last executing test programs: 6m8.527120657s ago: executing program 3 (id=2775): syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000105509147200ed0000000109022400010000000009040000030300000009"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000100)={0x2c, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) syz_usb_connect(0x2, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x6, [{0x0, 0x0}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x3001}}, {0x82, &(0x7f00000002c0)=@string={0x82, 0x3, "e754aa83b091ed6ea8f5a3626bfcc3e7e6ccff167e5c96eb4972912bbb3fec84470af2d7651e6c9bd76b7fce58f5426d8559658e82c028e8f8c7712d2c482a52081cd79cf5d287696af3918133acbbafb65a331a20aae38cb89aa582361c1491c772ccbc9787fcb73dc1f2505075a7611d8589cc5d027899d29ae99c4f3800f0"}}, {0x4, &(0x7f0000000180)=@lang_id={0x4, 0x3, 0x1c01}}, {0xb2, &(0x7f0000000380)=@string={0xb2, 0x3, "6ec15bd01810fcf015e463c9d672c611c6224578397aadd845e44fd1343aae1eadf86b1554ba61dcb5ffa4033de9e7c08e3a9c2bf6c0f8baf3198be2d6608a59b653be0d8781256b385677b8036cf6ad0f2efae2598f650360ee08993077d6eff6b51a144d02aef5e0fea022dec9b564cce3aaebdc8a5ce32ae2ab914add5ecaebecb64cb39de083926c07f330f180f9830da1b891b1c66fd64614d5ea3ee7441c6106781eed4540d8e9619644064285"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x1409}}]}) r1 = socket(0x10, 0x3, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x100008b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)=0x1400200bce) sched_setscheduler(0x0, 0x1, &(0x7f0000002200)=0x1) r2 = syz_open_dev$MSR(&(0x7f0000000200), 0x0, 0x0) read$msr(r2, &(0x7f0000002700)=""/102392, 0x18ff8) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000700000001000100090000000100", @ANYRES32=0x0, @ANYBLOB], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0xb4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) kcmp(0x0, 0x0, 0x2, r3, r1) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="600000000206010800000000000000000000000005000400000000000900020073797a31000000001400078008001240000000000500140008000000050005000a000000050001000600000011000300686173683a69702c706f7274"], 0x60}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000c80)=ANY=[@ANYBLOB="5c000000090601080000000000000000070000000900020073797a31000000000500010007000000340007801800018014000240fe8000000000000000000000000000bb060004400e1f00cd050007008800000006000540"], 0x5c}, 0x1, 0x0, 0x0, 0x10000042}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0xa, &(0x7f0000000000)=@raw=[@map_fd={0x18, 0x2}, @ldst={0x0, 0x3, 0x4, 0x0, 0x63cc52f0dd3656b0, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffffa}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query], 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0xcc03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x1c, 0xf, &(0x7f0000000380)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r5}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x40000}, {0x85, 0x0, 0x0, 0x86}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x2a}}}, &(0x7f0000000080)='GPL\x00', 0x2, 0x0, 0x0, 0x1e00, 0x4d}, 0x94) 6m6.397620673s ago: executing program 3 (id=2782): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f00000000c0)={0x1f, 0xffff, 0x3}, 0x6) write(r0, &(0x7f0000000000), 0x0) 6m6.078826856s ago: executing program 3 (id=2785): r0 = syz_usb_connect(0x0, 0x1cb, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000122f0d4071040403dfe4000000010902b901010000003f0904"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$sierra_net(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$sierra_net(r0, 0x0, &(0x7f0000000800)={0x1c, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00('], 0x0, 0x0}) 6m5.397940768s ago: executing program 3 (id=2786): r0 = socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x20, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0xb, 0x9, 0x0, 0x1, 0x20000000}, {0x66, 0x0, 0x0, 0x256c6c64}}, [@printk={@lld, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0x5, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x15}}], {{0x7, 0x1, 0x3, 0x3}, {0x5, 0x0, 0xb, 0x3}, {0x85, 0x0, 0x0, 0x76}}}, &(0x7f0000000000)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x24008800) socket$nl_generic(0x10, 0x3, 0x10) socket$can_bcm(0x2d, 0x2, 0x2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, 0x0, 0xa0) connect$inet(r3, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)='highspeed', 0x9) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) r5 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000040), 0x1e1201, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r5, 0xc004500a, &(0x7f0000001340)) ioctl$SNDCTL_DSP_CHANNELS(r5, 0xc0045006, &(0x7f0000000180)=0xa) ioctl$KDSKBSENT(r4, 0x4b49, 0x0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000002c0)=0x20) ioctl$NBD_SET_SIZE_BLOCKS(r6, 0xab07, 0x1) r7 = syz_open_procfs$pagemap(0x0, &(0x7f0000001080)) ioctl$PAGEMAP_SCAN(r7, 0xc0606610, &(0x7f0000000140)={0x60, 0x0, &(0x7f0000001000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, 0x0, 0x0, 0x0, 0x100000c01, 0x38, 0x0, 0x42, 0x6e}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'bond0\x00'}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000200)) 6m3.39006017s ago: executing program 3 (id=2789): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) open(&(0x7f00000001c0)='./file0\x00', 0x148640, 0x78e22799f4a46f1e) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup(r1) (async) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="74415f41349c9d4e2ef80dcee36f3d", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',msize=0x0000000000001000,k']) socket$nl_xfrm(0x10, 0x3, 0x6) (async) socket$nl_xfrm(0x10, 0x3, 0x6) 6m1.847007221s ago: executing program 3 (id=2796): r0 = syz_usb_connect(0x0, 0x1cb, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000122f0d4071040403dfe4000000010902b901010000003f0904"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$sierra_net(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$sierra_net(r0, 0x0, &(0x7f0000000800)={0x1c, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00('], 0x0, 0x0}) 6m1.293749733s ago: executing program 32 (id=2796): r0 = syz_usb_connect(0x0, 0x1cb, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000122f0d4071040403dfe4000000010902b901010000003f0904"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$sierra_net(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$sierra_net(r0, 0x0, &(0x7f0000000800)={0x1c, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00('], 0x0, 0x0}) 7.852725675s ago: executing program 4 (id=4285): socket(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_buf(r2, 0x29, 0x30, &(0x7f0000000180)=""/214, &(0x7f0000000080)=0xd6) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000001c0)=0x0) sched_setattr(r3, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x81c0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file2\x00', 0x0, 0x0, 0x0) symlink(&(0x7f0000002040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', &(0x7f0000000000)='./file0\x00') rename(&(0x7f0000000380)='./file0\x00', &(0x7f0000000780)='./file2\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x4e, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd6000a8bc001806fffe80000000000000000000000000000afe8000000000000000000000000000aa00004001", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="600200009078000308020000ecbe41e5d8020f8a667c95e9fe1ee91cdc359cca6b84d05760920a68d52ddb0a4b6a8a57a929f7191cd3204a4d1f7a93248851fd233eb7848c56dc57261e8493d4422e7d51ab87129cc798198de5bfeff221c4143e423aa2475f"], 0x0) syz_usb_connect(0x0, 0x6b, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) pipe2$watch_queue(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r4, 0x5760, 0x14) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) 6.465568168s ago: executing program 5 (id=4294): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000001680)=ANY=[@ANYBLOB="1800000000030000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='contention_end\x00', r0}, 0x18) syz_usb_connect(0x0, 0x24, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000d1d7a440041601801f44010203010902120001000000000904"], 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000000), 0xdc3, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045520, 0x0) 5.901483144s ago: executing program 5 (id=4297): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000180), r0) (async) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000280), r0) sendmsg$NLBL_CALIPSO_C_LISTALL(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r2, 0x1, 0x70bd29, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x20044001) (async) r3 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r3, 0x107, 0xf, &(0x7f0000000000), 0x4) (async) sendmsg$kcm(r3, &(0x7f00000001c0)={&(0x7f0000001340)=@hci={0x1f, 0x0, 0x12}, 0x80, &(0x7f0000000140)=[{&(0x7f00000006c0)="62043c00590200000001ad2f1eafbcf706e12b30087f5c582d26116642c47a5f8786ee601e65ab3c06d4b8bf4a81cb3e247345af215542f41ddf82f618438a34f90186cee8441e2305e495d04ad68ab8fef69df82de6456fbb48b63f60c9c9", 0x5f}, {0x0}], 0x2}, 0x0) (async) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e20, @broadcast}, 0x10) (async) sendto$inet(r4, &(0x7f0000000140)="ed", 0x1, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) (async) recvfrom$inet(r4, 0x0, 0x0, 0x13, 0x0, 0x0) (async) sendmsg$NLBL_MGMT_C_PROTOCOLS(r0, &(0x7f00000001c0)={0x0, 0x4b, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYRES32=r4, @ANYRESOCT=r2, @ANYRES32=r1], 0x58}, 0x1, 0x0, 0x0, 0x5}, 0x404c044) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000940)={'syzkaller0\x00', 0x7101}) (async) r6 = socket(0x400000000010, 0x3, 0x0) (async) r7 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0x25dfdbfd, {0x0, 0x0, 0x0, r8, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x42}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001300)=@newtfilter={0x38, 0x2c, 0xd27, 0x70bd24, 0x25dfdbfc, {0x0, 0x0, 0x0, r8, {0x4, 0xc}, {}, {0x7, 0x2}}, [@filter_kind_options=@f_matchall={{0xd}, {0x4}}]}, 0x38}, 0x1, 0x0, 0x0, 0x8848}, 0x80) (async) sendmsg$nl_route_sched(r6, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@gettfilter={0x24, 0x2e, 0x1, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, r8, {0xfff2, 0xffe0}, {0x0, 0xfff1}, {0x7, 0x2}}}, 0x24}, 0x1, 0x0, 0x0, 0x20000801}, 0x4041080) (async) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100), r0) 5.787448273s ago: executing program 2 (id=4298): bpf$MAP_CREATE(0x0, 0x0, 0x50) prlimit64(0x0, 0xe, &(0x7f0000000200)={0x8, 0x8a}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x802, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x70f9a000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ppoll(&(0x7f00000000c0)=[{}, {}], 0x20000000000000dc, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x2, 0x0, 0x8) r1 = memfd_secret(0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f00000005c0)={'sit0\x00', &(0x7f0000000580)={@loopback, 0x0, 0x0, 0x30, 0x0, [{@empty}, {@empty}, {@initdev}]}}) ftruncate(r1, 0x51a9497) readahead(r1, 0x7, 0x4000) 5.718676746s ago: executing program 5 (id=4299): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000105509147200ed00000001090224000100000000090400000303000000092100000001220500090581"], 0x0) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_control_io(r1, &(0x7f0000000100)={0x2c, &(0x7f0000000280)=ANY=[@ANYBLOB=' mO'], 0x0, 0x0, 0x0, 0x0}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c00", @ANYRES16, @ANYBLOB="470d000000000000000000000000080002"], 0x1c}}, 0x0) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) syz_usb_connect(0x2, 0x0, 0x0, &(0x7f0000000500)={0xa, &(0x7f0000000000)={0xa, 0x6, 0x201, 0x4, 0x6d, 0xfc, 0x40, 0x7}, 0x0, 0x0, 0x6, [{0x0, 0x0}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x3001}}, {0x82, &(0x7f00000002c0)=@string={0x82, 0x3, "e754aa83b091ed6ea8f5a3626bfcc3e7e6ccff167e5c96eb4972912bbb3fec84470af2d7651e6c9bd76b7fce58f5426d8559658e82c028e8f8c7712d2c482a52081cd79cf5d287696af3918133acbbafb65a331a20aae38cb89aa582361c1491c772ccbc9787fcb73dc1f2505075a7611d8589cc5d027899d29ae99c4f3800f0"}}, {0x4, &(0x7f0000000180)=@lang_id={0x4, 0x3, 0x1c01}}, {0xac, &(0x7f0000000380)=@string={0xac, 0x3, "6ec15bd01810fcf015e463c9d672c611c6224578397aadd845e44fd1343aae1eadf86b1554ba61dcb5ffa4033de9e7c08e3a9c2bf6c0f8baf3198be2d6608a59b653be0d8781256b385677b8036cf6ad0f2efae2598f650360ee08993077d6eff6b51a144d02aef5e0fea022dec9b564cce3aaebdc8a5ce32ae2ab914add5ecaebecb64cb39de083926c07f330f180f9830da1b891b1c66fd64614d5ea3ee7441c6106781eed4540d8e9"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x1409}}]}) socketpair$unix(0x1, 0x1, 0x0, 0x0) r2 = socket(0x10, 0x3, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x100008b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)=0x1400200bce) sched_setscheduler(0x0, 0x1, &(0x7f0000002200)=0x1) r3 = syz_open_dev$MSR(&(0x7f0000000200), 0x0, 0x0) read$msr(r3, &(0x7f0000002700)=""/102392, 0x18ff8) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000700000001000100090000000100", @ANYRES32=0x0, @ANYBLOB], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0xb4) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) kcmp(0x0, 0x0, 0x2, r4, r2) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="600000000206010800000000000000000000000005000400000000000900020073797a31000000001400078008001240000000000500140008000000050005000a000000050001000600000011000300686173683a69702c706f7274"], 0x60}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000c80)=ANY=[@ANYBLOB="5c000000090601080000000000000000070000000900020073797a31000000000500010007000000340007801800018014000240fe8000000000000000000000000000bb060004400e1f00cd050007008800000006000540"], 0x5c}, 0x1, 0x0, 0x0, 0x10000042}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0xa, &(0x7f0000000000)=@raw=[@map_fd={0x18, 0x2}, @ldst={0x0, 0x3, 0x4, 0x0, 0x63cc52f0dd3656b0, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffffa}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query], 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0xcc03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x1c, 0xf, &(0x7f0000000380)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r7}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x40000}, {0x85, 0x0, 0x0, 0x86}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x2a}}}, &(0x7f0000000080)='GPL\x00', 0x2, 0x0, 0x0, 0x1e00, 0x4d}, 0x94) syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') 5.657714365s ago: executing program 2 (id=4301): r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x84200) r1 = syz_open_dev$loop(&(0x7f0000000440), 0x7, 0x0) r2 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_INIT(r2, 0x0, 0xc8, &(0x7f0000000040), 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuset.effective_cpus\x00', 0x275a, 0x0) ioctl$LOOP_CONFIGURE(r1, 0x4c0a, &(0x7f00000005c0)={r3, 0x800, {0x2a00, 0x80010000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, 0x5, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd6447a4b4e00d9683dda1af1ea09de2b7fb0a0100000000000000000300", "2809e8dbe10859892d0000b420a9c81f40f05f819e0117020000f20020000000e903001000", "90be8b1c5512406c7f00", [0x4, 0x5]}}) r4 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x4080) ioctl$LOOP_CONFIGURE(r4, 0x4c0a, &(0x7f0000001280)={r3, 0x200, {0x2a12, 0x80010000, 0x0, 0x3, 0x20000000000006, 0x0, 0x0, 0x7, 0x1c, "fee8a2ab78fc179fd1f8a0e91ddaaca7ca64c6a4b4e00d9683dda1af1ea80000000000000000000000deff1200100000000000000000000000000800", "2809a9000000038948224ad54afac11d875375bdb2420000b420a1a93c7540f4767f9e01177d3dd40600000061ac000000800800", "90be8b1c55f96400", [0x5, 0x9]}}) socket$rxrpc(0x21, 0x2, 0xa) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r4) ioctl$NBD_DO_IT(r0, 0xab03) timer_create(0x0, &(0x7f0000000080)={0x0, 0x11, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r5 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000380)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f0000000080)={r6, 0x23f}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000000640)={r7, @in={{0x2, 0x4e21, @multicast1}}, [0x5, 0x4b77ef9e, 0x8, 0x74e5, 0x8, 0x7daf, 0x991c, 0x2, 0xbd, 0x81, 0x3, 0x5, 0x1, 0xc, 0xffffffffffffffff]}, &(0x7f0000000580)=0x100) setsockopt$inet6_group_source_req(r5, 0x29, 0x2b, &(0x7f00000000c0)={0x8001, {{0xa, 0x4e24, 0x9, @mcast2, 0x80000001}}, {{0xa, 0x4e22, 0x6, @loopback, 0xfffffffc}}}, 0x108) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) 4.862330796s ago: executing program 5 (id=4304): r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)) fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r1 = timerfd_create(0x2, 0x80000) timerfd_gettime(r1, &(0x7f0000000240)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x206081, 0x0) getsockopt$inet6_mptcp_buf(0xffffffffffffffff, 0x11c, 0x6, &(0x7f0000000280)=""/81, &(0x7f0000000340)=0x51) rmdir(&(0x7f0000000180)='./file0\x00') fsopen(&(0x7f00000001c0)='ramfs\x00', 0x1) sendmsg$IPSET_CMD_ADD(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xd24f4d5778621d46}, 0x4) r3 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000180), &(0x7f0000000240)=0x4) ioctl$IOMMU_IOAS_ALLOW_IOVAS(r0, 0x3b82, &(0x7f0000000000)={0x18, 0x0, 0x0, 0x0, 0x0}) 4.606702766s ago: executing program 5 (id=4306): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000001000000000000080000095"], &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='contention_end\x00', r0}, 0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'bond0\x00'}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'dummy0\x00'}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x11) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x21c0, 0x103) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x40, 0x7, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x89f9b000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) renameat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000480)='./file7\x00', 0x5) r2 = syz_usb_connect$lan78xx(0x3, 0x3f, &(0x7f0000000c40)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0x424, 0x7850, 0x0, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d}}]}}, 0x0) syz_usb_control_io$lan78xx(r2, 0x0, &(0x7f0000000000)={0x1c, &(0x7f0000000080)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$lan78xx(r2, 0x0, 0x0) syz_usb_control_io$lan78xx(r2, 0x0, &(0x7f0000000940)={0x34, &(0x7f0000000680)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$lan78xx(r2, 0x0, 0x0) syz_usb_control_io(r2, 0x0, &(0x7f0000003f00)={0x84, &(0x7f0000003b00)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$lan78xx(r2, 0x0, &(0x7f0000000880)={0x34, &(0x7f00000006c0)={0x40, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r2, 0x0, &(0x7f0000000180)={0x84, &(0x7f0000000e80)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = syz_usb_connect$uac1(0x2, 0x76, &(0x7f0000000040)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0xff, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x64, 0x3, 0x1, 0x4, 0x90, 0x9, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0xa50b, 0x9e}, [@selector_unit={0x5, 0x24, 0x5, 0x6, 0x5}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x48, 0x0, 0x81, 0x8, {0x7, 0x25, 0x1, 0x0, 0x9, 0x3}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x8, 0x9, 0x6, 0x4, {0x7, 0x25, 0x1, 0x85, 0x9, 0x5}}}}}}}]}}, 0x0) syz_usb_control_io$uac1(r3, &(0x7f0000000680)={0x14, 0x0, 0x0}, 0x0) syz_usb_control_io(r2, 0x0, &(0x7f0000000b80)={0x44, &(0x7f0000000040)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) 4.485656323s ago: executing program 4 (id=4308): io_submit(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) setrlimit(0x6, 0x0) syz_clone(0x2180, 0x0, 0xe4, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x5) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x82200, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000400), 0x2, 0x141102) writev(r0, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x1a1800, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000040)=0x3) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000140)={0x2, 0x0, @ioapic={0x1000, 0x0, 0x1, 0xeffffdff, 0x0, [{0x9, 0xff, 0x0, '\x00', 0x20}, {0x15, 0x0, 0x5}, {0x8}, {0x0, 0x0, 0x7d}, {}, {0xa, 0x65, 0x5}, {0xfc, 0x0, 0x30, '\x00', 0x3}, {0x0, 0x5}, {0x0, 0x32, 0xfa, '\x00', 0x8}, {0x2, 0x5}, {0xff, 0x5}, {0x0, 0x8, 0xff, '\x00', 0xfc}, {0x0, 0x4}, {0x3, 0x0, 0xff, '\x00', 0xc0}, {0xfc, 0xa, 0x0, '\x00', 0x3}, {0x0, 0x86, 0x80, '\x00', 0x5}, {0x7, 0x2, 0x7f}, {0x5, 0x0, 0x0, '\x00', 0xbe}, {0x20, 0x8, 0x19, '\x00', 0x5}, {0x0, 0x0, 0x0, '\x00', 0x26}, {0x58, 0x3}, {0x0, 0x0, 0x41}, {0x4, 0x0, 0x9}, {0x0, 0x80, 0x6, '\x00', 0x1}]}}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0xffffffffffffffa1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r4 = io_uring_setup(0x780, &(0x7f0000000040)={0x0, 0x8edf, 0x1c881, 0x1, 0xd1}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c0000001a0001000080801200000000000000002513dcd63cad2a6d3323b19e475a534e7dab6a0c1c0b4025345399ac"], 0x1c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x5, 0x4, &(0x7f0000000000)=ANY=[@ANYRES32=r2], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2b27}, 0x94) eventfd(0xcac4) io_uring_enter(r4, 0x2219, 0x7721, 0x16, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x4af584f73552a348) io_uring_enter(r4, 0x0, 0x1000002, 0x37, 0x0, 0x0) 4.023439798s ago: executing program 4 (id=4310): r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x2, 0x5, @loopback={0xfec0ffff00000000}}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000240)={0x2, {{0xa, 