000001b40)="$eJzs3E1sFFUcAPD/bL/5kIr4AYJW8YOotLR8yMGLRhMPmpjoAeOplkKQQg2tiZBG0QMeDYl349HEu4knvRj1YEy86t2QENML6GnMzM4s23a3n0sX3N8v2e17M7N97z9vXuf1vd0NoGMNZU9JxLaI+CMidlSzCw8Yqv64OT838c/83EQSafrm30l+3I35uYny0PJ1W6uZNI3oy5J9Dcq98k7E+NTU5IUiPzJ77v2RmYuXDp45N3568vTk+bHjx48c3td7bOxovj9dZ3yV4mcW1409H03v3f3q21dfnzhx9d2fv8nqu63YXx/HuqRLazhUPbuLPZo9Pbmhwu4ov2ZP2+s2JN3NDx7ehAqxel0RkTVXT55LoisGavt2xCuftrFqwG2Wpmna6P4cdfftFPifSvRv6FDlvT77/7d8bM7I485w/cWIOFhk5ucmbtbi767NHfQs+v+2lYYi4sTlf7/MHtGKeQgAgBV8n41/nms0/qvEA3XH3VOsoQxGxL0RsTMi7ouIXRFxf0R+7IMR5x5aY/mLV0iWjn8q19YV2Cpl478XirWtmwvGf+XoLwa7itz2PP6e5NSZqclDxTk5ED19WX50mTJ+ePn3z8t0/6J99eO/7JGVX44Fi3pc6140QXdyfHY8T6Rp+vHGwo/rn0Ts6W4UfxLlMk4SEbsjYs86yzjzzNd7m+1bOf5lLLPOtFrpVxFPV9v/8sLx/62mSurXJwciorY+Ofr8sbGjI/0xNXlopLwqlvrltytvNCt/Q/G3QNb+Wxpe/7VV4MGkP2Lm4qWz+XrtzNrLuPLnZ3V9esHqchZ/5duINV//vclbebq32Pbh+OzshdGI3uS1pdvHbr22zJfHZ/Ef2N+4/++sq/HDEZFdxPsi4pFiETdru8ci4vGI2L9M/D+99MR7zfY1b/9ms/Ktdb04Ucu2f9S3/9oTXWd//K5Z+UPFGmQU56Fx+x/JUweKLbW/f8tYbQXXddIAAADgLlPJ3wOfVIZr6UpleLj6Hv5dsaUyNT0z++yp6Q/On6y+V34weirlTNeOuvnQ0WJuuMyPLcofLuaNv+gayPPDE9NTJ9sdPHS4rU36f+avrnbXDrjtWrCOBtyl9H/oXPo/dC79HzqX/g+dq1H/3+gHC4C7g/s/dK68/z91ud3VANrA/R86l/4PHanpZ+MrG/rIf9NE0upf2DBRfnfCZpS1cqL8LopNL31g3S/vX/nURaW9Z7VjEt1L2iK6W1pEX8NdbfyjBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0EL/BQAA///5etKr") r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 477.33µs ago: executing program 0 (id=1826): r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x2, @perf_config_ext={0xf60, 0xffffffff}, 0x1100, 0x5dd8, 0x3a65, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$SG_IO(r0, 0x2285, &(0x7f00000005c0)={0x53, 0xfffffffe, 0x6, 0x2, @scatter={0x1, 0xcc, &(0x7f0000000700)=[{&(0x7f0000000800)=""/215, 0xd7}]}, &(0x7f0000000080)="0000501ef663", 0x0, 0x800004, 0x10030, 0x0, 0x0}) request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000001fee)='y\xa9rustV\x1eS=\xd4\x16\x95:\x00\x01\x00\x00', 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) (async) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x2, @perf_config_ext={0xf60, 0xffffffff}, 0x1100, 0x5dd8, 0x3a65, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) (async) socket$nl_netfilter(0x10, 0x3, 0xc) (async) socket$nl_netfilter(0x10, 0x3, 0xc) (async) ioctl$SG_IO(r0, 0x2285, &(0x7f00000005c0)={0x53, 0xfffffffe, 0x6, 0x2, @scatter={0x1, 0xcc, &(0x7f0000000700)=[{&(0x7f0000000800)=""/215, 0xd7}]}, &(0x7f0000000080)="0000501ef663", 0x0, 0x800004, 0x10030, 0x0, 0x0}) (async) request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000001fee)='y\xa9rustV\x1eS=\xd4\x16\x95:\x00\x01\x00\x00', 0x0) (async) 0s ago: executing program 3 (id=1827): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sched_switch\x00', r0, 0x0, 0x85f5}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000dc0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000ac0)={0x2c, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x18, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}]}]}, 0x2c}}, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000880)=0x200000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x34402, 0x0) futimesat(r4, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{0x77359400}}) r5 = socket(0x10, 0x803, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000003c0)=@getchain={0x24, 0x66, 0x0, 0x3, 0x2000, {0x0, 0x0, 0x0, 0x0, {0x0, 0x8}, {0x0, 0xffff}}}, 0x86}}, 0x400c0) getsockname$packet(r5, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000700)=0x14) r8 = syz_io_uring_setup(0xdcd, &(0x7f0000000140)={0x0, 0xd46c, 0x800, 0x0, 0xe2}, &(0x7f0000000340)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r9, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r9, r10, &(0x7f00000003c0)=@IORING_OP_SPLICE={0x1e, 0x2, 0x0, @fd, 0x1ff, {}, 0x72, 0x11}) io_uring_enter(r8, 0x3516, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}]}}}]}, 0x48}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x80, 0x10, 0x401, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x60, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x50, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @private2}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0xfffffff5}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x14}, @IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x3}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0x3}]}}}]}, 0x80}, 0x1, 0x0, 0x0, 0x40001}, 0x20004090) r11 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r11, 0x0, 0x60, &(0x7f0000000180)={'filter\x00', 0xfffffffffffff20, [{}, {0x0, 0x100000000000000}]}, 0x68) kernel console output (not intermixed with test programs): 4_sys_ioctl+0x43/0x50 [ 63.985610][ T5107] x64_sys_call+0x168d/0x2e10 [ 63.985621][ T5107] do_syscall_64+0xc9/0x1c0 [ 63.985633][ T5107] ? clear_bhb_loop+0x25/0x80 [ 63.985645][ T5107] ? clear_bhb_loop+0x25/0x80 [ 63.985656][ T5107] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 63.985738][ T5107] RIP: 0033:0x7f91319cd169 [ 63.985825][ T5107] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 63.985879][ T5107] RSP: 002b:00007f913002f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 63.985890][ T5107] RAX: ffffffffffffffda RBX: 00007f9131be5fa0 RCX: 00007f91319cd169 [ 63.985933][ T5107] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000004 [ 63.985939][ T5107] RBP: 00007f913002f090 R08: 0000000000000000 R09: 0000000000000000 [ 63.985945][ T5107] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 63.985951][ T5107] R13: 0000000000000000 R14: 00007f9131be5fa0 R15: 00007fff9b1f3698 [ 63.985960][ T5107] [ 64.378139][ T5131] FAULT_INJECTION: forcing a failure. [ 64.378139][ T5131] name failslab, interval 1, probability 0, space 0, times 0 [ 64.392242][ T5131] CPU: 1 UID: 0 PID: 5131 Comm: syz.0.662 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 64.392265][ T5131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 64.392390][ T5131] Call Trace: [ 64.392397][ T5131] [ 64.392405][ T5131] dump_stack_lvl+0xf6/0x150 [ 64.392457][ T5131] dump_stack+0x15/0x1a [ 64.392472][ T5131] should_fail_ex+0x261/0x270 [ 64.392544][ T5131] should_failslab+0x8f/0xb0 [ 64.392566][ T5131] __kmalloc_cache_noprof+0x55/0x320 [ 64.392596][ T5131] ? reuseport_alloc+0x9d/0x200 [ 64.392618][ T5131] reuseport_alloc+0x9d/0x200 [ 64.392680][ T5131] udp_lib_get_port+0x87b/0xdd0 [ 64.392720][ T5131] udp_v4_get_port+0xe2/0x100 [ 64.392747][ T5131] inet_dgram_connect+0x15b/0x1b0 [ 64.392825][ T5131] ? __pfx_inet_dgram_connect+0x10/0x10 [ 64.392857][ T5131] __sys_connect+0x192/0x1b0 [ 64.392888][ T5131] __x64_sys_connect+0x41/0x50 [ 64.392915][ T5131] x64_sys_call+0x2030/0x2e10 [ 64.392968][ T5131] do_syscall_64+0xc9/0x1c0 [ 64.392986][ T5131] ? clear_bhb_loop+0x25/0x80 [ 64.393002][ T5131] ? clear_bhb_loop+0x25/0x80 [ 64.393021][ T5131] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 64.393041][ T5131] RIP: 0033:0x7f1aa8b7d169 [ 64.393071][ T5131] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 64.393147][ T5131] RSP: 002b:00007f1aa71df038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 64.393163][ T5131] RAX: ffffffffffffffda RBX: 00007f1aa8d95fa0 RCX: 00007f1aa8b7d169 [ 64.393174][ T5131] RDX: 0000000000000010 RSI: 0000200000000c40 RDI: 0000000000000003 [ 64.393185][ T5131] RBP: 00007f1aa71df090 R08: 0000000000000000 R09: 0000000000000000 [ 64.393256][ T5131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 64.393265][ T5131] R13: 0000000000000000 R14: 00007f1aa8d95fa0 R15: 00007fff6612a258 [ 64.393278][ T5131] [ 64.465943][ T5134] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5134 comm=syz.3.661 [ 64.737397][ T5140] FAULT_INJECTION: forcing a failure. [ 64.737397][ T5140] name failslab, interval 1, probability 0, space 0, times 0 [ 64.750652][ T5140] CPU: 0 UID: 0 PID: 5140 Comm: syz.4.664 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 64.750680][ T5140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 64.750690][ T5140] Call Trace: [ 64.750697][ T5140] [ 64.750703][ T5140] dump_stack_lvl+0xf6/0x150 [ 64.750724][ T5140] dump_stack+0x15/0x1a [ 64.750785][ T5140] should_fail_ex+0x261/0x270 [ 64.750804][ T5140] should_failslab+0x8f/0xb0 [ 64.750827][ T5140] __kmalloc_node_track_caller_noprof+0xaa/0x410 [ 64.750858][ T5140] ? sidtab_sid2str_get+0xb8/0x140 [ 64.750922][ T5140] ? skb_put+0xba/0x100 [ 64.751006][ T5140] kmemdup_noprof+0x2b/0x70 [ 64.751039][ T5140] sidtab_sid2str_get+0xb8/0x140 [ 64.751119][ T5140] security_sid_to_context_core+0x1eb/0x2f0 [ 64.751145][ T5140] security_sid_to_context+0x27/0x30 [ 64.751170][ T5140] avc_audit_post_callback+0x9f/0x540 [ 64.751255][ T5140] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 64.751315][ T5140] common_lsm_audit+0x1c6/0x230 [ 64.751341][ T5140] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 64.751360][ T5140] ? kstrtoull+0x115/0x140 [ 64.751421][ T5140] slow_avc_audit+0xff/0x140 [ 64.751441][ T5140] avc_has_perm+0x124/0x150 [ 64.751463][ T5140] selinux_bpf+0xa4/0xc0 [ 64.751487][ T5140] security_bpf+0x50/0x90 [ 64.751519][ T5140] __sys_bpf+0x1ca/0x800 [ 64.751591][ T5140] __x64_sys_bpf+0x43/0x50 [ 64.751604][ T5140] x64_sys_call+0x23da/0x2e10 [ 64.751621][ T5140] do_syscall_64+0xc9/0x1c0 [ 64.751638][ T5140] ? clear_bhb_loop+0x25/0x80 [ 64.751657][ T5140] ? clear_bhb_loop+0x25/0x80 [ 64.751686][ T5140] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 64.751719][ T5140] RIP: 0033:0x7f45045cd169 [ 64.751733][ T5140] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 64.751747][ T5140] RSP: 002b:00007f4502c37038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 64.751765][ T5140] RAX: ffffffffffffffda RBX: 00007f45047e5fa0 RCX: 00007f45045cd169 [ 64.751776][ T5140] RDX: 0000000000000094 RSI: 0000200000000440 RDI: 0000000000000005 [ 64.751787][ T5140] RBP: 00007f4502c37090 R08: 0000000000000000 R09: 0000000000000000 [ 64.751798][ T5140] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 64.751809][ T5140] R13: 0000000000000000 R14: 00007f45047e5fa0 R15: 00007ffc71476f28 [ 64.751887][ T5140] [ 65.733573][ T5205] FAULT_INJECTION: forcing a failure. [ 65.733573][ T5205] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 65.747226][ T5205] CPU: 0 UID: 0 PID: 5205 Comm: syz.1.688 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 65.747247][ T5205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 65.747257][ T5205] Call Trace: [ 65.747315][ T5205] [ 65.747322][ T5205] dump_stack_lvl+0xf6/0x150 [ 65.747343][ T5205] dump_stack+0x15/0x1a [ 65.747390][ T5205] should_fail_ex+0x261/0x270 [ 65.747410][ T5205] should_fail+0xb/0x10 [ 65.747472][ T5205] should_fail_usercopy+0x1a/0x20 [ 65.747492][ T5205] strncpy_from_user+0x25/0x230 [ 65.747519][ T5205] ? getname_flags+0x81/0x3b0 [ 65.747547][ T5205] getname_flags+0xb0/0x3b0 [ 65.747595][ T5205] __x64_sys_renameat2+0x6e/0xa0 [ 65.747648][ T5205] x64_sys_call+0x2cf7/0x2e10 [ 65.747667][ T5205] do_syscall_64+0xc9/0x1c0 [ 65.747752][ T5205] ? clear_bhb_loop+0x25/0x80 [ 65.747764][ T5205] ? clear_bhb_loop+0x25/0x80 [ 65.747845][ T5205] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 65.747856][ T5205] RIP: 0033:0x7f0b4a4ed169 [ 65.747865][ T5205] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 65.747874][ T5205] RSP: 002b:00007f0b48b57038 EFLAGS: 00000246 ORIG_RAX: 000000000000013c [ 65.747905][ T5205] RAX: ffffffffffffffda RBX: 00007f0b4a705fa0 RCX: 00007f0b4a4ed169 [ 65.747911][ T5205] RDX: 0000000000000003 RSI: 0000200000000380 RDI: 0000000000000003 [ 65.747917][ T5205] RBP: 00007f0b48b57090 R08: 0000000000000000 R09: 0000000000000000 [ 65.747989][ T5205] R10: 00002000000003c0 R11: 0000000000000246 R12: 0000000000000001 [ 65.747996][ T5205] R13: 0000000000000000 R14: 00007f0b4a705fa0 R15: 00007ffd40199c18 [ 65.748085][ T5205] [ 66.313209][ T5222] FAULT_INJECTION: forcing a failure. [ 66.313209][ T5222] name failslab, interval 1, probability 0, space 0, times 0 [ 66.313236][ T5222] CPU: 0 UID: 0 PID: 5222 Comm: syz.0.695 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 66.313322][ T5222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 66.313373][ T5222] Call Trace: [ 66.313379][ T5222] [ 66.313385][ T5222] dump_stack_lvl+0xf6/0x150 [ 66.313408][ T5222] dump_stack+0x15/0x1a [ 66.313424][ T5222] should_fail_ex+0x261/0x270 [ 66.313444][ T5222] should_failslab+0x8f/0xb0 [ 66.313482][ T5222] __kmalloc_node_track_caller_noprof+0xaa/0x410 [ 66.313509][ T5222] ? sidtab_sid2str_get+0xb8/0x140 [ 66.313536][ T5222] ? skb_put+0xba/0x100 [ 66.313600][ T5222] kmemdup_noprof+0x2b/0x70 [ 66.313621][ T5222] sidtab_sid2str_get+0xb8/0x140 [ 66.313723][ T5222] security_sid_to_context_core+0x1eb/0x2f0 [ 66.313818][ T5222] security_sid_to_context+0x27/0x30 [ 66.313845][ T5222] avc_audit_post_callback+0x9f/0x540 [ 66.313867][ T5222] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 66.313893][ T5222] common_lsm_audit+0x1c6/0x230 [ 66.313942][ T5222] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 66.313962][ T5222] ? kstrtoull+0x115/0x140 [ 66.314040][ T5222] slow_avc_audit+0xff/0x140 [ 66.314095][ T5222] avc_has_perm+0x124/0x150 [ 66.314116][ T5222] selinux_bpf+0xa4/0xc0 [ 66.314140][ T5222] security_bpf+0x50/0x90 [ 66.314165][ T5222] __sys_bpf+0x1ca/0x800 [ 66.314188][ T5222] __x64_sys_bpf+0x43/0x50 [ 66.314278][ T5222] x64_sys_call+0x23da/0x2e10 [ 66.314313][ T5222] do_syscall_64+0xc9/0x1c0 [ 66.314338][ T5222] ? clear_bhb_loop+0x25/0x80 [ 66.314358][ T5222] ? clear_bhb_loop+0x25/0x80 [ 66.314376][ T5222] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 66.314394][ T5222] RIP: 0033:0x7f1aa8b7d169 [ 66.314438][ T5222] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 66.314454][ T5222] RSP: 002b:00007f1aa71df038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 66.314471][ T5222] RAX: ffffffffffffffda RBX: 00007f1aa8d95fa0 RCX: 00007f1aa8b7d169 [ 66.314483][ T5222] RDX: 0000000000000070 RSI: 00002000000000c0 RDI: 0000000000000005 [ 66.314494][ T5222] RBP: 00007f1aa71df090 R08: 0000000000000000 R09: 0000000000000000 [ 66.314505][ T5222] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 66.314516][ T5222] R13: 0000000000000000 R14: 00007f1aa8d95fa0 R15: 00007fff6612a258 [ 66.314550][ T5222] [ 67.042261][ T29] kauditd_printk_skb: 13844 callbacks suppressed [ 67.042278][ T29] audit: type=1400 audit(1743527718.356:22214): avc: denied { prog_load } for pid=5242 comm="syz.3.703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 67.070280][ T29] audit: type=1400 audit(1743527718.356:22215): avc: denied { create } for pid=5242 comm="syz.3.703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 67.089973][ T29] audit: type=1326 audit(1743527718.356:22216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5242 comm="syz.3.703" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f076d27d169 code=0x0 [ 