last executing test programs: 21.849017218s ago: executing program 1 (id=1064): r0 = openat$rnullb(0xffffffffffffff9c, &(0x7f0000000000), 0x103680, 0x0) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000040)) r1 = ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) mmap$KVM_VCPU(&(0x7f0000ffc000/0x1000)=nil, r1, 0x8, 0x80010, r0, 0x0) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r0, 0x8008f512, &(0x7f0000000080)) ioctl$XFS_IOC_BULKSTAT(0xffffffffffffffff, 0x8040587f, &(0x7f0000000240)={{0x1, 0x1, 0xfffffffc, 0x4, 0x6}, &(0x7f00000000c0)=[{}, {}]}) ioctl$BTRFS_IOC_SEND(r0, 0x40489426, &(0x7f0000000300)={{r0}, 0x2, &(0x7f00000002c0)=[0x3ff, 0x8], 0x8c, 0x1, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000380)={{&(0x7f0000ff1000/0xf000)=nil, 0xf000}, 0x4}) r3 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000440)=0x60, 0x81000) sendto(r3, &(0x7f0000000480)="ce2a615c66c73dfb013b20e522d60f4773ee532678050f90ba2e83fb743f27e28e6df0f713904c0fec18e47dcde91187f6c89ef3f94cd77bcdf3bbbaf6e6c1573b25cbdc7ee79477a5f4d3784b4f84eb8177c0171453490d9b5da2e5a6a46337b928dd6b2b3377318fd6950c097fc52734a5e95ceaf318019c4857a512c9d496fbf4f1d4de77b4a0dd3b1258ea573f97bb3e0ca05e7bb765f422fb7fab4518f55583b4a0f5618e9c60f080dcf30e450ce7ccfc61c905d081", 0xb8, 0x4000000, &(0x7f0000000540)=@ax25={{0x3, @default}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80) r4 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0), &(0x7f0000000640)=0x6e) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r4, 0x8008f513, &(0x7f0000000680)) fstat(r4, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000740)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) quotactl_fd$Q_QUOTAOFF(r0, 0xffffffff80000302, r7, 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000880)) r8 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r8, 0x3, r3, &(0x7f00000008c0)={0x2000}) r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x3b) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, &(0x7f0000000d00)=0xc) r11 = fcntl$getown(r2, 0x9) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000d40)={{{@in, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@local}}, &(0x7f0000000e40)=0xe8) socketpair(0x29, 0x4, 0x1, &(0x7f0000000e80)={0xffffffffffffffff}) r14 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r15 = socket$xdp(0x2c, 0x3, 0x0) r16 = gettid() r17 = syz_clone(0x40000, &(0x7f0000000ec0)="0c253d94812026e3aad6409e6344458c088e5e790a4d98a805056960e0f5247d9c025521c37de7020d3bbcb8b0ebadbf74cae94a89982dfce6e1e573cfa2eca7ffa82adbae06bdbf61cb7d7842b449f3c34a0d1f7bac8bd14e5a83b32bb7d928", 0x60, &(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)="ef0de3d89ba3b7addd0be9846aad5d41e3daa4ac779963bba254fcbfca94a5a05ca9e8c3910171655f9d39c2ed724c5009e7d3b4e612eb6ca4ada91bc7fbf4625dcb5368bc0cb55b84e5ad9ba26a1167ebc6a4567c4355a9233c40211c0180b207f01326305bb9941cfb1ef97e6881fcd98ee7ed098385525e13000e69e0a874e1f5") getgroups(0x1, &(0x7f0000001080)=[r6]) sendmsg$unix(r4, &(0x7f0000001340)={&(0x7f0000000900)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c40)=[{&(0x7f0000000980)="4806b1c0a730facabdfc8128d4cd694f262b17946d4899aa689bf640d9550bcdcfa082f54ff230f6f9767f2c138e700a44783693b219b7ee0ba8c4a5d4f783f7024898d4a0d333527948a71b096831d3b4b9ce81b44fcaaea553a9a48a00a05b98722a13014098cda46bfc556e42a7f08f8ebfb6203788d428cbe5c5eac1f27ec75f10d506c23e211d2ecb87323f294a67902862dfa054e274aa933eb55ef6647a4f7f8f6b49c196f5abc21a22677f921e41c7877bb0f895cbdc98b90a17dedefff95dc2da7a41661054fc5cdfe4893c2ce85e61325676", 0xd7}, {&(0x7f0000000a80)="5bade2c83eaf9ac550cf5b5ac44df07ed5e7545f7c63af03f41677e26d3b6c8015af5f92ea9557975cef83ae5f65a5ed4e32e9b0ae90cc1b7efd0f2b1b7b417e14957b1eda05adc910bd38d18053d24607217350869ba465ac8c74141a659be2d369202c8f0d529c1e495c87afb2e2fd7da31c8898613315a1832cdf6bef9186e80596c0ce26f6b03979c7cc44203259f49f05199d014b194f1d22474d7f99a1ccc65a3ec3202eedd01f1a98a338d9217c14c74d817a9fa0d4bd9ce59474f2a9dfb06bc89b7e1d171ca5d7", 0xcb}, {&(0x7f0000000b80)='\a_D', 0x3}, {&(0x7f0000000bc0)}, {&(0x7f0000000c00)="6f631b0360b4bc9fad1f4da09d90567cb42cd1dbf420c96d5f8e60e95ddb22dbb24fe96d07", 0x25}], 0x5, &(0x7f0000001200)=[@cred={{0x1c, 0x1, 0x2, {0x0, r7, r10}}}, @cred={{0x1c, 0x1, 0x2, {r11, r12, r6}}}, @rights={{0x34, 0x1, 0x1, [r0, r0, r8, r13, r3, r2, r14, r3, r4]}}, @rights={{0x34, 0x1, 0x1, [r8, r3, r2, r0, r15, r3, r3, r2, r8]}}, @cred={{0x1c, 0x1, 0x2, {r16, r7, r6}}}, @cred={{0x1c, 0x1, 0x2, {r17, r5, r18}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r4, 0xffffffffffffffff, r0, r4, r9, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r5}}}], 0x140, 0x40000}, 0x20000080) 21.828191359s ago: executing program 1 (id=1065): fsopen(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x80000, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, '\x00', 0x41}, 0x9}, 0x1c) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000840)={0x1fe, 0x2, 0x3000, 0x2000, &(0x7f0000003000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x34, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21.787720299s ago: executing program 1 (id=1066): r0 = memfd_secret(0x80000) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000000000)={0x10004, 0x0, &(0x7f0000ffa000/0x3000)=nil}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x1c1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) r2 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000002580)=ANY=[@ANYBLOB="12010002000000106d0443c300000000000109022400010000b000090400021903000300222800090581030004010800"], 0x0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0xb, r3, &(0x7f0000001040)=""/222, 0xde) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="800000000001010400000000141a000002fff500240001801400018008000100e000000108000200e00000010c00028005000100000000002400028014000180080001000000000008000200ac1e00010c000280050001000000000008000740000000011c00108008000140000000000800024000000000080003"], 0x80}, 0x1, 0x0, 0x0, 0x4000810}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="3800000003010104000000000000000002000000240001801400018000010c00028005000100"/56], 0x38}}, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) prctl$PR_MCE_KILL(0x21, 0x0, 0x1) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x100, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r7 = inotify_init1(0x80000) inotify_add_watch(r7, &(0x7f0000000040)='./file1\x00', 0x7f7) link(&(0x7f0000000200)='./file1\x00', &(0x7f0000000300)='./bus\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = open(&(0x7f0000000000)='./bus\x00', 0x141b42, 0x8) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r11, 0x0, r10, 0x0, 0x1000, 0x800000000000000) splice(r8, 0x0, r12, 0x0, 0x80, 0x8) write$tun(r9, &(0x7f00000033c0)=ANY=[], 0x107c) r13 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CAP_EXIT_HYPERCALL(r13, 0x4068aea3, &(0x7f0000000040)={0x79, 0x0, 0xc}) r14 = ioctl$KVM_CREATE_VCPU(r13, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r14, 