0x4e20, 0x0, @mcast2, 0xde9a}}, {{0xa, 0x4e22, 0x200, @mcast2, 0x80000000}}}, 0x108) syz_emit_ethernet(0x66, &(0x7f0000000b40)={@local, @random="8c00defa00", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00048e", 0x30, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[], @time_exceed={0x2, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "050006", 0x97a, 0x3a, 0xff, @mcast1, @mcast2}}}}}}}, 0x0) 3.948193368s ago: executing program 4 (id=4311): bpf$MAP_CREATE(0x0, 0x0, 0x50) prlimit64(0x0, 0xe, &(0x7f0000000200)={0x8, 0x8a}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x802, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x70f9a000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ppoll(&(0x7f00000000c0)=[{}, {}], 0x20000000000000dc, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x2, 0x0, 0x8) r1 = memfd_secret(0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f00000005c0)={'sit0\x00', &(0x7f0000000580)={@loopback, 0x0, 0x0, 0x30, 0x0, [{@empty}, {@empty}, {@initdev}]}}) ftruncate(r1, 0x51a9497) readahead(r1, 0x7, 0x4000) 3.736299689s ago: executing program 4 (id=4315): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001580)={0x2, 0x4, &(0x7f0000000240)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xad}]}, &(0x7f0000001340)='GPL\x00'}, 0x80) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) r0 = socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_GET(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0xa7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r6 = syz_io_uring_setup(0x23c, &(0x7f0000000080)={0x0, 0x0, 0x10100}, 0x0, &(0x7f0000000040)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_io_uring_submit(0x0, r7, &(0x7f0000000000)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r8, 0x0, &(0x7f0000000240)="352f1938d141676d9b6c59065f664735c08b9d697a645f85b19ba9030648cd046d1f26aad0196458046b81", 0xfffffffffffffe08, 0xebec93e830f96115}) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = syz_open_dev$tty1(0xc, 0x4, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) ioctl$TIOCL_BLANKSCREEN(r9, 0x4b67, &(0x7f0000000180)) io_uring_enter(r6, 0x7f5f, 0x4000000, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=@newlink={0x44, 0x10, 0x437, 0x0, 0xfffffffd, {0x0, 0x0, 0x0, r2, 0x5394b, 0x601}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}, @IFLA_GRE_FLOWINFO={0x8, 0xc, 0x1ff}]}}}]}, 0x44}, 0x1, 0x0, 0x0, 0x48800}, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1f, &(0x7f00000003c0)=0x6, 0x4) 3.353404571s ago: executing program 5 (id=4318): socket(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_buf(r2, 0x29, 0x30, &(0x7f0000000180)=""/214, &(0x7f0000000080)=0xd6) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000001c0)=0x0) sched_setattr(r3, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x81c0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file2\x00', 0x0, 0x0, 0x0) symlink(&(0x7f0000002040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', &(0x7f0000000000)='./file0\x00') rename(&(0x7f0000000380)='./file0\x00', &(0x7f0000000780)='./file2\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x4e, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd6000a8bc001806fffe80000000000000000000000000000afe8000000000000000000000000000aa00004001", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="600200009078000308020000ecbe41e5d8020f8a667c95e9fe1ee91cdc359cca6b84d05760920a68d52ddb0a4b6a8a57a929f7191cd3204a4d1f7a93248851fd233eb7848c56dc57261e8493d4422e7d51ab87129cc798198de5bfeff221c4143e423aa2475f"], 0x0) syz_usb_connect(0x0, 0x6b, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) pipe2$watch_queue(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r4, 0x5760, 0x14) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) 3.167330805s ago: executing program 4 (id=4319): r0 = syz_open_dev$loop(&(0x7f0000000440), 0x7, 0x0) r1 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_INIT(r1, 0x0, 0xc8, &(0x7f0000000040), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuset.effective_cpus\x00', 0x275a, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f00000005c0)={r2, 0x800, {0x2a00, 0x80010000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, 0x5, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd6447a4b4e00d9683dda1af1ea09de2b7fb0a0100000000000000000300", "2809e8dbe10859892d0000b420a9c81f40f05f819e0117020000f20020000000e903001000", "90be8b1c5512406c7f00", [0x4, 0x5]}}) r3 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x4080) ioctl$LOOP_CONFIGURE(r3, 0x4c0a, &(0x7f0000001280)={r2, 0x200, {0x2a12, 0x80010000, 0x0, 0x3, 0x20000000000006, 0x0, 0x0, 0x7, 0x1c, "fee8a2ab78fc179fd1f8a0e91ddaaca7ca64c6a4b4e00d9683dda1af1ea80000000000000000000000deff1200100000000000000000000000000800", "2809a9000000038948224ad54afac11d875375bdb2420000b420a1a93c7540f4767f9e01177d3dd40600000061ac000000800800", "90be8b1c55f96400", [0x5, 0x9]}}) socket$rxrpc(0x21, 0x2, 0xa) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r3) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) timer_create(0x0, &(0x7f0000000080)={0x0, 0x11, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r4 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000380)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000080)={r5, 0x23f}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000640)={r6, @in={{0x2, 0x4e21, @multicast1}}, [0x5, 0x4b77ef9e, 0x8, 0x74e5, 0x8, 0x7daf, 0x991c, 0x2, 0xbd, 0x81, 0x3, 0x5, 0x1, 0xc, 0xffffffffffffffff]}, &(0x7f0000000580)=0x100) setsockopt$inet6_group_source_req(r4, 0x29, 0x2b, &(0x7f00000000c0)={0x8001, {{0xa, 0x4e24, 0x9, @mcast2, 0x80000001}}, {{0xa, 0x4e22, 0x6, @loopback, 0xfffffffc}}}, 0x108) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 2.366987588s ago: executing program 0 (id=4322): r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[], 0xd8}, 0x1, 0x0, 0x0, 0x6004040}, 0x20000000) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0x18}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x60, &(0x7f0000000080)={'filter\x00', 0x1058, [{}, {0x0, 0x100000000000000}]}, 0x68) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bond0\x00'}) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) pread64(r3, 0x0, 0x0, 0x1) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000480)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xfc409000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) fsopen(&(0x7f0000000000)='rpc_pipefs\x00', 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x47) setsockopt$inet_tcp_int(r7, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000040000000d00000f03000000000000000000000000000000491eaf000000000000000f010000005e00d5000000006100"], 0x0, 0x46, 0x0, 0x1}, 0x20) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x4) connect$inet(r7, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) 2.336405563s ago: executing program 2 (id=4323): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@base={0x11, 0x4, 0x4, 0x2}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0xd, &(0x7f0000000200)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x75}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {0x4}, {0x6, 0x0, 0xa}, {}, {}, {0x85, 0x0, 0x0, 0x33}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b80)={r1, 0x2000012, 0xe, 0x0, &(0x7f0000000280)="63ec33c9e9b98600000000000000", 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xb}, 0x50) 2.248104678s ago: executing program 2 (id=4324): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x18, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000080000000000000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$vim2m(&(0x7f0000000000), 0x0, 0x2) ioctl$vim2m_VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f00000000c0)={0x10002, 0x1, 0x1}) gettid() r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000780)=[@in6={0xa, 0x4e24, 0xb, @private1, 0x80000000}]}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x74, &(0x7f0000000240)={r3, 0xc125, 0x30, 0xa5f}, &(0x7f0000000080)=0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x11, 0x3, &(0x7f0000000100)=ANY=[], &(0x7f0000000000)='syzkaller\x00'}, 0x94) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x80000, 0x0) r5 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r5, 0x10c, 0x8, &(0x7f0000000000)=0x1003, 0x4) prlimit64(0x0, 0xe, &(0x7f00000004c0)={0x7, 0x800000000000008a}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RNDADDTOENTCNT(r4, 0x40045201, &(0x7f0000000200)=0x7) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000000)={'wlan1\x00', @random="0100c3201000"}) 2.114110622s ago: executing program 1 (id=4326): openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x2c41, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002040), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000002080)='./file0\x00', &(0x7f0000000040), 0x10000, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\vu']) syz_fuse_handle_req(r0, &(0x7f000000bb40)="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", 0x2000, &(0x7f0000007a80)={&(0x7f0000006400)={0x50, 0x0, 0x1ff, {0x7, 0x29, 0x1, 0xdb0078e619e3dde7, 0xdcf, 0x6, 0xb, 0x800, 0x0, 0x0, 0x2, 0x10001}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='task\x00') fchdir(r1) openat(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/cgroup.procs\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) r2 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x143102) writev(r2, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) mknod(0x0, 0x8000, 0x0) r3 = landlock_create_ruleset(&(0x7f0000000000)={0xb001, 0x3, 0x3}, 0x18, 0x0) landlock_restrict_self(r3, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000300)='./file2\x00', 0xc000, 0x0) r4 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r4, 0x0, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a00e0ffffff0f77042482"], 0xd) syz_emit_vhci(&(0x7f00000007c0)=ANY=[@ANYBLOB="040e06006220"], 0x9) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r5 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(r5, 0x0, 0x2, 0x0) syz_open_procfs$userns(r5, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 2.074127202s ago: executing program 2 (id=4327): listen(0xffffffffffffffff, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000780)=ANY=[@ANYBLOB="12010000cf8bed20d90f25004029000000010902120001000000000904"], 0x0) syz_usb_control_io$uac1(r0, 0x0, &(0x7f0000000580)={0x24, &(0x7f0000000700)=ANY=[@ANYBLOB="201109"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$I2C(&(0x7f0000000080), 0xffffffffffffff01, 0x40000) ioctl$I2C_SMBUS(r1, 0x720, &(0x7f0000000200)={0x1, 0xd9, 0x3, &(0x7f0000000040)={0xa, "810556c721393f4084cc9efc7ddb01702fb9a7f77d040b00"}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000380)='\x00', 0x89901) fchdir(r2) mount_setattr(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x8000, &(0x7f0000000200)={0x7}, 0x20) r3 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x90000, 0x10) fsetxattr$trusted_overlay_opaque(r3, &(0x7f00000001c0), 0x0, 0x0, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r4 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r4, &(0x7f0000000300)=""/102392, 0x18ff8) ioctl$CEC_ADAP_S_LOG_ADDRS(0xffffffffffffffff, 0xc05c6104, 0x0) socket(0x1e, 0x4, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x4e23, @rand_addr=0x64010100}}, 0x0, 0x20000000005, 0x4a}, 0xd8) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x240087f9, &(0x7f0000000100)={0x2, 0x4e23, @loopback}, 0x10) close(r5) r6 = syz_open_procfs(0x0, &(0x7f0000000380)='clear_refs\x00') writev(r6, &(0x7f0000000100)=[{&(0x7f0000000000)='4', 0x1}], 0x1) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000000), 0x0) 1.546842415s ago: executing program 1 (id=4328): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa10000000000000701"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xff0f0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.519878163s ago: executing program 1 (id=4329): prlimit64(0x0, 0xe, &(0x7f0000000600)={0x9, 0x20000008b}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000080)="682ed500000000a1783569ae0000000000ffffff", 0xfffffdd2}, {&(0x7f00000001c0)="29235f8b92d8a00700000000000000442aba329c9f1dc1d202c0c12aefdeed8e463a935ef4418b81b79ec3019db723e26db60936b09359c37bbb7c353cf6f339e32000"/76, 0x4c}], 0x2, 0x0, 0x0, 0x40011}, 0x20040000) 1.470130687s ago: executing program 0 (id=4330): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x25dfdbfd, 0x10}, 0xc) socket$inet6(0xa, 0x3, 0x87) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='environ\x00') read$FUSE(r1, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYRES8=0xffffffffffffffff], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='cgroup\x00') lseek(r4, 0xffffff60, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='sys_enter\x00', r2}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_j1939(r6, &(0x7f0000000340)={0x1d, r7, 0x0, {0x0, 0x0, 0x6}}, 0x18) setsockopt$sock_int(r6, 0x1, 0x6, &(0x7f0000000040)=0x1, 0x4) prlimit64(0x0, 0xe, &(0x7f0000000780)={0x9, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r8 = getpid() sched_setscheduler(r8, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x9031, 0xffffffffffffffff, 0xe75f0000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r9, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r10, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r9, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), r11) sendmsg$DEVLINK_CMD_RATE_GET(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES8=r3, @ANYBLOB="01032abd7000fddbdf25050000000e0001006e657464657673696d000002006e657464657673696d300000", @ANYRES64=r12, @ANYRESOCT=r9, @ANYRES16=r7, @ANYRES16=r4], 0x34}, 0x1, 0x0, 0x0, 0x40014}, 0x0) sched_setattr(0xffffffffffffffff, &(0x7f0000000180)={0x38, 0x0, 0x8, 0x10001, 0x7, 0x3, 0x0, 0x9, 0x3, 0x27c}, 0x0) sendmsg$inet(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000003c0)="964a6c5176e84b4d7a", 0x9}], 0x1}, 0x4048081) bind$can_j1939(r6, &(0x7f0000000080)={0x1d, r7, 0x3, {0x0, 0xff, 0x3}, 0xfe}, 0x18) sendmsg$nl_route_sched(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000780)=@newtfilter={0x24, 0x11, 0x1, 0x70bd2a, 0x25dfdbfc, {0x0, 0x0, 0x74, r7, {0xfff3, 0x10}, {0xfff1, 0xb}, {0x2, 0xd}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x4012}, 0x20000050) 1.258176809s ago: executing program 0 (id=4331): connect$unix(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) syz_io_uring_setup(0x497, &(0x7f0000000000)={0x0, 0xf62c, 0x800, 0x3, 0x37d}, 0x0, &(0x7f0000000280)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.io_wait_time_recursive\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000000), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) preadv(r2, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffff23}], 0x1, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x44, 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000100)={'syz', 0x2}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 1.056880409s ago: executing program 2 (id=4332): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x50) socket(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_buf(r2, 0x29, 0x30, &(0x7f0000000180)=""/214, &(0x7f0000000080)=0xd6) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000001c0)) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x81c0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file2\x00', 0x0, 0x0, 0x0) symlink(&(0x7f0000002040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', &(0x7f0000000000)='./file0\x00') rename(&(0x7f0000000380)='./file0\x00', &(0x7f0000000780)='./file2\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x4e, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd6000a8bc001806fffe80000000000000000000000000000afe8000000000000000000000000000aa000040", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="600200009078000308020000ecbe41e5d8020f8a667c95e9fe1ee91cdc359cca6b84d05760920a68d52ddb0a4b6a8a57a929f7191cd3204a4d1f7a93248851fd233eb7848c56dc57261e84"], 0x0) syz_usb_connect(0x0, 0x6b, &(0x7f0000000100)=ANY=[@ANYBLOB="1201000385352608f20446b76e8e01020301090259000104e9000909049300000e0100ff0a2401020005028a01"], &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}) pipe2$watch_queue(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r3, 0x5760, 0x14) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) rseq(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x1}, 0x20, 0x4, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) 882.532432ms ago: executing program 0 (id=4333): r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) read$ptp(r0, &(0x7f0000000040)=""/253, 0xfd) r1 = syz_open_dev$sg(&(0x7f0000000140), 0x6, 0x101000) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000180)) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000001c0)=0x5) pselect6(0x40, &(0x7f0000000200)={0x0, 0x4c7, 0x7b5f, 0x5, 0x206, 0x401, 0x3ff, 0x7}, &(0x7f0000000240)={0xf, 0x9, 0x4, 0xa51, 0x2, 0xffffffffffffffff, 0x85e7, 0xebb}, &(0x7f0000000280)={0x8000000000000000, 0x5, 0x490, 0xff, 0x9ddc, 0x9847, 0xfc3}, &(0x7f00000002c0)={0x0, 0x989680}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000006c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000680)={&(0x7f00000003c0)={0x1c0, 0x2f, 0x420, 0x70bd26, 0x25dfdbfc, {0x1a}, [@nested={0xc, 0xd, 0x0, 0x1, [@typed={0x8, 0x102, 0x0, 0x0, @ipv4=@remote}]}, @nested={0x1a0, 0x146, 0x0, 0x1, [@nested={0x4, 0x14f}, @generic="34f74501671af4d667a0aecbeea914bca0f4fb5743f59b2c22adbab309834c8066e96cccafe012932686f435a3769f9de4a686f52e1de66fd56c87d2b83be2064504392bcfd7beeb438bebbd75c9c3bbe4c0f9c5a8acfb29f99783d35906b42c4bfd100a89d17baebb737d48ef84a58cd1c308c3f847eccdda362e720922b11b926937cab0c75483bc0bb1aaa243d0d2eae594d278509e5db99e8e6c271d4cbc766250fec3676067bfed6fe72ba70132285f767e78c4fe81df2d83279abb4ba2367840a2de2f97757f4746099f00d06001342c5cc88eff15f63b0561350f79", @typed={0x14, 0x69, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @typed={0x14, 0xeb, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x2b}}, @nested={0x4, 0xd6}, @nested={0x4, 0x23}, @typed={0x8, 0x6, 0x0, 0x0, @ipv4=@broadcast}, @generic="15e4a32b31e0a36c1d939d9dc45f897b7756ee6f1f793d42654e9bba9714f51f8556e38e266e7e7b949dde190b4eb758160eb49564674f02099f0079fd121a2b8ca880ec200b042b91eb1438a53be43adc8831092d762487ccdbd8478f699335bafc95a32ea257805c146fc0f3a656f0ce1f749cc31b25c6527c836f5eccc88dfa"]}]}, 0x1c0}}, 0x8002) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'geneve0\x00'}) r3 = syz_open_dev$vcsa(&(0x7f0000000740), 0x3, 0x40000) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000780)={r3}, 0x8) ioctl$KVM_GET_PIT(r3, 0xc048ae65, &(0x7f00000007c0)) syz_usb_connect(0x2, 0x6f1, &(0x7f0000000840)={{0x12, 0x1, 0x200, 0x1d, 0xa4, 0xa6, 0x20, 0x12d1, 0x141f, 0x0, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x6df, 0x2, 0x80, 0x0, 0x40, 0x40, [{{0x9, 0x4, 0xe7, 0xff, 0xd, 0x14, 0x7, 0x78, 0x4, [@uac_control={{0xa, 0x24, 0x1, 0x7, 0x7}, [@mixer_unit={0x6, 0x24, 0x4, 0x3, 0x34, "e6"}]}], [{{0x9, 0x5, 0x0, 0xa, 0x3ff, 0x3, 0x5, 0x9b}}, {{0x9, 0x5, 0xd, 0x10, 0x20, 0x5, 0xc2, 0x8, [@generic={0xce, 0xf, "13641c0e3568a0a180e966a348f6c9cf52114f8c8df8304776486e2cfce8b025b5067f226ff06701a77331c6bd21479826284b86238cddce02d58a40571e93fe8d6027ebba9db88cb6ffdb2182e172e370a3d717fb3033ec155130002275e5099effa339f0d739214da3e198f2dff9e1db93988d90d0abd7ff668908bb657e84c14691a6c71c94ea349218e0b0952b2f0edb2d818c5735861464e9c0e1fb1d3482df2bd4dcb4d2a0ac35c08af6d832bc111b238c5b8dbae64b3d53d601c638a87cf3d98fdef7eb891dde2101"}]}}, {{0x9, 0x5, 0x2, 0x4, 0x20, 0x2, 0x5, 0x26}}, {{0x9, 0x5, 0x8, 0x2, 0x3ff, 0x4, 0x5f, 0x5}}, {{0x9, 0x5, 0x3, 0x0, 0x20, 0x6, 0x9, 0x4, [@generic={0x100, 0x6, "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"}]}}, {{0x9, 0x5, 0x1, 0x2, 0x3ff, 0x8, 0x4, 0x4, [@generic={0x3a, 0x4, "76af05507f027592c17abc6eae6e594a8579b43fa60f6f0956f10211dbc8542044da1a8cc00759464dabac1a047112b80fb0100080d9519b"}]}}, {{0x9, 0x5, 0x3, 0x0, 0x8, 0x1, 0x69, 0x62, [@uac_iso={0x7, 0x25, 0x1, 0x80, 0x6, 0x2}, @generic={0x72, 0x10, "d23ae9c4979c26492ab24a197fd8dc1649052479cb1f09c227c61592592cb892c2464fd449370c75bc48653605a91b0b6c12b871769938e79956164c1165b47ca81ce10ffbabecfc9ae73eb52ed3fa0b1d77f8c01815c6fe2561d9d8040cdd397d3e15fe81a1d31368caff55a2258916"}]}}, {{0x9, 0x5, 0x5, 0x8, 0x20, 0x8, 0xb3, 0x40, [@uac_iso={0x7, 0x25, 0x1, 0x3, 0x6, 0x3}]}}, {{0x9, 0x5, 0xc, 0x0, 0x3ff, 0x3, 0x2, 0x5}}, {{0x9, 0x5, 0x7, 0x10, 0x8, 0x1, 0x87, 0x4, [@generic={0x23, 0x24, "b7d74614543cb4292e17cdd052321510e98ea6367acaa61ab76d959dc50002f34d"}]}}, {{0x9, 0x5, 0xf, 0x3, 0x0, 0x8, 0x0, 0xea}}, {{0x9, 0x5, 0x0, 0x0, 0x20, 0x9, 0x8, 0xc, [@generic={0x2f, 0xe, "12214e37e2aff1d021bb15953d840707ff54d146ae9bb1ef06725b782e428b7bcb690f1f79d55edfbd733b87a2"}]}}, {{0x9, 0x5, 0x9, 0x10, 0x3ff, 0x6, 0x0, 0x6}}]}}, {{0x9, 0x4, 0x0, 0x2, 0x8, 0x57, 0x45, 0x74, 0x8, [@generic={0x4d, 0xc, "15493c416e1a14afca49519b23bc8da26f0761192d918b150dc99684fb6cd36f0d2cbd4b4552bd203136c556a6c52379bafd2926624cbe015e7c0ae97b37132ce621d70309a9344b43d022"}], [{{0x9, 0x5, 0xd, 0x4, 0x40, 0x1, 0x7, 0x7, [@generic={0x5d, 0x9, "7e491aee07dca1701eecdeddf8ec05b64f1a9d27e72532ee28e1088860f4340f9501a8da136637022cc48dd1822cf13517071f64011773574616423039e6a78ba48eeab97494726b675c3ace0fbfc53ad64634e1b546472ecd15e7"}, @generic={0x6e, 0x8, "a5af3bb747c4319f14c894e1cbf275e5b120dada3e0e706997593ce2f8ff6d272412e8060b097d413f0747ff1049bb7283f24b366447d14df142386fd4afe6c831b61c50a938196a51efd268b90b36533b344ff128f5f65fc6ed39bd8103b7c073cff0db0049b22f08d42a44"}]}}, {{0x9, 