67.113463][ T29] audit: type=1400 audit(1743527718.356:22217): avc: denied { read write } for pid=3320 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 67.138906][ T29] audit: type=1400 audit(1743527718.376:22218): avc: denied { create } for pid=5244 comm="syz.4.704" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 67.162451][ T29] audit: type=1400 audit(1743527718.376:22219): avc: denied { map_create } for pid=5244 comm="syz.4.704" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 67.182357][ T29] audit: type=1400 audit(1743527718.376:22220): avc: denied { prog_load } for pid=5244 comm="syz.4.704" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 67.201698][ T29] audit: type=1400 audit(1743527718.376:22221): avc: denied { open } for pid=5244 comm="syz.4.704" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 67.224120][ T29] audit: type=1400 audit(1743527718.426:22222): avc: denied { read write } for pid=3316 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 67.250086][ T29] audit: type=1400 audit(1743527718.456:22223): avc: denied { prog_load } for pid=5244 comm="syz.4.704" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 67.359019][ T5259] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 67.978608][ T5290] FAULT_INJECTION: forcing a failure. [ 67.978608][ T5290] name failslab, interval 1, probability 0, space 0, times 0 [ 67.991444][ T5290] CPU: 1 UID: 0 PID: 5290 Comm: syz.4.723 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 67.991477][ T5290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 67.991486][ T5290] Call Trace: [ 67.991493][ T5290] [ 67.991505][ T5290] dump_stack_lvl+0xf6/0x150 [ 67.991528][ T5290] dump_stack+0x15/0x1a [ 67.991543][ T5290] should_fail_ex+0x261/0x270 [ 67.991614][ T5290] should_failslab+0x8f/0xb0 [ 67.991710][ T5290] kmem_cache_alloc_noprof+0x59/0x340 [ 67.991739][ T5290] ? prepare_creds+0x37/0x480 [ 67.991822][ T5290] prepare_creds+0x37/0x480 [ 67.991846][ T5290] copy_creds+0x90/0x3f0 [ 67.991885][ T5290] copy_process+0x63f/0x1f60 [ 67.991909][ T5290] ? __rcu_read_unlock+0x4e/0x70 [ 67.992036][ T5290] kernel_clone+0x168/0x5d0 [ 67.992059][ T5290] __x64_sys_clone+0xe9/0x120 [ 67.992089][ T5290] x64_sys_call+0x2dc9/0x2e10 [ 67.992108][ T5290] do_syscall_64+0xc9/0x1c0 [ 67.992125][ T5290] ? clear_bhb_loop+0x25/0x80 [ 67.992195][ T5290] ? clear_bhb_loop+0x25/0x80 [ 67.992215][ T5290] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 67.992294][ T5290] RIP: 0033:0x7f45045cd169 [ 67.992308][ T5290] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 67.992326][ T5290] RSP: 002b:00007f4502c36fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 67.992345][ T5290] RAX: ffffffffffffffda RBX: 00007f45047e5fa0 RCX: 00007f45045cd169 [ 67.992357][ T5290] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000022023400 [ 67.992402][ T5290] RBP: 00007f4502c37090 R08: 0000000000000000 R09: 0000000000000000 [ 67.992411][ T5290] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 67.992421][ T5290] R13: 0000000000000000 R14: 00007f45047e5fa0 R15: 00007ffc71476f28 [ 67.992434][ T5290] [ 68.309493][ T5304] FAULT_INJECTION: forcing a failure. [ 68.309493][ T5304] name failslab, interval 1, probability 0, space 0, times 0 [ 68.322409][ T5304] CPU: 0 UID: 0 PID: 5304 Comm: syz.1.728 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 68.322433][ T5304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 68.322443][ T5304] Call Trace: [ 68.322448][ T5304] [ 68.322455][ T5304] dump_stack_lvl+0xf6/0x150 [ 68.322477][ T5304] dump_stack+0x15/0x1a [ 68.322545][ T5304] should_fail_ex+0x261/0x270 [ 68.322565][ T5304] should_failslab+0x8f/0xb0 [ 68.322589][ T5304] __kvmalloc_node_noprof+0x12c/0x520 [ 68.322607][ T5304] ? proc_sys_call_handler+0x25c/0x4c0 [ 68.322626][ T5304] ? ns_capable_noaudit+0x80/0xb0 [ 68.322660][ T5304] proc_sys_call_handler+0x25c/0x4c0 [ 68.322678][ T5304] proc_sys_write+0x22/0x30 [ 68.322706][ T5304] vfs_write+0x79b/0x950 [ 68.322727][ T5304] ? __pfx_proc_sys_write+0x10/0x10 [ 68.322759][ T5304] ksys_write+0xeb/0x1b0 [ 68.322780][ T5304] __x64_sys_write+0x42/0x50 [ 68.322801][ T5304] x64_sys_call+0x2a45/0x2e10 [ 68.322820][ T5304] do_syscall_64+0xc9/0x1c0 [ 68.322904][ T5304] ? clear_bhb_loop+0x25/0x80 [ 68.322923][ T5304] ? clear_bhb_loop+0x25/0x80 [ 68.322942][ T5304] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 68.322961][ T5304] RIP: 0033:0x7f0b4a4ed169 [ 68.323038][ T5304] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 68.323053][ T5304] RSP: 002b:00007f0b48b57038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 68.323071][ T5304] RAX: ffffffffffffffda RBX: 00007f0b4a705fa0 RCX: 00007f0b4a4ed169 [ 68.323082][ T5304] RDX: 0000000000000022 RSI: 0000200000000980 RDI: 0000000000000003 [ 68.323138][ T5304] RBP: 00007f0b48b57090 R08: 0000000000000000 R09: 0000000000000000 [ 68.323149][ T5304] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 68.323160][ T5304] R13: 0000000000000000 R14: 00007f0b4a705fa0 R15: 00007ffd40199c18 [ 68.323175][ T5304] [ 68.561204][ T5310] FAULT_INJECTION: forcing a failure. [ 68.561204][ T5310] name failslab, interval 1, probability 0, space 0, times 0 [ 68.573939][ T5310] CPU: 1 UID: 0 PID: 5310 Comm: syz.2.732 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 68.574003][ T5310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 68.574014][ T5310] Call Trace: [ 68.574020][ T5310] [ 68.574028][ T5310] dump_stack_lvl+0xf6/0x150 [ 68.574050][ T5310] dump_stack+0x15/0x1a [ 68.574062][ T5310] should_fail_ex+0x261/0x270 [ 68.574080][ T5310] should_failslab+0x8f/0xb0 [ 68.574130][ T5310] __kmalloc_cache_noprof+0x55/0x320 [ 68.574173][ T5310] ? getname_flags+0x1f3/0x3b0 [ 68.574198][ T5310] getname_flags+0x1f3/0x3b0 [ 68.574225][ T5310] __x64_sys_rename+0x40/0x70 [ 68.574368][ T5310] x64_sys_call+0x2cd9/0x2e10 [ 68.574384][ T5310] do_syscall_64+0xc9/0x1c0 [ 68.574470][ T5310] ? clear_bhb_loop+0x25/0x80 [ 68.574488][ T5310] ? clear_bhb_loop+0x25/0x80 [ 68.574508][ T5310] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 68.574528][ T5310] RIP: 0033:0x7f91319cd169 [ 68.574542][ T5310] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 68.574556][ T5310] RSP: 002b:00007f913002f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 68.574582][ T5310] RAX: ffffffffffffffda RBX: 00007f9131be5fa0 RCX: 00007f91319cd169 [ 68.574593][ T5310] RDX: 0000000000000000 RSI: 0000200000001300 RDI: 0000200000000040 [ 68.574605][ T5310] RBP: 00007f913002f090 R08: 0000000000000000 R09: 0000000000000000 [ 68.574617][ T5310] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 68.574628][ T5310] R13: 0000000000000000 R14: 00007f9131be5fa0 R15: 00007fff9b1f3698 [ 68.574643][ T5310] [ 68.762466][ T5315] FAULT_INJECTION: forcing a failure. [ 68.762466][ T5315] name failslab, interval 1, probability 0, space 0, times 0 [ 68.775718][ T5315] CPU: 0 UID: 0 PID: 5315 Comm: syz.1.734 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 68.775741][ T5315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 68.775773][ T5315] Call Trace: [ 68.775779][ T5315] [ 68.775785][ T5315] dump_stack_lvl+0xf6/0x150 [ 68.775882][ T5315] dump_stack+0x15/0x1a [ 68.775899][ T5315] should_fail_ex+0x261/0x270 [ 68.775953][ T5315] should_failslab+0x8f/0xb0 [ 68.775978][ T5315] __kmalloc_node_track_caller_noprof+0xaa/0x410 [ 68.776006][ T5315] ? sidtab_sid2str_get+0xb8/0x140 [ 68.776030][ T5315] ? skb_put+0xba/0x100 [ 68.776078][ T5315] kmemdup_noprof+0x2b/0x70 [ 68.776095][ T5315] sidtab_sid2str_get+0xb8/0x140 [ 68.776120][ T5315] security_sid_to_context_core+0x1eb/0x2f0 [ 68.776145][ T5315] security_sid_to_context+0x27/0x30 [ 68.776245][ T5315] avc_audit_post_callback+0x9f/0x540 [ 68.776266][ T5315] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 68.776285][ T5315] common_lsm_audit+0x1c6/0x230 [ 68.776307][ T5315] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 68.776344][ T5315] ? kstrtoull+0x115/0x140 [ 68.776361][ T5315] slow_avc_audit+0xff/0x140 [ 68.776383][ T5315] avc_has_perm+0x124/0x150 [ 68.776404][ T5315] selinux_bpf+0xa4/0xc0 [ 68.776486][ T5315] security_bpf+0x50/0x90 [ 68.776514][ T5315] __sys_bpf+0x1ca/0x800 [ 68.776586][ T5315] __x64_sys_bpf+0x43/0x50 [ 68.776600][ T5315] x64_sys_call+0x23da/0x2e10 [ 68.776616][ T5315] do_syscall_64+0xc9/0x1c0 [ 68.776637][ T5315] ? clear_bhb_loop+0x25/0x80 [ 68.776697][ T5315] ? clear_bhb_loop+0x25/0x80 [ 68.776713][ T5315] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 68.776731][ T5315] RIP: 0033:0x7f0b4a4ed169 [ 68.776747][ T5315] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 68.776766][ T5315] RSP: 002b:00007f0b48b57038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 68.776781][ T5315] RAX: ffffffffffffffda RBX: 00007f0b4a705fa0 RCX: 00007f0b4a4ed169 [ 68.776791][ T5315] RDX: 0000000000000070 RSI: 00002000000000c0 RDI: 0000000000000005 [ 68.776800][ T5315] RBP: 00007f0b48b57090 R08: 0000000000000000 R09: 0000000000000000 [ 68.776810][ T5315] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 68.776819][ T5315] R13: 0000000000000000 R14: 00007f0b4a705fa0 R15: 00007ffd40199c18 [ 68.776832][ T5315] [ 69.059165][ T5330] FAULT_INJECTION: forcing a failure. [ 69.059165][ T5330] name failslab, interval 1, probability 0, space 0, times 0 [ 69.071887][ T5330] CPU: 1 UID: 0 PID: 5330 Comm: syz.3.738 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 69.071982][ T5330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 69.072006][ T5330] Call Trace: [ 69.072012][ T5330] [ 69.072018][ T5330] dump_stack_lvl+0xf6/0x150 [ 69.072092][ T5330] dump_stack+0x15/0x1a [ 69.072107][ T5330] should_fail_ex+0x261/0x270 [ 69.072183][ T5330] should_failslab+0x8f/0xb0 [ 69.072204][ T5330] __kmalloc_node_track_caller_noprof+0xaa/0x410 [ 69.072232][ T5330] ? sidtab_sid2str_get+0xb8/0x140 [ 69.072332][ T5330] ? skb_put+0xba/0x100 [ 69.072360][ T5330] kmemdup_noprof+0x2b/0x70 [ 69.072382][ T5330] sidtab_sid2str_get+0xb8/0x140 [ 69.072413][ T5330] security_sid_to_context_core+0x1eb/0x2f0 [ 69.072484][ T5330] security_sid_to_context+0x27/0x30 [ 69.072508][ T5330] avc_audit_post_callback+0x9f/0x540 [ 69.072586][ T5330] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 69.072604][ T5330] common_lsm_audit+0x1c6/0x230 [ 69.072625][ T5330] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 69.072654][ T5330] ? kstrtoull+0x115/0x140 [ 69.072672][ T5330] slow_avc_audit+0xff/0x140 [ 69.072693][ T5330] avc_has_perm+0x124/0x150 [ 69.072758][ T5330] selinux_bpf+0xa4/0xc0 [ 69.072816][ T5330] security_bpf+0x50/0x90 [ 69.072844][ T5330] __sys_bpf+0x1ca/0x800 [ 69.073005][ T5330] __x64_sys_bpf+0x43/0x50 [ 69.073167][ T5330] x64_sys_call+0x23da/0x2e10 [ 69.073184][ T5330] do_syscall_64+0xc9/0x1c0 [ 69.073204][ T5330] ? clear_bhb_loop+0x25/0x80 [ 69.073264][ T5330] ? clear_bhb_loop+0x25/0x80 [ 69.073347][ T5330] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 69.073385][ T5330] RIP: 0033:0x7f076d27d169 [ 69.073400][ T5330] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 69.073417][ T5330] RSP: 002b:00007f076b8e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 69.073508][ T5330] RAX: ffffffffffffffda RBX: 00007f076d495fa0 RCX: 00007f076d27d169 [ 69.073518][ T5330] RDX: 0000000000000094 RSI: 0000200000000440 RDI: 0000000000000005 [ 69.073527][ T5330] RBP: 00007f076b8e7090 R08: 0000000000000000 R09: 0000000000000000 [ 69.073617][ T5330] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 69.073626][ T5330] R13: 0000000000000000 R14: 00007f076d495fa0 R15: 00007fff084b5e48 [ 69.073641][ T5330] [ 69.380610][ T5341] FAULT_INJECTION: forcing a failure. [ 69.380610][ T5341] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 69.393859][ T5341] CPU: 1 UID: 0 PID: 5341 Comm: syz.3.742 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 69.393882][ T5341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 69.393892][ T5341] Call Trace: [ 69.393898][ T5341] [ 69.393905][ T5341] dump_stack_lvl+0xf6/0x150 [ 69.393925][ T5341] dump_stack+0x15/0x1a [ 69.393942][ T5341] should_fail_ex+0x261/0x270 [ 69.394008][ T5341] should_fail+0xb/0x10 [ 69.394022][ T5341] should_fail_usercopy+0x1a/0x20 [ 69.394040][ T5341] _copy_to_user+0x20/0xa0 [ 69.394062][ T5341] simple_read_from_buffer+0xb2/0x130 [ 69.394102][ T5341] proc_fail_nth_read+0x103/0x140 [ 69.394131][ T5341] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 69.394155][ T5341] vfs_read+0x1b2/0x710 [ 69.394172][ T5341] ? __rcu_read_unlock+0x4e/0x70 [ 69.394313][ T5341] ? __fget_files+0x186/0x1c0 [ 69.394394][ T5341] ksys_read+0xeb/0x1b0 [ 69.394411][ T5341] __x64_sys_read+0x42/0x50 [ 69.394434][ T5341] x64_sys_call+0x2a3b/0x2e10 [ 69.394456][ T5341] do_syscall_64+0xc9/0x1c0 [ 69.394474][ T5341] ? clear_bhb_loop+0x25/0x80 [ 69.394497][ T5341] ? clear_bhb_loop+0x25/0x80 [ 69.394513][ T5341] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 69.394529][ T5341] RIP: 0033:0x7f076d27bb7c [ 69.394542][ T5341] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 69.394559][ T5341] RSP: 002b:00007f076b8e7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 69.394577][ T5341] RAX: ffffffffffffffda RBX: 00007f076d495fa0 RCX: 00007f076d27bb7c [ 69.394590][ T5341] RDX: 000000000000000f RSI: 00007f076b8e70a0 RDI: 0000000000000004 [ 69.394600][ T5341] RBP: 00007f076b8e7090 R08: 0000000000000000 R09: 0000000000000000 [ 69.394616][ T5341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 69.394628][ T5341] R13: 0000000000000000 R14: 00007f076d495fa0 R15: 00007fff084b5e48 [ 69.394644][ T5341] [ 70.139054][ T5381] FAULT_INJECTION: forcing a failure. [ 70.139054][ T5381] name failslab, interval 1, probability 0, space 0, times 0 [ 70.152394][ T5381] CPU: 1 UID: 0 PID: 5381 Comm: syz.3.756 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 70.152422][ T5381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 70.152433][ T5381] Call Trace: [ 70.152440][ T5381] [ 70.152447][ T5381] dump_stack_lvl+0xf6/0x150 [ 70.152472][ T5381] dump_stack+0x15/0x1a [ 70.152488][ T5381] should_fail_ex+0x261/0x270 [ 70.152566][ T5381] should_failslab+0x8f/0xb0 [ 70.152592][ T5381] kmem_cache_alloc_noprof+0x59/0x340 [ 70.152623][ T5381] ? dst_alloc+0xc0/0x100 [ 70.152641][ T5381] dst_alloc+0xc0/0x100 [ 70.152657][ T5381] ? ipv4_sk_update_pmtu+0x4b2/0xad0 [ 70.152707][ T5381] ip_route_output_key_hash_rcu+0xb90/0x12e0 [ 70.152734][ T5381] ip_route_output_flow+0x7e/0x130 [ 70.152759][ T5381] tcp_v4_connect+0x476/0xaf0 [ 70.152783][ T5381] __inet_stream_connect+0x15c/0x7c0 [ 70.152812][ T5381] ? _raw_spin_unlock_bh+0x36/0x40 [ 70.152838][ T5381] ? _raw_spin_unlock_bh+0x36/0x40 [ 70.152935][ T5381] ? lock_sock_nested+0x114/0x140 [ 70.152960][ T5381] ? selinux_netlbl_socket_connect+0x112/0x130 [ 70.152991][ T5381] inet_stream_connect+0x48/0x70 [ 70.153018][ T5381] ? __pfx_inet_stream_connect+0x10/0x10 [ 70.153067][ T5381] __sys_connect+0x192/0x1b0 [ 70.153139][ T5381] __x64_sys_connect+0x41/0x50 [ 70.153164][ T5381] x64_sys_call+0x2030/0x2e10 [ 70.153185][ T5381] do_syscall_64+0xc9/0x1c0 [ 70.153203][ T5381] ? clear_bhb_loop+0x25/0x80 [ 70.153219][ T5381] ? clear_bhb_loop+0x25/0x80 [ 70.153236][ T5381] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 70.153254][ T5381] RIP: 0033:0x7f076d27d169 [ 70.153276][ T5381] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 70.153292][ T5381] RSP: 002b:00007f076b8e7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 70.153309][ T5381] RAX: ffffffffffffffda RBX: 00007f076d495fa0 RCX: 00007f076d27d169 [ 70.153318][ T5381] RDX: 0000000000000010 RSI: 0000200000000180 RDI: 0000000000000003 [ 70.153405][ T5381] RBP: 00007f076b8e7090 R08: 0000000000000000 R09: 0000000000000000 [ 70.153417][ T5381] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 70.153428][ T5381] R13: 0000000000000000 R14: 00007f076d495fa0 R15: 00007fff084b5e48 [ 70.153444][ T5381] Apr 1 17:15:21 syzkaller daemon.err dhcpcd[5404]: ps_bpf_start_bpf: bpf_open: Invalid argument Apr 1 17:15:21 syzkaller daemon.err dhcpcd[5404]: ps_root_recvmsg: Invalid argument Apr 1 17:15:22 syzkaller daemon.err dhcpcd[5409]: ps_bpf_start_bpf: bpf_open: Invalid argument Apr 1 17:15:22 syzkaller daemon.err dhcpcd[5409]: ps_root_recvmsg: Invalid argument Apr 1 17:15:22 syzkaller daemon.err dhcpcd[5448]: ps_bpf_start_bpf: bpf_open: Invalid argument Apr 1 17:15:22 syzkaller daemon.err dhcpcd[5448]: ps_root_recvmsg: Invalid argument [ 71.322115][ T5456] xt_CT: No such helper "netbios-ns" [ 71.469860][ T5478] FAULT_INJECTION: forcing a failure. [ 71.469860][ T5478] name failslab, interval 1, probability 0, space 0, times 0 [ 71.482662][ T5478] CPU: 1 UID: 0 PID: 5478 Comm: syz.0.789 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 71.482689][ T5478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 71.482700][ T5478] Call Trace: [ 71.482727][ T5478] [ 71.482734][ T5478] dump_stack_lvl+0xf6/0x150 [ 71.482756][ T5478] dump_stack+0x15/0x1a [ 71.482772][ T5478] should_fail_ex+0x261/0x270 [ 71.482792][ T5478] should_failslab+0x8f/0xb0 [ 71.482816][ T5478] __kmalloc_noprof+0xad/0x410 [ 71.482902][ T5478] ? __register_sysctl_table+0x57/0xc00 [ 71.482996][ T5478] __register_sysctl_table+0x57/0xc00 [ 71.483022][ T5478] ? __kmalloc_node_track_caller_noprof+0x1ed/0x410 [ 71.483124][ T5478] ? register_pidns_sysctls+0x4a/0x140 [ 71.483228][ T5478] register_pidns_sysctls+0xdd/0x140 [ 71.483253][ T5478] copy_pid_ns+0x356/0x640 [ 71.483279][ T5478] ? copy_mnt_ns+0x78/0x5e0 [ 71.483302][ T5478] ? kmem_cache_alloc_noprof+0x237/0x340 [ 71.483361][ T5478] create_new_namespaces+0x188/0x430 [ 71.483380][ T5478] ? security_capable+0x81/0x90 [ 71.483401][ T5478] unshare_nsproxy_namespaces+0xe6/0x120 [ 71.483462][ T5478] ksys_unshare+0x3d3/0x700 [ 71.483489][ T5478] __x64_sys_unshare+0x1f/0x30 [ 71.483514][ T5478] x64_sys_call+0x2c93/0x2e10 [ 71.483534][ T5478] do_syscall_64+0xc9/0x1c0 [ 71.483585][ T5478] ? clear_bhb_loop+0x25/0x80 [ 71.483604][ T5478] ? clear_bhb_loop+0x25/0x80 [ 71.483622][ T5478] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 71.483642][ T5478] RIP: 0033:0x7f1aa8b7d169 [ 71.483657][ T5478] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 71.483679][ T5478] RSP: 002b:00007f1aa71be038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 71.483697][ T5478] RAX: ffffffffffffffda RBX: 00007f1aa8d96080 RCX: 00007f1aa8b7d169 [ 71.483708][ T5478] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000062040200 [ 71.483720][ T5478] RBP: 00007f1aa71be090 R08: 0000000000000000 R09: 0000000000000000 [ 71.483731][ T5478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 71.483742][ T5478] R13: 0000000000000000 R14: 00007f1aa8d96080 R15: 00007fff6612a258 [ 71.483768][ T5478] Apr 1 17:15:23 syzkaller daemon.err dhcpcd[5501]: ps_bpf_start_bpf: bpf_open: Invalid argument Apr 1 17:15:23 syzkaller daemon.err dhcpcd[5501]: ps_root_recvmsg: Invalid argument [ 72.052313][ T29] kauditd_printk_skb: 794 callbacks suppressed [ 72.052341][ T29] audit: type=1400 audit(1743527723.366:23018): avc: denied { create } for pid=5503 comm="syz.4.801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 72.095628][ T29] audit: type=1400 audit(1743527723.366:23019): avc: denied { read write } for pid=5510 comm="syz.0.804" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 72.119279][ T29] audit: type=1400 audit(1743527723.366:23020): avc: denied { bpf } for pid=5503 comm="syz.4.801" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 72.139824][ T29] audit: type=1400 audit(1743527723.366:23021): avc: denied { create } for pid=5503 comm="syz.4.801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 72.159325][ T29] audit: type=1400 audit(1743527723.366:23022): avc: denied { prog_load } for pid=5503 comm="syz.4.801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 72.179268][ T29] audit: type=1400 audit(1743527723.386:23023): avc: denied { read write } for pid=3320 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.203600][ T29] audit: type=1400 audit(1743527723.396:23024): avc: denied { execmem } for pid=5512 comm="syz.4.805" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 72.375613][ T29] audit: type=1400 audit(1743527723.686:23025): avc: denied { read write } for pid=3316 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.406366][ T29] audit: type=1400 audit(1743527723.716:23026): avc: denied { read write } for pid=5515 comm="syz.2.806" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 72.430479][ T29] audit: type=1400 audit(1743527723.716:23027): avc: denied { create } for pid=5515 comm="syz.2.806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 77.061149][ T29] kauditd_printk_skb: 252 callbacks suppressed [ 77.061233][ T29] audit: type=1400 audit(1743527728.366:23280): avc: denied { read write } for pid=3305 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.101295][ T29] audit: type=1400 audit(1743527728.416:23281): avc: denied { create } for pid=5677 comm="syz.3.874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 77.141164][ T29] audit: type=1400 audit(1743527728.446:23282): avc: denied { read write } for pid=3305 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.167429][ T29] audit: type=1400 audit(1743527728.446:23283): avc: denied { read write } for pid=5679 comm="syz.3.875" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 77.192510][ T29] audit: type=1400 audit(1743527728.446:23284): avc: denied { write } for pid=5679 comm="syz.3.875" name="route" dev="proc" ino=4026532642 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 [ 77.215803][ T29] audit: type=1400 audit(1743527728.446:23285): avc: denied { read } for pid=5679 comm="syz.3.875" name="msr" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 77.273672][ T29] audit: type=1400 audit(1743527728.566:23286): avc: denied { read write } for pid=3320 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.323060][ T29] audit: type=1400 audit(1743527728.626:23287): avc: denied { read write } for pid=3320 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.378003][ T29] audit: type=1400 audit(1743527728.636:23288): avc: denied { execmem } for pid=5683 comm="syz.4.877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 77.417239][ T29] audit: type=1400 audit(1743527728.696:23289): avc: denied { name_bind } for pid=5683 comm="syz.4.877" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 78.527462][ T5741] netlink: 60 bytes leftover after parsing attributes in process `syz.2.899'. [ 78.548439][ T5735] netlink: 60 bytes leftover after parsing attributes in process `syz.2.899'. [ 78.562609][ T5742] macsec0: entered promiscuous mode [ 78.568001][ T5742] macsec0: entered allmulticast mode [ 78.573526][ T5742] veth1_macvtap: entered allmulticast mode [ 78.606863][ T5735] netlink: 60 bytes leftover after parsing attributes in process `syz.2.899'. [ 78.782242][ T5785] netlink: 60 bytes leftover after parsing attributes in process `syz.1.918'. [ 78.801354][ T5772] netlink: 60 bytes leftover after parsing attributes in process `syz.1.918'. [ 78.828939][ T5785] netlink: 60 bytes leftover after parsing attributes in process `syz.1.918'. [ 79.055445][ T5830] netlink: 'syz.2.944': attribute type 10 has an invalid length. [ 79.063522][ T5830] netlink: 3819 bytes leftover after parsing attributes in process `syz.2.944'. [ 79.173438][ T5868] netlink: 60 bytes leftover after parsing attributes in process `syz.2.958'. [ 79.207518][ T5856] netlink: 60 bytes leftover after parsing attributes in process `syz.2.958'. [ 79.244573][ T5868] netlink: 60 bytes leftover after parsing attributes in process `syz.2.958'. [ 79.287745][ T5888] netlink: 'syz.4.972': attribute type 29 has an invalid length. [ 79.297143][ T5881] netlink: 'syz.1.969': attribute type 29 has an invalid length. [ 79.305032][ T5881] netlink: 'syz.1.969': attribute type 3 has an invalid length. [ 79.356740][ T5888] netlink: 'syz.4.972': attribute type 29 has an invalid length. [ 80.434440][ T6135] netlink: 'syz.1.1093': attribute type 29 has an invalid length. [ 80.443069][ T6135] netlink: 'syz.1.1093': attribute type 29 has an invalid length. [ 80.647427][ T6182] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53 sclass=netlink_route_socket pid=6182 comm=syz.2.1110 [ 81.016255][ T6272] netlink: 'syz.3.1155': attribute type 29 has an invalid length. [ 81.025659][ T6272] netlink: 'syz.3.1155': attribute type 29 has an invalid length. [ 81.037286][ T6272] netlink: 'syz.3.1155': attribute type 29 has an invalid length. [ 81.045649][ T6275] GPL: port 1(erspan0) entered blocking state [ 81.051781][ T6275] GPL: port 1(erspan0) entered disabled state [ 81.058978][ T6275] erspan0: entered allmulticast mode [ 81.071816][ T6275] erspan0: entered promiscuous mode [ 81.629419][ T6417] netdevsim netdevsim4 netdevsim0: entered promiscuous mode [ 81.636809][ T6417] netdevsim netdevsim4 netdevsim0: entered allmulticast mode [ 82.074104][ T29] kauditd_printk_skb: 2123 callbacks suppressed [ 82.074118][ T29] audit: type=1400 audit(1743527733.386:25413): avc: denied { open } for pid=6534 comm="syz.0.1285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 82.113922][ T29] audit: type=1400 audit(1743527733.386:25414): avc: denied { read write } for pid=3305 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.139691][ T29] audit: type=1400 audit(1743527733.386:25415): avc: denied { open } for pid=6537 comm="syz.3.1286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 82.160862][ T29] audit: type=1400 audit(1743527733.386:25416): avc: denied { prog_load } for pid=6537 comm="syz.3.1286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 82.181394][ T29] audit: type=1400 audit(1743527733.386:25417): avc: denied { open } for pid=6537 comm="syz.3.1286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 82.201326][ T29] audit: type=1400 audit(1743527733.386:25418): avc: denied { prog_load } for pid=6537 comm="syz.3.1286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 82.220533][ T29] audit: type=1400 audit(1743527733.396:25419): avc: denied { create } for pid=6537 comm="syz.3.1286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 82.240400][ T29] audit: type=1400 audit(1743527733.396:25420): avc: denied { prog_load } for pid=6537 comm="syz.3.1286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 82.260168][ T29] audit: type=1400 audit(1743527733.396:25421): avc: denied { prog_load } for pid=6537 comm="syz.3.1286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 82.279349][ T29] audit: type=1400 audit(1743527733.396:25422): avc: denied { map_create } for pid=6537 comm="syz.3.1286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 84.879218][ T6850] FAULT_INJECTION: forcing a failure. [ 84.879218][ T6850] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 84.892430][ T6850] CPU: 1 UID: 0 PID: 6850 Comm: syz.3.1430 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 84.892453][ T6850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 84.892463][ T6850] Call Trace: [ 84.892469][ T6850] [ 84.892476][ T6850] dump_stack_lvl+0xf6/0x150 [ 84.892497][ T6850] dump_stack+0x15/0x1a [ 84.892509][ T6850] should_fail_ex+0x261/0x270 [ 84.892561][ T6850] should_fail+0xb/0x10 [ 84.892575][ T6850] should_fail_usercopy+0x1a/0x20 [ 84.892643][ T6850] _copy_to_user+0x20/0xa0 [ 84.892667][ T6850] simple_read_from_buffer+0xb2/0x130 [ 84.892690][ T6850] proc_fail_nth_read+0x103/0x140 [ 84.892717][ T6850] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 84.892801][ T6850] vfs_read+0x1b2/0x710 [ 84.892820][ T6850] ? __set_next_task_fair+0x5e/0x160 [ 84.892845][ T6850] ? __rcu_read_unlock+0x4e/0x70 [ 84.892876][ T6850] ? __fget_files+0x186/0x1c0 [ 84.892948][ T6850] ksys_read+0xeb/0x1b0 [ 84.892970][ T6850] __x64_sys_read+0x42/0x50 [ 84.892991][ T6850] x64_sys_call+0x2a3b/0x2e10 [ 84.893070][ T6850] do_syscall_64+0xc9/0x1c0 [ 84.893090][ T6850] ? clear_bhb_loop+0x25/0x80 [ 84.893109][ T6850] ? clear_bhb_loop+0x25/0x80 [ 84.893124][ T6850] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 84.893140][ T6850] RIP: 0033:0x7f076d27bb7c [ 84.893177][ T6850] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 84.893194][ T6850] RSP: 002b:00007f076b8e7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 84.893211][ T6850] RAX: ffffffffffffffda RBX: 00007f076d495fa0 RCX: 00007f076d27bb7c [ 84.893222][ T6850] RDX: 000000000000000f RSI: 00007f076b8e70a0 RDI: 0000000000000004 [ 84.893232][ T6850] RBP: 00007f076b8e7090 R08: 0000000000000000 R09: 0000000000000000 [ 84.893314][ T6850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 84.893325][ T6850] R13: 0000000000000000 R14: 00007f076d495fa0 R15: 00007fff084b5e48 [ 84.893360][ T6850] [ 85.500423][ T6882] FAULT_INJECTION: forcing a failure. [ 85.500423][ T6882] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 85.513574][ T6882] CPU: 1 UID: 0 PID: 6882 Comm: syz.4.1442 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 85.513681][ T6882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 85.513692][ T6882] Call Trace: [ 85.513699][ T6882] [ 85.513707][ T6882] dump_stack_lvl+0xf6/0x150 [ 85.513730][ T6882] dump_stack+0x15/0x1a [ 85.513747][ T6882] should_fail_ex+0x261/0x270 [ 85.513768][ T6882] should_fail+0xb/0x10 [ 85.513809][ T6882] should_fail_usercopy+0x1a/0x20 [ 85.513830][ T6882] strncpy_from_user+0x25/0x230 [ 85.513915][ T6882] ? getname_flags+0x81/0x3b0 [ 85.513977][ T6882] getname_flags+0xb0/0x3b0 [ 85.514056][ T6882] user_path_at+0x26/0x140 [ 85.514076][ T6882] do_faccessat+0x3aa/0x6e0 [ 85.514099][ T6882] ? __secure_computing+0x7e/0x160 [ 85.514125][ T6882] __x64_sys_faccessat2+0x51/0x60 [ 85.514160][ T6882] x64_sys_call+0x2af9/0x2e10 [ 85.514181][ T6882] do_syscall_64+0xc9/0x1c0 [ 85.514201][ T6882] ? clear_bhb_loop+0x25/0x80 [ 85.514222][ T6882] ? clear_bhb_loop+0x25/0x80 [ 85.514321][ T6882] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 85.514341][ T6882] RIP: 0033:0x7f45045cd169 [ 85.514356][ T6882] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 85.514426][ T6882] RSP: 002b:00007f4502c37038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b7 [ 85.514445][ T6882] RAX: ffffffffffffffda RBX: 00007f45047e5fa0 RCX: 00007f45045cd169 [ 85.514457][ T6882] RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffffffffffffffff [ 85.514468][ T6882] RBP: 00007f4502c37090 R08: 0000000000000000 R09: 0000000000000000 [ 85.514480][ T6882] R10: 0000000000001200 R11: 0000000000000246 R12: 0000000000000001 [ 85.514491][ T6882] R13: 0000000000000000 R14: 00007f45047e5fa0 R15: 00007ffc71476f28 [ 85.514550][ T6882] [ 85.857759][ T6892] FAULT_INJECTION: forcing a failure. [ 85.857759][ T6892] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 85.870962][ T6892] CPU: 0 UID: 0 PID: 6892 Comm: syz.0.1447 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 85.871031][ T6892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 85.871043][ T6892] Call Trace: [ 85.871050][ T6892] [ 85.871080][ T6892] dump_stack_lvl+0xf6/0x150 [ 85.871106][ T6892] dump_stack+0x15/0x1a [ 85.871123][ T6892] should_fail_ex+0x261/0x270 [ 85.871144][ T6892] should_fail+0xb/0x10 [ 85.871162][ T6892] should_fail_usercopy+0x1a/0x20 [ 85.871217][ T6892] _copy_from_user+0x1c/0xa0 [ 85.871239][ T6892] ipv6_mcast_join_leave+0x8f/0x170 [ 85.871264][ T6892] do_ipv6_setsockopt+0x13db/0x2240 [ 85.871284][ T6892] ? kstrtouint+0x7b/0xc0 [ 85.871302][ T6892] ? avc_has_perm_noaudit+0x1cc/0x210 [ 85.871375][ T6892] ? selinux_netlbl_socket_setsockopt+0xea/0x2d0 [ 85.871531][ T6892] ? avc_has_perm+0xd6/0x150 [ 85.871549][ T6892] ipv6_setsockopt+0x57/0x130 [ 85.871565][ T6892] tcp_setsockopt+0x93/0xb0 [ 85.871709][ T6892] sock_common_setsockopt+0x64/0x80 [ 85.871737][ T6892] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 85.871762][ T6892] __sys_setsockopt+0x187/0x200 [ 85.871779][ T6892] __x64_sys_setsockopt+0x66/0x80 [ 85.871836][ T6892] x64_sys_call+0x2a09/0x2e10 [ 85.871853][ T6892] do_syscall_64+0xc9/0x1c0 [ 85.871869][ T6892] ? clear_bhb_loop+0x25/0x80 [ 85.871885][ T6892] ? clear_bhb_loop+0x25/0x80 [ 85.871910][ T6892] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 85.871928][ T6892] RIP: 0033:0x7f1aa8b7d169 [ 85.871941][ T6892] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 85.871959][ T6892] RSP: 002b:00007f1aa71df038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 85.871979][ T6892] RAX: ffffffffffffffda RBX: 00007f1aa8d95fa0 RCX: 00007f1aa8b7d169 [ 85.871989][ T6892] RDX: 000000000000002a RSI: 0000000000000029 RDI: 0000000000000003 [ 85.871998][ T6892] RBP: 00007f1aa71df090 R08: 0000000000000088 R09: 0000000000000000 [ 85.872013][ T6892] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 85.872023][ T6892] R13: 0000000000000000 R14: 00007f1aa8d95fa0 R15: 00007fff6612a258 [ 85.872036][ T6892] [ 86.874000][ T6950] FAULT_INJECTION: forcing a failure. [ 86.874000][ T6950] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 86.887212][ T6950] CPU: 1 UID: 0 PID: 6950 Comm: syz.4.1468 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 86.887235][ T6950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 86.887245][ T6950] Call Trace: [ 86.887251][ T6950] [ 86.887258][ T6950] dump_stack_lvl+0xf6/0x150 [ 86.887277][ T6950] dump_stack+0x15/0x1a [ 86.887290][ T6950] should_fail_ex+0x261/0x270 [ 86.887388][ T6950] should_fail+0xb/0x10 [ 86.887403][ T6950] should_fail_usercopy+0x1a/0x20 [ 86.887423][ T6950] _copy_to_user+0x20/0xa0 [ 86.887443][ T6950] syslog_print_all+0x209/0x3f0 [ 86.887528][ T6950] do_syslog+0x44a/0x810 [ 86.887550][ T6950] ? ksys_write+0x180/0x1b0 [ 86.887572][ T6950] __x64_sys_syslog+0x43/0x50 [ 86.887590][ T6950] x64_sys_call+0x2b8f/0x2e10 [ 86.887607][ T6950] do_syscall_64+0xc9/0x1c0 [ 86.887656][ T6950] ? clear_bhb_loop+0x25/0x80 [ 86.887685][ T6950] ? clear_bhb_loop+0x25/0x80 [ 86.887711][ T6950] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 86.887728][ T6950] RIP: 0033:0x7f45045cd169 [ 86.887740][ T6950] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 86.887754][ T6950] RSP: 002b:00007f4502c37038 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 86.887772][ T6950] RAX: ffffffffffffffda RBX: 00007f45047e5fa0 RCX: 00007f45045cd169 [ 86.887791][ T6950] RDX: 0000000000001000 RSI: 0000200000000b00 RDI: 0000000000000003 [ 86.887801][ T6950] RBP: 00007f4502c37090 R08: 0000000000000000 R09: 0000000000000000 [ 86.887810][ T6950] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 86.887822][ T6950] R13: 0000000000000000 R14: 00007f45047e5fa0 R15: 00007ffc71476f28 [ 86.887838][ T6950] [ 87.087855][ T29] kauditd_printk_skb: 728 callbacks suppressed [ 87.087869][ T29] audit: type=1400 audit(1743527738.396:26151): avc: denied { read write } for pid=3320 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 87.119120][ T29] audit: type=1400 audit(1743527738.406:26152): avc: denied { map_create } for pid=6958 comm="syz.4.1472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 87.120339][ T6957] FAULT_INJECTION: forcing a failure. [ 87.120339][ T6957] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 87.138596][ T29] audit: type=1400 audit(1743527738.406:26153): avc: denied { prog_load } for pid=6958 comm="syz.4.1472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 87.151628][ T6957] CPU: 1 UID: 0 PID: 6957 Comm: syz.3.1471 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 87.151701][ T6957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 87.151711][ T6957] Call Trace: [ 87.151717][ T6957] [ 87.151725][ T6957] dump_stack_lvl+0xf6/0x150 [ 87.151810][ T6957] dump_stack+0x15/0x1a [ 87.151825][ T6957] should_fail_ex+0x261/0x270 [ 87.151858][ T6957] should_fail+0xb/0x10 [ 87.151917][ T6957] should_fail_usercopy+0x1a/0x20 [ 87.151938][ T6957] _copy_to_user+0x20/0xa0 [ 87.151962][ T6957] simple_read_from_buffer+0xb2/0x130 [ 87.152042][ T6957] proc_fail_nth_read+0x103/0x140 [ 87.152070][ T6957] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 87.152203][ T6957] vfs_read+0x1b2/0x710 [ 87.152223][ T6957] ? __rcu_read_unlock+0x4e/0x70 [ 87.152247][ T6957] ? __fget_files+0x186/0x1c0 [ 87.152308][ T6957] ksys_read+0xeb/0x1b0 [ 87.152329][ T6957] __x64_sys_read+0x42/0x50 [ 87.152431][ T6957] x64_sys_call+0x2a3b/0x2e10 [ 87.152465][ T6957] do_syscall_64+0xc9/0x1c0 [ 87.152485][ T6957] ? clear_bhb_loop+0x25/0x80 [ 87.152504][ T6957] ? clear_bhb_loop+0x25/0x80 [ 87.152523][ T6957] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 87.152543][ T6957] RIP: 0033:0x7f076d27bb7c [ 87.152558][ T6957] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 87.152587][ T6957] RSP: 002b:00007f076b8e7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 87.152604][ T6957] RAX: ffffffffffffffda RBX: 00007f076d495fa0 RCX: 00007f076d27bb7c [ 87.152616][ T6957] RDX: 000000000000000f RSI: 00007f076b8e70a0 RDI: 0000000000000004 [ 87.152627][ T6957] RBP: 00007f076b8e7090 R08: 0000000000000000 R09: 0000000000000000 [ 87.152637][ T6957] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 87.152648][ T6957] R13: 0000000000000000 R14: 00007f076d495fa0 R15: 00007fff084b5e48 [ 87.152737][ T6957] [ 87.222502][ T6962] FAULT_INJECTION: forcing a failure. [ 87.222502][ T6962] name failslab, interval 1, probability 0, space 0, times 0 [ 87.223116][ T29] audit: type=1400 audit(1743527738.406:26154): avc: denied { create } for pid=6958 comm="syz.4.1472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 87.227598][ T6962] CPU: 1 UID: 0 PID: 6962 Comm: syz.1.1470 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 87.227627][ T6962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 87.227640][ T6962] Call Trace: [ 87.227647][ T6962] [ 87.227656][ T6962] dump_stack_lvl+0xf6/0x150 [ 87.227741][ T6962] dump_stack+0x15/0x1a [ 87.227757][ T6962] should_fail_ex+0x261/0x270 [ 87.227778][ T6962] should_failslab+0x8f/0xb0 [ 87.227815][ T6962] __kmalloc_noprof+0xad/0x410 [ 87.227844][ T6962] ? __register_sysctl_table+0x57/0xc00 [ 87.227874][ T6962] __register_sysctl_table+0x57/0xc00 [ 87.227901][ T6962] ? __kmalloc_node_track_caller_noprof+0x1ed/0x410 [ 87.227975][ T6962] ? register_pidns_sysctls+0x4a/0x140 [ 87.228011][ T6962] register_pidns_sysctls+0xdd/0x140 [ 87.228083][ T6962] copy_pid_ns+0x356/0x640 [ 87.228109][ T6962] ? copy_mnt_ns+0x78/0x5e0 [ 87.228133][ T6962] ? kmem_cache_alloc_noprof+0x237/0x340 [ 87.228167][ T6962] create_new_namespaces+0x188/0x430 [ 87.228185][ T6962] ? security_capable+0x81/0x90 [ 87.228205][ T6962] unshare_nsproxy_namespaces+0xe6/0x120 [ 87.228225][ T6962] ksys_unshare+0x3d3/0x700 [ 87.228325][ T6962] __x64_sys_unshare+0x1f/0x30 [ 87.228351][ T6962] x64_sys_call+0x2c93/0x2e10 [ 87.228370][ T6962] do_syscall_64+0xc9/0x1c0 [ 87.228455][ T6962] ? clear_bhb_loop+0x25/0x80 [ 87.228475][ T6962] ? clear_bhb_loop+0x25/0x80 [ 87.228533][ T6962] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 87.228551][ T6962] RIP: 0033:0x7f0b4a4ed169 [ 87.228566][ T6962] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 87.228582][ T6962] RSP: 002b:00007f0b48b36038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 87.228600][ T6962] RAX: ffffffffffffffda RBX: 00007f0b4a706080 RCX: 00007f0b4a4ed169 [ 87.228611][ T6962] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000062040200 [ 87.228636][ T6962] RBP: 00007f0b48b36090 R08: 0000000000000000 R09: 0000000000000000 [ 87.228646][ T6962] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 87.228657][ T6962] R13: 0000000000000000 R14: 00007f0b4a706080 R15: 00007ffd40199c18 [ 87.228672][ T6962] [ 87.572275][ T3304] audit: audit_backlog=65 > audit_backlog_limit=64 [ 87.578480][ T29] audit: type=1400 audit(1743527738.406:26155): avc: denied { create } for pid=6958 comm="syz.4.1472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 87.586664][ T3304] audit: audit_lost=81 audit_rate_limit=0 audit_backlog_limit=64 [ 87.586680][ T3304] audit: backlog limit exceeded [ 87.597142][ T6974] audit: audit_backlog=65 > audit_backlog_limit=64 [ 87.603286][ T29] audit: type=1400 audit(1743527738.406:26156): avc: denied { map_create } for pid=6956 comm="syz.3.1471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 88.067801][ T7009] FAULT_INJECTION: forcing a failure. [ 88.067801][ T7009] name failslab, interval 1, probability 0, space 0, times 0 [ 88.080592][ T7009] CPU: 1 UID: 0 PID: 7009 Comm: syz.4.1490 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 88.080618][ T7009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 88.080628][ T7009] Call Trace: [ 88.080635][ T7009] [ 88.080642][ T7009] dump_stack_lvl+0xf6/0x150 [ 88.080663][ T7009] dump_stack+0x15/0x1a [ 88.080677][ T7009] should_fail_ex+0x261/0x270 [ 88.080732][ T7009] should_failslab+0x8f/0xb0 [ 88.080776][ T7009] kmem_cache_alloc_lru_noprof+0x5e/0x330 [ 88.080839][ T7009] ? __d_alloc+0x3d/0x350 [ 88.080918][ T7009] __d_alloc+0x3d/0x350 [ 88.080933][ T7009] ? mpol_shared_policy_init+0xd2/0x510 [ 88.080951][ T7009] d_alloc_pseudo+0x1e/0x80 [ 88.081039][ T7009] alloc_file_pseudo+0x75/0x160 [ 88.081055][ T7009] __shmem_file_setup+0x1bb/0x1f0 [ 88.081081][ T7009] shmem_file_setup+0x3b/0x50 [ 88.081109][ T7009] __se_sys_memfd_create+0x2e1/0x5a0 [ 88.081129][ T7009] __x64_sys_memfd_create+0x31/0x40 [ 88.081156][ T7009] x64_sys_call+0x1163/0x2e10 [ 88.081201][ T7009] do_syscall_64+0xc9/0x1c0 [ 88.081220][ T7009] ? clear_bhb_loop+0x25/0x80 [ 88.081238][ T7009] ? clear_bhb_loop+0x25/0x80 [ 88.081253][ T7009] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 88.081307][ T7009] RIP: 0033:0x7f45045cd169 [ 88.081322][ T7009] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 88.081336][ T7009] RSP: 002b:00007f4502c36e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 88.081354][ T7009] RAX: ffffffffffffffda RBX: 0000000000000553 RCX: 00007f45045cd169 [ 88.081365][ T7009] RDX: 00007f4502c36ef0 RSI: 0000000000000000 RDI: 00007f450464ec3c [ 88.081374][ T7009] RBP: 0000200000001080 R08: 00007f4502c36bb7 R09: 00007f4502c36e40 [ 88.081384][ T7009] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000140 [ 88.081393][ T7009] R13: 00007f4502c36ef0 R14: 00007f4502c36eb0 R15: 0000200000000080 [ 88.081438][ T7009] [ 88.326013][ T7022] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 88.468740][ T7031] FAULT_INJECTION: forcing a failure. [ 88.468740][ T7031] name failslab, interval 1, probability 0, space 0, times 0 [ 88.481570][ T7031] CPU: 0 UID: 0 PID: 7031 Comm: syz.0.1498 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 88.481633][ T7031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 88.481643][ T7031] Call Trace: [ 88.481649][ T7031] [ 88.481663][ T7031] dump_stack_lvl+0xf6/0x150 [ 88.481683][ T7031] dump_stack+0x15/0x1a [ 88.481696][ T7031] should_fail_ex+0x261/0x270 [ 88.481716][ T7031] should_failslab+0x8f/0xb0 [ 88.481808][ T7031] __kmalloc_node_track_caller_noprof+0xaa/0x410 [ 88.481835][ T7031] ? sidtab_sid2str_get+0xb8/0x140 [ 88.481862][ T7031] ? skb_put+0xba/0x100 [ 88.481938][ T7031] kmemdup_noprof+0x2b/0x70 [ 88.481959][ T7031] sidtab_sid2str_get+0xb8/0x140 [ 88.481983][ T7031] security_sid_to_context_core+0x1eb/0x2f0 [ 88.482041][ T7031] security_sid_to_context+0x27/0x30 [ 88.482070][ T7031] avc_audit_post_callback+0x9f/0x540 [ 88.482091][ T7031] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 88.482122][ T7031] common_lsm_audit+0x1c6/0x230 [ 88.482205][ T7031] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 88.482225][ T7031] ? _parse_integer_limit+0x167/0x180 [ 88.482240][ T7031] slow_avc_audit+0xff/0x140 [ 88.482285][ T7031] selinux_capable+0x1a7/0x260 [ 88.482306][ T7031] security_capable+0x81/0x90 [ 88.482322][ T7031] ns_capable+0x4d/0xb0 [ 88.482346][ T7031] bpf_token_capable+0x43/0xd0 [ 88.482374][ T7031] bpf_btf_load+0xee/0x130 [ 88.482392][ T7031] __sys_bpf+0x695/0x800 [ 88.482467][ T7031] __x64_sys_bpf+0x43/0x50 [ 88.482481][ T7031] x64_sys_call+0x23da/0x2e10 [ 88.482497][ T7031] do_syscall_64+0xc9/0x1c0 [ 88.482583][ T7031] ? clear_bhb_loop+0x25/0x80 [ 88.482600][ T7031] ? clear_bhb_loop+0x25/0x80 [ 88.482684][ T7031] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 88.482703][ T7031] RIP: 0033:0x7f1aa8b7d169 [ 88.482764][ T7031] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 88.482795][ T7031] RSP: 002b:00007f1aa71be038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 88.482858][ T7031] RAX: ffffffffffffffda RBX: 00007f1aa8d96080 RCX: 00007f1aa8b7d169 [ 88.482870][ T7031] RDX: 0000000000000028 RSI: 0000200000000040 RDI: 0000000000000012 [ 88.482880][ T7031] RBP: 00007f1aa71be090 R08: 