0x4400ae8f, &(0x7f00000001c0)={"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"}) ioctl$KVM_RUN(r14, 0xae80, 0x0) syz_usb_control_io$hid(r2, 0x0, 0x0) 21.167576171s ago: executing program 1 (id=1073): r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000200)=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000000)={0x42, 0x1}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f00000000c0)={0x40, 0x0, 0x1}, 0x10) bind$tipc(r1, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x1, 0x5}}, 0x10) r2 = landlock_create_ruleset(&(0x7f0000000080)={0xc0d8, 0x1}, 0x18, 0x2) landlock_restrict_self(r2, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x101140, 0x0) ioctl$FS_IOC_GETFSUUID(r3, 0x80111500, &(0x7f0000000100)) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000240)={0x42, 0x1}, 0x10) bind$tipc(r0, 0x0, 0x0) r4 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r4, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) recvfrom$inet6(r4, &(0x7f0000000000)=""/42, 0xffffffffffffff54, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000000)="48050000150019", 0x7}], 0x1) r5 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r5, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) sendmsg$tipc(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x8860) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x2042, 0x19d) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r7, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendmmsg$inet(r7, &(0x7f0000004540)=[{{&(0x7f0000000040)={0x2, 0x4e22, @multicast1}, 0x10, 0x0}}, {{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="15b26f226e2966667482d50703b0a8d92ccd9e69d5cc4cb3d467a670b237a9225fb56c0f7ea725dee27c4bb43bb50c6748c83b71d59f0537405dfab648c096607340fac939a2efd31cbe2f8ca29c409e87ea0974b7bceff9afef5dffd691575f5115f2f961ad488e3386036913e98181a6034febaab853a3e928b9035b0e3a8e1cb393c70f6d0448970e0af2476f8b923ee09c19deca55d58f70e8eeff55dda6381cb96afe97196c0af0a8fd450a1447a1a521e2c211fb84cbcf4aebd31298972ec6be", 0xc3}, {&(0x7f0000000d80)="7d68e6de85f9b0cbc9d710267f321ec64eab043ecad9af7e01e9463218ec45924a99867163e468d36a682fadd749caa325e685d75559a87139e02fae7271be8f55671cfd32a09896278d1941370174720838039d0989bc3394b8a4c4f4a30f0496be313d6d60fe47966c634a3ee1f659e8ef310647725bda0130d5de5028220a4cf5fc808a75694738ee26cb21302b4bba4265b845a5d5dce706d9820c6936b122f9658446d74a9016b94424971dd443a6907eb5c73b6b200e92b23f2c36a214729b0bc231511e4c", 0xc8}, {&(0x7f0000000380)="73fd71361e8d6c80ae1bc9953e2a4aeac7a314273066fc7f65a51969b46df1774bb0be94ccd4824f2d57ad2cd37242b1258402395481f9f07e067652e52aa8ccefcd0962ba0c48757b68d493f3ad702e65d4daa7dfc1605a173185472ae12470eea64c70ef4e64793b8a830447de0f423bef3964934eef4243cac42939ba6fa68d821b9373b5f3e2c26e7ca75ed8fb3203aef3a6637cecdd0251532b99537e02f604058f50e66c8a657d59beeed127695475f082d3d2b9790181fc987ad000ac00887d1506be89f388ecb405660b4ea196ee8f5a92b12ec43bbf49567db613d478ebe2358364f7600bf4f80ef4b2756fb13416c4fa22880cc96a03f07888575aedb001d5a74bb2f906797912b5ac080a0a3d361425f1a92ab03bbe65d5dcb235f43b5ad1162a16ebdc647baac013bf076945126cdd5a080853976a97ad55184601102fbb8df86b21aa8162858d74465c5fb7dc766602a3567f6eaf441f85ec50ca7fb3a4fdb450d1420531da25d01a412958a5e3895c59542238cf8e188e7fb5641eb24a5f1819bf8d2e9dd6c1d0e93564d723e311db9cd268bb1e477036e822b135cdbaf40f812aa7db01d22c829ab01ae24997dae96ddeed49e62d285701d5419e3f94a8b95790cf5a296ed15bffae1f71470c6a6eda872528844a2df42590d898630263cab5cccec57b7cea365ad8c91bfbe7cb419635ce6bf340a56115c0ad922b6fade9538e543bc5def2a85d35ab16d20c219c4733837be2c14ba4d3d32c3a6882ce6857626f55109b4cdcb634425d710bf3108f9b31b4af0cc17a58e49e871a56126dd8bed08e038ba64008587237b3442d28032e52fc9fae1a5784ba59d0edfa03d38352724903ed6f6970b3f4dfa6e40bf933b6765c6ee648174765f1e8ec71b80cac86abd065a3005b40a43a665707cc590997c5048183006a9dd8026d39def05950183b3d4f12f4e1644ef78cddac7c5569985c2c232bb350f28857675339e53f63a868704d2e0b38993dc57a02d3e297fc9a5b9384622841018c303a05bac25d509df5a2d0e3232927283fcc3ec67e4fa7b71d22f115cf693851dcceab4bce38cbfbb32829e211cdcb6a359e14fe416663541050d340aef2555dbd292bd9cbab8fcf20378149cc994569c2bc95fb33fd2d9321b8ac8e5160b02e202492f470eb719a8f2ac3a4be37ea0918b54b14789b7aa228d47f7b13fd9af608740c5a8fe02109a7cc0e555b22628ef790e513ecadfd338d30aed8ca219e64ee4fb0bd0e21e5101bf2072ffa071eb1aa0454caccc015ff1e166813f819a142b56a22e4ff387bb319288a0ef747c6fc8fdee3a0e193b0d086eb816e97e0322fcdaa30da61cd26ac9d8d0748fccd911ce0fd4adc953e9486e137fe66bc8aedfd5b78c562ebfc578ac9f96a453311766564541e16955e30b95914e9411a0b4cd95e0d8732d5ff7a4f921ef41d986a195334266585353b16b9449955523913a30c087532bcb899f733af3abea59baea174cf04359547a633b5f8a582ae3ef12a1d0125bef8c6e8c9fb589d3597c5ab3879491b0c5e3607203f06836a6805d3f7979c4325f9fecb2aceddedb272237132460cda812ef7d613a585898d59f92ef68ec95f12b47b440f6d899ecbfab48055e0c1605ba4cd9dbc17c4cbfec8a953ebbd38c45a6737a57ee58e21a20e530171137968ae4f0d0366cdb0b9d6a4667b011fcd7cd9e77364e5221989d8f0d80793260e748e3bd394849c090c744f6044328304cd6f02e941c5405647daffc1fd2f2864b37f92bbf4931c8e4a7c6bafd0ea79d39d330e70e6776bf6a926de227e5a43653bba04883e98d67bb64aa86e8bf271ba87604bc598e47f2992c7618ad25068860a481554b53352c7339de7e79c3bd1aed5bef8f398432858c888a5d8651969ea40eb3d486e9fe61d49b20500fdfd1548f567da970103d36730657c35d03d2c36b142665f62203b1fb12d616478cfef6f38b34cda87a634dd06d359f33e98b94a5e5b46b2a8d73126352d1d5b65af75055455cc903e384c41876fbdff935d047284d9d203b147a6ba0e9cb50beef7798886c33d2f2f0c0d9abe0e32c7c809f8b0b28fc59471987353c862a311776b8275bf319d5cb9a59f8f103b6e567ef5dd8859973cc3fe41e356bf5bd3186240e49286977eca36a8ad44185973b276cd7958b73e14a221b7fd567818bebf54ad27ee95161bd2aeeb356482ff467500a7d36f0464f58a591ec6b728f984ec78d0abe14c6d3411ac3ffc4c3179d1f95d029f26cceb545723519d3d4209a2b1243e78767273c13dc2bd320512674b6f1a50313bae7b9d16aebb476dbc829e8fd8dd46a1696efaff5795cf75de57c90f05ed9ef4a5cdfbf20d3d9ed95fb4114b1d5c9ade0856212e7ba330ce5bccf2c993dff89112b28bd3b17d3fcfacef7590f62bf948977dd79e2d8025946c80bf263e34035409b5ba1443d4929727180761bd56d258c3670a0aa4de21111fc3172367582de2d164ff3a18d0696b8dd8e5c1423b2ea1e2c0cfe141e4cf04f8cdaed48976b94c40d6a581300458661bbdbfeeb4969af6319eb1798843d0872f68f0c6537bbc9c7dd1e9b0564bf442d8d25f8aa884aba1df074d374f99750d9227bb821ba0355f60de2829a5c8cd47c89d29a2e3d7d53d59db5c3ace8f484664202c210c68a3b33076fb00d59938e84fbad6d6618c0bb89cf94035fa2de4da351e0d71df416450ea7ec3af33aa5c0313c63e654bd79c73b39dc1933636956761058d76648746daca469f8fce62c17a8160cdefc6a927eef9ec4a8dd684e46f35282546ce2362ab8afedd39bf699fd7c2cde538f52ea43c08558f42ba77b2986b800c45fa76a130b30919b3e1d504573e3c1e7dd2dc5d81379df53d736511f1da4ad8791e46adb27bb5c38129e89edda0aed99dcc03fe400f7d05d48e3e9e17744e8487f8ac464c86f7332211fb9799e9d27a6832d5f17ccd1a2da255f6da047e4728dd80860c04391bca4b7833f0346866401ec20033bcf6dfa85fd1520de5a03b4f9f6f5d2f8d7b6e7d7df1cbe5c05e23e080cf335639c94c48aaeb0bfebbe79530d67d35fb101c91839954c0e50dd4b90a86428b22b0be1e906fee30f68d7ce4bf9c68eafe695f07f5e4e4d473d77104b7b1b5dcfeb84e8c83624c0068d4e1cccfe740f8e5d5699603f8481ef2a1f2d4b8fd2314c5cb1985fe34cf8ede7d2e8bddea269422490903489c7f5951114d7ccb29a19455a987d538955712a460243105b25ccb6e6f34c370a6bbb234bee150dbcea5188e45305253f1014f7c0b5d60d517d2d05707f5ca9249a921d6c5307caf41deca0509b49102d801320db65c00f6e1c05fb8c2e1cc554673bf6168dd64086b19af28eec508fd0c304837e802173ac9947c4d73929c61d9632ab929a25f2a04350954612c2de705c1c25215284fe933fc8ccfd30ab3fc9ff5e04dd68d4720d95a29d6da176ac9d332c9ce77358f3c262777ea828fe6473638bc77be2aa586a3733e275744bc42c3742c1ad8f89d25c31958902f2f498c58fc85e9b78fb7a331734cb081cfa9ccfd262df927c0ff46983f8765af4add3532de2b91f2436df028", 