0x5, 0x3, 0x3, 0x400, 0xf8, 0x3, 0x8, [@generic={0x4f, 0x5, "7ea7fb34f88711ffb5aaf016f7c4e48ebe08a3e3d91cbcb5eb7459c1973ec4ea25eadfbbee2c58c5b5bf97b1c2c0eb4abff83115c028aa31597c0c4dc04792ebac4c576878b6ff9afac287491d"}]}}, {{0x9, 0x5, 0xd, 0x3, 0x20, 0x5, 0x3, 0x1, [@uac_iso={0x7, 0x25, 0x1, 0x80, 0x7, 0xff6c}, @generic={0x59, 0x30, "6058d8203b3dfdc7e18c613ec2add9798d94a4c112a6871e2245954d539d182c58b423eef81821cb5f51af08f95236b81917fc8cf32876470b5ef67341981c134738e3274eb2262c47bdf52ed9084b467beae62c3e1d4a"}]}}, {{0x9, 0x5, 0xe, 0x10, 0x40, 0x5, 0x8, 0xcf, [@uac_iso={0x7, 0x25, 0x1, 0x81, 0x9}, @generic={0x101, 0x23, "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"}]}}, {{0x9, 0x5, 0x5, 0x8, 0x3ff, 0x4, 0x3, 0x3, [@generic={0x41, 0x7, "08e35e1c81287a6b12346aaee0366b324cce0ac4455ff6ef9b4ea076104232a98341977e7e7f2eb27a04d741f2a7519d577073103f44200c037ae8cd3659bb"}, @uac_iso={0x7, 0x25, 0x1, 0x3, 0x6, 0x9}]}}, {{0x9, 0x5, 0xf, 0x0, 0x200, 0x1, 0xd4, 0x7}}, {{0x9, 0x5, 0x4, 0x0, 0x20, 0x10, 0x1, 0x62, [@uac_iso={0x7, 0x25, 0x1, 0x81, 0xaf, 0x6}]}}, {{0x9, 0x5, 0xf, 0x0, 0x8, 0x0, 0x1, 0x7}}]}}]}}]}}, &(0x7f00000010c0)={0xa, &(0x7f0000000f40)={0xa, 0x6, 0x110, 0x51, 0x4, 0xfa, 0xff, 0x4}, 0x8, &(0x7f0000000f80)={0x5, 0xf, 0x8, 0x1, [@ptm_cap={0x3}]}, 0x4, [{0x4, &(0x7f0000000fc0)=@lang_id={0x4, 0x3, 0x44a}}, {0x4, &(0x7f0000001000)=@lang_id={0x4, 0x3, 0x418}}, {0x4, &(0x7f0000001040)=@lang_id={0x4, 0x3, 0x445}}, {0x4, &(0x7f0000001080)=@lang_id={0x4, 0x3, 0x403}}]}) ioctl$DMA_HEAP_IOCTL_ALLOC(r3, 0xc0184800, &(0x7f0000001140)={0x7, 0xffffffffffffffff, 0x2}) ioctl$USBDEVFS_CLAIMINTERFACE(r4, 0x8004550f, &(0x7f0000001180)=0x6) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f00000011c0)={0x7, 0x0}, 0x8) r7 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001200)=r6, 0x4) r8 = open(&(0x7f0000001240)='./file0\x00', 0x311202, 0x48) connect$pppl2tp(r5, &(0x7f0000001280)=@pppol2tpin6={0x18, 0x1, {0x0, r8, 0x4, 0x0, 0x4, 0x0, {0xa, 0x4e24, 0xffffff00, @empty, 0x5a02c481}}}, 0x32) pselect6(0x40, &(0x7f00000012c0)={0x8000000000000001, 0x2, 0x49, 0x6, 0x541b, 0x0, 0x9, 0x10000}, &(0x7f0000001300)={0x8000000000000000, 0x100, 0x2e9e, 0x9, 0x5, 0x4, 0xc00, 0x9}, &(0x7f0000001340)={0x3afe, 0x2, 0x5, 0x28, 0xfffffffffffffffd, 0x1, 0x3, 0x7fffffffffffffff}, &(0x7f0000001380)={0x0, 0x3938700}, &(0x7f0000001400)={&(0x7f00000013c0), 0x8}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r7, 0x400c6615, &(0x7f0000001440)={0x0, @adiantum, 0x0, @desc3}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001500)={r8, 0x58, &(0x7f0000001480)}, 0x10) syz_usb_connect$cdc_ecm(0x0, 0x86, &(0x7f0000001540)={{0x12, 0x1, 0x300, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x74, 0x1, 0x1, 0xa0, 0x20, 0xf, [{{0x9, 0x4, 0x0, 0xb, 0x2, 0x2, 0x6, 0x0, 0x7, {{0x8, 0x24, 0x6, 0x0, 0x0, "7d83a2"}, {0x5, 0x24, 0x0, 0xc00}, {0xd, 0x24, 0xf, 0x1, 0x101, 0x3, 0x1000, 0xd2}, [@obex={0x5, 0x24, 0x15, 0x7ff}, @mdlm={0x15, 0x24, 0x12, 0xfff}, @ncm={0x6}, @ncm={0x6, 0x24, 0x1a, 0x400, 0x1a}, @network_terminal={0x7, 0x24, 0xa, 0x18, 0xc0, 0x3, 0xd}]}, {[{{0x9, 0x5, 0x81, 0x3, 0x3ff, 0x3, 0x3, 0x12}}], {{0x9, 0x5, 0x82, 0x2, 0x8, 0x0, 0x7, 0x35}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x35, 0xfe, 0x5}}}}}]}}]}}, &(0x7f0000001a00)={0xa, &(0x7f0000001600)={0xa, 0x6, 0x300, 0x10, 0x5c, 0x2, 0x40, 0x4}, 0xe9, &(0x7f0000001640)={0x5, 0xf, 0xe9, 0x5, [@ss_container_id={0x14, 0x10, 0x4, 0x7, "0ededaffd6bb3bc2990f0ccababbc90b"}, @generic={0xbb, 0x10, 0xa, "d25a2adb94b099e37708525d0796310d72143a97425064f51ad0752e3d97bc11c98e7a96f5959e22c8d931d438472c9594d678375d5e6e08e82b408592e687fc445ef5f53f8f4ba99631b053025e707d4c73bf8592e3361d37efd1518ae7e14dbd95846aa8037a84f34f568a79e69d18c72f1d0e216401837857598f94477bf52782d5516851d495dd69d40a218b7ab2301bb766f3faef893ab796054cf772eab8dd84f09e6f94d7a17e261318c4760a22953e2bbe5981b2"}, @ext_cap={0x7, 0x10, 0x2, 0x1c, 0x8, 0x9, 0x9}, @wireless={0xb, 0x10, 0x1, 0x8, 0x10, 0x1, 0xd9, 0x1}, @ptm_cap={0x3}]}, 0x4, [{0xa8, &(0x7f0000001740)=@string={0xa8, 0x3, "e2e911c69f2c9432300f3d45e08b9e028d76761234876ff3cea8f92ef9343da395e6265fe4793afadda51a2f73ff72f871688f410df553ee136eb4c0369928734e7324260cd7a590455f5566a5d5bb7af1d3b67b9bcc7550740048fbe5f9e374777b451185ae31e74fd52c35b94985c8ae8d9f92db2a9d7f35eb4f07e3be3dae8115b34cef687aaa9f8b2662cb6ab67818315beceabd1799007865e89f06515fd4b53924d2f7"}}, {0xb3, &(0x7f0000001800)=@string={0xb3, 0x3, "c9be233204f7dd7558d7665e4121c8751ad4dcce98c3ee4bbf2cad34549f9a0e287212f7149883a2b5488c323018d87637bb8b3d0d78816b6dcba8e22dfb30176315957c133bbcd7cf2ef45c491d54d6b072647b446a54c7d89e853e7e36e304aaa09c000c7781bba0ffa318add3dbb3653b327423336ab7346b180666b85d398ad17274562efb14dbce3346a866836ef857dc7e8bd702d5fc4febcf52c5cfaa775a46a6f22d093c2f6c79d39ab25c7ce8"}}, {0x4, &(0x7f00000018c0)=@lang_id={0x4, 0x3, 0x41f}}, {0xd5, &(0x7f0000001900)=@string={0xd5, 0x3, "d2570a31566ef9337bb6c8e03b2c56245f24e6913eff47c31bbd442cc15bb45b71b87d18e59bb936750ce083bc341aa8ff3c861223a7295fabb7a87d05821c6e6b9c5fe9e33413c5d7f2b7ec565cc2c8bc1396ee748754a89cadfa57fa4b26bce8bb08668de204fadcb928f0cf378306c3e9e7160350f5e8487de9573792b2613d51a3532868d742a4007370f4a8833fe77af3a3021cf2196cb1ab51af70ac1b6f61e2cbe0d207a2a703c4d67997175cbbdc7ee51fea5cb8eb311ae618ad2a2d3e817ea1e990736b06e14397e6eee87439a81e"}}]}) syz_usb_connect$printer(0x6, 0x36, &(0x7f0000001a80)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xf, 0x10, 0xa, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x7, 0x1, 0x3, 0x1, "", {{{0x9, 0x5, 0x1, 0x2, 0x10, 0x3, 0x6, 0x5}}, [{{0x9, 0x5, 0x82, 0x2, 0x20, 0x40, 0x36, 0xee}}]}}}]}}]}}, &(0x7f0000001c00)={0xa, &(0x7f0000001ac0)={0xa, 0x6, 0x201, 0x4, 0xf7, 0x8, 0x20, 0x1}, 0x5, &(0x7f0000001b00)={0x5, 0xf, 0x5}, 0x2, [{0x7, &(0x7f0000001b40)=@string={0x7, 0x3, "f2d40b0f4a"}}, {0x54, &(0x7f0000001b80)=@string={0x54, 0x3, "6d74e037b22da64f1049e26e066d007ad8d641f4aa4c62b5b78bf22fb936165a3a9843eb130ceff3a1bc61264ef7114a27032815ceee3c38d7fc9fbda0a065954e840226cb6bfb56eba65732e270506ed3d0"}}]}) fallocate(r3, 0x6d, 0x2, 0x800) nanosleep(&(0x7f0000001c40)={0x0, 0x3938700}, &(0x7f0000001c80)) clock_getres(0x2, &(0x7f0000001cc0)) recvmmsg(r8, &(0x7f0000005300)=[{{0x0, 0x0, &(0x7f0000002e40)=[{&(0x7f0000001d00)=""/186, 0xba}, {&(0x7f0000001dc0)=""/80, 0x50}, {&(0x7f0000001e40)=""/4096, 0x1000}], 0x3, &(0x7f0000002e80)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000003e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000004080)=[{&(0x7f0000003f00)=""/110, 0x6e}, {&(0x7f0000003f80)=""/252, 0xfc}], 0x2, &(0x7f00000040c0)=""/73, 0x49}, 0x7}, {{&(0x7f0000004140)=@l2, 0x80, &(0x7f0000005240)=[{&(0x7f00000041c0)=""/4096, 0x1000}, {&(0x7f00000051c0)=""/115, 0x73}], 0x2, &(0x7f0000005280)=""/93, 0x5d}, 0x4}], 0x3, 0x2101, &(0x7f00000053c0)={0x77359400}) 699.60667ms ago: executing program 1 (id=4334): r0 = syz_usb_connect$hid(0x2, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x4b4, 0x7b1, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x2e0a04a5a13ae2e3, 0x3, [{{0x9, 0x4, 0x0, 0x8, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x4, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x3ff, 0x2}}}}}]}}]}}, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x2}, 0x50) landlock_create_ruleset(0x0, 0x0, 0x2) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7fffffff) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000b40)={0x24, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x22, 0x5, {[@local=@item_4={0x3, 0x2, 0x9, "ff039812"}]}}, 0x0}, 0x0) 233.163127ms ago: executing program 0 (id=4335): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e000000020013000200000000000000ff0800ed05000600200000000a0006000000000026b900000000000000001ffeff0001000003f1dc7f7c6e7c0200010000000000004000020000000005000500000000000a"], 0x80}}, 0x0) sendmsg$key(r0, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200130002eb0e000000fffffffd000105000600200000000a00000040010000000500e50000070000001f00001a000000030000a95a6e870200010000e9ff070040000200000000050005000000cc580a"], 0x80}}, 0x4000000) 83.204295ms ago: executing program 1 (id=4336): bpf$MAP_CREATE(0x0, 0x0, 0x50) prlimit64(0x0, 0xe, &(0x7f0000000200)={0x8, 0x8a}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x802, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x70f9a000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ppoll(&(0x7f00000000c0)=[{}, {}], 0x20000000000000dc, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r0 = syz_open_dev$MSR(0x0, 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x2, 0x0, 0x8) r1 = memfd_secret(0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f00000005c0)={'sit0\x00', &(0x7f0000000580)={@loopback, 0x0, 0x0, 0x30, 0x0, [{@empty}, {@empty}, {@initdev}]}}) ftruncate(r1, 0x51a9497) readahead(r1, 0x7, 0x4000) 82.265503ms ago: executing program 0 (id=4337): socket$inet(0x2, 0x1, 0x100) socket$packet(0x11, 0x3, 0x300) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb7"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000002c0)='contention_begin\x00', r0, 0x0, 0xd}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x4, 0x80}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000540)=0x4) r1 = syz_open_dev$vbi(&(0x7f0000000080), 0x1, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r1, 0xc0745645, &(0x7f0000000000)={0xbcad, [0x1, 0x8001, 0xb, 0xc000, 0x94c, 0x100, 0x2d8a, 0xfde8, 0x6, 0x8, 0x83, 0x400, 0x6, 0x4, 0x5, 0x16, 0x204, 0x2, 0x52, 0x0, 0x7fff, 0x4, 0x80, 0x9, 0x5, 0x5, 0xfff, 0xb12, 0x8, 0x8, 0x0, 0x1000, 0xe, 0xffff, 0x3, 0x10, 0x2, 0xb4e, 0x3, 0x4, 0x5, 0x1ff, 0x8000, 0x48, 0x8, 0x4, 0x9, 0x4], 0x7}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r2 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r2, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) clock_settime(0x0, &(0x7f0000000240)={0x77359400}) socket$inet6_mptcp(0xa, 0x1, 0x106) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000c40)='comm\x00') writev(r4, &(0x7f0000000040)=[{&(0x7f0000002240)="c3", 0x1}], 0x1) socket$nl_route(0x10, 0x3, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8b18, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x24, r5, 0x5, 0x2000000, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x1fffffffffe, 0xfffffffffffffffd, 0x0, 0x0, 0x1000001000, 0x9}, 0x0, &(0x7f00000002c0)={0x3fb, 0x8000, 0x400000000001, 0x9, 0x40000000000000, 0xf, 0x80000002, 0x2}, 0x0, 0x0) 0s ago: executing program 1 (id=4338): syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0xc, 0x8001, 0x0, 0x9, 0x4f, 0x8, 0xfa11, 0x1}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) kexec_load(0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000e1d000/0x3000)=nil, 0x3000, 0x0, 0x20010, r2, 0xa2286000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$qrtr(0x2a, 0x2, 0x0) syz_usb_connect(0x6, 0x1fc, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file2\x00', 0x207) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f00000000c0)={[{@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file2'}}], [], 0x2c}) socket$nl_route(0x10, 0x3, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x16, 0x3, &(0x7f000001b000)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x50) socket$nl_rdma(0x10, 0x3, 0x14) r4 = socket(0x10, 0x2, 0x0) write(r4, &(0x7f0000000140)="1c0000010000e4ff00bb9b00000082e04cbedcf609c8941e7aa9503da79910b2dded85f4abd368cd838788ff47332849de6d673f6d2d6d774a8c80d576d0398e9359861546f0eada37d8c8644d96873d20dc", 0x52) recvmmsg(r4, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) sendmsg$RDMA_NLDEV_CMD_STAT_SET(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4000085) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) kernel console output (not intermixed with test programs): ftover after parsing attributes in process `syz.4.3371'. [ 1217.060190][T18895] team0 (unregistering): Port device team_slave_0 removed [ 1217.097167][T18895] team0 (unregistering): Port device team_slave_1 removed [ 1217.115428][T18009] usb 2-1: new high-speed USB device number 123 using dummy_hcd [ 1217.286853][T18009] usb 2-1: Using ep0 maxpacket: 32 [ 1217.298259][T18009] usb 2-1: New USB device found, idVendor=0ccd, idProduct=0080, bcdDevice=67.fe [ 1217.361593][T18009] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1217.369632][T18009] usb 2-1: Product: syz [ 1217.373901][T18009] usb 2-1: Manufacturer: syz [ 1217.378540][T18009] usb 2-1: SerialNumber: syz [ 1217.387291][T18009] usb 2-1: config 0 descriptor?? [ 1217.396210][T18009] snd-usb-6fire 2-1:0.0: too many cards registered. [ 1217.618050][T18922] netlink: 24 bytes leftover after parsing attributes in process `syz.5.3379'. [ 1218.280934][ T5932] usb 3-1: USB disconnect, device number 125 [ 1218.752749][ T30] audit: type=1400 audit(1765917559.364:3172): avc: denied { read } for pid=18930 comm="syz.2.3382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1219.916008][ T5932] usb 3-1: new high-speed USB device number 126 using dummy_hcd [ 1219.991176][ T89] usb 6-1: new high-speed USB device number 26 using dummy_hcd [ 1220.039642][T18009] usb 2-1: USB disconnect, device number 123 [ 1220.041686][ T30] audit: type=1326 audit(1765917560.570:3173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18947 comm="syz.0.3386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f207538f749 code=0x7ffc0000 [ 1220.071951][T18948] FAULT_INJECTION: forcing a failure. [ 1220.071951][T18948] name failslab, interval 1, probability 0, space 0, times 0 [ 1220.096927][T18948] CPU: 1 UID: 0 PID: 18948 Comm: syz.0.3386 Tainted: G L syzkaller #0 PREEMPT(full) [ 1220.096948][T18948] Tainted: [L]=SOFTLOCKUP [ 1220.096952][T18948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1220.096959][T18948] Call Trace: [ 1220.096963][T18948] [ 1220.096968][T18948] dump_stack_lvl+0x16c/0x1f0 [ 1220.096986][T18948] should_fail_ex+0x512/0x640 [ 1220.097003][T18948] ? kmem_cache_alloc_noprof+0x62/0x770 [ 1220.097016][T18948] should_failslab+0xc2/0x120 [ 1220.097031][T18948] kmem_cache_alloc_noprof+0x83/0x770 [ 1220.097042][T18948] ? security_file_alloc+0x34/0x2b0 [ 1220.097060][T18948] ? security_file_alloc+0x34/0x2b0 [ 1220.097073][T18948] security_file_alloc+0x34/0x2b0 [ 1220.097088][T18948] init_file+0x93/0x4c0 [ 1220.097105][T18948] alloc_empty_file+0x73/0x1e0 [ 1220.097120][T18948] path_openat+0xde/0x3140 [ 1220.097135][T18948] ? do_syscall_64+0xcd/0xf80 [ 1220.097148][T18948] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1220.097164][T18948] ? __pfx_path_openat+0x10/0x10 [ 1220.097181][T18948] ? __lock_acquire+0x436/0x2890 [ 1220.097196][T18948] do_filp_open+0x20b/0x470 [ 1220.097211][T18948] ? __pfx_do_filp_open+0x10/0x10 [ 1220.097237][T18948] ? _raw_spin_unlock+0x28/0x50 [ 1220.097248][T18948] ? alloc_fd+0x471/0x7d0 [ 1220.097267][T18948] do_sys_openat2+0x121/0x290 [ 1220.097278][T18948] ? __pfx_do_sys_openat2+0x10/0x10 [ 1220.097288][T18948] ? __pfx___seccomp_filter+0x10/0x10 [ 1220.097308][T18948] __x64_sys_creat+0xcc/0x120 [ 1220.097319][T18948] ? __pfx___x64_sys_creat+0x10/0x10 [ 1220.097330][T18948] ? __secure_computing+0x28e/0x3b0 [ 1220.097347][T18948] ? syscall_trace_enter+0x89/0x220 [ 1220.097364][T18948] do_syscall_64+0xcd/0xf80 [ 1220.097378][T18948] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1220.097394][T18948] RIP: 0033:0x7f207538f749 [ 1220.097404][T18948] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1220.097415][T18948] RSP: 002b:00007f20761ba038 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1220.097426][T18948] RAX: ffffffffffffffda RBX: 00007f20755e5fa0 RCX: 00007f207538f749 [ 1220.097433][T18948] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 00002000000001c0 [ 1220.097440][T18948] RBP: 00007f20761ba090 R08: 0000000000000000 R09: 0000000000000000 [ 1220.097447][T18948] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1220.097453][T18948] R13: 00007f20755e6038 R14: 00007f20755e5fa0 R15: 00007fffcd175898 [ 1220.097468][T18948] [ 1220.119132][ T30] audit: type=1326 audit(1765917560.608:3174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18947 comm="syz.0.3386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f207538df90 code=0x7ffc0000 [ 1220.146405][ T5932] usb 3-1: Using ep0 maxpacket: 16 [ 1220.181507][ T30] audit: type=1326 audit(1765917560.608:3175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18947 comm="syz.0.3386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f207538e1ff code=0x7ffc0000 [ 1220.195042][ T5932] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1220.207494][ T30] audit: type=1326 audit(1765917560.608:3176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18947 comm="syz.0.3386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=85 compat=0 ip=0x7f207538f749 code=0x7ffc0000 [ 1220.207541][ T30] audit: type=1326 audit(1765917560.626:3177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18947 comm="syz.0.3386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f207538e15c code=0x7ffc0000 [ 1220.207590][ T30] audit: type=1326 audit(1765917560.701:3178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18947 comm="syz.0.3386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f207538e1ff code=0x7ffc0000 [ 1220.207630][ T30] audit: type=1326 audit(1765917560.701:3179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18947 comm="syz.0.3386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f207538e3aa code=0x7ffc0000 [ 1220.207668][ T30] audit: type=1326 audit(1765917560.701:3180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18947 comm="syz.0.3386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f207538f749 code=0x7ffc0000 [ 1220.207707][ T30] audit: type=1326 audit(1765917560.701:3181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18947 comm="syz.0.3386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f207538f749 code=0x7ffc0000 [ 1220.558037][ T89] usb 6-1: Using ep0 maxpacket: 16 [ 1220.564410][ T5932] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1220.574298][ T5932] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 3 [ 1220.587245][ T5932] usb 3-1: New USB device found, idVendor=0955, idProduct=7214, bcdDevice=ed.00 [ 1220.596347][ T5932] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1220.607096][ T5932] usb 3-1: config 0 descriptor?? [ 1220.638558][ T89] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1220.659868][ T89] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1220.697617][ T5830] Bluetooth: hci4: command 0x0406 tx timeout [ 1220.713955][ T89] usb 6-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 3 [ 1220.750211][ T89] usb 6-1: New USB device found, idVendor=0955, idProduct=7214, bcdDevice=ed.00 [ 1220.759271][ T89] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1220.775679][ T89] usb 6-1: config 0 descriptor?? [ 1221.338060][T18962] netlink: 24 bytes leftover after parsing attributes in process `syz.0.3390'. [ 1221.928067][ T5932] shield 0003:0955:7214.00BB: unknown main item tag 0x0 [ 1221.946992][ T5932] shield 0003:0955:7214.00BB: unknown main item tag 0x0 [ 1221.953984][ T5932] shield 0003:0955:7214.00BB: unknown main item tag 0x0 [ 1221.961180][ T5932] shield 0003:0955:7214.00BB: unknown main item tag 0x0 [ 1221.968330][ T5932] shield 0003:0955:7214.00BB: unknown main item tag 0x0 [ 1222.011372][ T5932] input: HID 0955:7214 Haptics as /devices/virtual/input/input192 [ 1222.027083][T18968] block nbd1: Cannot use ioctl interface on a netlink controlled device. [ 1222.162112][T18968] block nbd1: Cannot use ioctl interface on a netlink controlled device. [ 1222.343131][ T89] usbhid 6-1:0.0: can't add hid device: -71 [ 1222.354266][ T89] usbhid 6-1:0.0: probe with driver usbhid failed with error -71 [ 1222.375785][ T5932] shield 0003:0955:7214.00BB: Registered Thunderstrike controller [ 1222.389475][ T5932] shield 0003:0955:7214.00BB: : USB HID v0.00 Device [HID 0955:7214] on usb-dummy_hcd.2-1/input0 [ 1222.405400][T18968] block nbd1: shutting down sockets [ 1222.406135][ T89] usb 6-1: USB disconnect, device number 26 [ 1223.553381][T17067] shield 0003:0955:7214.00BB: Failed to output Thunderstrike HOSTCMD request HID report due to -EPROTO [ 1223.568442][ T89] usb 3-1: USB disconnect, device number 126 [ 1223.591445][T17067] shield 0003:0955:7214.00BB: Failed to output Thunderstrike HOSTCMD request HID report due to -ENODEV [ 1223.616217][T17067] shield 0003:0955:7214.00BB: Failed to output Thunderstrike HOSTCMD request HID report due to -ENODEV [ 1223.634134][T17067] shield 0003:0955:7214.00BB: Failed to output Thunderstrike HOSTCMD request HID report due to -ENODEV [ 1224.733777][T18987] netlink: 'syz.4.3398': attribute type 1 has an invalid length. [ 1224.766448][T18987] bond1: entered promiscuous mode [ 1224.772365][T18987] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1224.784813][T18987] netlink: 28 bytes leftover after parsing attributes in process `syz.4.3398'. [ 1224.814875][T18987] bond1: entered allmulticast mode [ 1224.833443][T18987] bond1: (slave bridge1): making interface the new active one [ 1224.841059][T18987] bridge1: entered promiscuous mode [ 1224.846689][T18987] bridge1: entered allmulticast mode [ 1224.852599][ T30] audit: type=1400 audit(1765917565.061:3182): avc: denied { read } for pid=18989 comm="syz.5.3399" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1224.852971][T18987] bond1: (slave bridge1): Enslaving as an active interface with an up link [ 1225.525426][T19001] netlink: 24 bytes leftover after parsing attributes in process `syz.4.3401'. [ 1226.566466][ T30] audit: type=1400 audit(1765917566.670:3183): avc: denied { map } for pid=19008 comm="syz.0.3391" path="/dev/pts/0" dev="devpts" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_devpts_t tclass=chr_file permissive=1 [ 1226.629491][ T30] audit: type=1400 audit(1765917566.689:3184): avc: denied { execute } for pid=19008 comm="syz.0.3391" path="/dev/pts/0" dev="devpts" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_devpts_t tclass=chr_file permissive=1 [ 1228.020045][T19029] netlink: 16 bytes leftover after parsing attributes in process `syz.2.3410'. [ 1228.560675][T19036] FAULT_INJECTION: forcing a failure. [ 1228.560675][T19036] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1228.640665][T19036] CPU: 1 UID: 0 PID: 19036 Comm: syz.1.3412 Tainted: G L syzkaller #0 PREEMPT(full) [ 1228.640698][T19036] Tainted: [L]=SOFTLOCKUP [ 1228.640704][T19036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1228.640715][T19036] Call Trace: [ 1228.640722][T19036] [ 1228.640730][T19036] dump_stack_lvl+0x16c/0x1f0 [ 1228.640758][T19036] should_fail_ex+0x512/0x640 [ 1228.640792][T19036] _copy_from_user+0x2e/0xd0 [ 1228.640819][T19036] restore_sigcontext+0xcb/0x6a0 [ 1228.640844][T19036] ? __pfx_restore_sigcontext+0x10/0x10 [ 1228.640885][T19036] ? __pfx_restore_altstack+0x10/0x10 [ 1228.640907][T19036] ? _raw_spin_unlock_irq+0x23/0x50 [ 1228.640927][T19036] ? lockdep_hardirqs_on+0x7c/0x110 [ 1228.640954][T19036] __do_sys_rt_sigreturn+0x229/0x2c0 [ 1228.640979][T19036] ? __pfx___do_sys_rt_sigreturn+0x10/0x10 [ 1228.641012][T19036] do_syscall_64+0xcd/0xf80 [ 1228.641037][T19036] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1228.641056][T19036] RIP: 0033:0x7fcb3d32b829 [ 1228.641072][T19036] Code: 64 c7 00 16 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 90 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 c7 c0 0f 00 00 00 0f 05 <0f> 1f 80 00 00 00 00 48 81 ec 48 01 00 00 49 89 d0 64 48 8b 04 25 [ 1228.641090][T19036] RSP: 002b:00007fcb3e207340 EFLAGS: 00000206 ORIG_RAX: 000000000000000f [ 1228.641108][T19036] RAX: ffffffffffffffda RBX: 00007fcb3d5e5fa0 RCX: 00007fcb3d32b829 [ 1228.641121][T19036] RDX: 00007fcb3e207340 RSI: 00007fcb3e207470 RDI: 0000000000000021 [ 1228.641134][T19036] RBP: 00007fcb3e208090 R08: 0000000000000000 R09: 0000000000000000 [ 1228.641145][T19036] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1228.641156][T19036] R13: 00007fcb3d5e6038 R14: 00007fcb3d5e5fa0 R15: 00007fffc298dc38 [ 1228.641184][T19036] [ 1229.271881][T19031] netlink: 24 bytes leftover after parsing attributes in process `syz.5.3411'. [ 1229.386654][T18009] usb 3-1: new high-speed USB device number 127 using dummy_hcd [ 1229.465486][T19031] netlink: 28 bytes leftover after parsing attributes in process `syz.5.3411'. [ 1229.539678][T18009] usb 3-1: device descriptor read/64, error -71 [ 1230.200088][T19052] netlink: 24 bytes leftover after parsing attributes in process `syz.5.3416'. [ 1230.491538][T18009] usb 3-1: new high-speed USB device number 2 using dummy_hcd [ 1230.659446][T18009] usb 3-1: device descriptor read/64, error -71 [ 1230.688808][T19049] netlink: 'syz.0.3415': attribute type 12 has an invalid length. [ 1230.696705][T19049] netlink: 'syz.0.3415': attribute type 29 has an invalid length. [ 1230.704578][T19049] netlink: 148 bytes leftover after parsing attributes in process `syz.0.3415'. [ 1230.800177][T18009] usb usb3-port1: attempt power cycle [ 1231.182534][T18009] usb 3-1: new high-speed USB device number 3 using dummy_hcd [ 1231.236664][T19058] netlink: 16 bytes leftover after parsing attributes in process `syz.0.3418'. [ 1231.247314][T18009] usb 3-1: device descriptor read/8, error -71 [ 1231.524498][T18009] usb 3-1: new high-speed USB device number 4 using dummy_hcd [ 1231.749856][T18009] usb 3-1: device descriptor read/8, error -71 [ 1232.487681][T18009] usb usb3-port1: unable to enumerate USB device [ 1232.606585][T19078] lo speed is unknown, defaulting to 1000 [ 1232.768795][ T55] usb 2-1: new high-speed USB device number 124 using dummy_hcd [ 1232.956897][ T55] usb 2-1: Using ep0 maxpacket: 16 [ 1232.963767][ T55] usb 2-1: config 0 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 3 [ 1232.977550][ T55] usb 2-1: New USB device found, idVendor=0955, idProduct=7214, bcdDevice=ed.00 [ 1232.986753][ T55] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1232.997826][ T55] usb 2-1: config 0 descriptor?? [ 1233.005912][ T55] usbhid 2-1:0.0: couldn't find an input interrupt endpoint [ 1233.075654][T19088] bridge0: port 2(bridge_slave_1) entered disabled state [ 1233.082926][T19088] bridge0: port 1(bridge_slave_0) entered disabled state [ 1233.631346][T19093] netlink: 24 bytes leftover after parsing attributes in process `syz.0.3427'. [ 1234.351606][T19098] FAULT_INJECTION: forcing a failure. [ 1234.351606][T19098] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1234.372063][T19100] netlink: 16 bytes leftover after parsing attributes in process `syz.4.3431'. [ 1234.588402][T19098] CPU: 1 UID: 0 PID: 19098 Comm: syz.2.3430 Tainted: G L syzkaller #0 PREEMPT(full) [ 1234.588436][T19098] Tainted: [L]=SOFTLOCKUP [ 1234.588443][T19098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1234.588454][T19098] Call Trace: [ 1234.588460][T19098] [ 1234.588469][T19098] dump_stack_lvl+0x16c/0x1f0 [ 1234.588496][T19098] should_fail_ex+0x512/0x640 [ 1234.588526][T19098] _copy_from_user+0x2e/0xd0 [ 1234.588552][T19098] kstrtouint_from_user+0xd6/0x1d0 [ 1234.588572][T19098] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 1234.588590][T19098] ? __lock_acquire+0x436/0x2890 [ 1234.588617][T19098] ? lock_acquire+0x179/0x330 [ 1234.588644][T19098] proc_fail_nth_write+0x83/0x220 [ 1234.588665][T19098] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1234.588692][T19098] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1234.588709][T19098] vfs_write+0x2a0/0x11d0 [ 1234.588733][T19098] ? __pfx___mutex_lock+0x10/0x10 [ 1234.588759][T19098] ? __pfx_vfs_write+0x10/0x10 [ 1234.588788][T19098] ? __fget_files+0x20e/0x3c0 [ 1234.588822][T19098] ksys_write+0x12a/0x250 [ 1234.588844][T19098] ? __pfx_ksys_write+0x10/0x10 [ 1234.588874][T19098] do_syscall_64+0xcd/0xf80 [ 1234.588900][T19098] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1234.588919][T19098] RIP: 0033:0x7f5b4e58e1ff [ 1234.588935][T19098] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 1234.588953][T19098] RSP: 002b:00007f5b4f374030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1234.588972][T19098] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5b4e58e1ff [ 1234.588985][T19098] RDX: 0000000000000001 RSI: 00007f5b4f3740a0 RDI: 0000000000000004 [ 1234.588997][T19098] RBP: 00007f5b4f374090 R08: 0000000000000000 R09: 0000000000000000 [ 1234.589008][T19098] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1234.589025][T19098] R13: 00007f5b4e7e6038 R14: 00007f5b4e7e5fa0 R15: 00007ffe027e6778 [ 1234.589055][T19098] [ 1236.138616][ T5932] usb 2-1: USB disconnect, device number 124 [ 1236.520320][ T30] audit: type=1400 audit(1765917575.997:3185): avc: denied { ioctl } for pid=19113 comm="syz.0.3428" path="socket:[63249]" dev="sockfs" ino=63249 ioctlcmd=0x89e8 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 1236.687564][ T5932] usb 2-1: new high-speed USB device number 125 using dummy_hcd [ 1236.873791][ T5932] usb 2-1: config 0 interface 0 altsetting 0 bulk endpoint 0x6 has invalid maxpacket 1023 [ 1236.918125][ T5932] usb 2-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xBA, changing to 0x8A [ 1236.940364][ T30] audit: type=1800 audit(1765917576.381:3186): pid=19130 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed comm="syz.0.3436" name=6E73BF12E10BC845E0807291376B6A9C4CCE5A99F85125232DD3D213E8DCE1FDDEEFF2A7D2AB97C26527FC108503 dev="overlay" ino=63725 res=0 errno=0 [ 1236.984764][ T5932] usb 2-1: config 0 interface 0 altsetting 0 bulk endpoint 0x8A has invalid maxpacket 72 [ 1237.024878][ T5932] usb 2-1: New USB device found, idVendor=2294, idProduct=425b, bcdDevice=a2.10 [ 1237.057222][ T5932] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1237.088703][ T5932] usb 2-1: Product: syz [ 1237.096617][ T5830] Bluetooth: hci0: command 0x0406 tx timeout [ 1237.102739][ T5932] usb 2-1: Manufacturer: syz [ 1237.136599][ T5932] usb 2-1: SerialNumber: syz [ 1237.192389][ T5932] usb 2-1: config 0 descriptor?? [ 1237.307464][T19120] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 1237.344045][T19120] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 1237.383604][T19132] syz.0.3437 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 1237.470851][ T5932] usb 2-1: ucan: probing device on interface #0 [ 1237.512118][T19133] comedi comedi3: 8255: I/O port conflict (0x1,4) [ 1237.679236][ T5932] usb 2-1: ucan: could not read protocol version, ret=-71 [ 1237.715522][ T5932] usb 2-1: ucan: probe failed; try to update the device firmware [ 1237.758486][ T5932] usb 2-1: USB disconnect, device number 125 [ 1238.224470][T19137] netlink: 24 bytes leftover after parsing attributes in process `syz.4.3438'. [ 1239.161928][ T30] audit: type=1400 audit(1765917578.467:3187): avc: denied { map } for pid=19139 comm="syz.1.3441" path="/dev/net/tun" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 1239.190166][T19140] bridge0: port 2(bridge_slave_1) entered disabled state [ 1239.197497][T19140] bridge0: port 1(bridge_slave_0) entered disabled state [ 1239.279836][ T30] audit: type=1400 audit(1765917578.467:3188): avc: denied { execute } for pid=19139 comm="syz.1.3441" path="/dev/net/tun" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 1239.485852][ T30] audit: type=1400 audit(1765917578.766:3189): avc: denied { execute } for pid=19141 comm="syz.0.3440" dev="hugetlbfs" ino=63270 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 1239.585112][ T30] audit: type=1400 audit(1765917578.766:3190): avc: denied { execute_no_trans } for pid=19141 comm="syz.0.3440" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="hugetlbfs" ino=63270 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 1240.458777][T19165] netlink: 44 bytes leftover after parsing attributes in process `syz.0.3447'. [ 1241.418123][T19174] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1243.218853][T18966] usb 3-1: new high-speed USB device number 5 using dummy_hcd [ 1243.400281][T18966] usb 3-1: Using ep0 maxpacket: 16 [ 1243.961711][T18966] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1244.133808][T19200] netlink: 'syz.0.3457': attribute type 1 has an invalid length. [ 1244.897726][T18966] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1244.918283][T18966] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 3 [ 1244.961928][T18966] usb 3-1: New USB device found, idVendor=0955, idProduct=7214, bcdDevice=ed.00 [ 1244.994383][T18966] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1245.027305][T18966] usb 3-1: config 0 descriptor?? [ 1245.044215][T18966] usb 3-1: can't set config #0, error -71 [ 1245.067959][T18966] usb 3-1: USB disconnect, device number 5 [ 1245.212054][T19209] comedi comedi0: Minor 3 could not be opened [ 1245.623701][T18966] usb 3-1: new low-speed USB device number 6 using dummy_hcd [ 1246.789602][T18966] usb 3-1: config 0 has an invalid interface number: 55 but max is 0 [ 1247.228354][T18966] usb 3-1: config 0 has no interface number 0 [ 1247.234572][T18966] usb 3-1: config 0 interface 55 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 1247.254334][T18966] usb 3-1: config 0 interface 55 altsetting 0 endpoint 0xE has invalid maxpacket 32, setting to 8 [ 1247.266701][T18966] usb 3-1: config 0 interface 55 altsetting 0 has an endpoint descriptor with address 0xAB, changing to 0x8B [ 1247.348403][T18966] usb 3-1: config 0 interface 55 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 10 [ 1247.361324][T18966] usb 3-1: config 0 interface 55 altsetting 0 endpoint 0x8B has invalid maxpacket 120, setting to 8 [ 1247.377347][T18966] usb 3-1: config 0 interface 55 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 2 [ 1247.398985][T18966] usb 3-1: New USB device found, idVendor=0f11, idProduct=1080, bcdDevice=fc.6a [ 1247.491855][T19232] block nbd0: Cannot use ioctl interface on a netlink controlled device. [ 1247.502258][T18966] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1247.548453][T19232] block nbd0: Cannot use ioctl interface on a netlink controlled device. [ 1247.712266][T18966] usb 3-1: config 0 descriptor?? [ 1247.759792][T19210] raw-gadget.0 gadget.2: fail, usb_ep_enable returned -22 [ 1247.911196][T19210] raw-gadget.0 gadget.2: fail, usb_ep_enable returned -22 [ 1248.037845][T19243] vimc link validate: Scaler:src:640x480 (0x33424752, 8, 0, 0, 0) RGB/YUV Capture:snk:640x480 (0x33424752, 8, 0, 0, 0) [ 1248.413590][T11741] usb 5-1: new high-speed USB device number 107 using dummy_hcd [ 1248.573838][T11741] usb 5-1: Using ep0 maxpacket: 8 [ 1248.590907][T11741] usb 5-1: unable to get BOS descriptor or descriptor too short [ 1248.675874][T18966] usb 3-1: can't set config #0, error -71 [ 1248.741961][T11741] usb 5-1: config 4 has an invalid interface number: 147 but max is 0 [ 1248.788439][T11741] usb 5-1: config 4 has an invalid descriptor of length 0, skipping remainder of the config [ 1248.827556][T18966] usb 3-1: USB disconnect, device number 6 [ 1248.850803][T11741] usb 5-1: config 4 has no interface number 0 [ 1249.091336][T11741] usb 5-1: New USB device found, idVendor=04f2, idProduct=b746, bcdDevice=8e.6e [ 1249.100565][T11741] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1249.129686][T11741] usb 5-1: Product: syz [ 1249.140590][T11741] usb 5-1: Manufacturer: syz [ 1249.151649][T11741] usb 5-1: SerialNumber: syz [ 1250.455028][T19258] comedi comedi0: pcl812: I/O port conflict (0x3,16) [ 1250.800518][T19056] IPVS: starting estimator thread 0... [ 1250.824388][T19260] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3474'. [ 1250.904136][T19266] IPVS: using max 69 ests per chain, 165600 per kthread [ 1251.053744][T11741] uvcvideo 5-1:4.147: probe with driver uvcvideo failed with error -22 [ 1251.086339][T11741] usb 5-1: USB disconnect, device number 107 [ 1251.263694][T19275] FAULT_INJECTION: forcing a failure. [ 1251.263694][T19275] name failslab, interval 1, probability 0, space 0, times 0 [ 1251.442527][T19275] CPU: 0 UID: 0 PID: 19275 Comm: syz.1.3479 Tainted: G L syzkaller #0 PREEMPT(full) [ 1251.442550][T19275] Tainted: [L]=SOFTLOCKUP [ 1251.442554][T19275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1251.442561][T19275] Call Trace: [ 1251.442565][T19275] [ 1251.442570][T19275] dump_stack_lvl+0x16c/0x1f0 [ 1251.442589][T19275] should_fail_ex+0x512/0x640 [ 1251.442605][T19275] ? __kmalloc_cache_noprof+0x5f/0x800 [ 1251.442624][T19275] should_failslab+0xc2/0x120 [ 1251.442639][T19275] __kmalloc_cache_noprof+0x80/0x800 [ 1251.442656][T19275] ? selinux_sb_eat_lsm_opts+0x3c1/0x6f0 [ 1251.442670][T19275] ? selinux_add_opt+0x30f/0x3e0 [ 1251.442684][T19275] ? selinux_add_opt+0x30f/0x3e0 [ 1251.442696][T19275] selinux_add_opt+0x30f/0x3e0 [ 1251.442710][T19275] selinux_sb_eat_lsm_opts+0x3e3/0x6f0 [ 1251.442726][T19275] ? __pfx_ovl_next_opt+0x10/0x10 [ 1251.442738][T19275] security_sb_eat_lsm_opts+0x1e3/0x210 [ 1251.442752][T19275] vfs_parse_monolithic_sep+0x96/0x210 [ 1251.442764][T19275] ? ovl_init_fs_context+0x338/0x5f0 [ 1251.442776][T19275] ? __pfx_vfs_parse_monolithic_sep+0x10/0x10 [ 1251.442788][T19275] ? alloc_fs_context+0x677/0xf50 [ 1251.442801][T19275] path_mount+0x76e/0x23a0 [ 1251.442812][T19275] ? rcu_is_watching+0x12/0xc0 [ 1251.442825][T19275] ? __pfx_path_mount+0x10/0x10 [ 1251.442835][T19275] ? kmem_cache_free+0x2d8/0x770 [ 1251.442846][T19275] ? putname+0xf5/0x1a0 [ 1251.442870][T19275] ? putname+0xf5/0x1a0 [ 1251.442884][T19275] ? putname+0xf5/0x1a0 [ 1251.442900][T19275] ? __x64_sys_mount+0x293/0x310 [ 1251.442910][T19275] __x64_sys_mount+0x293/0x310 [ 1251.442920][T19275] ? __pfx___x64_sys_mount+0x10/0x10 [ 1251.442935][T19275] do_syscall_64+0xcd/0xf80 [ 1251.442949][T19275] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1251.442961][T19275] RIP: 0033:0x7fcb3d38f749 [ 1251.442971][T19275] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1251.442982][T19275] RSP: 002b:00007fcb3e208038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1251.442993][T19275] RAX: ffffffffffffffda RBX: 00007fcb3d5e5fa0 RCX: 00007fcb3d38f749 [ 1251.443001][T19275] RDX: 0000200000000080 RSI: 00002000000000c0 RDI: 0000000000000000 [ 1251.443007][T19275] RBP: 00007fcb3e208090 R08: 0000200000000480 R09: 0000000000000000 [ 1251.443014][T19275] R10: 0000000000000014 R11: 0000000000000246 R12: 0000000000000002 [ 1251.443021][T19275] R13: 00007fcb3d5e6038 R14: 00007fcb3d5e5fa0 R15: 00007fffc298dc38 [ 1251.443036][T19275] [ 1252.232289][T19278] fuse: Unknown parameter '' [ 1252.993450][T19286] 9pnet_virtio: no channels available for device syz [ 1253.002116][T19286] overlayfs: missing 'lowerdir' [ 1253.013482][T19286] overlayfs: "xino" feature enabled using 3 upper inode bits. [ 1253.040075][T19286] overlayfs: failed lookup in lower (/, name='tracing', err=-66): unsupported object type [ 1253.050898][T19286] overlayfs: failed to look up (tracing) for ino (-66) [ 1253.076223][ T30] audit: type=1400 audit(1765917591.414:3191): avc: denied { mount } for pid=19284 comm="syz.4.3483" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 1253.293058][T19294] netlink: 'syz.5.3486': attribute type 1 has an invalid length. [ 1253.376550][T19294] bond1: entered promiscuous mode [ 1253.387597][T19294] bond1: entered allmulticast mode [ 1253.410931][T19294] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1253.448162][ T5932] usb 3-1: new high-speed USB device number 7 using dummy_hcd [ 1253.464743][T19298] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3486'. [ 1253.548304][T19297] erspan1: entered allmulticast mode [ 1253.567243][T19297] bond1: (slave erspan1): making interface the new active one [ 1253.589122][T19297] erspan1: entered promiscuous mode [ 1253.598713][T19297] bond1: (slave erspan1): Enslaving as an active interface with an up link [ 1253.619342][ T5932] usb 3-1: Using ep0 maxpacket: 32 [ 1253.634993][ T5932] usb 3-1: config 0 interface 0 has no altsetting 0 [ 1253.647074][ T5932] usb 3-1: New USB device found, idVendor=2040, idProduct=c603, bcdDevice= 1.8e [ 1253.747243][ T5932] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1253.785015][ T30] audit: type=1400 audit(1765917592.144:3192): avc: denied { unmount } for pid=18067 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 1253.807362][ T5932] usb 3-1: config 0 descriptor?? [ 1253.822463][ T55] usb 6-1: new low-speed USB device number 27 using dummy_hcd [ 1253.838387][ T5932] usb 3-1: dvb_usb_v2: found a 'Hauppauge 126xxx ATSC+' in warm state [ 1253.866573][ T5932] usb 3-1: dvb_usb_v2: will pass the complete MPEG2 transport stream to the software demuxer [ 1253.889658][ T5932] dvbdev: DVB: registering new adapter (Hauppauge 126xxx ATSC+) [ 1253.913347][ T5932] usb 3-1: media controller created [ 1253.949668][ T5932] dvbdev: dvb_create_media_entity: media entity 'dvb-demux' registered. [ 1254.015816][ T55] usb 6-1: config index 0 descriptor too short (expected 1307, got 27) [ 1254.024141][ T55] usb 6-1: config 0 has an invalid interface number: 0 but max is -1 [ 1254.035585][ T55] usb 6-1: config 0 has 1 interface, different from the descriptor's value: 0 [ 1254.045617][ T55] usb 6-1: too many endpoints for config 0 interface 0 altsetting 0: 246, using maximum allowed: 30 [ 1254.070086][ T55] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x84 is Bulk; changing to Interrupt [ 1254.103379][ T55] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x84 has invalid wMaxPacketSize 0 [ 1254.176188][ T55] usb 6-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 246 [ 1254.338563][ T55] usb 6-1: language id specifier not provided by device, defaulting to English [ 1254.495154][T19304] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1254.512584][ T55] usb 6-1: New USB device found, idVendor=0460, idProduct=0008, bcdDevice=e2.de [ 1254.514055][T19304] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1254.530629][ T55] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1254.551947][ T55] usb 6-1: Manufacturer:  [ 1254.596466][ T55] usb 6-1: config 0 descriptor?? [ 1254.631689][ T55] hub 6-1:0.0: bad descriptor, ignoring hub [ 1254.646298][ T55] hub 6-1:0.0: probe with driver hub failed with error -5 [ 1254.719982][ T55] input:  as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/input/input193 [ 1254.986339][T19298] bond1 (unregistering): (slave erspan1): Releasing active interface [ 1254.997906][T19298] erspan1: left promiscuous mode [ 1255.010929][T19298] bond1 (unregistering): Released all slaves [ 1255.081171][ T55] usb 6-1: USB disconnect, device number 27 [ 1255.090271][ T5932] set interface failed [ 1255.090745][ T5932] usb 3-1: dvb_usb_v2: usb_bulk_msg() failed=-22 [ 1255.126592][ T5932] error writing reg: 0xff, val: 0x00 [ 1255.181805][ T5932] dvb_usb_mxl111sf 3-1:0.0: probe with driver dvb_usb_mxl111sf failed with error -22 [ 1255.208686][T19318] netlink: 12 bytes leftover after parsing attributes in process `syz.1.3492'. [ 1255.222290][ T5932] usb 3-1: USB disconnect, device number 7 [ 1255.516844][T19330] netlink: 16 bytes leftover after parsing attributes in process `syz.0.3496'. [ 1255.716337][ T849] usb 5-1: new high-speed USB device number 108 using dummy_hcd [ 1256.206043][ T849] usb 5-1: Using ep0 maxpacket: 