0000000000000000 R09: 0000000000000000 [ 88.482889][ T7031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 88.482899][ T7031] R13: 0000000000000000 R14: 00007f1aa8d96080 R15: 00007fff6612a258 [ 88.482988][ T7031] [ 88.851880][ T7046] FAULT_INJECTION: forcing a failure. [ 88.851880][ T7046] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 88.865123][ T7046] CPU: 1 UID: 0 PID: 7046 Comm: syz.1.1502 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 88.865146][ T7046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 88.865156][ T7046] Call Trace: [ 88.865163][ T7046] [ 88.865170][ T7046] dump_stack_lvl+0xf6/0x150 [ 88.865190][ T7046] dump_stack+0x15/0x1a [ 88.865255][ T7046] should_fail_ex+0x261/0x270 [ 88.865277][ T7046] should_fail+0xb/0x10 [ 88.865295][ T7046] should_fail_usercopy+0x1a/0x20 [ 88.865334][ T7046] _copy_to_user+0x20/0xa0 [ 88.865360][ T7046] simple_read_from_buffer+0xb2/0x130 [ 88.865386][ T7046] proc_fail_nth_read+0x103/0x140 [ 88.865410][ T7046] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 88.865481][ T7046] vfs_read+0x1b2/0x710 [ 88.865497][ T7046] ? __rcu_read_unlock+0x4e/0x70 [ 88.865537][ T7046] ? __fget_files+0x186/0x1c0 [ 88.865565][ T7046] ksys_read+0xeb/0x1b0 [ 88.865587][ T7046] __x64_sys_read+0x42/0x50 [ 88.865667][ T7046] x64_sys_call+0x2a3b/0x2e10 [ 88.865688][ T7046] do_syscall_64+0xc9/0x1c0 [ 88.865709][ T7046] ? clear_bhb_loop+0x25/0x80 [ 88.865727][ T7046] ? clear_bhb_loop+0x25/0x80 [ 88.865747][ T7046] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 88.865794][ T7046] RIP: 0033:0x7f0b4a4ebb7c [ 88.865806][ T7046] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 88.865820][ T7046] RSP: 002b:00007f0b48b36030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 88.865836][ T7046] RAX: ffffffffffffffda RBX: 00007f0b4a706080 RCX: 00007f0b4a4ebb7c [ 88.865848][ T7046] RDX: 000000000000000f RSI: 00007f0b48b360a0 RDI: 0000000000000006 [ 88.865859][ T7046] RBP: 00007f0b48b36090 R08: 0000000000000000 R09: 0000000000000000 [ 88.865871][ T7046] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 88.865937][ T7046] R13: 0000000000000000 R14: 00007f0b4a706080 R15: 00007ffd40199c18 [ 88.865953][ T7046] [ 89.657719][ T7118] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 89.664370][ T7118] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 89.672259][ T7118] vhci_hcd vhci_hcd.0: Device attached [ 89.679560][ T7121] vhci_hcd: connection closed [ 89.679720][ T52] vhci_hcd: stop threads [ 89.688967][ T52] vhci_hcd: release socket [ 89.693443][ T52] vhci_hcd: disconnect device [ 90.215275][ T7167] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 90.231194][ T7167] syzkaller0: linktype set to 776 [ 90.377621][ T7178] FAULT_INJECTION: forcing a failure. [ 90.377621][ T7178] name failslab, interval 1, probability 0, space 0, times 0 [ 90.390888][ T7178] CPU: 1 UID: 0 PID: 7178 Comm: syz.3.1553 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 90.390914][ T7178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 90.390924][ T7178] Call Trace: [ 90.390930][ T7178] [ 90.390935][ T7178] dump_stack_lvl+0xf6/0x150 [ 90.390955][ T7178] dump_stack+0x15/0x1a [ 90.390968][ T7178] should_fail_ex+0x261/0x270 [ 90.390986][ T7178] should_failslab+0x8f/0xb0 [ 90.391023][ T7178] kmem_cache_alloc_node_noprof+0x5c/0x340 [ 90.391048][ T7178] ? __alloc_skb+0x10d/0x320 [ 90.391071][ T7178] __alloc_skb+0x10d/0x320 [ 90.391172][ T7178] ? audit_log_start+0x37f/0x6e0 [ 90.391192][ T7178] audit_log_start+0x39a/0x6e0 [ 90.391288][ T7178] ? kstrtouint+0x7b/0xc0 [ 90.391304][ T7178] audit_seccomp+0x4b/0x130 [ 90.391363][ T7178] __seccomp_filter+0x694/0x10e0 [ 90.391389][ T7178] ? vfs_write+0x669/0x950 [ 90.391409][ T7178] ? putname+0xe1/0x100 [ 90.391508][ T7178] __secure_computing+0x7e/0x160 [ 90.391532][ T7178] syscall_trace_enter+0xcf/0x1f0 [ 90.391563][ T7178] ? fpregs_assert_state_consistent+0x83/0xa0 [ 90.391629][ T7178] do_syscall_64+0xaa/0x1c0 [ 90.391654][ T7178] ? clear_bhb_loop+0x25/0x80 [ 90.391675][ T7178] ? clear_bhb_loop+0x25/0x80 [ 90.391713][ T7178] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 90.391734][ T7178] RIP: 0033:0x7f076d27d169 [ 90.391747][ T7178] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 90.391765][ T7178] RSP: 002b:00007f076b8e7038 EFLAGS: 00000246 ORIG_RAX: 00000000000001c0 [ 90.391864][ T7178] RAX: ffffffffffffffda RBX: 00007f076d495fa0 RCX: 00007f076d27d169 [ 90.391875][ T7178] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffffffffff [ 90.391885][ T7178] RBP: 00007f076b8e7090 R08: 0000000000000000 R09: 0000000000000000 [ 90.391894][ T7178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 90.391904][ T7178] R13: 0000000000000000 R14: 00007f076d495fa0 R15: 00007fff084b5e48 [ 90.391916][ T7178] [ 90.471428][ T9] syzkaller0: tun_net_xmit 76 [ 90.501255][ T9] syzkaller0: tun_net_xmit 96 [ 90.661287][ T3440] syzkaller0: tun_net_xmit 296 [ 90.802082][ T9] syzkaller0: tun_net_xmit 396 [ 90.841292][ T9] syzkaller0: tun_net_xmit 216 [ 90.911386][ T3440] syzkaller0: tun_net_xmit 196 [ 90.991234][ T9] syzkaller0: tun_net_xmit 256 [ 91.168736][ T7207] FAULT_INJECTION: forcing a failure. [ 91.168736][ T7207] name failslab, interval 1, probability 0, space 0, times 0 [ 91.181595][ T7207] CPU: 0 UID: 0 PID: 7207 Comm: syz.0.1564 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 91.181637][ T7207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 91.181647][ T7207] Call Trace: [ 91.181654][ T7207] [ 91.181661][ T7207] dump_stack_lvl+0xf6/0x150 [ 91.181682][ T7207] dump_stack+0x15/0x1a [ 91.181695][ T7207] should_fail_ex+0x261/0x270 [ 91.181752][ T7207] should_failslab+0x8f/0xb0 [ 91.181817][ T7207] kmem_cache_alloc_lru_noprof+0x5e/0x330 [ 91.181907][ T7207] ? __d_alloc+0x3d/0x350 [ 91.181997][ T7207] __d_alloc+0x3d/0x350 [ 91.182012][ T7207] ? mpol_shared_policy_init+0xd2/0x510 [ 91.182029][ T7207] d_alloc_pseudo+0x1e/0x80 [ 91.182123][ T7207] alloc_file_pseudo+0x75/0x160 [ 91.182139][ T7207] __shmem_file_setup+0x1bb/0x1f0 [ 91.182162][ T7207] shmem_file_setup+0x3b/0x50 [ 91.182186][ T7207] __se_sys_memfd_create+0x2e1/0x5a0 [ 91.182206][ T7207] __x64_sys_memfd_create+0x31/0x40 [ 91.182278][ T7207] x64_sys_call+0x1163/0x2e10 [ 91.182299][ T7207] do_syscall_64+0xc9/0x1c0 [ 91.182320][ T7207] ? clear_bhb_loop+0x25/0x80 [ 91.182341][ T7207] ? clear_bhb_loop+0x25/0x80 [ 91.182406][ T7207] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 91.182461][ T7207] RIP: 0033:0x7f1aa8b7d169 [ 91.182475][ T7207] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 91.182492][ T7207] RSP: 002b:00007f1aa71dee18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 91.182507][ T7207] RAX: ffffffffffffffda RBX: 000000000000050a RCX: 00007f1aa8b7d169 [ 91.182516][ T7207] RDX: 00007f1aa71deef0 RSI: 0000000000000000 RDI: 00007f1aa8bfec3c [ 91.182526][ T7207] RBP: 0000200000000200 R08: 00007f1aa71debb7 R09: 00007f1aa71dee40 [ 91.182535][ T7207] R10: 000000000000000a R11: 0000000000000202 R12: 00002000000001c0 [ 91.182622][ T7207] R13: 00007f1aa71deef0 R14: 00007f1aa71deeb0 R15: 0000200000000940 [ 91.182637][ T7207] [ 91.525664][ T7223] FAULT_INJECTION: forcing a failure. [ 91.525664][ T7223] name failslab, interval 1, probability 0, space 0, times 0 [ 91.538466][ T7223] CPU: 0 UID: 0 PID: 7223 Comm: syz.1.1571 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 91.538488][ T7223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 91.538498][ T7223] Call Trace: [ 91.538528][ T7223] [ 91.538535][ T7223] dump_stack_lvl+0xf6/0x150 [ 91.538610][ T7223] dump_stack+0x15/0x1a [ 91.538626][ T7223] should_fail_ex+0x261/0x270 [ 91.538652][ T7223] should_failslab+0x8f/0xb0 [ 91.538676][ T7223] kmem_cache_alloc_noprof+0x59/0x340 [ 91.538700][ T7223] ? security_file_alloc+0x32/0x100 [ 91.538724][ T7223] security_file_alloc+0x32/0x100 [ 91.538862][ T7223] init_file+0x5e/0x1e0 [ 91.538879][ T7223] alloc_empty_file+0x8e/0x200 [ 91.538895][ T7223] path_openat+0x6f/0x2000 [ 91.538911][ T7223] ? _parse_integer_limit+0x167/0x180 [ 91.538991][ T7223] ? kstrtoull+0x115/0x140 [ 91.539006][ T7223] ? kstrtouint+0x7b/0xc0 [ 91.539049][ T7223] do_filp_open+0x115/0x240 [ 91.539130][ T7223] do_sys_openat2+0xaa/0x110 [ 91.539167][ T7223] __x64_sys_openat+0xf8/0x120 [ 91.539184][ T7223] x64_sys_call+0x1ac/0x2e10 [ 91.539211][ T7223] do_syscall_64+0xc9/0x1c0 [ 91.539231][ T7223] ? clear_bhb_loop+0x25/0x80 [ 91.539274][ T7223] ? clear_bhb_loop+0x25/0x80 [ 91.539295][ T7223] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 91.539432][ T7223] RIP: 0033:0x7f0b4a4ed169 [ 91.539446][ T7223] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 91.539463][ T7223] RSP: 002b:00007f0b48b57038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 91.539481][ T7223] RAX: ffffffffffffffda RBX: 00007f0b4a705fa0 RCX: 00007f0b4a4ed169 [ 91.539492][ T7223] RDX: 0000000000000000 RSI: 0000200000000180 RDI: ffffffffffffff9c [ 91.539502][ T7223] RBP: 00007f0b48b57090 R08: 0000000000000000 R09: 0000000000000000 [ 91.539512][ T7223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 91.539569][ T7223] R13: 0000000000000000 R14: 00007f0b4a705fa0 R15: 00007ffd40199c18 [ 91.539582][ T7223] [ 91.823970][ T7251] FAULT_INJECTION: forcing a failure. [ 91.823970][ T7251] name failslab, interval 1, probability 0, space 0, times 0 [ 91.836780][ T7251] CPU: 0 UID: 0 PID: 7251 Comm: syz.3.1583 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 91.836876][ T7251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 91.836906][ T7251] Call Trace: [ 91.836912][ T7251] [ 91.836919][ T7251] dump_stack_lvl+0xf6/0x150 [ 91.836940][ T7251] dump_stack+0x15/0x1a [ 91.836953][ T7251] should_fail_ex+0x261/0x270 [ 91.836972][ T7251] should_failslab+0x8f/0xb0 [ 91.837136][ T7251] kmem_cache_alloc_noprof+0x59/0x340 [ 91.837160][ T7251] ? alloc_empty_file+0x78/0x200 [ 91.837176][ T7251] alloc_empty_file+0x78/0x200 [ 91.837190][ T7251] path_openat+0x6f/0x2000 [ 91.837269][ T7251] ? _parse_integer_limit+0x167/0x180 [ 91.837287][ T7251] ? kstrtoull+0x115/0x140 [ 91.837300][ T7251] ? kstrtouint+0x7b/0xc0 [ 91.837315][ T7251] do_filp_open+0x115/0x240 [ 91.837396][ T7251] do_sys_openat2+0xaa/0x110 [ 91.837425][ T7251] __x64_sys_openat+0xf8/0x120 [ 91.837442][ T7251] x64_sys_call+0x1ac/0x2e10 [ 91.837459][ T7251] do_syscall_64+0xc9/0x1c0 [ 91.837521][ T7251] ? clear_bhb_loop+0x25/0x80 [ 91.837540][ T7251] ? clear_bhb_loop+0x25/0x80 [ 91.837557][ T7251] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 91.837647][ T7251] RIP: 0033:0x7f076d27d169 [ 91.837660][ T7251] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 91.837674][ T7251] RSP: 002b:00007f076b8e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 91.837694][ T7251] RAX: ffffffffffffffda RBX: 00007f076d495fa0 RCX: 00007f076d27d169 [ 91.837705][ T7251] RDX: 0000000000008402 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 91.837717][ T7251] RBP: 00007f076b8e7090 R08: 0000000000000000 R09: 0000000000000000 [ 91.837728][ T7251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 91.837738][ T7251] R13: 0000000000000000 R14: 00007f076d495fa0 R15: 00007fff084b5e48 [ 91.837821][ T7251] [ 92.096659][ T29] kauditd_printk_skb: 10497 callbacks suppressed [ 92.096669][ T29] audit: type=1400 audit(1743527743.406:36266): avc: denied { read write } for pid=3316 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 92.135188][ T29] audit: type=1400 audit(1743527743.446:36267): avc: denied { read write } for pid=3316 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 92.171040][ T29] audit: type=1400 audit(1743527743.476:36268): avc: denied { open } for pid=7271 comm="syz.2.1592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 92.190449][ T29] audit: type=1400 audit(1743527743.476:36269): avc: denied { open } for pid=7271 comm="syz.2.1592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 92.209793][ T29] audit: type=1400 audit(1743527743.476:36270): avc: denied { map_create } for pid=7271 comm="syz.2.1592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 92.229113][ T29] audit: type=1400 audit(1743527743.476:36271): avc: denied { prog_load } for pid=7271 comm="syz.2.1592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 92.248304][ T29] audit: type=1400 audit(1743527743.476:36272): avc: denied { map_create } for pid=7271 comm="syz.2.1592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 92.267623][ T29] audit: type=1400 audit(1743527743.476:36273): avc: denied { prog_load } for pid=7271 comm="syz.2.1592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 92.286864][ T29] audit: type=1400 audit(1743527743.476:36274): avc: denied { open } for pid=7271 comm="syz.2.1592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 92.306582][ T29] audit: type=1400 audit(1743527743.476:36275): avc: denied { map_create } for pid=7271 comm="syz.2.1592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 92.484884][ T7294] FAULT_INJECTION: forcing a failure. [ 92.484884][ T7294] name failslab, interval 1, probability 0, space 0, times 0 [ 92.497714][ T7294] CPU: 1 UID: 0 PID: 7294 Comm: syz.1.1600 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 92.497740][ T7294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 92.497747][ T7294] Call Trace: [ 92.497752][ T7294] [ 92.497757][ T7294] dump_stack_lvl+0xf6/0x150 [ 92.497771][ T7294] dump_stack+0x15/0x1a [ 92.497780][ T7294] should_fail_ex+0x261/0x270 [ 92.497856][ T7294] should_failslab+0x8f/0xb0 [ 92.497871][ T7294] __kmalloc_noprof+0xad/0x410 [ 92.497925][ T7294] ? __register_sysctl_table+0x57/0xc00 [ 92.497942][ T7294] __register_sysctl_table+0x57/0xc00 [ 92.497957][ T7294] ? __kmalloc_node_track_caller_noprof+0x1ed/0x410 [ 92.498051][ T7294] ? register_pidns_sysctls+0x4a/0x140 [ 92.498195][ T7294] register_pidns_sysctls+0xdd/0x140 [ 92.498288][ T7294] copy_pid_ns+0x356/0x640 [ 92.498324][ T7294] ? copy_mnt_ns+0x78/0x5e0 [ 92.498338][ T7294] ? kmem_cache_alloc_noprof+0x237/0x340 [ 92.498412][ T7294] create_new_namespaces+0x188/0x430 [ 92.498423][ T7294] ? security_capable+0x81/0x90 [ 92.498514][ T7294] unshare_nsproxy_namespaces+0xe6/0x120 [ 92.498595][ T7294] ksys_unshare+0x3d3/0x700 [ 92.498644][ T7294] __x64_sys_unshare+0x1f/0x30 [ 92.498703][ T7294] x64_sys_call+0x2c93/0x2e10 [ 92.498716][ T7294] do_syscall_64+0xc9/0x1c0 [ 92.498728][ T7294] ? clear_bhb_loop+0x25/0x80 [ 92.498759][ T7294] ? clear_bhb_loop+0x25/0x80 [ 92.498773][ T7294] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 92.498784][ T7294] RIP: 0033:0x7f0b4a4ed169 [ 92.498793][ T7294] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 92.498803][ T7294] RSP: 002b:00007f0b48b57038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 92.498813][ T7294] RAX: ffffffffffffffda RBX: 00007f0b4a705fa0 RCX: 00007f0b4a4ed169 [ 92.498877][ T7294] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000062040200 [ 92.498883][ T7294] RBP: 00007f0b48b57090 R08: 0000000000000000 R09: 0000000000000000 [ 92.498889][ T7294] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 92.498895][ T7294] R13: 0000000000000000 R14: 00007f0b4a705fa0 R15: 00007ffd40199c18 [ 92.498951][ T7294] [ 92.737713][ T7296] FAULT_INJECTION: forcing a failure. [ 92.737713][ T7296] name failslab, interval 1, probability 0, space 0, times 0 [ 92.750540][ T7296] CPU: 0 UID: 0 PID: 7296 Comm: syz.1.1601 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 92.750563][ T7296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 92.750573][ T7296] Call Trace: [ 92.750577][ T7296] [ 92.750584][ T7296] dump_stack_lvl+0xf6/0x150 [ 92.750665][ T7296] dump_stack+0x15/0x1a [ 92.750679][ T7296] should_fail_ex+0x261/0x270 [ 92.750698][ T7296] should_failslab+0x8f/0xb0 [ 92.750721][ T7296] kmem_cache_alloc_noprof+0x59/0x340 [ 92.750836][ T7296] ? alloc_empty_file+0x78/0x200 [ 92.750852][ T7296] alloc_empty_file+0x78/0x200 [ 92.750868][ T7296] path_openat+0x6f/0x2000 [ 92.750885][ T7296] ? next_uptodate_folio+0x820/0x8a0 [ 92.750929][ T7296] ? _raw_spin_unlock_irqrestore+0x2b/0x60 [ 92.750955][ T7296] ? percpu_counter_add_batch+0x136/0x140 [ 92.750975][ T7296] ? __rcu_read_unlock+0x34/0x70 [ 92.751001][ T7296] ? filemap_map_pages+0x8d3/0xb40 [ 92.751081][ T7296] do_filp_open+0x115/0x240 [ 92.751106][ T7296] do_sys_openat2+0xaa/0x110 [ 92.751135][ T7296] __x64_sys_openat+0xf8/0x120 [ 92.751153][ T7296] x64_sys_call+0x1ac/0x2e10 [ 92.751211][ T7296] do_syscall_64+0xc9/0x1c0 [ 92.751227][ T7296] ? clear_bhb_loop+0x25/0x80 [ 92.751245][ T7296] ? clear_bhb_loop+0x25/0x80 [ 92.751261][ T7296] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 92.751327][ T7296] RIP: 0033:0x7f0b4a4ebad0 [ 92.751342][ T7296] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 92.751397][ T7296] RSP: 002b:00007f0b48b56b70 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 92.751482][ T7296] RAX: ffffffffffffffda RBX: 0000000000020182 RCX: 00007f0b4a4ebad0 [ 92.751489][ T7296] RDX: 0000000000020182 RSI: 00007f0b48b56c10 RDI: 00000000ffffff9c [ 92.751495][ T7296] RBP: 00007f0b48b56c10 R08: 0000000000000000 R09: 0000000000000000 [ 92.751505][ T7296] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 92.751512][ T7296] R13: 0000000000000000 R14: 00007f0b4a705fa0 R15: 00007ffd40199c18 [ 92.751520][ T7296] [ 93.239487][ T7326] FAULT_INJECTION: forcing a failure. [ 93.239487][ T7326] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 93.252662][ T7326] CPU: 0 UID: 0 PID: 7326 Comm: syz.2.1613 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 93.252685][ T7326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 93.252695][ T7326] Call Trace: [ 93.252700][ T7326] [ 93.252706][ T7326] dump_stack_lvl+0xf6/0x150 [ 93.252770][ T7326] dump_stack+0x15/0x1a [ 93.252785][ T7326] should_fail_ex+0x261/0x270 [ 93.252804][ T7326] should_fail+0xb/0x10 [ 93.252819][ T7326] should_fail_usercopy+0x1a/0x20 [ 93.252865][ T7326] _copy_to_user+0x20/0xa0 [ 93.252879][ T7326] simple_read_from_buffer+0xb2/0x130 [ 93.252894][ T7326] proc_fail_nth_read+0x103/0x140 [ 93.252911][ T7326] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 93.252997][ T7326] vfs_read+0x1b2/0x710 [ 93.253009][ T7326] ? __rcu_read_unlock+0x4e/0x70 [ 93.253024][ T7326] ? __fget_files+0x186/0x1c0 [ 93.253040][ T7326] ksys_read+0xeb/0x1b0 [ 93.253098][ T7326] __x64_sys_read+0x42/0x50 [ 93.253161][ T7326] x64_sys_call+0x2a3b/0x2e10 [ 93.253173][ T7326] do_syscall_64+0xc9/0x1c0 [ 93.253263][ T7326] ? clear_bhb_loop+0x25/0x80 [ 93.253278][ T7326] ? clear_bhb_loop+0x25/0x80 [ 93.253289][ T7326] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 93.253300][ T7326] RIP: 0033:0x7f91319cbb7c [ 93.253309][ T7326] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 93.253319][ T7326] RSP: 002b:00007f913002f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 93.253377][ T7326] RAX: ffffffffffffffda RBX: 00007f9131be5fa0 RCX: 00007f91319cbb7c [ 93.253383][ T7326] RDX: 000000000000000f RSI: 00007f913002f0a0 RDI: 0000000000000005 [ 93.253390][ T7326] RBP: 00007f913002f090 R08: 0000000000000000 R09: 0000000000000000 [ 93.253396][ T7326] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 93.253402][ T7326] R13: 0000000000000000 R14: 00007f9131be5fa0 R15: 00007fff9b1f3698 [ 93.253410][ T7326] [ 93.457545][ T7328] FAULT_INJECTION: forcing a failure. [ 93.457545][ T7328] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 93.470782][ T7328] CPU: 1 UID: 0 PID: 7328 Comm: syz.2.1614 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 93.470805][ T7328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 93.470815][ T7328] Call Trace: [ 93.470822][ T7328] [ 93.470829][ T7328] dump_stack_lvl+0xf6/0x150 [ 93.470872][ T7328] dump_stack+0x15/0x1a [ 93.470885][ T7328] should_fail_ex+0x261/0x270 [ 93.470970][ T7328] should_fail+0xb/0x10 [ 93.470979][ T7328] should_fail_usercopy+0x1a/0x20 [ 93.470992][ T7328] copy_page_from_iter_atomic+0x232/0xfa0 [ 93.471012][ T7328] ? shmem_write_begin+0xa7/0x190 [ 93.471113][ T7328] ? shmem_write_begin+0xdf/0x190 [ 93.471262][ T7328] generic_perform_write+0x2d2/0x4b0 [ 93.471359][ T7328] shmem_file_write_iter+0xc2/0xe0 [ 93.471376][ T7328] vfs_write+0x79b/0x950 [ 93.471394][ T7328] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 93.471493][ T7328] ksys_write+0xeb/0x1b0 [ 93.471511][ T7328] __x64_sys_write+0x42/0x50 [ 93.471528][ T7328] x64_sys_call+0x2a45/0x2e10 [ 93.471544][ T7328] do_syscall_64+0xc9/0x1c0 [ 93.471683][ T7328] ? clear_bhb_loop+0x25/0x80 [ 93.471716][ T7328] ? clear_bhb_loop+0x25/0x80 [ 93.471796][ T7328] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 93.471815][ T7328] RIP: 0033:0x7f91319cd169 [ 93.471878][ T7328] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 93.471895][ T7328] RSP: 002b:00007f913002f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 93.471912][ T7328] RAX: ffffffffffffffda RBX: 00007f9131be5fa0 RCX: 00007f91319cd169 [ 93.471920][ T7328] RDX: 000000000208e24b RSI: 0000200000000000 RDI: 0000000000000003 [ 93.471934][ T7328] RBP: 00007f913002f090 R08: 0000000000000000 R09: 0000000000000000 [ 93.471941][ T7328] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 93.472025][ T7328] R13: 0000000000000000 R14: 00007f9131be5fa0 R15: 00007fff9b1f3698 [ 93.472034][ T7328] [ 93.890771][ T7342] FAULT_INJECTION: forcing a failure. [ 93.890771][ T7342] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 93.927766][ T7342] CPU: 1 UID: 0 PID: 7342 Comm: syz.1.1619 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 93.927789][ T7342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 93.927799][ T7342] Call Trace: [ 93.927806][ T7342] [ 93.927814][ T7342] dump_stack_lvl+0xf6/0x150 [ 93.927868][ T7342] dump_stack+0x15/0x1a [ 93.928037][ T7342] should_fail_ex+0x261/0x270 [ 93.932004][ T7342] should_fail_alloc_page+0xfd/0x110 [ 93.932033][ T7342] alloc_pages_bulk_noprof+0xfd/0x580 [ 93.932051][ T7342] copy_splice_read+0xe7/0x5d0 [ 93.932070][ T7342] ? __kmalloc_noprof+0x287/0x410 [ 93.932213][ T7342] ? alloc_pipe_info+0x1cb/0x360 [ 93.932233][ T7342] ? __pfx_copy_splice_read+0x10/0x10 [ 93.932251][ T7342] splice_direct_to_actor+0x26c/0x680 [ 93.932270][ T7342] ? __pfx_direct_splice_actor+0x10/0x10 [ 93.932315][ T7342] do_splice_direct+0xd9/0x150 [ 93.932333][ T7342] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 93.932357][ T7342] do_sendfile+0x40a/0x690 [ 93.932422][ T7342] __x64_sys_sendfile64+0x113/0x160 [ 93.932446][ T7342] x64_sys_call+0xfc3/0x2e10 [ 93.932534][ T7342] do_syscall_64+0xc9/0x1c0 [ 93.932551][ T7342] ? clear_bhb_loop+0x25/0x80 [ 93.932570][ T7342] ? clear_bhb_loop+0x25/0x80 [ 93.932587][ T7342] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 93.932659][ T7342] RIP: 0033:0x7f0b4a4ed169 [ 93.932673][ T7342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 93.932688][ T7342] RSP: 002b:00007f0b48b57038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 93.932705][ T7342] RAX: ffffffffffffffda RBX: 00007f0b4a705fa0 RCX: 00007f0b4a4ed169 [ 93.932714][ T7342] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 93.932788][ T7342] RBP: 00007f0b48b57090 R08: 0000000000000000 R09: 0000000000000000 [ 93.932876][ T7342] R10: 00000000003fffff R11: 0000000000000246 R12: 0000000000000001 [ 93.932888][ T7342] R13: 0000000000000000 R14: 00007f0b4a705fa0 R15: 00007ffd40199c18 [ 93.932904][ T7342] [ 94.549563][ T7394] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 94.664708][ T7401] FAULT_INJECTION: forcing a failure. [ 94.664708][ T7401] name failslab, interval 1, probability 0, space 0, times 0 [ 94.677621][ T7401] CPU: 0 UID: 0 PID: 7401 Comm: syz.2.1643 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 94.677645][ T7401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 94.677714][ T7401] Call Trace: [ 94.677723][ T7401] [ 94.677730][ T7401] dump_stack_lvl+0xf6/0x150 [ 94.677753][ T7401] dump_stack+0x15/0x1a [ 94.677830][ T7401] should_fail_ex+0x261/0x270 [ 94.677847][ T7401] should_failslab+0x8f/0xb0 [ 94.677889][ T7401] __kvmalloc_node_noprof+0x12c/0x520 [ 94.677904][ T7401] ? alloc_fdtable+0xfc/0x1b0 [ 94.677926][ T7401] alloc_fdtable+0xfc/0x1b0 [ 94.678013][ T7401] dup_fd+0x508/0x580 [ 94.678031][ T7401] ? _raw_spin_unlock+0x26/0x50 [ 94.678059][ T7401] ksys_unshare+0x345/0x700 [ 94.678082][ T7401] __x64_sys_unshare+0x1f/0x30 [ 94.678104][ T7401] x64_sys_call+0x2c93/0x2e10 [ 94.678121][ T7401] do_syscall_64+0xc9/0x1c0 [ 94.678193][ T7401] ? clear_bhb_loop+0x25/0x80 [ 94.678209][ T7401] ? clear_bhb_loop+0x25/0x80 [ 94.678226][ T7401] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 94.678242][ T7401] RIP: 0033:0x7f91319cd169 [ 94.678254][ T7401] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 94.678346][ T7401] RSP: 002b:00007f913000e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 94.678360][ T7401] RAX: ffffffffffffffda RBX: 00007f9131be6080 RCX: 00007f91319cd169 [ 94.678370][ T7401] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000042000600 [ 94.678379][ T7401] RBP: 00007f913000e090 R08: 0000000000000000 R09: 0000000000000000 [ 94.678389][ T7401] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 94.678398][ T7401] R13: 0000000000000000 R14: 00007f9131be6080 R15: 00007fff9b1f3698 [ 94.678430][ T7401] [ 94.929138][ T7412] FAULT_INJECTION: forcing a failure. [ 94.929138][ T7412] name failslab, interval 1, probability 0, space 0, times 0 [ 94.942015][ T7412] CPU: 0 UID: 0 PID: 7412 Comm: syz.4.1646 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 94.942042][ T7412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 94.942099][ T7412] Call Trace: [ 94.942106][ T7412] [ 94.942190][ T7412] dump_stack_lvl+0xf6/0x150 [ 94.942210][ T7412] dump_stack+0x15/0x1a [ 94.942222][ T7412] should_fail_ex+0x261/0x270 [ 94.942244][ T7412] should_failslab+0x8f/0xb0 [ 94.942321][ T7412] __kmalloc_node_track_caller_noprof+0xaa/0x410 [ 94.942407][ T7412] ? sidtab_sid2str_get+0xb8/0x140 [ 94.942438][ T7412] ? skb_put+0xba/0x100 [ 94.942469][ T7412] kmemdup_noprof+0x2b/0x70 [ 94.942491][ T7412] sidtab_sid2str_get+0xb8/0x140 [ 94.942580][ T7412] security_sid_to_context_core+0x1eb/0x2f0 [ 94.942609][ T7412] security_sid_to_context+0x27/0x30 [ 94.942704][ T7412] avc_audit_post_callback+0x9f/0x540 [ 94.942723][ T7412] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 94.942744][ T7412] common_lsm_audit+0x1c6/0x230 [ 94.942766][ T7412] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 94.942798][ T7412] ? kstrtoull+0x115/0x140 [ 94.942814][ T7412] slow_avc_audit+0xff/0x140 [ 94.942836][ T7412] avc_has_perm+0x124/0x150 [ 94.942857][ T7412] selinux_bpf+0xa4/0xc0 [ 94.942884][ T7412] security_bpf+0x50/0x90 [ 94.942957][ T7412] __sys_bpf+0x1ca/0x800 [ 94.942982][ T7412] __x64_sys_bpf+0x43/0x50 [ 94.942998][ T7412] x64_sys_call+0x23da/0x2e10 [ 94.943022][ T7412] do_syscall_64+0xc9/0x1c0 [ 94.943039][ T7412] ? clear_bhb_loop+0x25/0x80 [ 94.943061][ T7412] ? clear_bhb_loop+0x25/0x80 [ 94.943109][ T7412] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 94.943129][ T7412] RIP: 0033:0x7f45045cd169 [ 94.943145][ T7412] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 94.943163][ T7412] RSP: 002b:00007f4502c37038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 94.943181][ T7412] RAX: ffffffffffffffda RBX: 00007f45047e5fa0 RCX: 00007f45045cd169 [ 94.943191][ T7412] RDX: 0000000000000094 RSI: 0000200000000440 RDI: 0000000000000005 [ 94.943201][ T7412] RBP: 00007f4502c37090 R08: 0000000000000000 R09: 0000000000000000 [ 94.943210][ T7412] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 94.943287][ T7412] R13: 0000000000000000 R14: 00007f45047e5fa0 R15: 00007ffc71476f28 [ 94.943299][ T7412] [ 95.252944][ T7420] FAULT_INJECTION: forcing a failure. [ 95.252944][ T7420] name failslab, interval 1, probability 0, space 0, times 0 [ 95.265875][ T7420] CPU: 0 UID: 0 PID: 7420 Comm: syz.1.1648 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 95.265900][ T7420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 95.265912][ T7420] Call Trace: [ 95.265920][ T7420] [ 95.265927][ T7420] dump_stack_lvl+0xf6/0x150 [ 95.265946][ T7420] dump_stack+0x15/0x1a [ 95.265991][ T7420] should_fail_ex+0x261/0x270 [ 95.266013][ T7420] should_failslab+0x8f/0xb0 [ 95.266061][ T7420] __kmalloc_node_track_caller_noprof+0xaa/0x410 [ 95.266095][ T7420] ? sidtab_sid2str_get+0xb8/0x140 [ 95.266126][ T7420] ? skb_put+0xba/0x100 [ 95.266211][ T7420] kmemdup_noprof+0x2b/0x70 [ 95.266233][ T7420] sidtab_sid2str_get+0xb8/0x140 [ 95.266346][ T7420] security_sid_to_context_core+0x1eb/0x2f0 [ 95.266378][ T7420] security_sid_to_context+0x27/0x30 [ 95.266408][ T7420] avc_audit_post_callback+0x9f/0x540 [ 95.266425][ T7420] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 95.266516][ T7420] common_lsm_audit+0x1c6/0x230 [ 95.266542][ T7420] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 95.266563][ T7420] ? kstrtoull+0x115/0x140 [ 95.266577][ T7420] slow_avc_audit+0xff/0x140 [ 95.266594][ T7420] avc_has_perm+0x124/0x150 [ 95.266629][ T7420] selinux_bpf+0xa4/0xc0 [ 95.266741][ T7420] security_bpf+0x50/0x90 [ 95.266762][ T7420] __sys_bpf+0x1ca/0x800 [ 95.266783][ T7420] __x64_sys_bpf+0x43/0x50 [ 95.266798][ T7420] x64_sys_call+0x23da/0x2e10 [ 95.266890][ T7420] do_syscall_64+0xc9/0x1c0 [ 95.266907][ T7420] ? clear_bhb_loop+0x25/0x80 [ 95.266923][ T7420] ? clear_bhb_loop+0x25/0x80 [ 95.266940][ T7420] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 95.266960][ T7420] RIP: 0033:0x7f0b4a4ed169 [ 95.266975][ T7420] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 95.267047][ T7420] RSP: 002b:00007f0b48b57038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 95.267062][ T7420] RAX: ffffffffffffffda