0x9fd}], 0x3}}, {{0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000001700)="c9", 0x1}], 0x300}}], 0x3, 0x240080e4) add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000140)="1081b3", 0x3, 0xffffffffffffffff) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', r6, &(0x7f00000004c0)='./file1\x00', 0x5) unlinkat(r6, &(0x7f00000011c0)='./file0\x00', 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x6a) 21.105535793s ago: executing program 1 (id=1074): fsopen(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x80000, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, '\x00', 0x41}, 0x9}, 0x1c) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000840)={0x1fe, 0x2, 0x3000, 0x2000, &(0x7f0000003000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x34, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20.989001817s ago: executing program 1 (id=1075): write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000cc0)={'syz1\x00', {0xfff9, 0x0, 0x248, 0x9b99}, 0x3a, [0xfffffff8, 0x8, 0x144, 0x10009, 0x8, 0x155f, 0x8, 0x2, 0x25cd, 0x1, 0xb4, 0xa, 0xb2bd, 0x6, 0x8, 0xe4, 0x6, 0xfc000000, 0x7, 0xbbf, 0x1000, 0x3, 0x0, 0xd, 0x4, 0x12a0, 0x8000, 0x1, 0x7, 0x8, 0x7, 0x81, 0xb66, 0x79, 0x2, 0x10001, 0x5, 0x91, 0x4, 0x4, 0x16, 0x0, 0x5, 0x401, 0xfffffff5, 0x405, 0xa7, 0x81, 0x9, 0xf9a2, 0xffffff81, 0xff, 0x2, 0x2, 0x2, 0x2, 0x7, 0x4, 0x7, 0xbe, 0x4007f, 0xffffffff, 0x9212], [0x9, 0x16e, 0x6, 0x9, 0x4, 0xc66, 0xa8a9, 0x20000077, 0x8e, 0xd50, 0x7, 0x5, 0xfffffffd, 0x80a, 0x4, 0x5, 0x1000, 0x0, 0x200b395, 0x400004, 0x80000000, 0x4, 0x19, 0x7, 0x1, 0x3, 0x3, 0x7, 0x9, 0x400, 0x6, 0x4c2336d3, 0x96, 0x0, 0xfffffff8, 0x401, 0x46, 0xf1, 0x4, 0xab00060, 0x5, 0x1, 0x0, 0x5, 0x3ff, 0x1ff, 0x1, 0x7fff, 0x1, 0x1ca, 0x4, 0x80000004, 0x80000001, 0x6, 0x2, 0x9, 0x95, 0x80000000, 0x4, 0xfffffff9, 0x40000003, 0x1000, 0xfffff804, 0x5], [0x2, 0xfffffffe, 0xffff, 0xc, 0x2, 0x1ff, 0x80000001, 0x5, 0x5, 0x491, 0x5, 0x200006, 0x8, 0x400, 0xfffffffe, 0x400, 0x41, 0x6, 0xee4b, 0x2000004, 0x8000, 0x8000003, 0x5, 0x89, 0x3, 0x3, 0x9, 0x0, 0xc7, 0xfff, 0x10000a, 0x9, 0x401, 0x3e59, 0x5, 0xd3, 0x8, 0x3437, 0x3, 0xd, 0x7, 0x601, 0x101, 0xdd80, 0x60a0, 0x80, 0x9d26, 0x10000, 0x1, 0x2, 0x2, 0x6, 0x8000, 0x0, 0x3, 0xd500, 0x8, 0x77, 0x9, 0x6, 0x10000, 0x203, 0x5, 0x1], [0xa772, 0x3, 0x5, 0x1afa, 0xbfc, 0x8, 0x5, 0x7f, 0x2, 0x40, 0xff, 0x1005, 0x1, 0x8000007, 0x1e, 0x8000007f, 0x81, 0x3, 0x9d86, 0x9, 0xfffffff7, 0x8, 0xfa, 0x5396, 0x936, 0x6, 0x80008001, 0x7777, 0x1, 0x2, 0x100, 0xffffffff, 0x7fffffff, 0x9, 0xc, 0x32d, 0x0, 0x1ff, 0xcdf, 0x2, 0x10000, 0x0, 0x8004, 0x7fff, 0x0, 0x6, 0xf, 0xe, 0x5337, 0x26d, 0x6, 0xfffffff9, 0x1, 0xfffffff9, 0xd, 0xc, 0x463f, 0x7fffffff, 0x7fffffff, 0x8006, 0x8, 0x14000, 0x1, 0x9]}, 0x45c) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x80002, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f0000000340)}], 0x1, 0xe, 0xff, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x1a, 0x0, &(0x7f0000000480)) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000100), 0x2d0102, 0x0) fcntl$getflags(r5, 0x3) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000000)={[0x35, 0xfff, 0x0, 0x40000000000180, 0x2, 0x80000080, 0xf2, 0xd, 0x7fffffffffffe, 0x7, 0x5, 0x7, 0x0, 0x5, 0x4, 0x8], 0x25000, 0x304}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x20}}, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110c230000) close(r6) r7 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r8 = dup(r7) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000000840)={0x1fe, 0x2, 0x3000, 0x2000, &(0x7f0000003000/0x2000)=nil}) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r7, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r9, 0xae80, 0x0) 20.970668298s ago: executing program 32 (id=1075): write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000cc0)={'syz1\x00', {0xfff9, 0x0, 0x248, 0x9b99}, 0x3a, [0xfffffff8, 0x8, 0x144, 0x10009, 0x8, 0x155f, 0x8, 0x2, 0x25cd, 0x1, 0xb4, 0xa, 0xb2bd, 0x6, 0x8, 0xe4, 0x6, 0xfc000000, 0x7, 0xbbf, 0x1000, 0x3, 0x0, 0xd, 0x4, 0x12a0, 0x8000, 0x1, 0x7, 0x8, 0x7, 0x81, 0xb66, 0x79, 0x2, 0x10001, 0x5, 0x91, 0x4, 0x4, 0x16, 0x0, 0x5, 0x401, 0xfffffff5, 0x405, 0xa7, 0x81, 0x9, 0xf9a2, 0xffffff81, 0xff, 0x2, 0x2, 0x2, 0x2, 0x7, 0x4, 0x7, 0xbe, 0x4007f, 0xffffffff, 0x9212], [0x9, 0x16e, 0x6, 0x9, 0x4, 0xc66, 0xa8a9, 0x20000077, 0x8e, 0xd50, 0x7, 0x5, 0xfffffffd, 0x80a, 0x4, 0x5, 0x1000, 0x0, 0x200b395, 0x400004, 0x80000000, 0x4, 0x19, 0x7, 0x1, 0x3, 0x3, 0x7, 0x9, 0x400, 0x6, 0x4c2336d3, 0x96, 0x0, 0xfffffff8, 0x401, 0x46, 0xf1, 0x4, 0xab00060, 0x5, 0x1, 0x0, 0x5, 0x3ff, 0x1ff, 0x1, 0x7fff, 0x1, 0x1ca, 0x4, 0x80000004, 0x80000001, 0x6, 0x2, 0x9, 0x95, 0x80000000, 0x4, 0xfffffff9, 0x40000003, 0x1000, 0xfffff804, 0x5], [0x2, 0xfffffffe, 0xffff, 0xc, 0x2, 0x1ff, 0x80000001, 0x5, 0x5, 0x491, 0x5, 0x200006, 0x8, 0x400, 0xfffffffe, 0x400, 0x41, 0x6, 0xee4b, 0x2000004, 0x8000, 0x8000003, 0x5, 0x89, 0x3, 0x3, 0x9, 0x0, 0xc7, 0xfff, 0x10000a, 0x9, 0x401, 0x3e59, 0x5, 0xd3, 0x8, 0x3437, 0x3, 0xd, 0x7, 0x601, 0x101, 0xdd80, 0x60a0, 0x80, 0x9d26, 0x10000, 0x1, 0x2, 0x2, 0x6, 0x8000, 0x0, 0x3, 0xd500, 0x8, 0x77, 0x9, 0x6, 0x10000, 0x203, 0x5, 0x1], [0xa772, 0x3, 0x5, 0x1afa, 0xbfc, 0x8, 0x5, 0x7f, 0x2, 0x40, 0xff, 0x1005, 0x1, 0x8000007, 0x1e, 0x8000007f, 0x81, 0x3, 0x9d86, 0x9, 0xfffffff7, 0x8, 0xfa, 0x5396, 0x936, 0x6, 0x80008001, 0x7777, 0x1, 0x2, 0x100, 0xffffffff, 0x7fffffff, 0x9, 0xc, 0x32d, 0x0, 0x1ff, 0xcdf, 0x2, 0x10000, 0x0, 0x8004, 0x7fff, 0x0, 0x6, 0xf, 0xe, 0x5337, 0x26d, 0x6, 0xfffffff9, 0x1, 0xfffffff9, 0xd, 0xc, 0x463f, 0x7fffffff, 0x7fffffff, 0x8006, 0x8, 0x14000, 0x1, 0x9]}, 0x45c) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x80002, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f0000000340)}], 0x1, 0xe, 0xff, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x1a, 0x0, &(0x7f0000000480)) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000100), 0x2d0102, 0x0) fcntl$getflags(r5, 0x3) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000000)={[0x35, 0xfff, 0x0, 0x40000000000180, 0x2, 0x80000080, 0xf2, 0xd, 0x7fffffffffffe, 0x7, 0x5, 0x7, 0x0, 0x5, 0x4, 0x8], 0x25000, 0x304}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x20}}, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110c230000) close(r6) r7 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r8 = dup(r7) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000000840)={0x1fe, 0x2, 0x3000, 0x2000, &(0x7f0000003000/0x2000)=nil}) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r7, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r9, 0xae80, 0x0) 9.12906011s ago: executing program 2 (id=1103): syz_usb_connect$hid(0x0, 0x36, &(0x7f0000003ec0)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x10, 0x16c0, 0x5e1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xfa, 0xb0, 0x16, "", [{{0x9, 0x4, 0x0, 0x9, 0x2, 0x3, 0x1, 0x1, 0x48, {0x9, 0x21, 0xd, 0x0, 0x1, {0x22, 0x657}}, {{{0x9, 0x5, 0x81, 0x3, 0x3ff, 0x3, 0x8}}}}}]}}]}}, &(0x7f0000004000)={0x0, 0x0, 0x0, 0x0}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KVM_GET_EMULATED_CPUID(0xffffffffffffffff, 0xc008ae09, &(0x7f00000002c0)={0x2, 0x0, [{0x40000000, 0x7fffffff, 0x3, 0x200, 0x7, 0x7, 0x2}, {0x80000019, 0x8, 0x4, 0x7f, 0x4, 0x8001, 0x73}]}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r4 = openat$selinux_policy(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r4, 0x0) write$selinux_load(r3, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "3a7205d400000000273f4b559820c63f"}, 0x20) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000040)=0x4) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000080)={0x3, 0xbde, 0x0, &(0x7f0000000180)="a1984ec3aec3fc2e025f90eda6dbc903939aac644fd36f1e65174cae030c42cbacc392851a695f247112e91f059460a2c031929dc0515ac7cd20775ff9da9c2b6cb48968dcd6d8d982c492932c572f084d3af58650d207eec0794b3e47c5678c36b99eed61e1dbac68ce8a79aa21a51202018bdc4a51489844f785887083841d65c129992bbe5a51c71b95a9847d2bdede66c6e3184c386faf938fd6db888e73a5c0dcc69c3de7458e68ed33226a8d1c8e17", 0x0, 0xb2}) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0xd) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000340)={0x1ff, 0x2, 0x0, 0x1000, &(0x7f0000a9a000/0x1000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000140)=@x86={0x7, 0x8, 0xc5, 0x0, 0x6, 0x9, 0x4, 0x6, 0x1, 0xf8, 0x0, 0x9, 0x0, 0x3, 0x6, 0x6, 0x71, 0x4, 0xfe, '\x00', 0x4, 0x4}) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) pipe2$9p(&(0x7f0000000400)={0xffffffffffffffff}, 0x800) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000004500), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r6, @ANYBLOB=',wfdno=', @ANYRES16=r2, @ANYBLOB=',cacGe=loose,noextend,access=user']) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) write$binfmt_script(r7, &(0x7f0000000380), 0x1000a) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r7, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 7.551579213s ago: executing program 0 (id=1105): fsopen(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000840)={0x1fe, 0x2, 0x3000, 0x2000, &(0x7f0000003000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x34, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 7.550525384s ago: executing program 2 (id=1106): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0xa2f01, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) write$tun(r0, &(0x7f0000000200)={@void, @void, @eth={@broadcast, @empty, @val={@void, {0x8100, 0x1, 0x1, 0x205}}, {@ipv6={0x86dd, @icmpv6={0x9, 0x6, "4f791e", 0x1a, 0x3a, 0xff, @private1, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x6, '\x00', @private2={0xfc, 0x2, '\x00', 0x1}, [{0x19}]}}}}}}}, 0x54) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x3, 0x81, 0x3}, {0x61, 0xf}, {0x6, 0x0, 0x0, 0x5}]}) 7.550093423s ago: executing program 3 (id=1107): prlimit64(0x0, 0x9, &(0x7f0000000000)={0xfffffffffffffffb, 0xfffffffffffffffb}, 0x0) mremap(&(0x7f000016c000/0x4000)=nil, 0x4000, 0x40000000, 0x3, &(0x7f000063c000/0x3000)=nil) syz_clone(0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 7.531464634s ago: executing program 3 (id=1108): write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000cc0)={'syz1\x00', {0xfff9, 0x0, 0x248, 0x9b99}, 0x3a, [0xfffffff8, 0x8, 0x144, 0x10009, 0x8, 0x155f, 0x6, 0x2, 0x25cd, 0x1, 0xb4, 0xa, 0xb2bd, 0x6, 0x8, 0xe4, 0x6, 0xfc000000, 0x3, 0xbbf, 0x1000, 0x3, 0x0, 0xd, 0x4, 0x12a0, 0x8000, 0x1, 0x7, 0x8, 0x7, 0x81, 0xb66, 0x79, 0x2, 0x10001, 0x5, 0x91, 0x4, 0x4, 0x16, 0x0, 0x5, 0x401, 0xfffffff5, 0x405, 0xa7, 0x81, 0x9, 0xf9a2, 0xffffff81, 0xff, 0x2, 0x2, 0x2, 0x2, 0x7, 0x4, 0x7, 0xbe, 0x4007f, 0xffffffff, 0x9212], [0x9, 0x16e, 0x6, 0x9, 0x4, 0xc66, 0xa8a9, 0x20000077, 0x8e, 0xd50, 0x7, 0x5, 0xfffffffd, 0x80a, 0x4, 0x5, 0x1000, 0x0, 0x200b395, 0x400004, 0x80000000, 0x4, 0x19, 0x7, 0x1, 0x3, 0x3, 0x8, 0x9, 0x400, 0x6, 0x4c2336d3, 0x96, 0x0, 0xfffffff8, 0x401, 0x46, 0xf1, 0x4, 0xab00060, 0x5, 0x1, 0x0, 0x5, 0x3ff, 0x1ff, 0x1, 0x7fff, 0x1, 0x1ca, 0x4, 0x80000004, 0x80000001, 0x6, 0x2, 0x9, 0x95, 0x80000000, 0x4, 0xfffffff9, 0x40000003, 0x1000, 0xfffff804, 0x5], [0x2, 0xfffffffe, 0xffff, 0xc, 0x2, 0x1ff, 0x80000001, 0x5, 0x5, 0x491, 0x5, 0x200006, 0x8, 0x400, 0xfffffffe, 0x400, 0x41, 0x6, 0xee4b, 0x2000004, 0x8000, 0x8000003, 0x5, 0x89, 0x3, 0x3, 0x9, 0x0, 0xc7, 0xfff, 0x10000a, 0x8000, 0x401, 0x3e59, 0x5, 0xd3, 0x8, 0x3437, 0x3, 0xd, 0x7, 0x601, 0x101, 0xdd80, 0x60a0, 0x80, 0x1, 0x10000, 0x1, 0x2, 0x2, 0x6, 0x8000, 0x0, 0x3, 0xd500, 0x8, 0x77, 0x9, 0x6, 0x10000, 0x203, 0x5, 0x1], [0xa772, 0x3, 0x5, 0x1afa, 0xbfc, 0x8, 0x5, 0x7f, 0x55, 0x40, 0xff, 0x1005, 0x1, 0x8000007, 0x1e, 0x7f, 0x81, 0x3, 0x9d86, 0x9, 0xfffffff7, 0x8, 0xfa, 0x5396, 0x936, 0x6, 0x80008001, 0x7777, 0x1, 0x2, 0x100, 0xffffffff, 0x7fffffff, 0x9, 0xc, 0x32d, 0x0, 0x1ff, 0x2000803, 0x2, 0x10000, 0x0, 0x8004, 0x7fff, 0x0, 0x6, 0xf, 0xe, 0x5337, 0x26d, 0x6, 0xfffffff9, 0x1, 0xfffffff9, 0xd, 0xc, 0x463f, 0x7fffffff, 0x7fffffff, 0x8006, 0x8, 0x14000, 0x1, 0x9]}, 0x45c) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x80002, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f0000000340)}], 0x1, 0xe, 0xff, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x1a, 0x0, &(0x7f0000000480)) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000000)={[0x35, 0xfff, 0x0, 0x40000000000180, 0x2, 0x80000080, 0xf2, 0xd, 0x7fffffffffffe, 0x7, 0x5, 0x7, 0x0, 0x5, 0x4, 0x8], 0x25000, 0x304}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f00000003c0)={'filter\x00', 0x2, [{}, {}]}, 0x48) ioctl$KVM_RUN(r4, 0xae80, 0x0) r6 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r7 = dup(r6) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000840)={0x1fe, 0x2, 0x3000, 0x2000, &(0x7f0000003000/0x2000)=nil}) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f00000000c0)="c20000361e0f01c3660fd2eff30f10f1b961020000b80e000000ba000000000f30b98d0200000f320b99f3530000660f6af7c4e2f91d20", 0x37}], 0x1, 0x11, 0x0, 0x0) syz_kvm_setup_cpu$x86(r6, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) 5.773210624s ago: executing program 0 (id=1109): syz_usb_connect$hid(0x2, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="12010000090024206d041cc340000000000109022400010000a000090400000103010100092100080001220100090581"], 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x80400, 0x0) timer_create(0x0, &(0x7f0000002c00)={0x0, 