16 [ 1256.215554][ T849] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1256.225882][ T849] usb 5-1: config 0 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 3 [ 1256.242512][ T849] usb 5-1: New USB device found, idVendor=0955, idProduct=7214, bcdDevice=ed.00 [ 1256.251915][ T849] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1256.262626][ T849] usb 5-1: config 0 descriptor?? [ 1256.280078][ T849] usbhid 5-1:0.0: couldn't find an input interrupt endpoint [ 1256.295704][ T30] audit: type=1400 audit(1765917594.492:3193): avc: denied { append } for pid=19345 comm="syz.1.3500" name="card1" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1256.329100][T19348] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1256.408215][T19356] ubi: mtd0 is already attached to ubi31 [ 1256.451660][T19350] f2fs: Unknown parameter 'discardi_ctrl' [ 1256.459385][T19350] netlink: 16 bytes leftover after parsing attributes in process `syz.2.3504'. [ 1256.514031][T19355] SELinux: failed to load policy [ 1256.730263][T19361] netlink: 16 bytes leftover after parsing attributes in process `syz.0.3507'. [ 1257.720668][T19365] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1539 sclass=netlink_xfrm_socket pid=19365 comm=syz.5.3508 [ 1259.391371][T11741] usb 1-1: new high-speed USB device number 103 using dummy_hcd [ 1259.562493][ T89] usb 6-1: new high-speed USB device number 28 using dummy_hcd [ 1259.562519][T11741] usb 1-1: Using ep0 maxpacket: 16 [ 1259.578383][T11741] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1259.590094][T11741] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1259.618667][T11741] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 3 [ 1259.647923][T11741] usb 1-1: New USB device found, idVendor=0955, idProduct=7214, bcdDevice=ed.00 [ 1259.662119][T11741] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1259.681404][T11741] usb 1-1: config 0 descriptor?? [ 1259.744288][ T89] usb 6-1: Using ep0 maxpacket: 16 [ 1259.752891][ T89] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1259.788172][ T89] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1259.810530][ T89] usb 6-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 3 [ 1259.866199][ T89] usb 6-1: New USB device found, idVendor=0955, idProduct=7214, bcdDevice=ed.00 [ 1259.884532][ T89] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1259.908460][ T89] usb 6-1: config 0 descriptor?? [ 1260.134564][T11741] shield 0003:0955:7214.00BC: unknown main item tag 0x0 [ 1260.182623][T11741] shield 0003:0955:7214.00BC: unknown main item tag 0x0 [ 1260.222294][T11741] shield 0003:0955:7214.00BC: unknown main item tag 0x0 [ 1260.246508][T11741] shield 0003:0955:7214.00BC: unknown main item tag 0x0 [ 1260.287261][T11741] shield 0003:0955:7214.00BC: unknown main item tag 0x0 [ 1260.323458][ T30] audit: type=1400 audit(1765917598.262:3194): avc: denied { map } for pid=19397 comm="syz.1.3517" path="/dev/dri/card0" dev="devtmpfs" ino=627 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1260.323975][T11741] input: HID 0955:7214 Haptics as /devices/virtual/input/input194 [ 1261.145010][ T55] usb 5-1: USB disconnect, device number 108 [ 1261.156268][ T89] usbhid 6-1:0.0: can't add hid device: -71 [ 1261.162268][ T89] usbhid 6-1:0.0: probe with driver usbhid failed with error -71 [ 1261.191192][ T89] usb 6-1: USB disconnect, device number 28 [ 1261.204786][T11741] shield 0003:0955:7214.00BC: Registered Thunderstrike controller [ 1261.223823][T11741] shield 0003:0955:7214.00BC: : USB HID v0.00 Device [HID 0955:7214] on usb-dummy_hcd.0-1/input0 [ 1261.353562][ T5964] shield 0003:0955:7214.00BC: Failed to output Thunderstrike HOSTCMD request HID report due to -EPROTO [ 1261.367721][T11741] usb 1-1: USB disconnect, device number 103 [ 1261.379664][ T5964] shield 0003:0955:7214.00BC: Failed to output Thunderstrike HOSTCMD request HID report due to -ENODEV [ 1261.401011][ T5964] shield 0003:0955:7214.00BC: Failed to output Thunderstrike HOSTCMD request HID report due to -ENODEV [ 1261.418382][ T5964] shield 0003:0955:7214.00BC: Failed to output Thunderstrike HOSTCMD request HID report due to -ENODEV [ 1262.237657][ T1298] ieee802154 phy0 wpan0: encryption failed: -22 [ 1262.244283][ T1298] ieee802154 phy1 wpan1: encryption failed: -22 [ 1263.337752][T19426] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1263.581187][ T5964] usb 5-1: new high-speed USB device number 109 using dummy_hcd [ 1263.838690][ T5964] usb 5-1: Using ep0 maxpacket: 32 [ 1263.865426][ T5964] usb 5-1: New USB device found, idVendor=0ccd, idProduct=0080, bcdDevice=67.fe [ 1263.880793][ T5964] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1263.895803][ T5964] usb 5-1: Product: syz [ 1263.906624][ T5964] usb 5-1: Manufacturer: syz [ 1263.911308][ T5964] usb 5-1: SerialNumber: syz [ 1263.924514][ T5964] usb 5-1: config 0 descriptor?? [ 1263.948030][ T5964] snd-usb-6fire 5-1:0.0: too many cards registered. [ 1264.001035][T19444] netlink: 32 bytes leftover after parsing attributes in process `syz.1.3531'. [ 1264.159104][T13849] usb 3-1: new high-speed USB device number 8 using dummy_hcd [ 1264.226773][T19445] vivid-000: disconnect [ 1264.373121][T13849] usb 3-1: Using ep0 maxpacket: 16 [ 1264.564446][T13849] usb 3-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1264.618078][T13849] usb 3-1: config 0 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 3 [ 1264.640142][T19436] vivid-000: reconnect [ 1264.650261][T13849] usb 3-1: New USB device found, idVendor=0955, idProduct=7214, bcdDevice=ed.00 [ 1264.720736][T13849] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1264.758410][T19446] netlink: 24 bytes leftover after parsing attributes in process `syz.0.3529'. [ 1264.798693][T13849] usb 3-1: config 0 descriptor?? [ 1264.849662][T13849] usbhid 3-1:0.0: couldn't find an input interrupt endpoint [ 1264.877075][T19455] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3529'. [ 1265.715131][ T5964] usb 5-1: USB disconnect, device number 109 [ 1266.733662][ T30] audit: type=1400 audit(1765917604.250:3195): avc: denied { setopt } for pid=19467 comm="syz.4.3536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1267.736522][ T5964] usb 3-1: USB disconnect, device number 8 [ 1269.117990][ T30] audit: type=1400 audit(1765917606.476:3196): avc: denied { link } for pid=19500 comm="syz.1.3546" name="#2d" dev="tmpfs" ino=566 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1269.812901][ T30] audit: type=1400 audit(1765917607.113:3197): avc: denied { rename } for pid=19500 comm="syz.1.3546" name="#2e" dev="tmpfs" ino=566 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1271.293620][ T30] audit: type=1400 audit(1765917608.525:3198): avc: denied { read } for pid=19516 comm="syz.2.3543" dev="sockfs" ino=65615 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1271.448906][ T849] usb 6-1: new high-speed USB device number 29 using dummy_hcd [ 1271.609146][ T849] usb 6-1: Using ep0 maxpacket: 16 [ 1271.618564][ T849] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1271.639145][T19518] netlink: 24 bytes leftover after parsing attributes in process `syz.0.3544'. [ 1271.641178][ T849] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1271.669779][ T849] usb 6-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 3 [ 1271.693203][ T849] usb 6-1: New USB device found, idVendor=0955, idProduct=7214, bcdDevice=ed.00 [ 1271.712284][ T849] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1271.733630][ T849] usb 6-1: config 0 descriptor?? [ 1271.769285][T19518] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3544'. [ 1271.802311][T11741] usb 3-1: new high-speed USB device number 9 using dummy_hcd [ 1271.940527][T11741] usb 3-1: device descriptor read/64, error -71 [ 1272.197029][T11741] usb 3-1: new high-speed USB device number 10 using dummy_hcd [ 1272.336388][T11741] usb 3-1: device descriptor read/64, error -71 [ 1272.466334][T11741] usb usb3-port1: attempt power cycle [ 1272.577977][T19535] siw: device registration error -23 [ 1273.396088][ T849] usbhid 6-1:0.0: can't add hid device: -71 [ 1273.405832][ T849] usbhid 6-1:0.0: probe with driver usbhid failed with error -71 [ 1273.430978][ T849] usb 6-1: USB disconnect, device number 29 [ 1273.565280][T11741] usb 3-1: new high-speed USB device number 11 using dummy_hcd [ 1273.612215][T11741] usb 3-1: device descriptor read/8, error -71 [ 1273.675458][T19542] FAULT_INJECTION: forcing a failure. [ 1273.675458][T19542] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1273.716607][T19542] CPU: 0 UID: 0 PID: 19542 Comm: syz.4.3557 Tainted: G L syzkaller #0 PREEMPT(full) [ 1273.716640][T19542] Tainted: [L]=SOFTLOCKUP [ 1273.716647][T19542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1273.716658][T19542] Call Trace: [ 1273.716665][T19542] [ 1273.716674][T19542] dump_stack_lvl+0x16c/0x1f0 [ 1273.716701][T19542] should_fail_ex+0x512/0x640 [ 1273.716731][T19542] _copy_from_user+0x2e/0xd0 [ 1273.716757][T19542] drm_ioctl+0x4fb/0xc30 [ 1273.716785][T19542] ? __pfx_drm_mode_getresources+0x10/0x10 [ 1273.716806][T19542] ? __pfx_drm_ioctl+0x10/0x10 [ 1273.716841][T19542] ? selinux_file_ioctl+0x180/0x270 [ 1273.716864][T19542] ? selinux_file_ioctl+0xb4/0x270 [ 1273.716892][T19542] ? __pfx_drm_ioctl+0x10/0x10 [ 1273.716917][T19542] __x64_sys_ioctl+0x18e/0x210 [ 1273.716942][T19542] do_syscall_64+0xcd/0xf80 [ 1273.716966][T19542] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1273.716986][T19542] RIP: 0033:0x7f6c2518f749 [ 1273.717002][T19542] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1273.717020][T19542] RSP: 002b:00007f6c260cc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1273.717038][T19542] RAX: ffffffffffffffda RBX: 00007f6c253e5fa0 RCX: 00007f6c2518f749 [ 1273.717051][T19542] RDX: 0000200000000900 RSI: 00000000c04064a0 RDI: 0000000000000003 [ 1273.717063][T19542] RBP: 00007f6c260cc090 R08: 0000000000000000 R09: 0000000000000000 [ 1273.717075][T19542] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1273.717087][T19542] R13: 00007f6c253e6038 R14: 00007f6c253e5fa0 R15: 00007fff475a1088 [ 1273.717115][T19542] [ 1274.024931][T11741] usb 3-1: new high-speed USB device number 12 using dummy_hcd [ 1274.046748][T11741] usb 3-1: device descriptor read/8, error -71 [ 1274.167006][T11741] usb usb3-port1: unable to enumerate USB device [ 1274.531037][T19549] binder: 19548:19549 ioctl 1276 0 returned -22 [ 1274.806311][T19558] netlink: 8 bytes leftover after parsing attributes in process `syz.5.3562'. [ 1274.835266][T19561] netlink: 16 bytes leftover after parsing attributes in process `syz.2.3563'. [ 1274.858818][ T5952] usb 5-1: new high-speed USB device number 110 using dummy_hcd [ 1274.996929][ T30] audit: type=1400 audit(1765917611.987:3199): avc: denied { mount } for pid=19562 comm="syz.2.3564" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 1275.057034][T19568] netlink: 16 bytes leftover after parsing attributes in process `syz.5.3565'. [ 1275.061873][ T5952] usb 5-1: Using ep0 maxpacket: 32 [ 1275.084818][ T5952] usb 5-1: unable to get BOS descriptor or descriptor too short [ 1275.105132][ T5952] usb 5-1: config 135 has an invalid interface number: 152 but max is 0 [ 1275.125916][ T5952] usb 5-1: config 135 has no interface number 0 [ 1275.146151][ T5952] usb 5-1: config 135 interface 152 has no altsetting 0 [ 1275.156085][ T5952] usb 5-1: New USB device found, idVendor=0547, idProduct=6801, bcdDevice=11.3b [ 1275.217141][ T5952] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1275.397549][ T5952] usb 5-1: Product: syz [ 1275.403853][ T5830] Bluetooth: hci1: command 0x0406 tx timeout [ 1275.409950][ T5952] usb 5-1: Manufacturer: syz [ 1275.426798][ T5952] usb 5-1: SerialNumber: syz [ 1275.566739][ T30] audit: type=1400 audit(1765917612.520:3200): avc: denied { setattr } for pid=19570 comm="syz.1.3566" name="NETLINK" dev="sockfs" ino=65000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 1275.665839][ T30] audit: type=1400 audit(1765917612.613:3201): avc: denied { unmount } for pid=17656 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 1275.686928][T19577] netlink: 'syz.5.3568': attribute type 12 has an invalid length. [ 1275.694797][T19577] netlink: 'syz.5.3568': attribute type 29 has an invalid length. [ 1275.702625][T19577] netlink: 148 bytes leftover after parsing attributes in process `syz.5.3568'. [ 1275.711671][T19577] netlink: 59 bytes leftover after parsing attributes in process `syz.5.3568'. [ 1275.815946][ T5952] gspca_main: touptek-2.14.0 probing 0547:6801 [ 1275.841505][ T5952] usb 5-1: USB disconnect, device number 110 [ 1275.897529][T19585] netlink: 8 bytes leftover after parsing attributes in process `syz.5.3570'. [ 1275.988437][T19588] netlink: 20 bytes leftover after parsing attributes in process `syz.5.3570'. [ 1276.533557][T19596] fuse: Unknown parameter '›ÎÈü:³BNfg—Ç9š‘5)' [ 1277.328546][T19606] netlink: 8 bytes leftover after parsing attributes in process `syz.5.3576'. [ 1279.221347][T19633] comedi comedi0: Minor 3 could not be opened [ 1279.240404][ T30] audit: type=1400 audit(1765917615.953:3202): avc: denied { setattr } for pid=19624 comm="syz.5.3581" name="vhost-vsock" dev="devtmpfs" ino=1275 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1280.526336][T13849] IPVS: starting estimator thread 0... [ 1281.014982][T19056] usb 1-1: new high-speed USB device number 104 using dummy_hcd [ 1281.079849][ T5952] usb 2-1: new high-speed USB device number 126 using dummy_hcd [ 1281.090503][T19659] IPVS: using max 69 ests per chain, 165600 per kthread [ 1281.187189][T19056] usb 1-1: Using ep0 maxpacket: 32 [ 1281.194393][T19056] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x85 has invalid maxpacket 1024 [ 1281.213877][T19056] usb 1-1: New USB device found, idVendor=12d8, idProduct=0001, bcdDevice=de.79 [ 1281.234285][T19056] usb 1-1: New USB device strings: Mfr=1, Product=236, SerialNumber=2 [ 1281.242746][ T5952] usb 2-1: Using ep0 maxpacket: 32 [ 1281.257765][ T5952] usb 2-1: config index 0 descriptor too short (expected 35577, got 27) [ 1281.274465][T19056] usb 1-1: Product: syz [ 1281.325672][ T5952] usb 2-1: config 1 has too many interfaces: 92, using maximum allowed: 32 [ 1281.334559][T19056] usb 1-1: Manufacturer: syz [ 1281.345400][T19056] usb 1-1: SerialNumber: syz [ 1281.356209][ T5952] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 92 [ 1281.373369][T19056] usb 1-1: config 0 descriptor?? [ 1281.382037][T19650] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1281.401538][ T5952] usb 2-1: config 1 has no interface number 0 [ 1281.425626][ T5952] usb 2-1: config 1 interface 1 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1281.440658][ T5952] usb 2-1: config 1 interface 1 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 17 [ 1281.472616][ T5952] usb 2-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 1281.482029][ T5952] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1281.514888][ T5952] snd_usb_pod 2-1:1.1: Line 6 Pocket POD found [ 1281.695961][T19670] netlink: 'syz.0.3589': attribute type 13 has an invalid length. [ 1281.731223][ T5952] snd_usb_pod 2-1:1.1: Line 6 Pocket POD now attached [ 1281.770583][ T30] audit: type=1404 audit(1765917618.320:3203): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 1281.968460][ T30] audit: type=1400 audit(1765917618.517:3204): avc: denied { ioctl } for pid=19651 comm="syz.1.3588" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5507 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1282.135018][T19670] binfmt_misc: register: failed to install interpreter file ./file0 [ 1282.356511][ T30] audit: type=1400 audit(1765917618.517:3205): avc: denied { write } for pid=19651 comm="syz.1.3588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1282.411783][ T30] audit: type=1400 audit(1765917618.517:3206): avc: denied { create } for pid=19651 comm="syz.1.3588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 1282.471306][ T89] usb 1-1: USB disconnect, device number 104 [ 1282.599322][ T30] audit: type=1400 audit(1765917618.517:3207): avc: denied { read write } for pid=19651 comm="syz.1.3588" name="rdma_cm" dev="devtmpfs" ino=1271 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=0 [ 1282.625295][ T30] audit: type=1400 audit(1765917618.657:3208): avc: denied { prog_load } for pid=19651 comm="syz.1.3588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1282.644660][ T30] audit: type=1400 audit(1765917618.666:3209): avc: denied { execute } for pid=19649 comm="syz.0.3589" name="file0" dev="tmpfs" ino=852 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 1282.714024][ T30] audit: type=1400 audit(1765917618.704:3210): avc: denied { read write } for pid=18067 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1282.782986][T13849] usb 2-1: USB disconnect, device number 126 [ 1282.789772][T13849] snd_usb_pod 2-1:1.1: Line 6 Pocket POD now disconnected [ 1282.854260][ T30] audit: type=1400 audit(1765917618.956:3211): avc: denied { read } for pid=19676 comm="syz.4.3595" dev="nsfs" ino=4026534453 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1282.876062][ T30] audit: type=1400 audit(1765917618.956:3212): avc: denied { create } for pid=19676 comm="syz.4.3595" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1283.144086][T19685] FAULT_INJECTION: forcing a failure. [ 1283.144086][T19685] name failslab, interval 1, probability 0, space 0, times 0 [ 1283.144658][T19684] lo speed is unknown, defaulting to 1000 [ 1283.218912][T19685] CPU: 1 UID: 0 PID: 19685 Comm: syz.5.3599 Tainted: G L syzkaller #0 PREEMPT(full) [ 1283.218939][T19685] Tainted: [L]=SOFTLOCKUP [ 1283.218944][T19685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1283.218951][T19685] Call Trace: [ 1283.218955][T19685] [ 1283.218960][T19685] dump_stack_lvl+0x16c/0x1f0 [ 1283.218978][T19685] should_fail_ex+0x512/0x640 [ 1283.218994][T19685] ? kmem_cache_alloc_lru_noprof+0x66/0x770 [ 1283.219008][T19685] should_failslab+0xc2/0x120 [ 1283.219022][T19685] kmem_cache_alloc_lru_noprof+0x87/0x770 [ 1283.219033][T19685] ? stack_trace_save+0x8e/0xc0 [ 1283.219045][T19685] ? __d_alloc+0x35/0xa80 [ 1283.219064][T19685] ? __d_alloc+0x35/0xa80 [ 1283.219079][T19685] __d_alloc+0x35/0xa80 [ 1283.219097][T19685] d_alloc_parallel+0x111/0x1510 [ 1283.219119][T19685] ? find_held_lock+0x2b/0x80 [ 1283.219137][T19685] ? __pfx_d_alloc_parallel+0x10/0x10 [ 1283.219152][T19685] ? __d_lookup+0x266/0x4a0 [ 1283.219168][T19685] lookup_open.isra.0+0x66c/0x1780 [ 1283.219185][T19685] ? __pfx_lookup_open.isra.0+0x10/0x10 [ 1283.219200][T19685] ? find_held_lock+0x2b/0x80 [ 1283.219220][T19685] ? __pfx_down_write+0x10/0x10 [ 1283.219239][T19685] path_openat+0xa95/0x3140 [ 1283.219259][T19685] ? __pfx_path_openat+0x10/0x10 [ 1283.219276][T19685] ? __lock_acquire+0x436/0x2890 [ 1283.219290][T19685] do_filp_open+0x20b/0x470 [ 1283.219305][T19685] ? __pfx_do_filp_open+0x10/0x10 [ 1283.219331][T19685] ? _raw_spin_unlock+0x28/0x50 [ 1283.219342][T19685] ? alloc_fd+0x471/0x7d0 [ 1283.219363][T19685] do_sys_openat2+0x121/0x290 [ 1283.219374][T19685] ? __pfx_do_sys_openat2+0x10/0x10 [ 1283.219384][T19685] ? __pfx___seccomp_filter+0x10/0x10 [ 1283.219405][T19685] __x64_sys_creat+0xcc/0x120 [ 1283.219416][T19685] ? __pfx___x64_sys_creat+0x10/0x10 [ 1283.219427][T19685] ? __secure_computing+0x28e/0x3b0 [ 1283.219444][T19685] ? syscall_trace_enter+0x89/0x220 [ 1283.219460][T19685] do_syscall_64+0xcd/0xf80 [ 1283.219475][T19685] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1283.219487][T19685] RIP: 0033:0x7f9e7078f749 [ 1283.219496][T19685] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1283.219507][T19685] RSP: 002b:00007f9e716a2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1283.219517][T19685] RAX: ffffffffffffffda RBX: 00007f9e709e5fa0 RCX: 00007f9e7078f749 [ 1283.219525][T19685] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 00002000000001c0 [ 1283.219532][T19685] RBP: 00007f9e716a2090 R08: 0000000000000000 R09: 0000000000000000 [ 1283.219538][T19685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1283.219545][T19685] R13: 00007f9e709e6038 R14: 00007f9e709e5fa0 R15: 00007ffd35fdf498 [ 1283.219560][T19685] [ 1283.836043][T19690] lo speed is unknown, defaulting to 1000 [ 1284.773227][T19705] netlink: 'syz.4.3606': attribute type 10 has an invalid length. [ 1284.885620][T19705] bond0: (slave wlan1): Enslaving as an active interface with an up link [ 1287.224923][ T30] kauditd_printk_skb: 150 callbacks suppressed [ 1287.224939][ T30] audit: type=1400 audit(1765917623.428:3363): avc: denied { prog_load } for pid=19760 comm="syz.4.3627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1287.282979][ T30] audit: type=1400 audit(1765917623.456:3364): avc: denied { prog_load } for pid=19760 comm="syz.4.3627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1287.342133][ T30] audit: type=1400 audit(1765917623.456:3365): avc: denied { execmem } for pid=19760 comm="syz.4.3627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1287.429159][ T30] audit: type=1400 audit(1765917623.512:3366): avc: denied { read write } for pid=19760 comm="syz.4.3627" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1287.524767][ T30] audit: type=1400 audit(1765917623.568:3367): avc: denied { read write } for pid=17071 comm="syz-executor" name="loop0" dev="devtmpfs" ino=4060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1287.597780][ T30] audit: type=1400 audit(1765917623.662:3368): avc: denied { write } for pid=19764 comm="syz.0.3628" name="ptp0" dev="devtmpfs" ino=1265 