RBX: 00007f0b4a705fa0 RCX: 00007f0b4a4ed169 [ 95.267072][ T7420] RDX: 0000000000000094 RSI: 0000200000000440 RDI: 0000000000000005 [ 95.267082][ T7420] RBP: 00007f0b48b57090 R08: 0000000000000000 R09: 0000000000000000 [ 95.267096][ T7420] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 95.267108][ T7420] R13: 0000000000000000 R14: 00007f0b4a705fa0 R15: 00007ffd40199c18 [ 95.267121][ T7420] [ 97.087199][ T7476] xt_TPROXY: Can be used only with -p tcp or -p udp [ 97.094096][ T7477] xt_TPROXY: Can be used only with -p tcp or -p udp [ 97.117658][ T29] kauditd_printk_skb: 646 callbacks suppressed [ 97.117675][ T29] audit: type=1400 audit(1743527748.426:36922): avc: denied { prog_load } for pid=7475 comm="syz.4.1673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 97.143796][ T29] audit: type=1400 audit(1743527748.426:36923): avc: denied { prog_load } for pid=7475 comm="syz.4.1673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 97.162970][ T29] audit: type=1400 audit(1743527748.426:36924): avc: denied { read write } for pid=3305 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 97.228868][ T29] audit: type=1400 audit(1743527748.426:36925): avc: denied { create } for pid=7478 comm="syz.0.1674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 97.248623][ T29] audit: type=1400 audit(1743527748.436:36926): avc: denied { create } for pid=7480 comm="syz.3.1675" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 97.268966][ T29] audit: type=1400 audit(1743527748.436:36927): avc: denied { map_create } for pid=7480 comm="syz.3.1675" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 97.288244][ T29] audit: type=1400 audit(1743527748.436:36928): avc: denied { prog_load } for pid=7480 comm="syz.3.1675" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 97.307477][ T29] audit: type=1400 audit(1743527748.436:36929): avc: denied { open } for pid=7480 comm="syz.3.1675" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 97.326856][ T29] audit: type=1400 audit(1743527748.436:36930): avc: denied { read write } for pid=3320 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 97.351219][ T29] audit: type=1400 audit(1743527748.456:36931): avc: denied { map_create } for pid=7482 comm="syz.4.1676" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 98.126091][ T3379] IPVS: starting estimator thread 0... [ 98.232063][ T7538] IPVS: using max 2688 ests per chain, 134400 per kthread [ 98.294496][ T7556] FAULT_INJECTION: forcing a failure. [ 98.294496][ T7556] name failslab, interval 1, probability 0, space 0, times 0 [ 98.307246][ T7556] CPU: 0 UID: 0 PID: 7556 Comm: syz.3.1704 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 98.307273][ T7556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 98.307308][ T7556] Call Trace: [ 98.307313][ T7556] [ 98.307321][ T7556] dump_stack_lvl+0xf6/0x150 [ 98.307343][ T7556] dump_stack+0x15/0x1a [ 98.307359][ T7556] should_fail_ex+0x261/0x270 [ 98.307378][ T7556] should_failslab+0x8f/0xb0 [ 98.307398][ T7556] kmem_cache_alloc_noprof+0x59/0x340 [ 98.307454][ T7556] ? alloc_empty_file+0x78/0x200 [ 98.307472][ T7556] ? _raw_spin_unlock+0x26/0x50 [ 98.307532][ T7556] alloc_empty_file+0x78/0x200 [ 98.307546][ T7556] alloc_file_pseudo+0xcb/0x160 [ 98.307562][ T7556] __shmem_file_setup+0x1bb/0x1f0 [ 98.307587][ T7556] shmem_file_setup+0x3b/0x50 [ 98.307678][ T7556] __se_sys_memfd_create+0x2e1/0x5a0 [ 98.307699][ T7556] __x64_sys_memfd_create+0x31/0x40 [ 98.307720][ T7556] x64_sys_call+0x1163/0x2e10 [ 98.307742][ T7556] do_syscall_64+0xc9/0x1c0 [ 98.307763][ T7556] ? clear_bhb_loop+0x25/0x80 [ 98.307859][ T7556] ? clear_bhb_loop+0x25/0x80 [ 98.307880][ T7556] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 98.307899][ T7556] RIP: 0033:0x7f076d27d169 [ 98.307912][ T7556] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 98.307927][ T7556] RSP: 002b:00007f076b8e6e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 98.307942][ T7556] RAX: ffffffffffffffda RBX: 0000000000000b85 RCX: 00007f076d27d169 [ 98.307965][ T7556] RDX: 00007f076b8e6ef0 RSI: 0000000000000000 RDI: 00007f076d2fec3c [ 98.307978][ T7556] RBP: 0000200000000c80 R08: 00007f076b8e6bb7 R09: 00007f076b8e6e40 [ 98.307990][ T7556] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000c00 [ 98.308002][ T7556] R13: 00007f076b8e6ef0 R14: 00007f076b8e6eb0 R15: 0000200000000c40 [ 98.308018][ T7556] [ 98.639351][ T7579] FAULT_INJECTION: forcing a failure. [ 98.639351][ T7579] name failslab, interval 1, probability 0, space 0, times 0 [ 98.652140][ T7579] CPU: 1 UID: 0 PID: 7579 Comm: syz.2.1712 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 98.652167][ T7579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 98.652179][ T7579] Call Trace: [ 98.652186][ T7579] [ 98.652193][ T7579] dump_stack_lvl+0xf6/0x150 [ 98.652231][ T7579] dump_stack+0x15/0x1a [ 98.652248][ T7579] should_fail_ex+0x261/0x270 [ 98.652269][ T7579] should_failslab+0x8f/0xb0 [ 98.652330][ T7579] kmem_cache_alloc_noprof+0x59/0x340 [ 98.652357][ T7579] ? alloc_empty_file+0x78/0x200 [ 98.652373][ T7579] ? _raw_spin_unlock+0x26/0x50 [ 98.652395][ T7579] alloc_empty_file+0x78/0x200 [ 98.652410][ T7579] alloc_file_pseudo+0xcb/0x160 [ 98.652425][ T7579] __shmem_file_setup+0x1bb/0x1f0 [ 98.652518][ T7579] shmem_file_setup+0x3b/0x50 [ 98.652539][ T7579] __se_sys_memfd_create+0x2e1/0x5a0 [ 98.652580][ T7579] __x64_sys_memfd_create+0x31/0x40 [ 98.652599][ T7579] x64_sys_call+0x1163/0x2e10 [ 98.652618][ T7579] do_syscall_64+0xc9/0x1c0 [ 98.652635][ T7579] ? clear_bhb_loop+0x25/0x80 [ 98.652700][ T7579] ? clear_bhb_loop+0x25/0x80 [ 98.652717][ T7579] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 98.652735][ T7579] RIP: 0033:0x7f91319cd169 [ 98.652751][ T7579] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 98.652769][ T7579] RSP: 002b:00007f913002ee18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 98.652788][ T7579] RAX: ffffffffffffffda RBX: 0000000000001240 RCX: 00007f91319cd169 [ 98.652797][ T7579] RDX: 00007f913002eef0 RSI: 0000000000000000 RDI: 00007f9131a4ec3c [ 98.652807][ T7579] RBP: 0000200000001300 R08: 00007f913002ebb7 R09: 00007f913002ee40 [ 98.652887][ T7579] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000001280 [ 98.652899][ T7579] R13: 00007f913002eef0 R14: 00007f913002eeb0 R15: 00002000000012c0 [ 98.652915][ T7579] [ 99.557490][ T7601] FAULT_INJECTION: forcing a failure. [ 99.557490][ T7601] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 99.570728][ T7601] CPU: 0 UID: 0 PID: 7601 Comm: syz.4.1719 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 99.570828][ T7601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 99.570840][ T7601] Call Trace: [ 99.570846][ T7601] [ 99.570853][ T7601] dump_stack_lvl+0xf6/0x150 [ 99.570877][ T7601] dump_stack+0x15/0x1a [ 99.570893][ T7601] should_fail_ex+0x261/0x270 [ 99.570979][ T7601] should_fail+0xb/0x10 [ 99.570995][ T7601] should_fail_usercopy+0x1a/0x20 [ 99.571013][ T7601] _copy_to_user+0x20/0xa0 [ 99.571039][ T7601] simple_read_from_buffer+0xb2/0x130 [ 99.571117][ T7601] proc_fail_nth_read+0x103/0x140 [ 99.571189][ T7601] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 99.571212][ T7601] vfs_read+0x1b2/0x710 [ 99.571232][ T7601] ? __rcu_read_unlock+0x4e/0x70 [ 99.571258][ T7601] ? __fget_files+0x186/0x1c0 [ 99.571322][ T7601] ksys_read+0xeb/0x1b0 [ 99.571342][ T7601] __x64_sys_read+0x42/0x50 [ 99.571359][ T7601] x64_sys_call+0x2a3b/0x2e10 [ 99.571376][ T7601] do_syscall_64+0xc9/0x1c0 [ 99.571402][ T7601] ? clear_bhb_loop+0x25/0x80 [ 99.571420][ T7601] ? clear_bhb_loop+0x25/0x80 [ 99.571438][ T7601] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 99.571458][ T7601] RIP: 0033:0x7f45045cbb7c [ 99.571472][ T7601] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 99.571488][ T7601] RSP: 002b:00007f4502c16030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 99.571586][ T7601] RAX: ffffffffffffffda RBX: 00007f45047e6080 RCX: 00007f45045cbb7c [ 99.571597][ T7601] RDX: 000000000000000f RSI: 00007f4502c160a0 RDI: 0000000000000003 [ 99.571607][ T7601] RBP: 00007f4502c16090 R08: 0000000000000000 R09: 0000000000000000 [ 99.571616][ T7601] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 99.571625][ T7601] R13: 0000000000000001 R14: 00007f45047e6080 R15: 00007ffc71476f28 [ 99.571639][ T7601] [ 99.572039][ T7603] FAULT_INJECTION: forcing a failure. [ 99.572039][ T7603] name failslab, interval 1, probability 0, space 0, times 0 [ 99.779166][ T7603] CPU: 1 UID: 0 PID: 7603 Comm: syz.3.1720 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 99.779194][ T7603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 99.779204][ T7603] Call Trace: [ 99.779211][ T7603] [ 99.779217][ T7603] dump_stack_lvl+0xf6/0x150 [ 99.779263][ T7603] dump_stack+0x15/0x1a [ 99.779279][ T7603] should_fail_ex+0x261/0x270 [ 99.779300][ T7603] should_failslab+0x8f/0xb0 [ 99.779353][ T7603] kmem_cache_alloc_noprof+0x59/0x340 [ 99.779429][ T7603] ? alloc_empty_file+0x78/0x200 [ 99.779443][ T7603] ? _raw_spin_unlock+0x26/0x50 [ 99.779463][ T7603] alloc_empty_file+0x78/0x200 [ 99.779551][ T7603] alloc_file_pseudo+0xcb/0x160 [ 99.779647][ T7603] __shmem_file_setup+0x1bb/0x1f0 [ 99.779707][ T7603] shmem_file_setup+0x3b/0x50 [ 99.779728][ T7603] __se_sys_memfd_create+0x2e1/0x5a0 [ 99.779750][ T7603] __x64_sys_memfd_create+0x31/0x40 [ 99.779767][ T7603] x64_sys_call+0x1163/0x2e10 [ 99.779786][ T7603] do_syscall_64+0xc9/0x1c0 [ 99.779816][ T7603] ? clear_bhb_loop+0x25/0x80 [ 99.779837][ T7603] ? clear_bhb_loop+0x25/0x80 [ 99.779854][ T7603] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 99.779874][ T7603] RIP: 0033:0x7f076d27d169 [ 99.779886][ T7603] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 99.779901][ T7603] RSP: 002b:00007f076b8e6e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 99.779982][ T7603] RAX: ffffffffffffffda RBX: 0000000000000a47 RCX: 00007f076d27d169 [ 99.779992][ T7603] RDX: 00007f076b8e6ef0 RSI: 0000000000000000 RDI: 00007f076d2fec3c [ 99.780002][ T7603] RBP: 0000200000000b40 R08: 00007f076b8e6bb7 R09: 00007f076b8e6e40 [ 99.780013][ T7603] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000ac0 [ 99.780023][ T7603] R13: 00007f076b8e6ef0 R14: 00007f076b8e6eb0 R15: 0000200000000b00 [ 99.780038][ T7603] [ 100.180733][ T7644] FAULT_INJECTION: forcing a failure. [ 100.180733][ T7644] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 100.193920][ T7644] CPU: 1 UID: 0 PID: 7644 Comm: syz.3.1737 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 100.193943][ T7644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 100.193955][ T7644] Call Trace: [ 100.193961][ T7644] [ 100.193968][ T7644] dump_stack_lvl+0xf6/0x150 [ 100.194044][ T7644] dump_stack+0x15/0x1a [ 100.194057][ T7644] should_fail_ex+0x261/0x270 [ 100.194074][ T7644] should_fail+0xb/0x10 [ 100.194127][ T7644] should_fail_usercopy+0x1a/0x20 [ 100.194148][ T7644] _copy_to_user+0x20/0xa0 [ 100.194172][ T7644] simple_read_from_buffer+0xb2/0x130 [ 100.194195][ T7644] proc_fail_nth_read+0x103/0x140 [ 100.194287][ T7644] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 100.194452][ T7644] vfs_read+0x1b2/0x710 [ 100.194471][ T7644] ? __rcu_read_unlock+0x4e/0x70 [ 100.194525][ T7644] ? __fget_files+0x186/0x1c0 [ 100.194567][ T7644] ksys_read+0xeb/0x1b0 [ 100.194584][ T7644] __x64_sys_read+0x42/0x50 [ 100.194629][ T7644] x64_sys_call+0x2a3b/0x2e10 [ 100.194720][ T7644] do_syscall_64+0xc9/0x1c0 [ 100.194741][ T7644] ? clear_bhb_loop+0x25/0x80 [ 100.194758][ T7644] ? clear_bhb_loop+0x25/0x80 [ 100.194778][ T7644] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 100.194798][ T7644] RIP: 0033:0x7f076d27bb7c [ 100.194893][ T7644] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 100.194907][ T7644] RSP: 002b:00007f076b8e7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 100.194923][ T7644] RAX: ffffffffffffffda RBX: 00007f076d495fa0 RCX: 00007f076d27bb7c [ 100.194933][ T7644] RDX: 000000000000000f RSI: 00007f076b8e70a0 RDI: 0000000000000004 [ 100.194942][ T7644] RBP: 00007f076b8e7090 R08: 0000000000000000 R09: 0000000000000000 [ 100.194955][ T7644] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 100.194967][ T7644] R13: 0000000000000000 R14: 00007f076d495fa0 R15: 00007fff084b5e48 [ 100.195028][ T7644] [ 100.489206][ T7654] FAULT_INJECTION: forcing a failure. [ 100.489206][ T7654] name failslab, interval 1, probability 0, space 0, times 0 [ 100.502002][ T7654] CPU: 0 UID: 0 PID: 7654 Comm: syz.3.1741 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 100.502030][ T7654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 100.502040][ T7654] Call Trace: [ 100.502049][ T7654] [ 100.502056][ T7654] dump_stack_lvl+0xf6/0x150 [ 100.502079][ T7654] dump_stack+0x15/0x1a [ 100.502095][ T7654] should_fail_ex+0x261/0x270 [ 100.502113][ T7654] should_failslab+0x8f/0xb0 [ 100.502201][ T7654] kmem_cache_alloc_lru_noprof+0x5e/0x330 [ 100.502234][ T7654] ? __d_alloc+0x3d/0x350 [ 100.502253][ T7654] __d_alloc+0x3d/0x350 [ 100.502334][ T7654] d_alloc_parallel+0x57/0xcb0 [ 100.502366][ T7654] ? __d_lookup+0x362/0x390 [ 100.502382][ T7654] ? try_to_unlazy+0x26f/0x3a0 [ 100.502407][ T7654] path_openat+0x6ed/0x2000 [ 100.502436][ T7654] ? kstrtoull+0x115/0x140 [ 100.502458][ T7654] do_filp_open+0x115/0x240 [ 100.502557][ T7654] do_sys_openat2+0xaa/0x110 [ 100.502624][ T7654] __x64_sys_creat+0x6a/0x90 [ 100.502641][ T7654] x64_sys_call+0x10b4/0x2e10 [ 100.502658][ T7654] do_syscall_64+0xc9/0x1c0 [ 100.502677][ T7654] ? clear_bhb_loop+0x25/0x80 [ 100.502766][ T7654] ? clear_bhb_loop+0x25/0x80 [ 100.502786][ T7654] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 100.502808][ T7654] RIP: 0033:0x7f076d27d169 [ 100.502824][ T7654] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 100.502893][ T7654] RSP: 002b:00007f076b8c6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 100.502911][ T7654] RAX: ffffffffffffffda RBX: 00007f076d496080 RCX: 00007f076d27d169 [ 100.502923][ T7654] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000100 [ 100.502936][ T7654] RBP: 00007f076b8c6090 R08: 0000000000000000 R09: 0000000000000000 [ 100.502949][ T7654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 100.502961][ T7654] R13: 0000000000000000 R14: 00007f076d496080 R15: 00007fff084b5e48 [ 100.502977][ T7654] [ 101.045292][ T7675] FAULT_INJECTION: forcing a failure. [ 101.045292][ T7675] name failslab, interval 1, probability 0, space 0, times 0 [ 101.058006][ T7675] CPU: 1 UID: 0 PID: 7675 Comm: syz.1.1749 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 101.058035][ T7675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 101.058045][ T7675] Call Trace: [ 101.058051][ T7675] [ 101.058133][ T7675] dump_stack_lvl+0xf6/0x150 [ 101.058191][ T7675] dump_stack+0x15/0x1a [ 101.058230][ T7675] should_fail_ex+0x261/0x270 [ 101.058252][ T7675] should_failslab+0x8f/0xb0 [ 101.058274][ T7675] __kmalloc_node_track_caller_noprof+0xaa/0x410 [ 101.058349][ T7675] ? should_fail_ex+0xd7/0x270 [ 101.058432][ T7675] ? security_netlbl_sid_to_secattr+0xc7/0x160 [ 101.058511][ T7675] kstrdup+0x3d/0xd0 [ 101.058529][ T7675] security_netlbl_sid_to_secattr+0xc7/0x160 [ 101.058548][ T7675] selinux_netlbl_sock_genattr+0xa6/0x260 [ 101.058575][ T7675] selinux_netlbl_socket_post_create+0x69/0x100 [ 101.058666][ T7675] selinux_socket_post_create+0x211/0x2a0 [ 101.058699][ T7675] security_socket_post_create+0x5b/0xa0 [ 101.058778][ T7675] __sock_create+0x35b/0x5a0 [ 101.058860][ T7675] __sys_socket+0xb3/0x240 [ 101.058880][ T7675] __x64_sys_socket+0x3f/0x50 [ 101.058901][ T7675] x64_sys_call+0x28f1/0x2e10 [ 101.058919][ T7675] do_syscall_64+0xc9/0x1c0 [ 101.059005][ T7675] ? clear_bhb_loop+0x25/0x80 [ 101.059080][ T7675] ? clear_bhb_loop+0x25/0x80 [ 101.059099][ T7675] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 101.059120][ T7675] RIP: 0033:0x7f0b4a4ed169 [ 101.059135][ T7675] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 101.059164][ T7675] RSP: 002b:00007f0b48b57038 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 101.059180][ T7675] RAX: ffffffffffffffda RBX: 00007f0b4a705fa0 RCX: 00007f0b4a4ed169 [ 101.059190][ T7675] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000002 [ 101.059201][ T7675] RBP: 00007f0b48b57090 R08: 0000000000000000 R09: 0000000000000000 [ 101.059212][ T7675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 101.059223][ T7675] R13: 0000000000000000 R14: 00007f0b4a705fa0 R15: 00007ffd40199c18 [ 101.059238][ T7675] [ 101.496967][ T7721] FAULT_INJECTION: forcing a failure. [ 101.496967][ T7721] name failslab, interval 1, probability 0, space 0, times 0 [ 101.509815][ T7721] CPU: 0 UID: 0 PID: 7721 Comm: syz.2.1767 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 101.509840][ T7721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 101.509849][ T7721] Call Trace: [ 101.509855][ T7721] [ 101.509862][ T7721] dump_stack_lvl+0xf6/0x150 [ 101.509955][ T7721] dump_stack+0x15/0x1a [ 101.509970][ T7721] should_fail_ex+0x261/0x270 [ 101.509993][ T7721] should_failslab+0x8f/0xb0 [ 101.510019][ T7721] __kmalloc_node_track_caller_noprof+0xaa/0x410 [ 101.510111][ T7721] ? sidtab_sid2str_get+0xb8/0x140 [ 101.510139][ T7721] kmemdup_noprof+0x2b/0x70 [ 101.510162][ T7721] sidtab_sid2str_get+0xb8/0x140 [ 101.510194][ T7721] security_sid_to_context_core+0x1eb/0x2f0 [ 101.510218][ T7721] security_sid_to_context+0x27/0x30 [ 101.510240][ T7721] avc_audit_post_callback+0x10f/0x540 [ 101.510268][ T7721] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 101.510289][ T7721] common_lsm_audit+0x1c6/0x230 [ 101.510315][ T7721] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 101.510380][ T7721] ? kstrtoull+0x115/0x140 [ 101.510401][ T7721] slow_avc_audit+0xff/0x140 [ 101.510422][ T7721] avc_has_perm+0x124/0x150 [ 101.510444][ T7721] selinux_bpf+0xa4/0xc0 [ 101.510470][ T7721] security_bpf+0x50/0x90 [ 101.510607][ T7721] __sys_bpf+0x1ca/0x800 [ 101.510627][ T7721] __x64_sys_bpf+0x43/0x50 [ 101.510641][ T7721] x64_sys_call+0x23da/0x2e10 [ 101.510658][ T7721] do_syscall_64+0xc9/0x1c0 [ 101.510702][ T7721] ? clear_bhb_loop+0x25/0x80 [ 101.510720][ T7721] ? clear_bhb_loop+0x25/0x80 [ 101.510736][ T7721] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 101.510798][ T7721] RIP: 0033:0x7f91319cd169 [ 101.510810][ T7721] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 101.510825][ T7721] RSP: 002b:00007f913002f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 101.510894][ T7721] RAX: ffffffffffffffda RBX: 00007f9131be5fa0 RCX: 00007f91319cd169 [ 101.510905][ T7721] RDX: 0000000000000050 RSI: 00002000000009c0 RDI: 0000000000000000 [ 101.510915][ T7721] RBP: 00007f913002f090 R08: 0000000000000000 R09: 0000000000000000 [ 101.510924][ T7721] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 101.510934][ T7721] R13: 0000000000000001 R14: 00007f9131be5fa0 R15: 00007fff9b1f3698 [ 101.510947][ T7721] [ 102.149760][ T29] kauditd_printk_skb: 9507 callbacks suppressed [ 102.149781][ T29] audit: type=1326 audit(1743527753.456:46437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7683 comm="syz.1.1753" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0b4a4ed169 code=0x7fc00000 [ 102.194132][ T29] audit: type=1400 audit(1743527753.466:46438): avc: denied { read write } for pid=3304 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 102.219231][ T29] audit: type=1400 audit(1743527753.496:46439): avc: denied { map_create } for pid=7738 comm="syz.1.1774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 102.240537][ T29] audit: type=1400 audit(1743527753.496:46440): avc: denied { prog_load } for pid=7738 comm="syz.1.1774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 102.240795][ T7742] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 102.261558][ T29] audit: type=1400 audit(1743527753.496:46441): avc: denied { prog_load } for pid=7738 comm="syz.1.1774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 102.261585][ T29] audit: type=1400 audit(1743527753.496:46442): avc: denied { prog_load } for pid=7738 comm="syz.1.1774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 102.309809][ T29] audit: type=1400 audit(1743527753.496:46443): avc: denied { prog_load } for pid=7738 comm="syz.1.1774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 102.329211][ T29] audit: type=1400 audit(1743527753.496:46444): avc: denied { create } for pid=7738 comm="syz.1.1774" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=0 [ 102.350118][ T29] audit: type=1400 audit(1743527753.496:46445): avc: denied { map_create } for pid=7738 comm="syz.1.1774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 102.369716][ T29] audit: type=1400 audit(1743527753.496:46446): avc: denied { prog_load } for pid=7738 comm="syz.1.1774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 102.504334][ T7756] FAULT_INJECTION: forcing a failure. [ 102.504334][ T7756] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 102.517576][ T7756] CPU: 0 UID: 0 PID: 7756 Comm: syz.0.1781 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 102.517643][ T7756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 102.517654][ T7756] Call Trace: [ 102.517661][ T7756] [ 102.517668][ T7756] dump_stack_lvl+0xf6/0x150 [ 102.517704][ T7756] dump_stack+0x15/0x1a [ 102.517717][ T7756] should_fail_ex+0x261/0x270 [ 102.517772][ T7756] should_fail+0xb/0x10 [ 102.517798][ T7756] should_fail_usercopy+0x1a/0x20 [ 102.517821][ T7756] _copy_to_user+0x20/0xa0 [ 102.517846][ T7756] simple_read_from_buffer+0xb2/0x130 [ 102.517868][ T7756] proc_fail_nth_read+0x103/0x140 [ 102.517923][ T7756] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 102.517965][ T7756] vfs_read+0x1b2/0x710 [ 102.518011][ T7756] ? __rcu_read_unlock+0x4e/0x70 [ 102.518031][ T7756] ? __fget_files+0x186/0x1c0 [ 102.518057][ T7756] ksys_read+0xeb/0x1b0 [ 102.518076][ T7756] __x64_sys_read+0x42/0x50 [ 102.518147][ T7756] x64_sys_call+0x2a3b/0x2e10 [ 102.518168][ T7756] do_syscall_64+0xc9/0x1c0 [ 102.518188][ T7756] ? clear_bhb_loop+0x25/0x80 [ 102.518208][ T7756] ? clear_bhb_loop+0x25/0x80 [ 102.518300][ T7756] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 102.518320][ T7756] RIP: 0033:0x7f1aa8b7bb7c [ 102.518336][ T7756] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 102.518361][ T7756] RSP: 002b:00007f1aa71df030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 102.518379][ T7756] RAX: ffffffffffffffda RBX: 00007f1aa8d95fa0 RCX: 00007f1aa8b7bb7c [ 102.518391][ T7756] RDX: 000000000000000f RSI: 00007f1aa71df0a0 RDI: 0000000000000004 [ 102.518403][ T7756] RBP: 00007f1aa71df090 R08: 0000000000000000 R09: 0000000000000000 [ 102.518428][ T7756] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 102.518441][ T7756] R13: 0000000000000000 R14: 00007f1aa8d95fa0 R15: 00007fff6612a258 [ 102.518457][ T7756] [ 103.194965][ T7814] FAULT_INJECTION: forcing a failure. [ 103.194965][ T7814] name failslab, interval 1, probability 0, space 0, times 0 [ 103.207701][ T7814] CPU: 0 UID: 0 PID: 7814 Comm: syz.3.1804 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 103.207728][ T7814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 103.207807][ T7814] Call Trace: [ 103.207814][ T7814] [ 103.207821][ T7814] dump_stack_lvl+0xf6/0x150 [ 103.207841][ T7814] dump_stack+0x15/0x1a [ 103.207853][ T7814] should_fail_ex+0x261/0x270 [ 103.207873][ T7814] should_failslab+0x8f/0xb0 [ 103.207904][ T7814] __kmalloc_node_track_caller_noprof+0xaa/0x410 [ 103.208029][ T7814] ? sidtab_sid2str_get+0xb8/0x140 [ 103.208057][ T7814] kmemdup_noprof+0x2b/0x70 [ 103.208071][ T7814] sidtab_sid2str_get+0xb8/0x140 [ 103.208159][ T7814] security_sid_to_context_core+0x1eb/0x2f0 [ 103.208176][ T7814] security_sid_to_context+0x27/0x30 [ 103.208192][ T7814] avc_audit_post_callback+0x10f/0x540 [ 103.208218][ T7814] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 103.208229][ T7814] common_lsm_audit+0x1c6/0x230 [ 103.208247][ T7814] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 103.208258][ T7814] ? kstrtoull+0x115/0x140 [ 103.208287][ T7814] slow_avc_audit+0xff/0x140 [ 103.208298][ T7814] avc_has_perm+0x124/0x150 [ 103.208309][ T7814] selinux_bpf+0xa4/0xc0 [ 103.208325][ T7814] security_bpf+0x50/0x90 [ 103.208341][ T7814] __sys_bpf+0x1ca/0x800 [ 103.208428][ T7814] __x64_sys_bpf+0x43/0x50 [ 103.208438][ T7814] x64_sys_call+0x23da/0x2e10 [ 103.208529][ T7814] do_syscall_64+0xc9/0x1c0 [ 103.208541][ T7814] ? clear_bhb_loop+0x25/0x80 [ 103.208553][ T7814] ? clear_bhb_loop+0x25/0x80 [ 103.208563][ T7814] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 103.208575][ T7814] RIP: 0033:0x7f076d27d169 [ 103.208584][ T7814] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 103.208631][ T7814] RSP: 002b:00007f076b8e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 103.208642][ T7814] RAX: ffffffffffffffda RBX: 00007f076d495fa0 RCX: 00007f076d27d169 [ 103.208648][ T7814] RDX: 0000000000000094 RSI: 0000200000002c40 RDI: 0000000000000005 [ 103.208655][ T7814] RBP: 00007f076b8e7090 R08: 0000000000000000 R09: 0000000000000000 [ 103.208661][ T7814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 103.208694][ T7814] R13: 0000000000000000 R14: 00007f076d495fa0 R15: 00007fff084b5e48 [ 103.208702][ T7814] [ 103.604655][ T7833] FAULT_INJECTION: forcing a failure. [ 103.604655][ T7833] name failslab, interval 1, probability 0, space 0, times 0 [ 103.617375][ T7833] CPU: 1 UID: 0 PID: 7833 Comm: syz.2.1812 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 103.617438][ T7833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 103.617544][ T7833] Call Trace: [ 103.617552][ T7833] [ 103.617559][ T7833] dump_stack_lvl+0xf6/0x150 [ 103.617583][ T7833] dump_stack+0x15/0x1a [ 103.617657][ T7833] should_fail_ex+0x261/0x270 [ 103.617674][ T7833] should_failslab+0x8f/0xb0 [ 103.617699][ T7833] __kmalloc_node_track_caller_noprof+0xaa/0x410 [ 103.617725][ T7833] ? sidtab_sid2str_get+0xb8/0x140 [ 103.617810][ T7833] kmemdup_noprof+0x2b/0x70 [ 103.617827][ T7833] sidtab_sid2str_get+0xb8/0x140 [ 103.617877][ T7833] security_sid_to_context_core+0x1eb/0x2f0 [ 103.617902][ T7833] security_sid_to_context+0x27/0x30 [ 103.618017][ T7833] avc_audit_post_callback+0x10f/0x540 [ 103.618035][ T7833] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 103.618088][ T7833] common_lsm_audit+0x1c6/0x230 [ 103.618109][ T7833] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 103.618126][ T7833] ? kstrtoull+0x115/0x140 [ 103.618141][ T7833] slow_avc_audit+0xff/0x140 [ 103.618242][ T7833] avc_has_perm+0x124/0x150 [ 103.618261][ T7833] selinux_bpf+0xa4/0xc0 [ 103.618334][ T7833] security_bpf+0x50/0x90 [ 103.618357][ T7833] __sys_bpf+0x1ca/0x800 [ 103.618377][ T7833] __x64_sys_bpf+0x43/0x50 [ 103.618391][ T7833] x64_sys_call+0x23da/0x2e10 [ 103.618407][ T7833] do_syscall_64+0xc9/0x1c0 [ 103.618504][ T7833] ? clear_bhb_loop+0x25/0x80 [ 103.618524][ T7833] ? clear_bhb_loop+0x25/0x80 [ 103.618544][ T7833] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 103.618575][ T7833] RIP: 0033:0x7f91319cd169 [ 103.618587][ T7833] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 103.618603][ T7833] RSP: 002b:00007f913002f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 103.618621][ T7833] RAX: ffffffffffffffda RBX: 00007f9131be5fa0 RCX: 00007f91319cd169 [ 103.618633][ T7833] RDX: 0000000000000050 RSI: 0000200000000280 RDI: 0000000000000000 [ 103.618644][ T7833] RBP: 00007f913002f090 R08: 0000000000000000 R09: 0000000000000000 [ 103.618655][ T7833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 103.618666][ T7833] R13: 0000000000000000 R14: 00007f9131be5fa0 R15: 00007fff9b1f3698 [ 103.618681][ T7833] [ 103.939257][ T7851] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 103.939257][ T7851] The task syz.3.1815 (7851) triggered the difference, watch for misbehavior. [ 104.143826][ T7871] ================================================================== [ 104.151981][ T7871] BUG: KCSAN: data-race in call_rcu / mtree_range_walk [ 104.158855][ T7871] [ 104.161615][ T7871] write to 0xffff888103402a10 of 8 bytes by task 7868 on cpu 0: [ 104.169239][ T7871] call_rcu+0x3d/0x430 [ 104.173325][ T7871] mas_replace_node+0x2fd/0x430 [ 104.178199][ T7871] mas_wr_store_entry+0x1e80/0x2460 [ 104.183402][ T7871] mas_store_prealloc+0x6d5/0x960 [ 104.188426][ T7871] vma_complete+0x3a7/0x760 [ 104.192959][ T7871] __split_vma+0x5d9/0x6a0 [ 104.197386][ T7871] vma_modify+0x105/0x200 [ 104.201719][ T7871] vma_modify_flags+0xf3/0x120 [ 104.206480][ T7871] mprotect_fixup+0x323/0x600 [ 104.211162][ T7871] do_mprotect_pkey+0x6ce/0x9a0 [ 104.216005][ T7871] __x64_sys_mprotect+0x48/0x60 [ 104.220966][ T7871] x64_sys_call+0x272f/0x2e10 [ 104.225659][ T7871] do_syscall_64+0xc9/0x1c0 [ 104.230172][ T7871] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 104.236105][ T7871] [ 104.238434][ T7871] read to 0xffff888103402a10 of 8 bytes by task 7871 on cpu 1: [ 104.245982][ T7871] mtree_range_walk+0x1b3/0x460 [ 104.250843][ T7871] mas_walk+0x16e/0x320 [ 104.255013][ T7871] lock_vma_under_rcu+0x97/0x290 [ 104.259962][ T7871] exc_page_fault+0x150/0x650 [ 104.264651][ T7871] asm_exc_page_fault+0x26/0x30 [ 104.269502][ T7871] [ 104.271860][ T7871] value changed: 0x000000110e22ffff -> 0xffffffff85622600 [ 104.278965][ T7871] [ 104.281347][ T7871] Reported by Kernel Concurrency Sanitizer on: [ 104.287549][ T7871] CPU: 1 UID: 0 PID: 7871 Comm: syz.0.1826 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 104.299623][ T7871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 104.309707][ T7871] ==================================================================