0x22, 0x1, @thr={0x0, 0x0}}, 0x0) timer_settime(0x0, 0x1, 0x0, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000180)={{0x77359400}, {0x77359400}}, &(0x7f00000001c0)) r0 = syz_usb_connect$printer(0x1, 0x0, 0x0, &(0x7f0000000c80)={0xa, &(0x7f0000000380)={0xa, 0x6, 0x250, 0x5, 0x1, 0x6, 0x20, 0x40}, 0x15, &(0x7f00000003c0)={0x5, 0xf, 0x15, 0x3, [@ptm_cap={0x3}, @ptm_cap={0x3}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x0, 0x31, 0xf, 0x1}]}, 0x4, [{0x0, 0x0}, {0x4, &(0x7f00000008c0)=@lang_id={0x4, 0x3, 0x411}}, {0x0, 0x0}, {0x0, 0x0}]}) syz_usb_control_io$printer(r0, &(0x7f0000000e40)={0x14, &(0x7f0000000d00)={0x20, 0x23, 0x5a, {0x5a, 0x5, "9c048238e22434d44243576e2ec2ed9aa1e1d7fe4b9263f3e08b2c61c0196cd8308e45fd6eab01bf884c2727ed92ece1769adba1e78193ce36e57219bccc5de06ecec46123c0a9cb80b7ea117d2bfee7ade122789c2a665a"}}, &(0x7f0000000d80)={0x0, 0x3, 0x76, @string={0x76, 0x3, "34eae9d4353f33f0ee8a26988467182db932128bc511a2c02ba66899a7e22bbb3c2b0ed8724dec86ca30178f51293479a12423d8118b84b097b74e9105833a390787cdab870abe395d4b0e39f17075202b6c58497f6503460528204b6212aff6899c5f2e12717dd14b4a71145a54d650c87803e0"}}}, &(0x7f0000001240)={0x34, &(0x7f0000000e80)={0x20, 0xf, 0xff, "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"}, &(0x7f0000000fc0)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000001000)={0x0, 0x8, 0x1, 0x28}, &(0x7f0000001100)={0x20, 0x0, 0xae, {0xac, "71ae2ce7de068505f978bee080b45d612b4ad9ac9b50ea53bdae643486ccfccdbf9833216528351a14dced8745e2a1a8921dad8f2d8c019dfa959ccdfe46a403c083b17c4f6270e498e5f6f6030b1ab1474a293e99f082badc853462c2e2b451919c0301ed2611ec6d2666c91741045232ea13706ad6316dfc3aafaa353c8856d3fb017bf71efe0a89ec53ac6f4590d13994c00c9e9a96c8898ed5079defb56a25b944f5c3ccc2753d887390"}}, &(0x7f00000011c0)={0x20, 0x1, 0x1, 0x8}, &(0x7f0000001200)={0x20, 0x0, 0x1, 0xd}}) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x9, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x22}}, 0x6}, 0x1c) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22, 0x7, @ipv4={'\x00', '\xff\xff', @empty}, 0xd}, 0x1c) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={'batadv_slave_1\x00', {0x2, 0x0, @loopback=0x7f000000}}) ioctl$SNDRV_TIMER_IOCTL_CREATE(0xffffffffffffffff, 0xc02054a5, &(0x7f0000000200)={0x17fd, r2, 'id1\x00'}) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f0000000140)=0xff, &(0x7f00000001c0)=0xffffffd5) r4 = fcntl$dupfd(r1, 0x0, r1) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x6) sendmsg$NL80211_CMD_SET_INTERFACE(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000e40)=ANY=[], 0x20}}, 0x1) 5.769704544s ago: executing program 2 (id=1110): mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x6, 0x9, &(0x7f00000001c0)={{0x11, @private=0xa010101, 0x4e20, 0x0, 'lblc\x00', 0x1a, 0x2, 0x2000000}, {@private=0xa010101, 0x0, 0x0, 0x0, 0x7}}, 0x44) getsockopt$inet_tcp_int(r0, 0x6, 0x9, 0x0, &(0x7f0000000040)) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file2\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f00000001c0)={[{@workdir={'workdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file2'}}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@nfs_export_on}], [], 0x2c}) open$dir(&(0x7f00000000c0)='./file2\x00', 0x22800, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') lseek(r1, 0xb, 0x0) 5.769557094s ago: executing program 3 (id=1111): r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x1, 0x0, 0xfffffffd}, 0x1c) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xffffff97) 3.981247015s ago: executing program 2 (id=1112): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = inotify_init1(0x800) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) dup3(r1, r2, 0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x2}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000100)) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000140)=@arm64={0x6, 0xd1, 0x82, '\x00', 0x1}) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000000040)=0x9) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000380)={0x2, 0x0, @ioapic={0x8000000, 0x9, 0xffff, 0xfffffffd, 0x0, [{0x2, 0x4, 0x87, '\x00', 0x8}, {0x9, 0x8, 0x2, '\x00', 0xb}, {0xff, 0x7f, 0xd4, '\x00', 0x67}, {0x6, 0x2, 0xf5, '\x00', 0xf}, {0x1, 0x9, 0xc, '\x00', 0xfe}, {0x0, 0x4, 0x54, '\x00', 0xff}, {0x71, 0xd5, 0xf1, '\x00', 0x7f}, {0x3, 0x4, 0xc}, {0x7f, 0x5, 0xb, '\x00', 0x8}, {0xd7, 0xd, 0x8, '\x00', 0x6}, {0x0, 0x28, 0x7, '\x00', 0xdc}, {0x40, 0x1, 0x5, '\x00', 0x81}, {0xfe, 0x3, 0x26}, {0xcf, 0x3, 0x1, '\x00', 0x6}, {0xf, 0xee, 0xa, '\x00', 0x3}, {0x39, 0x2, 0x6, '\x00', 0xb}, {0x9, 0x6, 0x2, '\x00', 0x8}, {0x5, 0xc, 0x5, '\x00', 0xc}, {0x7, 0x1, 0x7}, {0x0, 0x80, 0x1, '\x00', 0x7f}, {0x1, 0xc, 0x80, '\x00', 0x7f}, {0x10, 0x6, 0x3, '\x00', 0x10}, {0x1, 0x23, 0xf3}, {0x7, 0x6, 0x4, '\x00', 0x8}]}}) 3.980333195s ago: executing program 0 (id=1113): r0 = socket$nl_audit(0x10, 0x3, 0x9) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x8a, &(0x7f00000000c0), 0x4) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8982, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r2, 0x0, 0x8001) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000004c0)={'syztnl1\x00', &(0x7f0000000440)={'ip6_vti0\x00', 0x0, 0x2f, 0x4, 0x7, 0xe, 0x78, @empty, @local, 0x8000, 0x80, 0xf9, 0x6c}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8050}, 0x50000) r3 = syz_open_dev$usbfs(&(0x7f0000000080), 0x75, 0x109301) ioctl$USBDEVFS_DISCONNECT_CLAIM(r3, 0x8108551b, 0x0) ioctl$USBDEVFS_SUBMITURB(r3, 0x8038550a, &(0x7f0000000300)=@urb_type_bulk={0x3, {0x1, 0x1}, 0x13fb, 0x0, &(0x7f0000000340), 0x0, 0x1fc, 0x0, 0x2, 0x4, 0x9, 0x0}) ioctl$USBDEVFS_DISCARDURB(r3, 0x550b, 0x0) syz_open_dev$loop(&(0x7f0000000180), 0x0, 0x800) socket$key(0xf, 0x3, 0x2) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r4, 0x6, 0x1b, 0x0, &(0x7f0000000000)) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000000040), 0x4000000) mount$9p_fd(0x0, &(0x7f0000000280)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB="060000006e6f3d", @ANYRESHEX, @ANYBLOB=',version=9p2000,\x00']) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), r0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000001c0)={'erspan0\x00', &(0x7f0000000680)={'syztnl1\x00', 0x0, 0x760, 0x40, 0x6, 0x7, {{0x33, 0x4, 0x3, 0x7, 0xcc, 0x65, 0x0, 0x5, 0x2f, 0x0, @private=0xa010102, @rand_addr=0x64010101, {[@cipso={0x86, 0x31, 0xffffffffffffffff, [{0x1, 0x7, "f0fd818e30"}, {0x0, 0xa, "ecbe465a76fd0626"}, {0x7, 0x10, "e25659c7181b578ddf3f4c6253b5"}, {0x0, 0x4, "1c97"}, {0x5, 0x6, "070080b3"}]}, @timestamp_prespec={0x44, 0x34, 0x5, 0x3, 0xc, [{@broadcast}, {@private=0xa010101, 0x1}, {@remote, 0x2f7}, {@remote, 0x9}, {@private=0xa010101, 0x5}, {@rand_addr=0x64010101, 0x4}]}, @rr={0x7, 0x13, 0x12, [@multicast2, @loopback, @remote, @loopback]}, @noop, @timestamp_prespec={0x44, 0xc, 0x7e, 0x3, 0x7, [{@broadcast, 0x8}]}, @timestamp_prespec={0x44, 0x14, 0x0, 0x3, 0x7, [{@empty, 0x881}, {@broadcast, 