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=0 [ 1287.630169][ T30] audit: type=1400 audit(1765917623.737:3369): avc: denied { create } for pid=19764 comm="syz.0.3628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1287.700457][ T30] audit: type=1400 audit(1765917623.737:3370): avc: denied { read write } for pid=19764 comm="syz.0.3628" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1287.741796][ T30] audit: type=1400 audit(1765917623.746:3371): avc: denied { read write } for pid=19764 comm="syz.0.3628" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1287.841950][ T30] audit: type=1400 audit(1765917623.746:3372): avc: denied { read write } for pid=19764 comm="syz.0.3628" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1288.693305][T19788] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2827 sclass=netlink_route_socket pid=19788 comm=syz.2.3636 [ 1289.408424][T19808] netlink: 'syz.2.3645': attribute type 1 has an invalid length. [ 1289.468197][T19810] netlink: 28 bytes leftover after parsing attributes in process `syz.2.3645'. [ 1289.469564][T19808] bond1: entered promiscuous mode [ 1289.482786][T19808] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1289.517945][T19808] bond1: (slave bridge1): making interface the new active one [ 1289.525697][T19808] bridge1: entered promiscuous mode [ 1289.532068][T19808] bond1: (slave bridge1): Enslaving as an active interface with an up link [ 1289.818425][T19830] x_tables: ip6_tables: icmp6 match: only valid for protocol 58 [ 1289.829670][T19830] netlink: 'syz.0.3653': attribute type 13 has an invalid length. [ 1290.116073][T19830] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1290.146069][T19830] 8021q: adding VLAN 0 to HW filter on device team0 [ 1290.187161][T19830] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1291.359764][T19865] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3664'. [ 1292.175554][T19886] ªªªªªª: renamed from vlan0 (while UP) [ 1292.594148][ T30] kauditd_printk_skb: 248 callbacks suppressed [ 1292.594159][ T30] audit: type=1400 audit(1765917628.452:3622): avc: denied { read write } for pid=16633 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1292.650503][ T30] audit: type=1400 audit(1765917628.433:3621): avc: denied { read } for pid=19896 comm="syz.2.3678" dev="nsfs" ino=4026533182 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1292.676936][T19897] netlink: 'syz.2.3678': attribute type 14 has an invalid length. [ 1292.696755][ T30] audit: type=1400 audit(1765917628.508:3623): avc: denied { create } for pid=19898 comm="syz.5.3679" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1292.737945][ T30] audit: type=1400 audit(1765917628.527:3624): avc: denied { create } for pid=19898 comm="syz.5.3679" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1292.784005][ T30] audit: type=1400 audit(1765917628.527:3625): avc: denied { create } for pid=19896 comm="syz.2.3678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1292.807282][ T30] audit: type=1400 audit(1765917628.527:3626): avc: denied { read write } for pid=19896 comm="syz.2.3678" name="video9" dev="devtmpfs" ino=959 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 [ 1292.838636][ T30] audit: type=1400 audit(1765917628.573:3627): avc: denied { read write } for pid=16633 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1292.950715][ T30] audit: type=1400 audit(1765917628.573:3628): avc: denied { read } for pid=19896 comm="syz.2.3678" dev="nsfs" ino=4026533182 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1292.986565][ T30] audit: type=1400 audit(1765917628.573:3629): avc: denied { create } for pid=19896 comm="syz.2.3678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 1293.010790][ T30] audit: type=1400 audit(1765917628.573:3630): avc: denied { create } for pid=19896 comm="syz.2.3678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1293.551889][T19912] No such timeout policy "syz1" [ 1294.451565][T19946] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=142 sclass=netlink_route_socket pid=19946 comm=syz.5.3697 [ 1295.091813][T19963] gtp0: entered promiscuous mode [ 1295.461995][T19977] No such timeout policy "syz1" [ 1297.293819][T20022] FAULT_INJECTION: forcing a failure. [ 1297.293819][T20022] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1297.307614][T20022] CPU: 1 UID: 0 PID: 20022 Comm: syz.2.3725 Tainted: G L syzkaller #0 PREEMPT(full) [ 1297.307647][T20022] Tainted: [L]=SOFTLOCKUP [ 1297.307654][T20022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1297.307665][T20022] Call Trace: [ 1297.307672][T20022] [ 1297.307681][T20022] dump_stack_lvl+0x16c/0x1f0 [ 1297.307709][T20022] should_fail_ex+0x512/0x640 [ 1297.307740][T20022] _copy_from_user+0x2e/0xd0 [ 1297.307767][T20022] kstrtouint_from_user+0xd6/0x1d0 [ 1297.307786][T20022] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 1297.307804][T20022] ? __lock_acquire+0x436/0x2890 [ 1297.307828][T20022] ? lock_acquire+0x179/0x330 [ 1297.307853][T20022] proc_fail_nth_write+0x83/0x220 [ 1297.307874][T20022] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1297.307902][T20022] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1297.307920][T20022] vfs_write+0x2a0/0x11d0 [ 1297.307945][T20022] ? __pfx___mutex_lock+0x10/0x10 [ 1297.307972][T20022] ? __pfx_vfs_write+0x10/0x10 [ 1297.308002][T20022] ? __fget_files+0x20e/0x3c0 [ 1297.308025][T20022] ? __x64_sys_mount+0x220/0x310 [ 1297.308051][T20022] ksys_write+0x12a/0x250 [ 1297.308073][T20022] ? __pfx_ksys_write+0x10/0x10 [ 1297.308103][T20022] do_syscall_64+0xcd/0xf80 [ 1297.308128][T20022] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1297.308148][T20022] RIP: 0033:0x7f5b4e58e1ff [ 1297.308164][T20022] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 1297.308183][T20022] RSP: 002b:00007f5b4f374030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1297.308202][T20022] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5b4e58e1ff [ 1297.308219][T20022] RDX: 0000000000000001 RSI: 00007f5b4f3740a0 RDI: 0000000000000003 [ 1297.308231][T20022] RBP: 00007f5b4f374090 R08: 0000000000000000 R09: 0000000000000000 [ 1297.308243][T20022] R10: 00000000000000c4 R11: 0000000000000293 R12: 0000000000000002 [ 1297.308255][T20022] R13: 00007f5b4e7e6038 R14: 00007f5b4e7e5fa0 R15: 00007ffe027e6778 [ 1297.308285][T20022] [ 1297.647975][T20031] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20031 comm=syz.2.3727 [ 1297.705689][T20031] netlink: 'syz.2.3727': attribute type 1 has an invalid length. [ 1297.854870][T20037] bond2: (slave bridge2): making interface the new active one [ 1297.863000][T20037] bond2: (slave bridge2): Enslaving as an active interface with an up link [ 1297.950192][ T30] kauditd_printk_skb: 282 callbacks suppressed [ 1297.950209][ T30] audit: type=1400 audit(1765917633.457:3913): avc: denied { read } for pid=20043 comm="syz.5.3732" name="binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 1297.998678][ T30] audit: type=1400 audit(1765917633.504:3914): avc: denied { read write } for pid=18067 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1298.046610][T20045] xt_SECMARK: invalid security context 'unconfined' [ 1298.108704][ T30] audit: type=1400 audit(1765917633.532:3915): avc: denied { read write } for pid=20043 comm="syz.5.3732" name="vbi1" dev="devtmpfs" ino=955 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 [ 1298.133549][ T30] audit: type=1400 audit(1765917633.616:3916): avc: denied { read write } for pid=20043 comm="syz.5.3732" name="virtual_nci" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1298.159239][ T30] audit: type=1400 audit(1765917633.634:3917): avc: denied { create } for pid=20043 comm="syz.5.3732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 1298.192165][ T30] audit: type=1400 audit(1765917633.681:3918): avc: denied { read write } for pid=20047 comm="syz.4.3733" name="qrtr-tun" dev="devtmpfs" ino=1314 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1298.252440][ T30] audit: type=1400 audit(1765917633.719:3919): avc: denied { read write } for pid=17656 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1298.386055][ T30] audit: type=1400 audit(1765917633.728:3920): avc: denied { map_create } for pid=20043 comm="syz.5.3732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1298.425318][ T30] audit: type=1400 audit(1765917633.728:3921): avc: denied { prog_load } for pid=20043 comm="syz.5.3732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1298.444788][ T30] audit: type=1400 audit(1765917633.728:3922): avc: denied { prog_load } for pid=20043 comm="syz.5.3732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1298.586074][T20058] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=20058 comm=syz.2.3736 [ 1301.084383][T20121] capability: warning: `syz.4.3758' uses 32-bit capabilities (legacy support in use) [ 1302.662513][T20159] netlink: 72 bytes leftover after parsing attributes in process `syz.5.3770'. [ 1303.420516][ T30] kauditd_printk_skb: 247 callbacks suppressed [ 1303.424174][ T30] audit: type=1400 audit(1765917894.518:4170): avc: denied { execute } for pid=20172 comm="syz.2.3777" name="file2" dev="tmpfs" ino=884 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 1303.484848][ T30] audit: type=1400 audit(1765917894.528:4171): avc: denied { read write } for pid=20172 comm="syz.2.3777" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1303.584230][ T30] audit: type=1400 audit(1765917894.734:4172): avc: denied { read write } for pid=17071 comm="syz-executor" name="loop0" dev="devtmpfs" ino=4060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1303.658523][ T30] audit: type=1400 audit(1765917894.808:4173): avc: denied { create } for pid=20177 comm="syz.0.3778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1303.779676][ T30] audit: type=1400 audit(1765917894.874:4174): avc: denied { read write } for pid=16633 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1303.805639][ T30] audit: type=1400 audit(1765917894.874:4175): avc: denied { create } for pid=20177 comm="syz.0.3778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1303.841120][ T30] audit: type=1400 audit(1765917894.893:4176): avc: denied { read write } for pid=17071 comm="syz-executor" name="loop0" dev="devtmpfs" ino=4060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1303.914269][ T30] audit: type=1400 audit(1765917895.005:4177): avc: denied { prog_load } for pid=20179 comm="syz.5.3779" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1303.945338][ T30] audit: type=1400 audit(1765917895.024:4178): avc: denied { read write } for pid=17451 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1304.128756][ T30] audit: type=1400 audit(1765917895.033:4179): avc: denied { map_create } for pid=20181 comm="syz.1.3781" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1305.094790][T20201] IPv6: NLM_F_REPLACE set, but no existing node found! [ 1307.413828][T20247] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3801'. [ 1307.526012][T20247] SET target dimension over the limit! [ 1308.893577][ T30] kauditd_printk_skb: 191 callbacks suppressed [ 1308.910163][ T30] audit: type=1400 audit(1765917899.692:4371): avc: denied { create } for pid=20264 comm="syz.1.3809" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 1308.988489][ T30] audit: type=1400 audit(1765917899.785:4372): avc: denied { read write } for pid=16633 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1309.047973][ T30] audit: type=1400 audit(1765917899.842:4373): avc: denied { read write } for pid=17656 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1309.130258][ T30] audit: type=1400 audit(1765917899.860:4374): avc: denied { execmem } for pid=20268 comm="syz.4.3810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1309.175382][ T30] audit: type=1400 audit(1765917899.898:4375): avc: denied { prog_load } for pid=20264 comm="syz.1.3809" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1309.224946][ T30] audit: type=1400 audit(1765917899.898:4376): avc: denied { prog_load } for pid=20264 comm="syz.1.3809" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1309.331705][ T30] audit: type=1400 audit(1765917899.898:4377): avc: denied { create } for pid=20264 comm="syz.1.3809" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 1309.368005][ T30] audit: type=1400 audit(1765917899.898:4378): avc: denied { wake_alarm } for pid=20264 comm="syz.1.3809" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 1309.405199][ T30] audit: type=1400 audit(1765917899.916:4379): avc: denied { read } for pid=20268 comm="syz.4.3810" dev="nsfs" ino=4026534453 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1309.475868][ T30] audit: type=1400 audit(1765917899.916:4380): avc: denied { prog_load } for pid=20271 comm="syz.5.3812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1311.027196][T20294] netlink: 24 bytes leftover after parsing attributes in process `syz.0.3818'. [ 1311.121418][T20294] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3818'. [ 1314.042018][T20327] netlink: 24 bytes leftover after parsing attributes in process `syz.4.3830'. [ 1314.186782][T20334] No such timeout policy "syz1" [ 1314.218168][T20327] netlink: 28 bytes leftover after parsing attributes in process `syz.4.3830'. [ 1314.318484][ T30] kauditd_printk_skb: 122 callbacks suppressed [ 1314.318527][ T30] audit: type=1400 audit(1765917904.772:4503): avc: denied { execmem } for pid=20336 comm="syz.0.3833" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1314.411171][ T30] audit: type=1400 audit(1765917904.865:4504): avc: denied { read write } for pid=18067 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1314.569569][ T30] audit: type=1400 audit(1765917904.903:4505): avc: denied { map_create } for pid=20336 comm="syz.0.3833" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1314.589532][ T30] audit: type=1400 audit(1765917904.968:4506): avc: denied { create } for pid=20336 comm="syz.0.3833" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 1314.904706][ T30] audit: type=1400 audit(1765917904.968:4507): avc: denied { allowed } for pid=20336 comm="syz.0.3833" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 1314.943451][ T30] audit: type=1400 audit(1765917904.968:4508): avc: denied { read write } for pid=20336 comm="syz.0.3833" name="uinput" dev="devtmpfs" ino=920 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=0 [ 1314.991573][ T30] audit: type=1400 audit(1765917904.968:4509): avc: denied { read write } for pid=20336 comm="syz.0.3833" name="video0" dev="devtmpfs" ino=932 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 [ 1315.059312][ T30] audit: type=1400 audit(1765917905.324:4510): avc: denied { create } for pid=20341 comm="syz.4.3834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1315.092340][ T30] audit: type=1400 audit(1765917905.352:4511): avc: denied { create } for pid=20341 comm="syz.4.3834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1315.126792][ T30] audit: type=1400 audit(1765917905.399:4512): avc: denied { read write } for pid=16633 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1315.400982][T20355] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 1315.739309][T20365] IPv6: NLM_F_REPLACE set, but no existing node found! [ 1319.297936][T20397] IPv6: NLM_F_REPLACE set, but no existing node found! [ 1319.827616][ T30] kauditd_printk_skb: 95 callbacks suppressed [ 1319.827632][ T30] audit: type=1400 audit(1765917909.926:4608): avc: denied { read } for pid=20400 comm="syz.2.3857" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 1319.860647][ T30] audit: type=1400 audit(1765917909.964:4609): avc: denied { map_create } for pid=20400 comm="syz.2.3857" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1319.880506][ T30] audit: type=1400 audit(1765917909.964:4610): avc: denied { create } for pid=20400 comm="syz.2.3857" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1319.920242][ T30] audit: type=1400 audit(1765917909.964:4611): avc: denied { create } for pid=20400 comm="syz.2.3857" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1319.943050][ T30] audit: type=1400 audit(1765917909.964:4612): avc: denied { map_create } for pid=20400 comm="syz.2.3857" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1319.965476][ T30] audit: type=1400 audit(1765917909.964:4613): avc: denied { prog_load } for pid=20400 comm="syz.2.3857" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1319.986058][ T30] audit: type=1400 audit(1765917909.964:4614): avc: denied { read write } for pid=17451 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1320.017621][ T30] audit: type=1400 audit(1765917910.011:4615): avc: denied { read write } for pid=20409 comm="syz.1.3858" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1320.064172][ T30] audit: type=1400 audit(1765917910.011:4616): avc: denied { read } for pid=20409 comm="syz.1.3858" dev="nsfs" ino=4026534249 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1320.094107][ T30] audit: type=1400 audit(1765917910.011:4617): avc: denied { read } for pid=20409 comm="syz.1.3858" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 1321.687703][T20457] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3877'. [ 1322.271500][T20476] bridge0: port 2(bridge_slave_1) entered blocking state [ 1322.278652][T20476] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1322.286028][T20476] bridge0: port 1(bridge_slave_0) entered blocking state [ 1322.293147][T20476] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1322.317413][T20476] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1323.801752][T20526] Bluetooth: (null): Out-of-order packet arrived (4 != 0) [ 1323.841254][T13447] Bluetooth: (null): Invalid header checksum [ 1323.856541][T13447] Bluetooth: (null): Invalid header checksum [ 1325.175303][ T30] kauditd_printk_skb: 326 callbacks suppressed [ 1325.175319][ T30] audit: type=1400 audit(1765917914.932:4944): avc: denied { read write } for pid=20566 comm="syz.2.3918" name="nullb0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1325.239492][ T30] audit: type=1400 audit(1765917914.932:4945): avc: denied { create } for pid=20566 comm="syz.2.3918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1325.261333][ T30] audit: type=1400 audit(1765917914.932:4946): avc: denied { create } for pid=20566 comm="syz.2.3918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1325.299366][ T30] audit: type=1400 audit(1765917914.960:4947): avc: denied { read write } for pid=17071 comm="syz-executor" name="loop0" dev="devtmpfs" ino=4060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1325.327917][ T30] audit: type=1400 audit(1765917914.978:4948): avc: denied { read } for pid=20566 comm="syz.2.3918" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 1325.370593][ T30] audit: type=1400 audit(1765917914.978:4949): avc: denied { map_create } for pid=20566 comm="syz.2.3918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1325.390615][ T30] audit: type=1400 audit(1765917914.978:4950): avc: denied { prog_load } for pid=20566 comm="syz.2.3918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1325.412278][ T30] audit: type=1400 audit(1765917914.978:4951): avc: denied { read append } for pid=20566 comm="syz.2.3918" name="loop6" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1325.437704][ T30] audit: type=1400 audit(1765917914.997:4952): avc: denied { read write } for pid=17656 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1325.462974][ T30] audit: type=1400 audit(1765917915.016:4953): avc: denied { allowed } for pid=20559 comm="syz.5.3915" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 1327.705230][T20610] syz.2.3935 (20610): drop_caches: 3 [ 1327.736240][T20629] lo speed is unknown, defaulting to 1000 [ 1327.914324][ T1298] ieee802154 phy0 wpan0: encryption failed: -22 [ 1327.920814][ T1298] ieee802154 phy1 wpan1: encryption failed: -22 [ 1329.790292][T20675] kAFS: unable to lookup cell '.' [ 1330.030334][T20686] IPv6: NLM_F_REPLACE set, but no existing node found! [ 1330.479947][T20703] FAULT_INJECTION: forcing a failure. [ 1330.479947][T20703] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1330.493306][T20703] CPU: 1 UID: 0 PID: 20703 Comm: syz.5.3969 Tainted: G L syzkaller #0 PREEMPT(full) [ 1330.493329][T20703] Tainted: [L]=SOFTLOCKUP [ 1330.493333][T20703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1330.493340][T20703] Call Trace: [ 1330.493345][T20703] [ 1330.493349][T20703] dump_stack_lvl+0x16c/0x1f0 [ 1330.493367][T20703] should_fail_ex+0x512/0x640 [ 1330.493387][T20703] _copy_from_user+0x2e/0xd0 [ 1330.493403][T20703] kstrtouint_from_user+0xd6/0x1d0 [ 1330.493415][T20703] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 1330.493426][T20703] ? __lock_acquire+0x436/0x2890 [ 1330.493441][T20703] ? lock_acquire+0x179/0x330 [ 1330.493463][T20703] proc_fail_nth_write+0x83/0x220 [ 1330.493476][T20703] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1330.493491][T20703] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1330.493501][T20703] vfs_write+0x2a0/0x11d0 [ 1330.493516][T20703] ? __pfx___mutex_lock+0x10/0x10 [ 1330.493532][T20703] ? __pfx_vfs_write+0x10/0x10 [ 1330.493549][T20703] ? __fget_files+0x20e/0x3c0 [ 1330.493569][T20703] ksys_write+0x12a/0x250 [ 1330.493582][T20703] ? __pfx_ksys_write+0x10/0x10 [ 1330.493594][T20703] ? rcu_is_watching+0x12/0xc0 [ 1330.493610][T20703] do_syscall_64+0xcd/0xf80 [ 1330.493625][T20703] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1330.493636][T20703] RIP: 0033:0x7f9e7078e1ff [ 1330.493646][T20703] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 1330.493657][T20703] RSP: 002b:00007f9e716a2030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1330.493668][T20703] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9e7078e1ff [ 1330.493675][T20703] RDX: 0000000000000001 RSI: 00007f9e716a20a0 RDI: 0000000000000004 [ 1330.493682][T20703] RBP: 00007f9e716a2090 R08: 0000000000000000 R09: 0000000000000000 [ 1330.493688][T20703] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 1330.493695][T20703] R13: 00007f9e709e6038 R14: 00007f9e709e5fa0 R15: 00007ffd35fdf498 [ 1330.493711][T20703] [ 1330.709387][ T30] kauditd_printk_skb: 923 callbacks suppressed [ 1330.709403][ T30] audit: type=1400 audit(1765917920.105:5877): avc: denied { read write } for pid=16633 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1330.742206][ T30] audit: type=1400 audit(1765917920.142:5878): avc: denied { execmem } for pid=20704 comm="syz.5.3970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1330.820019][ T30] audit: type=1400 audit(1765917920.217:5879): avc: denied { create } for pid=20704 comm="syz.5.3970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 1330.842766][ T30] audit: type=1400 audit(1765917920.236:5880): avc: denied { prog_load } for pid=20704 comm="syz.5.3970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1330.862449][ T30] audit: type=1400 audit(1765917920.236:5881): avc: denied { read write } for pid=17656 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1330.910510][ T30] audit: type=1400 audit(1765917920.292:5882): avc: denied { allowed } for pid=20707 comm="syz.2.3971" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 1331.072432][ T30] audit: type=1400 audit(1765917920.292:5883): avc: denied { allowed } for pid=20707 comm="syz.2.3971" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 1331.102931][ T30] audit: type=1400 audit(1765917920.292:5884): avc: denied { map_create } for pid=20707 comm="syz.2.3971" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1331.148344][ T30] audit: type=1400 audit(1765917920.292:5885): avc: denied { map_create } for pid=20707 comm="syz.2.3971" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1331.180328][ T30] audit: type=1400 audit(1765917920.292:5886): avc: denied { map_create } for pid=20707 comm="syz.2.3971" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1331.299876][T20718] IPv6: NLM_F_REPLACE set, but no existing node found! [ 1332.368493][T20749] IPv6: NLM_F_REPLACE set, but no existing node found! [ 1333.234742][T20777] IPv6: NLM_F_REPLACE set, but no existing node found! [ 1334.510257][T20807] IPv6: NLM_F_REPLACE set, but no existing node found! [ 1334.646940][T20815] FAULT_INJECTION: forcing a failure. [ 1334.646940][T20815] name failslab, interval 1, probability 0, space 0, times 0 [ 1334.662357][T20815] CPU: 1 UID: 0 PID: 20815 Comm: syz.1.4015 Tainted: G L syzkaller #0 PREEMPT(full) [ 1334.662388][T20815] Tainted: [L]=SOFTLOCKUP [ 1334.662394][T20815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1334.662405][T20815] Call Trace: [ 1334.662413][T20815] [ 1334.662427][T20815] dump_stack_lvl+0x16c/0x1f0 [ 1334.662454][T20815] should_fail_ex+0x512/0x640 [ 1334.662479][T20815] ? fs_reclaim_acquire+0xae/0x150 [ 1334.662506][T20815] should_failslab+0xc2/0x120 [ 1334.662530][T20815] __kmalloc_noprof+0xeb/0x910 [ 1334.662556][T20815] ? tomoyo_realpath_from_path+0xc2/0x6e0 [ 1334.662586][T20815] ? tomoyo_realpath_from_path+0xc2/0x6e0 [ 1334.662610][T20815] tomoyo_realpath_from_path+0xc2/0x6e0 [ 1334.662636][T20815] ? tomoyo_profile+0x47/0x60 [ 1334.662665][T20815] tomoyo_path_number_perm+0x245/0x580 [ 1334.662685][T20815] ? tomoyo_path_number_perm+0x237/0x580 [ 1334.662708][T20815] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 1334.662731][T20815] ? find_held_lock+0x2b/0x80 [ 1334.662784][T20815] ? find_held_lock+0x2b/0x80 [ 1334.662808][T20815] ? hook_file_ioctl_common+0x144/0x410 [ 1334.662841][T20815] ? __fget_files+0x20e/0x3c0 [ 1334.662870][T20815] security_file_ioctl+0x9b/0x240 [ 1334.662893][T20815] __x64_sys_ioctl+0xb7/0x210 [ 1334.662915][T20815] do_syscall_64+0xcd/0xf80 [ 1334.662940][T20815] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1334.662959][T20815] RIP: 0033:0x7fcb3d38f749 [ 1334.662974][T20815] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1334.662991][T20815] RSP: 002b:00007fcb3e208038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1334.663009][T20815] RAX: ffffffffffffffda RBX: 00007fcb3d5e5fa0 RCX: 00007fcb3d38f749 [ 1334.663021][T20815] RDX: 0000200000000000 RSI: 0000000000008916 RDI: 0000000000000003 [ 1334.663033][T20815] RBP: 00007fcb3e208090 R08: 0000000000000000 R09: 0000000000000000 [ 1334.663044][T20815] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1334.663055][T20815] R13: 00007fcb3d5e6038 R14: 00007fcb3d5e5fa0 R15: 00007fffc298dc38 [ 1334.663084][T20815] [ 1334.663092][T20815] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1334.944065][T20819] netlink: 16 bytes leftover after parsing attributes in process `syz.0.4017'. [ 1335.814265][T20844] macsec1: entered promiscuous mode [ 1335.834305][T20844] macsec1: entered allmulticast mode [ 1336.085765][ T30] kauditd_printk_skb: 343 callbacks suppressed [ 1336.085781][ T30] audit: type=1400 audit(1765917925.138:6230): avc: denied { read write } for pid=20849 comm="syz.5.4027" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1336.195505][ T30] audit: type=1400 audit(1765917925.175:6231): avc: denied { read write } for pid=17656 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1336.252612][ T30] audit: type=1400 audit(1765917925.213:6232): avc: denied { read } for pid=20849 comm="syz.5.4027" dev="nsfs" ino=4026533900 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1336.289643][ T30] audit: type=1400 audit(1765917925.213:6233): avc: denied { read } for pid=20849 comm="syz.5.4027" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 1336.318282][ T30] audit: type=1400 audit(1765917925.213:6234): avc: denied { map_create } for pid=20849 comm="syz.5.4027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1336.371489][ T30] audit: type=1400 audit(1765917925.213:6235): avc: denied { create } for pid=20849 comm="syz.5.4027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1336.386637][T20857] netlink: 68 bytes leftover after parsing attributes in process `syz.2.4030'. [ 1336.436509][ T30] audit: type=1400 audit(1765917925.213:6236): avc: denied { create } for pid=20849 comm="syz.5.4027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1336.497213][ T30] audit: type=1400 audit(1765917925.213:6237): avc: denied { map_create } for pid=20849 comm="syz.5.4027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1336.517257][ T30] audit: type=1400 audit(1765917925.222:6238): avc: denied { create } for pid=20854 comm="syz.2.4029" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 1336.550125][ T30] audit: type=1400 audit(1765917925.222:6239): avc: denied { prog_load } for pid=20849 comm="syz.5.4027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1336.615992][T20864] batman_adv: batadv0: Adding interface: macvlan2 [ 1336.622513][T20864] batman_adv: batadv0: The MTU of interface macvlan2 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1336.665949][T20864] batman_adv: batadv0: Interface activated: macvlan2 [ 1336.673374][T20868] [U] vÔ3¸Âfù¾"SçÁ/Éê4:ÃXTz“W¡t‘’lWµ«= [ 1336.679273][T20868] [U] J"—e:ÀÆ" [ 1336.777197][T20871] FAULT_INJECTION: forcing a failure. [ 1336.777197][T20871] name failslab, interval 1, probability 0, space 0, times 0 [ 1336.819452][T20871] CPU: 0 UID: 0 PID: 20871 Comm: syz.1.4036 Tainted: G L syzkaller #0 PREEMPT(full) [ 1336.819485][T20871] Tainted: [L]=SOFTLOCKUP [ 1336.819493][T20871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1336.819504][T20871] Call Trace: [ 1336.819511][T20871] [ 1336.819519][T20871] dump_stack_lvl+0x16c/0x1f0 [ 1336.819547][T20871] should_fail_ex+0x512/0x640 [ 1336.819573][T20871] ? fs_reclaim_acquire+0xae/0x150 [ 1336.819601][T20871] should_failslab+0xc2/0x120 [ 1336.819626][T20871] __kmalloc_noprof+0xeb/0x910 [ 1336.819654][T20871] ? tomoyo_encode2+0x100/0x3e0 [ 1336.819683][T20871] ? tomoyo_encode2+0x100/0x3e0 [ 1336.819705][T20871] tomoyo_encode2+0x100/0x3e0 [ 1336.819732][T20871] tomoyo_encode+0x29/0x50 [ 1336.819755][T20871] tomoyo_realpath_from_path+0x18f/0x6e0 [ 1336.819787][T20871] tomoyo_path_number_perm+0x245/0x580 [ 1336.819808][T20871] ? tomoyo_path_number_perm+0x237/0x580 [ 1336.819833][T20871] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 1336.819883][T20871] ? d_alloc_parallel+0xb4e/0x1510 [ 1336.819908][T20871] ? current_check_access_path+0x33b/0x460 [ 1336.819931][T20871] ? __pfx_current_check_access_path+0x10/0x10 [ 1336.819961][T20871] tomoyo_path_mknod+0x10c/0x190 [ 1336.819988][T20871] ? __pfx_tomoyo_path_mknod+0x10/0x10 [ 1336.820016][T20871] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1336.820043][T20871] security_path_mknod+0x161/0x310 [ 1336.820069][T20871] lookup_open.isra.0+0xc10/0x1780 [ 1336.820099][T20871] ? __pfx_lookup_open.isra.0+0x10/0x10 [ 1336.820127][T20871] ? find_held_lock+0x2b/0x80 [ 1336.820166][T20871] ? __pfx_down_write+0x10/0x10 [ 1336.820199][T20871] path_openat+0xa95/0x3140 [ 1336.820233][T20871] ? __pfx_path_openat+0x10/0x10 [ 1336.820263][T20871] ? __lock_acquire+0x436/0x2890 [ 1336.820288][T20871] do_filp_open+0x20b/0x470 [ 1336.820314][T20871] ? __pfx_do_filp_open+0x10/0x10 [ 1336.820360][T20871] ? _raw_spin_unlock+0x28/0x50 [ 1336.820380][T20871] ? alloc_fd+0x471/0x7d0 [ 1336.820413][T20871] do_sys_openat2+0x121/0x290 [ 1336.820432][T20871] ? __pfx_do_sys_openat2+0x10/0x10 [ 1336.820451][T20871] ? __pfx___seccomp_filter+0x10/0x10 [ 1336.820483][T20871] __x64_sys_creat+0xcc/0x120 [ 1336.820502][T20871] ? __pfx___x64_sys_creat+0x10/0x10 [ 1336.820521][T20871] ? __secure_computing+0x28e/0x3b0 [ 1336.820547][T20871] ? syscall_trace_enter+0x89/0x220 [ 1336.820572][T20871] do_syscall_64+0xcd/0xf80 [ 1336.820595][T20871] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1336.820614][T20871] RIP: 0033:0x7fcb3d38f749 [ 1336.820630][T20871] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1336.820646][T20871] RSP: 002b:00007fcb3e208038 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1336.820662][T20871] RAX: ffffffffffffffda RBX: 00007fcb3d5e5fa0 RCX: 00007fcb3d38f749 [ 1336.820674][T20871] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 00002000000001c0 [ 1336.820684][T20871] RBP: 00007fcb3e208090 R08: 0000000000000000 R09: 0000000000000000 [ 1336.820694][T20871] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1336.820705][T20871] R13: 00007fcb3d5e6038 R14: 00007fcb3d5e5fa0 R15: 00007fffc298dc38 [ 1336.820729][T20871] [ 1336.821735][T20871] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1338.962623][T20917] netlink: 24 bytes leftover after parsing attributes in process `syz.0.4053'. [ 1339.392659][T20917] netlink: 28 bytes leftover after parsing attributes in process `syz.0.4053'. [ 1341.006089][T20970] netlink: 'syz.4.4067': attribute type 10 has an invalid length. [ 1342.070599][ T30] kauditd_printk_skb: 209 callbacks suppressed [ 1342.070615][ T30] audit: type=1400 audit(1765917930.732:6449): avc: denied { read write } for pid=17071 comm="syz-executor" name="loop0" dev="devtmpfs" ino=4060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1342.169956][ T30] audit: type=1400 audit(1765917930.770:6450): avc: denied { read write } for pid=16633 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1342.287660][ T30] audit: type=1400 audit(1765917930.789:6451): avc: denied { create } for pid=20971 comm="syz.4.4068" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1342.370758][ T30] audit: type=1400 audit(1765917930.817:6452): avc: denied { create } for pid=20978 comm="syz.5.4071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 1342.433248][ T30] audit: type=1400 audit(1765917930.826:6453): avc: denied { read } for pid=20978 comm="syz.5.4071" name="event0" dev="devtmpfs" ino=918 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=0 [ 1342.504936][ T30] audit: type=1400 audit(1765917930.826:6454): avc: denied { allowed } for pid=20978 comm="syz.5.4071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 1342.584453][ T30] audit: type=1400 audit(1765917930.882:6455): avc: denied { read write } for pid=16633 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1342.644358][ T30] audit: type=1400 audit(1765917930.976:6456): avc: denied { map_create } for pid=20981 comm="syz.5.4072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1342.682030][ T30] audit: type=1400 audit(1765917930.976:6457): avc: denied { prog_load } for pid=20981 comm="syz.5.4072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1342.748230][ T30] audit: type=1400 audit(1765917930.976:6458): avc: denied { create } for pid=20983 comm="syz.0.4070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=0 [ 1342.773409][T20989] FAULT_INJECTION: forcing a failure. [ 1342.773409][T20989] name failslab, interval 1, probability 0, space 0, times 0 [ 1343.002856][T20989] CPU: 0 UID: 0 PID: 20989 Comm: syz.5.4072 Tainted: G L syzkaller #0 PREEMPT(full) [ 1343.002878][T20989] Tainted: [L]=SOFTLOCKUP [ 1343.002883][T20989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1343.002889][T20989] Call Trace: [ 1343.002894][T20989] [ 1343.002900][T20989] dump_stack_lvl+0x16c/0x1f0 [ 1343.002918][T20989] should_fail_ex+0x512/0x640 [ 1343.002935][T20989] ? fs_reclaim_acquire+0xae/0x150 [ 1343.002951][T20989] should_failslab+0xc2/0x120 [ 1343.002967][T20989] __kmalloc_noprof+0xeb/0x910 [ 1343.002984][T20989] ? tomoyo_encode2+0x100/0x3e0 [ 1343.003004][T20989] ? tomoyo_encode2+0x100/0x3e0 [ 1343.003018][T20989] tomoyo_encode2+0x100/0x3e0 [ 1343.003033][T20989] tomoyo_encode+0x29/0x50 [ 1343.003047][T20989] tomoyo_realpath_from_path+0x18f/0x6e0 [ 1343.003063][T20989] ? tomoyo_profile+0x47/0x60 [ 1343.003081][T20989] tomoyo_path_number_perm+0x245/0x580 [ 1343.003092][T20989] ? tomoyo_path_number_perm+0x237/0x580 [ 1343.003106][T20989] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 1343.003119][T20989] ? find_held_lock+0x2b/0x80 [ 1343.003149][T20989] ? find_held_lock+0x2b/0x80 [ 1343.003165][T20989] ? hook_file_ioctl_common+0x144/0x410 [ 1343.003185][T20989] ? __fget_files+0x20e/0x3c0 [ 1343.003202][T20989] security_file_ioctl+0x9b/0x240 [ 1343.003218][T20989] __x64_sys_ioctl+0xb7/0x210 [ 1343.003232][T20989] do_syscall_64+0xcd/0xf80 [ 1343.003247][T20989] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1343.003259][T20989] RIP: 0033:0x7f9e7078f749 [ 1343.003269][T20989] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1343.003279][T20989] RSP: 002b:00007f9e71660038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1343.003291][T20989] RAX: ffffffffffffffda RBX: 00007f9e709e6180 RCX: 00007f9e7078f749 [ 1343.003298][T20989] RDX: 0000200000000040 RSI: 0000000000008b30 RDI: 0000000000000005 [ 1343.003304][T20989] RBP: 00007f9e71660090 R08: 0000000000000000 R09: 0000000000000000 [ 1343.003311][T20989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1343.003317][T20989] R13: 00007f9e709e6218 R14: 00007f9e709e6180 R15: 00007ffd35fdf498 [ 1343.003332][T20989] [ 1343.003348][T20989] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1343.478059][T20999] netlink: 76 bytes leftover after parsing attributes in process `syz.1.4078'. [ 1346.188909][T21065] FAULT_INJECTION: forcing a failure. [ 1346.188909][T21065] name failslab, interval 1, probability 0, space 0, times 0 [ 1346.204886][T21065] CPU: 1 UID: 0 PID: 21065 Comm: syz.2.4101 Tainted: G L syzkaller #0 PREEMPT(full) [ 1346.204916][T21065] Tainted: [L]=SOFTLOCKUP [ 1346.204923][T21065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1346.204934][T21065] Call Trace: [ 1346.204941][T21065] [ 1346.204949][T21065] dump_stack_lvl+0x16c/0x1f0 [ 1346.204975][T21065] should_fail_ex+0x512/0x640 [ 1346.205003][T21065] should_failslab+0xc2/0x120 [ 1346.205026][T21065] __kmalloc_node_track_caller_noprof+0xec/0x930 [ 1346.205049][T21065] ? sidtab_sid2str_get+0x17a/0x680 [ 1346.205078][T21065] ? kmemdup_noprof+0x29/0x60 [ 1346.205094][T21065] kmemdup_noprof+0x29/0x60 [ 1346.205115][T21065] sidtab_sid2str_get+0x17a/0x680 [ 1346.205142][T21065] sidtab_entry_to_string+0x33/0x110 [ 1346.205168][T21065] security_sid_to_context_core+0x35c/0x640 [ 1346.205194][T21065] avc_audit_post_callback+0x109/0x8c0 [ 1346.205217][T21065] ? __pfx_audit_log_lsm_data+0x10/0x10 [ 1346.205235][T21065] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 1346.205254][T21065] ? skb_put+0x138/0x1b0 [ 1346.205272][T21065] ? audit_log_n_string+0x253/0x550 [ 1346.205293][T21065] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 1346.205311][T21065] common_lsm_audit+0x24e/0x300 [ 1346.205329][T21065] ? __pfx_common_lsm_audit+0x10/0x10 [ 1346.205344][T21065] ? __lock_acquire+0x436/0x2890 [ 1346.205366][T21065] slow_avc_audit+0x186/0x210 [ 1346.205386][T21065] ? __pfx_slow_avc_audit+0x10/0x10 [ 1346.205407][T21065] ? find_held_lock+0x2b/0x80 [ 1346.205426][T21065] ? avc_denied+0x14a/0x190 [ 1346.205447][T21065] ? avc_has_perm_noaudit+0x306/0x3b0 [ 1346.205470][T21065] avc_has_perm+0x1b5/0x1f0 [ 1346.205491][T21065] ? __pfx_avc_has_perm+0x10/0x10 [ 1346.205513][T21065] ? tomoyo_mount_permission+0x1ab/0x420 [ 1346.205535][T21065] inode_has_perm+0x166/0x1d0 [ 1346.205550][T21065] selinux_mount+0x381/0x460 [ 1346.205570][T21065] ? __pfx_selinux_mount+0x10/0x10 [ 1346.205597][T21065] security_sb_mount+0xc8/0x260 [ 1346.205614][T21065] path_mount+0x158/0x23a0 [ 1346.205628][T21065] ? rcu_is_watching+0x12/0xc0 [ 1346.205644][T21065] ? __pfx_path_mount+0x10/0x10 [ 1346.205658][T21065] ? kmem_cache_free+0x2d8/0x770 [ 1346.205672][T21065] ? putname+0xf5/0x1a0 [ 1346.205696][T21065] ? putname+0xf5/0x1a0 [ 1346.205713][T21065] ? putname+0xf5/0x1a0 [ 1346.205735][T21065] ? __x64_sys_mount+0x293/0x310 [ 1346.205747][T21065] __x64_sys_mount+0x293/0x310 [ 1346.205761][T21065] ? __pfx___x64_sys_mount+0x10/0x10 [ 1346.205775][T21065] ? fdget+0x187/0x210 [ 1346.205796][T21065] do_syscall_64+0xcd/0xf80 [ 1346.205823][T21065] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1346.205838][T21065] RIP: 0033:0x7f5b4e58f749 [ 1346.205851][T21065] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1346.205864][T21065] RSP: 002b:00007f5b4f353038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1346.205879][T21065] RAX: ffffffffffffffda RBX: 00007f5b4e7e6090 RCX: 00007f5b4e58f749 [ 1346.205887][T21065] RDX: 0000200000000040 RSI: 0000200000000000 RDI: 0000200000000140 [ 1346.205896][T21065] RBP: 00007f5b4f353090 R08: 0000000000000000 R09: 0000000000000000 [ 1346.205904][T21065] R10: 0000000000208000 R11: 0000000000000246 R12: 0000000000000002 [ 1346.205911][T21065] R13: 00007f5b4e7e6128 R14: 00007f5b4e7e6090 R15: 00007ffe027e6778 [ 1346.205932][T21065] [ 1347.422195][ T30] kauditd_printk_skb: 240 callbacks suppressed [ 1347.422206][ T30] audit: type=1400 audit(1765917935.747:6699): avc: denied { read write } for pid=21099 comm="syz.1.4115" name="nullb0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1347.519910][ T30] audit: type=1400 audit(1765917935.794:6700): avc: denied { execmem } for pid=21094 comm="syz.0.4113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1347.713000][ T30] audit: type=1400 audit(1765917935.803:6701): avc: denied { create } for pid=21094 comm="syz.0.4113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1347.765946][ T30] audit: type=1400 audit(1765917935.812:6702): avc: denied { read } for pid=21094 comm="syz.0.4113" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 1347.848795][ T30] audit: type=1400 audit(1765917935.812:6703): avc: denied { allowed } for pid=21094 comm="syz.0.4113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 1347.969597][ T30] audit: type=1400 audit(1765917935.812:6704): avc: denied { prog_load } for pid=21097 comm="syz.2.4114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1348.022284][ T30] audit: type=1400 audit(1765917935.812:6705): avc: denied { prog_load } for pid=21097 comm="syz.2.4114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1348.066776][ T30] audit: type=1400 audit(1765917935.812:6706): avc: denied { create } for pid=21097 comm="syz.2.4114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 1348.148577][ T30] audit: type=1400 audit(1765917935.812:6707): avc: denied { wake_alarm } for pid=21097 comm="syz.2.4114" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 1348.388808][ T30] audit: type=1400 audit(1765917935.971:6708): avc: denied { read write } for pid=18067 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1348.832626][T21132] netlink: 12 bytes leftover after parsing attributes in process `syz.5.4124'. [ 1349.377059][T21147] netlink: 24 bytes leftover after parsing attributes in process `syz.0.4130'. [ 1349.476886][T21147] netlink: 28 bytes leftover after parsing attributes in process `syz.0.4130'. [ 1352.466223][T21214] netlink: 'syz.2.4155': attribute type 1 has an invalid length. [ 1352.614592][T21214] bond3: entered promiscuous mode [ 1352.634597][T21214] 8021q: adding VLAN 0 to HW filter on device bond3 [ 1352.826439][ T30] kauditd_printk_skb: 246 callbacks suppressed [ 1352.826455][ T30] audit: type=1400 audit(1765917940.808:6955): avc: denied { read write } for pid=17451 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1352.924890][ T30] audit: type=1400 audit(1765917940.892:6956): avc: denied { create } for pid=21227 