0x7}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x13, 0x68, [@empty, @rand_addr=0x64010101, @empty, @broadcast]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_VOICE(r9, 0x112, 0xb, 0x0, &(0x7f0000000200)) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r6, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00082dbd7000fcdbdf250200000008000400080000002000068014000400fe800000006b1085f2000000000000bb08000600000000001500068008000700bf6f86a1c1bf359467ce8593b22a12b22119f2c2b5d9cc40acb72c66b02381c0374aab30bd356bc5af5ebaa8", @ANYRES32=r8, @ANYBLOB="08000300e0000002"], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) r10 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r10, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r10, &(0x7f0000000480)={0x2, 0x4e20, @multicast2}, 0x10) 3.980051575s ago: executing program 3 (id=1114): mknodat$loop(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_int(r4, 0x1, 0x3c, &(0x7f0000000000)=0x6, 0x4) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, r1, {0x7, 0x1f, 0x0, 0x10400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}}, 0x50) write$FUSE_ENTRY(r0, &(0x7f00000005c0)={0x90, 0x0, r1, {0x6, 0x2, 0x3220, 0x6, 0x3, 0x1, {0x3, 0x5, 0x4, 0x5, 0x0, 0xfffffffffffff27c, 0x0, 0x4, 0xfffffc00, 0xa000, 0x81, r2, r3, 0x7, 0x2}}}, 0x90) 2.040614661s ago: executing program 0 (id=1115): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12013f00000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581d7"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000840)=@migrate={0xa0, 0x21, 0x1, 0x70bd25, 0x25dfdbfd, {{@in6=@remote, @in=@rand_addr=0x64010100, 0x4e21, 0xa, 0x4e21, 0x9, 0xa, 0x80, 0x10, 0x2c}, 0x6e6bb7, 0x2}, [@migrate={0x50, 0x11, [{@in=@private=0xa010102, @in6=@mcast2, @in6=@loopback, @in=@broadcast, 0x32, 0x3, 0x0, 0x3503, 0x2, 0x2}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40800}, 0x2c040010) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x1ff) syz_usb_control_io$hid(r0, &(0x7f0000000300)={0x24, &(0x7f0000000100)={0x20, 0x24, 0x16, {0x16, 0x0, "fcedfa253d8043e925819d25a1c63ac62b23c698"}}, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hiddev(&(0x7f0000000280), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, &(0x7f0000000040)={0x3, 0xffffffff, 0x8, 0x4, 0x7, 0x6}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'vlan1\x00', 0x7101}) 2.040175411s ago: executing program 2 (id=1116): mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1/file3\x00', 0x11e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000470000/0x400000)=nil, 0xe06500) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f000051b000/0x3000)=nil) capset(&(0x7f0000000080)={0x20080522}, &(0x7f0000000040)={0x1000, 0x10ffff, 0xfffffffd}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0xa2) renameat2(0xffffffffffffff9c, &(0x7f0000000400)='./file1/file3\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180), 0x2, 0x0) msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000001c0)='./file1/file3\x00', &(0x7f0000000200), &(0x7f0000000440)={0x0, 0xfb, 0x151, 0x2, 0xe8, "ac75eb31f6d5f6c6086f987e05858962", "fd1f3c3ce124a711711899f47788f44444bb6a29ee44024361b01cf077c1e1d402ec3c2bec561ef6699a6ac3c49d22addc74ebc6f49deed7334931d5d35d7fa5d7ba000ab0fad112e62071e27d142a351d75d91e0a0fbd2c10b85a4083831b5d50bae70ec92b643957295e11f55d6fbf62a20a2a4b6cc418e952467f2bc4c329340cbf51068c65f4b305390d9b413499dba5cbebce60d155f7498ef12d63602829c13f309a2ef0c258b972a27279910fa05fc35d84ab7b425504f6341a2b387ac0a1d3c211898dc96e7fc28a04819961bf6eb5b06d8bbab6eeebf9097b5a7c2277c860b1383e74662cf7cfa1dee7cb7837523df21295ecb970b19d9ec2d9d7f1d89f571b958a426571c4a718741404b61e574eaa094c38124de10abf0de1d77594a215148cd6f2956060aae38d09745bbf6923b9827d061580bb932f"}, 0x151, 0x1) 1.993283432s ago: executing program 3 (id=1117): r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CAP_EXIT_HYPERCALL(r0, 0x4068aea3, &(0x7f0000000040)={0x79, 0x0, 0xc}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x1a3581, 0x0) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x1f) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f00000005c0)={0x1, 0x0, [{0x101, 0x5, 0x0, 0x0, @sint={0xa485, 0xde}}]}) 19.58103ms ago: executing program 0 (id=1118): write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000cc0)={'syz1\x00', {0xfff9, 0x0, 0x248, 0x9b99}, 0x3a, [0xfffffff8, 0x8, 0x144, 0x10009, 0x8, 0x155f, 0x6, 0x2, 0x25cd, 0x1, 0xb4, 0xa, 0xb2bd, 0x6, 0x8, 0xe4, 0x6, 0xfc000000, 0x3, 0xbbf, 0x1000, 0x3, 0x0, 0xd, 0x4, 0x12a0, 0x8000, 0x1, 0x7, 0x8, 0x7, 0x81, 0xb66, 0x79, 0x2, 0x10001, 0x5, 0x91, 0x4, 0x4, 0x16, 0x0, 0x5, 0x401, 0xfffffff5, 0x405, 0xa7, 0x81, 0x9, 0xf9a2, 0xffffff81, 0xff, 0x2, 0x2, 0x2, 0x2, 0x7, 0x4, 0x7, 0xbe, 0x4007f, 0xffffffff, 0x9212], [0x9, 0x16e, 0x6, 0x9, 0x4, 0xc66, 0xa8a9, 0x20000077, 0x8e, 0xd50, 0x7, 0x5, 0xfffffffd, 0x80a, 0x4, 0x5, 0x1000, 0x0, 0x200b395, 0x400004, 0x80000000, 0x4, 0x19, 0x7, 0x1, 0x3, 0x3, 0x8, 0x9, 0x400, 0x6, 0x4c2336d3, 0x96, 0x0, 0xfffffff8, 0x401, 0x46, 0xf1, 0x4, 0xab00060, 0x5, 0x1, 0x0, 0x5, 0x3ff, 0x1ff, 0x1, 0x7fff, 0x1, 0x1ca, 0x4, 0x80000004, 0x80000001, 0x6, 0x2, 0x9, 0x95, 0x80000000, 0x4, 0xfffffff9, 0x40000003, 0x1000, 0xfffff804, 0x5], [0x2, 0xfffffffe, 0xffff, 0xc, 0x2, 0x1ff, 0x80000001, 0x5, 0x5, 0x491, 0x5, 0x200006, 0x8, 0x400, 0xfffffffe, 0x400, 0x41, 0x6, 0xee4b, 0x2000004, 0x8000, 0x8000003, 0x5, 0x89, 0x3, 0x3, 0x9, 0x0, 0xc7, 0xfff, 0x10000a, 0x8000, 0x401, 0x3e59, 0x5, 0xd3, 0x8, 0x3437, 0x3, 0xd, 0x7, 0x601, 0x101, 0xdd80, 0x60a0, 0x80, 0x9d26, 0x10000, 0x1, 0x2, 0x2, 0x6, 0x8000, 0x0, 0x3, 0xd500, 0x8, 0x77, 0x9, 0x6, 0x10000, 0x203, 0x5, 0x1], [0xa772, 0x3, 0x5, 0x1afa, 0xbfc, 0x8, 0x5, 0x7f, 0x55, 0x40, 0xff, 0x1005, 0x1, 0x8000007, 0x1e, 0x7f, 0x81, 0x3, 0x9d86, 0x9, 0xfffffff7, 0x8, 0xfa, 0x5396, 0x936, 0x6, 0x80008001, 0x7777, 0x1, 0x2, 0x100, 0xffffffff, 0x7fffffff, 0x9, 0xc, 0x32d, 0x0, 0x1ff, 0x2000803, 0x2, 0x10000, 0x0, 0x8004, 0x7fff, 0x0, 0x6, 0xf, 0xe, 0x5337, 0x26d, 0x6, 0xfffffff9, 0x1, 0xfffffff9, 0xd, 0xc, 0x463f, 0x7fffffff, 0x7fffffff, 0x8006, 0x8, 0x14000, 0x1, 0x9]}, 0x45c) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x80002, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x1a, 0x0, &(0x7f0000000480)) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000000)={[0x35, 0xfff, 0x0, 0x40000000000180, 0x2, 0x80000080, 0xf2, 0xd, 0x7fffffffffffe, 0x7, 0x5, 0x7, 0x0, 0x5, 0x4, 0x8], 0x25000, 0x304}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x20}}, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r6 = dup(r5) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000840)={0x1fe, 0x2, 0x3000, 0x2000, &(0x7f0000003000/0x2000)=nil}) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f00000000c0)="c20000361e0f01c3660fd2eff30f10f1b961020000b80e000000ba000000000f30b98d0200000f320b99f3530000660f6af7c4e2f91d20", 0x37}], 0x1, 0x11, 0x0, 0x0) syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) 19.15056ms ago: executing program 2 (id=1119): r0 = syz_usb_connect$hid(0x2, 0x3f, &(0x7f0000000400)=ANY=[@ANYBLOB="1201000000000020bc20005500000000000109022d00010000600209040000050301010009210000360122050009058103"], 0x0) syz_usb_connect(0x0, 0x779, &(0x7f0000000440)={{0x12, 0x1, 0x310, 0x75, 0xe2, 0x94, 0x20, 0xbb4, 0xa40, 0xf034, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x767, 0x2, 0x5, 0x7, 0x10, 0x4, "", [{{0x9, 0x4, 0x76, 0x40, 0xc, 0x76, 0x5c, 0x86, 0x3, [@hid_hid={0x9, 0x21, 0x1, 0x89, 0x1, {0x22, 0x3a1}}], [{{0x9, 0x5, 0x5, 0x3, 0x200, 0x5, 0x2, 0x81, [@generic={0x9d, 0xd, "8e9cc4cbe38ed07bd958b1c55b705c89fc5695e3e0ac7eeefc73b94a0397faecf2ef122586c633d983398d4d5090f4c2b876d0e760cc0d8c9623753b358cb7bf5f7f36526e2e0d48786e1f3eb1917c8757acaa1b90dc74b3e0a975c36ff178d2771a140cd7d94ec2b53a6c6e475f73991101013e1c6cb1a5419bbe133b67fa582281da7a439f178134257865f01e3490e83f422797823e4816dfca"}]}}, {{0x9, 0x5, 0xf, 0x4, 0x3ff, 0x8, 0x6, 0x8d, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x4, 0xefa1}, @generic={0xe2, 0x22, "2dc7a4843e1d4c655128f61b649de122bbd34def6b9f3c8e11261e802a2dffa0e19657e85d7fc231400fab8a1f42d262d8ab166e9e474f1593683aa2ae0c8260005f7bdab2ade7947bd857f0e222ddfcbf809727b86bb0cbd83544c74af6a8c8eb77da26c3a91a652b88c2c52f71a0bb963ffb1ac2f1b77cf6edf0cd57b11686261defbebb773fe01dea4dd7aff56a38be45e85592f7fec1958f0aced9991f70bb139d0650d5dd7aa0f9b30b1f05effc91fa3cbb1ea413031dc5d05b2cd19e13c85db93a4ddfb0a880355ae661a880efc952c6ef3df814cdc3c33c27e9482293"}]}}, {{0x9, 0x5, 0x0, 0x10, 0x20, 0xff, 0x4, 0x1, [@generic={0x8, 0x31, "bc8611a6cdcc"}, @uac_iso={0x7, 0x25, 0x1, 0x4, 0x5, 0x4}]}}, {{0x9, 0x5, 0x1, 0x2, 0x0, 0x7f, 0x6, 0xd}}, {{0x9, 0x5, 0x7, 0x18, 0x8, 0x5, 0xa, 0xa, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x8, 0x6}, @uac_iso={0x7, 0x25, 0x1, 0x4, 0x80, 0x8}]}}, {{0x9, 0x5, 0x9, 0x1, 0x8, 0x2, 0x97, 0xe, [@uac_iso={0x7, 0x25, 0x1, 0xc, 0x5, 0xfff6}]}}, {{0x9, 0x5, 0x0, 0x3, 0x10, 0x2, 0x7f, 0x2, [@uac_iso={0x7, 0x25, 0x1, 0x4, 0xc, 0x3}]}}, {{0x9, 0x5, 0x1, 0x0, 0x10, 0xdb, 0x0, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x4, 0x6, 0x40}, @uac_iso={0x7, 0x25, 0x1, 0x4, 0x0, 0x487f}]}}, {{0x9, 0x5, 0x0, 0x4, 0x40, 0x6, 0x5, 0x7f, [@generic={0x36, 0x22, "90e36a6287286ce672ddc646829c58dc0233b1ba084093ee3f5de5e0f3b8073f52baa56adc17b1ad7a6410b3f7cd804b30978d24"}]}}, {{0x9, 0x5, 0xf, 0x0, 0x200, 0xc2, 0x10}}, {{0x9, 0x5, 0xc, 0x2, 0x40, 0x9, 0x6, 0x31}}, {{0x9, 0x5, 0xb, 0x4, 0x200, 0xd1, 0x2, 0x3, [@generic={0xce, 0x22, "95ffd3fbd667f29a47d842b5a164a8c958d6f9115058da0c4c9c514dd8106cc5dc2069a2a8625742b9fb64fc1e23b55793ccbf4bb9bffbb4a30e3f65fa38961cfe511850da86427ba6a2921f99454a81fcac775c78792c6fdcf38436159d399f13c6365d5b8c30436501af00d4b6c239cc56bfbac360d60c79c1dc4125ce8e1a3e4d6df7517f326ece8184f0d570ba66aed5d3927a5184b3451673ea640b25ddf071f105a5441da90e36ed22cd24a1a5924227fcd1e17f7fc8f080730676dce628562abc78ea31adef3ad165"}]}}]}}, {{0x9, 0x4, 0x2b, 0x5, 0x9, 0xe4, 0x4e, 0xfc, 0xa, [], [{{0x9, 0x5, 0x2, 0x3, 0x20, 0x80, 0x4, 0x2, [@generic={0x3e, 0x8, "8261ff538ef46cb05b4151792d0974a51017912e7180bb3262026cc9d4d8323746879bfc568ff63694f0e4f49301e739eaac3cc2f4f88b3253d9c717"}, @generic={0xbe, 0x4, "1520da844dded95ebc7903f8fb66eab36a0040243cd33bb5c697d0a530822f3ed1baa9bb39cf02a79ebe3b65a26b7ceecdeb00d7c20d0a57710e41196867fe7f1d1d83a25ecc4b857bdea23a7a5a317590ffeab8cb878ab63477ad92db9b4ddc5de2d72204fc11a3190b8a6dd3dc548ccdb1031cecfc34a56a7c7da7c6f4e10511756dbf25d66167bf7d1b39e2fc94988f9bdf28534b845cc863f4db4bb6a8b63620a092dad5adbbd4387238f63ab76c723f3442ea92f5c8e7c2e13d"}]}}, {{0x9, 0x5, 0xf, 0xc, 0x400, 0x7, 0x7, 0x6, [@generic={0xa5, 0xa, "61cfc026f58254e174804e4f9d69701f8b42d07c010ddb490e249eb0b605d1315b17d3043d5050442384967e69547fbf59684962e7319d660f02cbf63c52a505471967f1749f5e8fefa79e42d28718de07450d86a71314649b5bce4414df4610a5fb3bbf2c2d0dc9a10dd8b421be7bd2c092e1c4c7841b97dcf353ca35b8b70ba58d4beb21cf01b6735a0a3813c709ccbecaa63a12aedcb81f50a43137e0bd111605cb"}]}}, {{0x9, 0x5, 0xd, 0x8, 0x260, 0xc7, 0xc, 0xff, [@uac_iso={0x7, 0x25, 0x1, 0x8, 0x75, 0x314}, @generic={0xb5, 0xb, "5523647bf98078befcfccaff12c9c0db2700fdfc837ccf97a43a7e3f56d446099e0be6115a6e837e96bc607426df5388a4feeaef85f1a53bd76932958fdf5b9ec0010884feb79f260e51569627b1fbfc52a6e695d1f749ec6fb5aa9adc153b120b20195c24aed36137a91bd4bb487891c7352e393f28160f149b36f17b3b14fb9e86080b0708d7d142f8d503d6e672cb848ab8532537df55560e70bb2383fd1e8fd75a3d7da0b8f830e26086a1e767d25ba4dc"}]}}, {{0x9, 0x5, 0x4, 0x8, 0x40, 0x5a, 0x80, 0xa, [@uac_iso={0x7, 0x25, 0x1, 0x8, 0xf9, 0x1}, @generic={0x2a, 0x10, "546cc5c1ed65fcba8edc120b6ab3176953c56b1ffcc07e88adae8d383a6764b1cb96e6331c184580"}]}}, {{0x9, 0x5, 0xa, 0x0, 0x20, 0x1, 0x0, 0x19, [@generic={0xf0, 0x18, "7d3cecab709a5da87a1cb0a5cf93b17833bbad48994a119c383b001d75175c1484bbff3430f7cf1157102aed111585cba2b047a251e41837fe568523203c36be10d93933e816fc1353272a96501b0922a7a5f638be9f7158edc1e90c215bce979023a5ff1198d4d426ff775679f9e7aec18ec389f8947f41bcf6160973ec06cf00661471b824983e03510b9bb596675c237ba720f1a212c36b070fea8c6601f99006eab84201200a06fd0be01fcb2579c3c35a9bddb2a4c5c6460ce5bcc32ef85f45bec5920426384f196fe0b99a9dd0885b29e5151988cf5b5cab0244bce34aa5601082106c3da5f9b44e480494"}]}}, {{0x9, 0x5, 0x4, 0x10, 0x40, 0x58, 0x0, 0x4, [@generic={0x26, 0x8, "e8a83a9a70713bf8d8a5cc9035f503525183188968707f459f285c29b782073a96f1906c"}, @generic={0x11, 0x11, "0abd48eb1e0b837aa71759f4452429"}]}}, {{0x9, 0x5, 0x6, 0x10, 0x200, 0x1, 0x2, 0x6, [@uac_iso={0x7, 0x25, 0x1, 0x8, 0x5, 0xf5}, @uac_iso={0x7, 0x25, 0x1, 0x8, 0x74, 0x6}]}}, {{0x9, 0x5, 0xd, 0x0, 0x20, 0x2, 0x0, 0x8}}, {{0x9, 0x5, 0x8, 0x2, 0x30, 0x6, 0xa, 0xff}}]}}]}}]}}, &(0x7f0000000c80)={0xa, &(0x7f0000000bc0)={0xa, 0x6, 0x110, 0x0, 0x9, 0x7, 0x40, 0x7}, 0xf, &(0x7f0000000c00)={0x5, 0xf, 0xf, 0x1, [@ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0x4b, 0x63}]}, 0x1, [{0xd, &(0x7f0000000c40)=@string={0xd, 0x3, "714bb9ac118027d7ad3714"}}]}) syz_usb_disconnect(r0) r1 = syz_usb_connect(0x0, 0x24, &(0x7f0000000680)=ANY=[], 0x0) syz_usb_control_io$printer(r1, 0x0, 0x0) syz_usb_control_io$hid(r1, &(0x7f0000000200)={0x24, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x22, 0x5, {[@local=@item_012={0x0, 0x2, 0x2}, @global=@item_012={0x1, 0x1, 0x4, '@'}, @main=@item_012={0x1, 0x0, 0x9, "e5"}]}}, 0x0}, 0x0) 18.84767ms ago: executing program 3 (id=1120): syz_usb_connect$hid(0x2, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="12010000090024206d041cc340000000000109022400010000a000090400000103010100092100080001220100090581"], 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x80400, 0x0) timer_create(0x0, &(0x7f0000002c00)={0x0, 0x22, 0x1, @thr={0x0, 0x0}}, 0x0) timer_settime(0x0, 0x1, 0x0, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000180)={{0x77359400}, {0x77359400}}, &(0x7f00000001c0)) r0 = syz_usb_connect$printer(0x1, 0x0, 0x0, &(0x7f0000000c80)={0xa, &(0x7f0000000380)={0xa, 0x6, 0x250, 0x5, 0x1, 0x6, 0x20, 0x40}, 0x15, &(0x7f00000003c0)={0x5, 0xf, 0x15, 