comm="syz.1.4160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1352.958545][ T30] audit: type=1400 audit(1765917940.920:6957): avc: denied { create } for pid=21213 comm="syz.2.4155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=0 [ 1352.984322][ T30] audit: type=1400 audit(1765917940.920:6958): avc: denied { create } for pid=21213 comm="syz.2.4155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1353.009613][ T30] audit: type=1400 audit(1765917940.920:6959): avc: denied { map_create } for pid=21213 comm="syz.2.4155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1353.081894][ T30] audit: type=1400 audit(1765917940.920:6960): avc: denied { map_create } for pid=21213 comm="syz.2.4155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1353.165473][ T30] audit: type=1400 audit(1765917941.014:6961): avc: denied { read write } for pid=18067 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1353.200162][ T30] audit: type=1400 audit(1765917941.051:6962): avc: denied { create } for pid=21231 comm="syz.4.4161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 1353.317483][ T30] audit: type=1400 audit(1765917941.061:6963): avc: denied { read } for pid=21231 comm="syz.4.4161" dev="nsfs" ino=4026534453 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1353.527460][ T30] audit: type=1400 audit(1765917941.061:6964): avc: denied { create } for pid=21231 comm="syz.4.4161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1355.020904][T21260] bridge0: port 3(veth0_to_bridge) entered blocking state [ 1355.029423][T21260] bridge0: port 3(veth0_to_bridge) entered disabled state [ 1355.067386][T21260] veth0_to_bridge: entered allmulticast mode [ 1355.079658][T21260] veth0_to_bridge: entered promiscuous mode [ 1355.872845][T21280] netlink: 24 bytes leftover after parsing attributes in process `syz.4.4176'. [ 1355.922427][T21280] netlink: 28 bytes leftover after parsing attributes in process `syz.4.4176'. [ 1357.873972][T21314] netlink: 24 bytes leftover after parsing attributes in process `syz.0.4187'. [ 1358.092478][T21314] netlink: 28 bytes leftover after parsing attributes in process `syz.0.4187'. [ 1358.240659][ T30] kauditd_printk_skb: 230 callbacks suppressed [ 1358.240675][ T30] audit: type=1400 audit(1765917945.860:7195): avc: denied { read write } for pid=18067 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1358.359648][ T30] audit: type=1400 audit(1765917945.972:7196): avc: denied { read write } for pid=17071 comm="syz-executor" name="loop0" dev="devtmpfs" ino=4060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1358.560287][ T30] audit: type=1400 audit(1765917946.169:7197): avc: denied { read } for pid=21322 comm="syz.0.4189" name="card1" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=0 [ 1358.650883][ T30] audit: type=1400 audit(1765917946.169:7198): avc: denied { create } for pid=21322 comm="syz.0.4189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 1358.706050][ T30] audit: type=1400 audit(1765917946.169:7199): avc: denied { execmem } for pid=21322 comm="syz.0.4189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1358.751634][ T30] audit: type=1400 audit(1765917946.234:7200): avc: denied { read write } for pid=17451 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1358.842107][ T30] audit: type=1400 audit(1765917946.243:7201): avc: denied { create } for pid=21322 comm="syz.0.4189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1358.958206][ T30] audit: type=1400 audit(1765917946.402:7202): avc: denied { read } for pid=21327 comm="syz.1.4190" dev="nsfs" ino=4026534249 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1359.031705][ T30] audit: type=1400 audit(1765917946.402:7203): avc: denied { create } for pid=21327 comm="syz.1.4190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1359.132223][ T30] audit: type=1400 audit(1765917946.421:7204): avc: denied { read } for pid=21327 comm="syz.1.4190" dev="nsfs" ino=4026534249 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1362.320124][T21407] FAULT_INJECTION: forcing a failure. [ 1362.320124][T21407] name failslab, interval 1, probability 0, space 0, times 0 [ 1362.344758][T21407] CPU: 1 UID: 0 PID: 21407 Comm: syz.4.4218 Tainted: G L syzkaller #0 PREEMPT(full) [ 1362.344790][T21407] Tainted: [L]=SOFTLOCKUP [ 1362.344797][T21407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1362.344807][T21407] Call Trace: [ 1362.344813][T21407] [ 1362.344820][T21407] dump_stack_lvl+0x16c/0x1f0 [ 1362.344849][T21407] should_fail_ex+0x512/0x640 [ 1362.344874][T21407] ? fs_reclaim_acquire+0xae/0x150 [ 1362.344901][T21407] should_failslab+0xc2/0x120 [ 1362.344924][T21407] __kmalloc_noprof+0xeb/0x910 [ 1362.344950][T21407] ? tomoyo_encode2+0x100/0x3e0 [ 1362.344978][T21407] ? tomoyo_encode2+0x100/0x3e0 [ 1362.345000][T21407] tomoyo_encode2+0x100/0x3e0 [ 1362.345027][T21407] tomoyo_encode+0x29/0x50 [ 1362.345049][T21407] tomoyo_realpath_from_path+0x18f/0x6e0 [ 1362.345076][T21407] ? tomoyo_profile+0x47/0x60 [ 1362.345104][T21407] tomoyo_path_number_perm+0x245/0x580 [ 1362.345124][T21407] ? tomoyo_path_number_perm+0x237/0x580 [ 1362.345148][T21407] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 1362.345171][T21407] ? find_held_lock+0x2b/0x80 [ 1362.345223][T21407] ? find_held_lock+0x2b/0x80 [ 1362.345247][T21407] ? hook_file_ioctl_common+0x144/0x410 [ 1362.345280][T21407] ? __fget_files+0x20e/0x3c0 [ 1362.345309][T21407] security_file_ioctl+0x9b/0x240 [ 1362.345334][T21407] __x64_sys_ioctl+0xb7/0x210 [ 1362.345357][T21407] do_syscall_64+0xcd/0xf80 [ 1362.345382][T21407] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1362.345400][T21407] RIP: 0033:0x7f6c2518f749 [ 1362.345415][T21407] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1362.345433][T21407] RSP: 002b:00007f6c260cc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1362.345452][T21407] RAX: ffffffffffffffda RBX: 00007f6c253e5fa0 RCX: 00007f6c2518f749 [ 1362.345465][T21407] RDX: 0000200000000000 RSI: 0000000000008916 RDI: 0000000000000003 [ 1362.345477][T21407] RBP: 00007f6c260cc090 R08: 0000000000000000 R09: 0000000000000000 [ 1362.345488][T21407] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1362.345500][T21407] R13: 00007f6c253e6038 R14: 00007f6c253e5fa0 R15: 00007fff475a1088 [ 1362.345529][T21407] [ 1362.347161][T21407] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1362.831668][T21414] netlink: 16 bytes leftover after parsing attributes in process `syz.4.4220'. [ 1363.288439][T21421] bond0: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 1363.591246][ T30] kauditd_printk_skb: 203 callbacks suppressed [ 1363.591261][ T30] audit: type=1400 audit(1765918206.876:7408): avc: denied { read write } for pid=21431 comm="syz.2.4226" name="vhost-vsock" dev="devtmpfs" ino=1275 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=0 [ 1363.650034][ T30] audit: type=1400 audit(1765918206.876:7409): avc: denied { prog_load } for pid=21431 comm="syz.2.4226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1363.969188][ T30] audit: type=1400 audit(1765918206.922:7410): avc: denied { read } for pid=21431 comm="syz.2.4226" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 1363.993201][ T30] audit: type=1400 audit(1765918206.941:7411): avc: denied { create } for pid=21431 comm="syz.2.4226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1364.019630][ T30] audit: type=1400 audit(1765918206.960:7412): avc: denied { prog_load } for pid=21433 comm="syz.1.4227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1364.048692][ T30] audit: type=1400 audit(1765918206.997:7413): avc: denied { read write } for pid=17656 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1364.093133][ T30] audit: type=1400 audit(1765918207.063:7414): avc: denied { name_bind } for pid=21433 comm="syz.1.4227" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=0 [ 1364.133013][ T30] audit: type=1400 audit(1765918207.072:7415): avc: denied { prog_load } for pid=21433 comm="syz.1.4227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1364.181202][ T30] audit: type=1400 audit(1765918207.072:7416): avc: denied { prog_load } for pid=21433 comm="syz.1.4227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1364.214688][ T30] audit: type=1400 audit(1765918207.072:7417): avc: denied { prog_load } for pid=21433 comm="syz.1.4227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1365.566741][T21474] netlink: 24 bytes leftover after parsing attributes in process `syz.4.4243'. [ 1365.641833][T21474] A link change request failed with some changes committed already. Interface gre1 may have been left with an inconsistent configuration, please check. [ 1366.785097][T21513] netlink: 80 bytes leftover after parsing attributes in process `syz.1.4260'. [ 1366.799560][T21513] netlink: 'syz.1.4260': attribute type 19 has an invalid length. [ 1366.807673][T21513] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4260'. [ 1366.807941][T21514] netlink: 'syz.1.4260': attribute type 19 has an invalid length. [ 1366.835963][T17058] netdevsim netdevsim1 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 1366.845434][T17058] netdevsim netdevsim1 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 1366.854676][T17058] netdevsim netdevsim1 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 1366.861658][T21514] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4260'. [ 1366.865327][T17058] netdevsim netdevsim1 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 1367.044242][T21523] xt_connbytes: Forcing CT accounting to be enabled [ 1367.051163][T21523] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'nat' [ 1367.557331][T21530] FAULT_INJECTION: forcing a failure. [ 1367.557331][T21530] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1367.635245][T21530] CPU: 1 UID: 0 PID: 21530 Comm: syz.0.4265 Tainted: G L syzkaller #0 PREEMPT(full) [ 1367.635269][T21530] Tainted: [L]=SOFTLOCKUP [ 1367.635276][T21530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1367.635286][T21530] Call Trace: [ 1367.635292][T21530] [ 1367.635297][T21530] dump_stack_lvl+0x16c/0x1f0 [ 1367.635315][T21530] should_fail_ex+0x512/0x640 [ 1367.635342][T21530] _copy_from_user+0x2e/0xd0 [ 1367.635367][T21530] snd_seq_oss_write+0x397/0x7d0 [ 1367.635390][T21530] ? __pfx_snd_seq_oss_write+0x10/0x10 [ 1367.635409][T21530] ? bpf_lsm_file_permission+0x9/0x10 [ 1367.635423][T21530] ? __pfx_odev_write+0x10/0x10 [ 1367.635435][T21530] odev_write+0x51/0xa0 [ 1367.635448][T21530] vfs_write+0x2a0/0x11d0 [ 1367.635465][T21530] ? __pfx_vfs_write+0x10/0x10 [ 1367.635477][T21530] ? find_held_lock+0x2b/0x80 [ 1367.635494][T21530] ? __fget_files+0x204/0x3c0 [ 1367.635511][T21530] ? __fget_files+0x20e/0x3c0 [ 1367.635530][T21530] ksys_write+0x12a/0x250 [ 1367.635543][T21530] ? __pfx_ksys_write+0x10/0x10 [ 1367.635560][T21530] do_syscall_64+0xcd/0xf80 [ 1367.635575][T21530] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1367.635587][T21530] RIP: 0033:0x7f207538f749 [ 1367.635600][T21530] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1367.635611][T21530] RSP: 002b:00007f20761ba038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1367.635622][T21530] RAX: ffffffffffffffda RBX: 00007f20755e5fa0 RCX: 00007f207538f749 [ 1367.635630][T21530] RDX: 000000000000021e RSI: 0000200000000580 RDI: 0000000000000003 [ 1367.635637][T21530] RBP: 00007f20761ba090 R08: 0000000000000000 R09: 0000000000000000 [ 1367.635643][T21530] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1367.635649][T21530] R13: 00007f20755e6038 R14: 00007f20755e5fa0 R15: 00007fffcd175898 [ 1367.635664][T21530] [ 1368.113521][T21542] x_tables: duplicate underflow at hook 3 [ 1368.383068][T21554] No such timeout policy "syz1" [ 1369.001855][ T30] kauditd_printk_skb: 304 callbacks suppressed [ 1369.001870][ T30] audit: type=1400 audit(1765918211.936:7722): avc: denied { read write } for pid=17451 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1369.089587][ T30] audit: type=1400 audit(1765918211.973:7723): avc: denied { read write } for pid=17656 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1369.207718][ T30] audit: type=1400 audit(1765918212.011:7724): avc: denied { prog_load } for pid=21570 comm="syz.2.4278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1369.332696][ T30] audit: type=1400 audit(1765918212.086:7725): avc: denied { prog_load } for pid=21569 comm="syz.1.4277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1369.354308][ T30] audit: type=1400 audit(1765918212.095:7726): avc: denied { create } for pid=21570 comm="syz.2.4278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 1369.374986][ T30] audit: type=1400 audit(1765918212.095:7727): avc: denied { execmem } for pid=21570 comm="syz.2.4278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1369.394627][ T30] audit: type=1400 audit(1765918212.151:7728): avc: denied { map_create } for pid=21570 comm="syz.2.4278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1369.463136][ T30] audit: type=1400 audit(1765918212.151:7729): avc: denied { prog_load } for pid=21570 comm="syz.2.4278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1369.511232][ T30] audit: type=1400 audit(1765918212.151:7730): avc: denied { prog_load } for pid=21570 comm="syz.2.4278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1369.567967][ T30] audit: type=1400 audit(1765918212.207:7731): avc: denied { read write } for pid=21570 comm="syz.2.4278" name="comedi4" dev="devtmpfs" ino=1280 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1373.209772][T21650] No such timeout policy "syz1" [ 1374.370361][ T30] kauditd_printk_skb: 205 callbacks suppressed [ 1374.370372][ T30] audit: type=1400 audit(1765918216.950:7937): avc: denied { create } for pid=21674 comm="syz.1.4314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 1374.434723][ T30] audit: type=1400 audit(1765918216.978:7938): avc: denied { create } for pid=21674 comm="syz.1.4314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1374.482812][ T30] audit: type=1400 audit(1765918216.978:7939): avc: denied { create } for pid=21674 comm="syz.1.4314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1374.523973][ T30] audit: type=1400 audit(1765918217.006:7940): avc: denied { read write } for pid=17451 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1374.643306][ T30] audit: type=1400 audit(1765918217.015:7941): avc: denied { prog_load } for pid=21675 comm="syz.4.4315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1374.708747][ T30] audit: type=1400 audit(1765918217.015:7942): avc: denied { execmem } for pid=21675 comm="syz.4.4315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1374.751604][ T30] audit: type=1400 audit(1765918217.015:7943): avc: denied { read write } for pid=21679 comm="syz.1.4316" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1374.792807][T21682] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4317'. [ 1374.813027][ T30] audit: type=1400 audit(1765918217.043:7944): avc: denied { prog_load } for pid=21675 comm="syz.4.4315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1374.861073][ T30] audit: type=1400 audit(1765918217.053:7945): avc: denied { create } for pid=21679 comm="syz.1.4316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 1374.905086][ T30] audit: type=1400 audit(1765918217.053:7946): avc: denied { create } for pid=21679 comm="syz.1.4316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 1376.074992][ T5828] Bluetooth: hci4: connection err: -111 [ 1376.112323][ T5828] Bluetooth: hci4: unexpected Set CIG Parameters response data [ 1376.134771][ T5828] Bluetooth: hci4: unexpected event for opcode 0x2062 [ 1376.612445][T21716] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4330'. [ 1490.327324][ C1] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 1490.334297][ C1] rcu: (detected by 1, t=10505 jiffies, g=113745, q=186 ncpus=2) [ 1490.342089][ C1] rcu: All QSes seen, last rcu_preempt kthread activity 10505 (4295082329-4295071824), jiffies_till_next_fqs=1, root ->qsmask 0x0 [ 1490.355441][ C1] rcu: rcu_preempt kthread starved for 10505 jiffies! g113745 f0x2 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 [ 1490.366709][ C1] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 1490.376663][ C1] rcu: RCU grace-period kthread stack dump: [ 1490.382533][ C1] task:rcu_preempt state:R running task stack:28064 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00080000 [ 1490.396024][ C1] Call Trace: [ 1490.399290][ C1] [ 1490.402211][ C1] ? __schedule+0x10b9/0x6150 [ 1490.407233][ C1] __schedule+0x1139/0x6150 [ 1490.411748][ C1] ? __pfx___schedule+0x10/0x10 [ 1490.416596][ C1] ? find_held_lock+0x2b/0x80 [ 1490.421273][ C1] ? schedule+0x2d7/0x3a0 [ 1490.425598][ C1] schedule+0xe7/0x3a0 [ 1490.429661][ C1] schedule_timeout+0x123/0x290 [ 1490.434509][ C1] ? __pfx_schedule_timeout+0x10/0x10 [ 1490.439873][ C1] ? __pfx_process_timeout+0x10/0x10 [ 1490.445156][ C1] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 1490.450959][ C1] ? prepare_to_swait_event+0xf5/0x480 [ 1490.456423][ C1] rcu_gp_fqs_loop+0x1ea/0xaf0 [ 1490.461190][ C1] ? __pfx_rcu_gp_fqs_loop+0x10/0x10 [ 1490.466473][ C1] ? lockdep_hardirqs_on+0x7c/0x110 [ 1490.471670][ C1] ? __pfx_rcu_gp_init+0x10/0x10 [ 1490.476602][ C1] ? rcu_gp_cleanup+0x7c1/0xe90 [ 1490.481453][ C1] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 1490.487270][ C1] rcu_gp_kthread+0x26d/0x380 [ 1490.491944][ C1] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 1490.497138][ C1] ? rcu_is_watching+0x12/0xc0 [ 1490.501901][ C1] ? lockdep_hardirqs_on+0x7c/0x110 [ 1490.507110][ C1] ? __kthread_parkme+0x19e/0x250 [ 1490.512129][ C1] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 1490.517323][ C1] kthread+0x3c5/0x780 [ 1490.521387][ C1] ? __pfx_kthread+0x10/0x10 [ 1490.525974][ C1] ? rcu_is_watching+0x12/0xc0 [ 1490.530735][ C1] ? __pfx_kthread+0x10/0x10 [ 1490.535324][ C1] ret_from_fork+0x983/0xb10 [ 1490.539913][ C1] ? __pfx_ret_from_fork+0x10/0x10 [ 1490.545040][ C1] ? __switch_to+0x7af/0x10d0 [ 1490.549716][ C1] ? __pfx_kthread+0x10/0x10 [ 1490.554308][ C1] ret_from_fork_asm+0x1a/0x30 [ 1490.559087][ C1] [ 1490.562093][ C1] rcu: Stack dump where RCU GP kthread last ran: [ 1490.568398][ C1] Sending NMI from CPU 1 to CPUs 0: [ 1490.573603][ C0] NMI backtrace for cpu 0 [ 1490.573624][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT(full) [ 1490.573647][ C0] Tainted: [L]=SOFTLOCKUP [ 1490.573654][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1490.573665][ C0] RIP: 0010:do_raw_spin_lock+0x108/0x2b0 [ 1490.573691][ C0] Code: b6 14 02 4c 89 e0 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 67 01 00 00 8b 53 08 65 8b 05 34 5e 18 12 39 c2 0f 84 34 01 00 00 <48> 89 df be 04 00 00 00 c7 44 24 28 00 00 00 00 e8 f3 7f 8e 00 be [ 1490.573708][ C0] RSP: 0018:ffffc90000007da8 EFLAGS: 00000086 [ 1490.573722][ C0] RAX: 0000000000000000 RBX: ffff8880b8428440 RCX: fb268dbe5ff7dd64 [ 1490.573734][ C0] RDX: 00000000ffffffff RSI: ffffffff8daa7ad1 RDI: ffff8880b8428444 [ 1490.573746][ C0] RBP: 1ffff92000000fb6 R08: 00000000ffffffff R09: 00000000ffffffff [ 1490.573758][ C0] R10: 0000000000000000 R11: ffffffff8e098670 R12: ffff8880b8428448 [ 1490.573769][ C0] R13: ffff8880b8428450 R14: ffff888078c66300 R15: 0000000000000001 [ 1490.573781][ C0] FS: 0000000000000000(0000) GS:ffff8881248f6000(0000) knlGS:0000000000000000 [ 1490.573798][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1490.573809][ C0] CR2: 00007f2076199d58 CR3: 00000000348fa000 CR4: 00000000003526f0 [ 1490.573821][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 000000000300002a [ 1490.573832][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [ 1490.573843][ C0] Call Trace: [ 1490.573849][ C0] [ 1490.573858][ C0] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 1490.573886][ C0] __hrtimer_run_queues+0x2bc/0xc40 [ 1490.573916][ C0] ? __pfx___hrtimer_run_queues+0x10/0x10 [ 1490.573941][ C0] ? read_tsc+0x9/0x20 [ 1490.573968][ C0] hrtimer_interrupt+0x397/0x8e0 [ 1490.573990][ C0] __sysvec_apic_timer_interrupt+0x10b/0x3c0 [ 1490.574014][ C0] sysvec_apic_timer_interrupt+0x9f/0xc0 [ 1490.574036][ C0] [ 1490.574041][ C0] [ 1490.574048][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1490.574068][ C0] RIP: 0010:pv_native_safe_halt+0xf/0x20 [ 1490.574088][ C0] Code: c6 5f 02 c3 cc cc cc cc 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d 13 59 12 00 fb f4 cc 35 03 00 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 [ 1490.574105][ C0] RSP: 0018:ffffffff8e007df8 EFLAGS: 000002c6 [ 1490.574118][ C0] RAX: 0000000005622e9f RBX: 0000000000000000 RCX: ffffffff8b7806d9 [ 1490.574129][ C0] RDX: 0000000000000000 RSI: ffffffff8dacdb69 RDI: ffffffff8bf2b380 [ 1490.574141][ C0] RBP: fffffbfff1c12f68 R08: 0000000000000001 R09: ffffed101708673d [ 1490.574152][ C0] R10: ffff8880b84339eb R11: ffffffff8e098670 R12: 0000000000000000 [ 1490.574163][ C0] R13: ffffffff8e097b40 R14: ffffffff9088afd0 R15: 0000000000000000 [ 1490.574179][ C0] ? ct_kernel_exit+0x139/0x190 [ 1490.574202][ C0] default_idle+0x13/0x20 [ 1490.574225][ C0] default_idle_call+0x6c/0xb0 [ 1490.574247][ C0] do_idle+0x38d/0x510 [ 1490.574273][ C0] ? __pfx_do_idle+0x10/0x10 [ 1490.574300][ C0] cpu_startup_entry+0x4f/0x60 [ 1490.574325][ C0] rest_init+0x16b/0x2b0 [ 1490.574349][ C0] ? acpi_subsystem_init+0x133/0x180 [ 1490.574365][ C0] ? __pfx_x86_late_time_init+0x10/0x10 [ 1490.574382][ C0] start_kernel+0x3ef/0x4d0 [ 1490.574408][ C0] x86_64_start_reservations+0x18/0x30 [ 1490.574434][ C0] x86_64_start_kernel+0x130/0x190 [ 1490.574460][ C0] common_startup_64+0x13e/0x148 [ 1490.574487][ C0]