0x3, [@ptm_cap={0x3}, @ptm_cap={0x3}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x0, 0x31, 0xf, 0x1}]}, 0x4, [{0x0, 0x0}, {0x4, &(0x7f00000008c0)=@lang_id={0x4, 0x3, 0x411}}, {0x0, 0x0}, {0x0, 0x0}]}) syz_usb_control_io$printer(r0, &(0x7f0000000e40)={0x14, &(0x7f0000000d00)={0x20, 0x23, 0x5a, {0x5a, 0x5, "9c048238e22434d44243576e2ec2ed9aa1e1d7fe4b9263f3e08b2c61c0196cd8308e45fd6eab01bf884c2727ed92ece1769adba1e78193ce36e57219bccc5de06ecec46123c0a9cb80b7ea117d2bfee7ade122789c2a665a"}}, &(0x7f0000000d80)={0x0, 0x3, 0x76, @string={0x76, 0x3, "34eae9d4353f33f0ee8a26988467182db932128bc511a2c02ba66899a7e22bbb3c2b0ed8724dec86ca30178f51293479a12423d8118b84b097b74e9105833a390787cdab870abe395d4b0e39f17075202b6c58497f6503460528204b6212aff6899c5f2e12717dd14b4a71145a54d650c87803e0"}}}, &(0x7f0000001240)={0x34, &(0x7f0000000e80)={0x20, 0xf, 0xff, "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"}, &(0x7f0000000fc0)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000001000)={0x0, 0x8, 0x1, 0x28}, &(0x7f0000001100)={0x20, 0x0, 0xae, {0xac, "71ae2ce7de068505f978bee080b45d612b4ad9ac9b50ea53bdae643486ccfccdbf9833216528351a14dced8745e2a1a8921dad8f2d8c019dfa959ccdfe46a403c083b17c4f6270e498e5f6f6030b1ab1474a293e99f082badc853462c2e2b451919c0301ed2611ec6d2666c91741045232ea13706ad6316dfc3aafaa353c8856d3fb017bf71efe0a89ec53ac6f4590d13994c00c9e9a96c8898ed5079defb56a25b944f5c3ccc2753d887390"}}, &(0x7f00000011c0)={0x20, 0x1, 0x1, 0x8}, &(0x7f0000001200)={0x20, 0x0, 0x1, 0xd}}) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x9, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x22}}, 0x6}, 0x1c) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22, 0x7, @ipv4={'\x00', '\xff\xff', @empty}, 0xd}, 0x1c) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={'batadv_slave_1\x00', {0x2, 0x0, @loopback=0x7f000000}}) ioctl$SNDRV_TIMER_IOCTL_CREATE(0xffffffffffffffff, 0xc02054a5, &(0x7f0000000200)={0x17fd, r2, 'id1\x00'}) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f0000000140)=0xff, &(0x7f00000001c0)=0xffffffd5) r4 = fcntl$dupfd(r1, 0x0, r1) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x6) sendmsg$NL80211_CMD_SET_INTERFACE(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000e40)=ANY=[], 0x20}}, 0x1) 0s ago: executing program 0 (id=1121): r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0xb41003, 0x0) unshare(0x60000600) writev(r0, &(0x7f0000001240)=[{&(0x7f0000000240)="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", 0x1000}], 0x1) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40a01, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x5712c0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup(r2) keyctl$restrict_keyring(0x5, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='\x00', 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) write$tun(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="001c86dd0700400000004000000060ec97000fc83a00fe8000000000000000000000000000aaff020000000000000000000000000001"], 0xffe) kernel console output (not intermixed with test programs): 570] ? __fget_files+0x2c5/0x340 [ 35.079339][ T570] ? bpf_lsm_file_ioctl+0xd/0x20 [ 35.079360][ T570] ? security_file_ioctl+0x3e/0x110 [ 35.079373][ T570] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 35.079387][ T570] __se_sys_ioctl+0x135/0x1b0 [ 35.079398][ T570] __x64_sys_ioctl+0x7f/0xa0 [ 35.079407][ T570] x64_sys_call+0x1878/0x2ee0 [ 35.079422][ T570] do_syscall_64+0x57/0xf0 [ 35.079438][ T570] ? clear_bhb_loop+0x50/0xa0 [ 35.079449][ T570] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 35.079466][ T570] RIP: 0033:0x7f846499c819 [ 35.079478][ T570] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 35.079487][ T570] RSP: 002b:00007f8465890028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 35.079500][ T570] RAX: ffffffffffffffda RBX: 00007f8464c15fa0 RCX: 00007f846499c819 [ 35.079508][ T570] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 35.079516][ T570] RBP: 00007f8465890090 R08: 0000000000000000 R09: 0000000000000000 [ 35.079523][ T570] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 35.079529][ T570] R13: 00007f8464c16038 R14: 00007f8464c15fa0 R15: 00007fffce6292f8 [ 35.079538][ T570] [ 35.569152][ T421] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 35.631307][ T583] FAULT_INJECTION: forcing a failure. [ 35.631307][ T583] name failslab, interval 1, probability 0, space 0, times 0 [ 35.650961][ T583] CPU: 0 UID: 0 PID: 583 Comm: syz.2.94 Not tainted syzkaller #0 a40991d314adffa3075cd603e5b19eadab4cccf0 [ 35.650997][ T583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 35.651007][ T583] Call Trace: [ 35.651013][ T583] [ 35.651020][ T583] __dump_stack+0x21/0x30 [ 35.651047][ T583] dump_stack_lvl+0x140/0x1c0 [ 35.651060][ T583] ? __cfi_dump_stack_lvl+0x10/0x10 [ 35.651074][ T583] ? __cfi_avc_has_perm+0x10/0x10 [ 35.651091][ T583] ? kasan_save_alloc_info+0x40/0x50 [ 35.651105][ T583] dump_stack+0x19/0x20 [ 35.651117][ T583] should_fail_ex+0x3d7/0x530 [ 35.651133][ T583] should_failslab+0xac/0x100 [ 35.651143][ T583] __kmalloc_cache_noprof+0x41/0x470 [ 35.651159][ T583] ? vhost_task_create+0x12c/0x400 [ 35.651199][ T583] ? __cfi_kvm_nx_huge_page_recovery_worker+0x10/0x10 [ 35.651212][ T583] vhost_task_create+0x12c/0x400 [ 35.651221][ T583] ? __cfi_kvm_nx_huge_page_recovery_worker_kill+0x10/0x10 [ 35.651233][ T583] ? __cfi_vhost_task_create+0x10/0x10 [ 35.651243][ T583] ? __cfi_vhost_task_fn+0x10/0x10 [ 35.651252][ T583] ? __kasan_check_write+0x18/0x20 [ 35.651265][ T583] ? mutex_lock+0x97/0x1d0 [ 35.651277][ T583] ? __cfi_mutex_lock+0x10/0x10 [ 35.651288][ T583] ? kernel_text_address+0xa9/0xe0 [ 35.651302][ T583] kvm_mmu_post_init_vm+0x161/0x300 [ 35.651318][ T583] kvm_arch_vcpu_ioctl_run+0xf3/0x1bd0 [ 35.651333][ T583] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 35.651346][ T583] ? kstrtoull+0x13b/0x1e0 [ 35.651359][ T583] ? kstrtouint+0x78/0xf0 [ 35.651370][ T583] ? ioctl_has_perm+0x1bc/0x500 [ 35.651384][ T583] ? __asan_memcpy+0x5a/0x80 [ 35.651397][ T583] ? ioctl_has_perm+0x408/0x500 [ 35.651410][ T583] ? has_cap_mac_admin+0xd0/0xd0 [ 35.651425][ T583] ? __kasan_check_write+0x18/0x20 [ 35.651438][ T583] ? mutex_lock_killable+0x97/0x1d0 [ 35.651450][ T583] ? __cfi_mutex_lock_killable+0x10/0x10 [ 35.651461][ T583] ? proc_fail_nth_write+0x184/0x220 [ 35.651474][ T583] kvm_vcpu_ioctl+0xa48/0x1000 [ 35.651490][ T583] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 35.651505][ T583] ? __cfi_vfs_write+0x10/0x10 [ 35.651520][ T583] ? __kasan_check_write+0x18/0x20 [ 35.651533][ T583] ? mutex_unlock+0x90/0x240 [ 35.651544][ T583] ? __cfi_mutex_unlock+0x10/0x10 [ 35.651555][ T583] ? __fget_files+0x2c5/0x340 [ 35.651565][ T583] ? __fget_files+0x2c5/0x340 [ 35.651574][ T583] ? bpf_lsm_file_ioctl+0xd/0x20 [ 35.651586][ T583] ? security_file_ioctl+0x3e/0x110 [ 35.651599][ T583] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 35.651613][ T583] __se_sys_ioctl+0x135/0x1b0 [ 35.651623][ T583] __x64_sys_ioctl+0x7f/0xa0 [ 35.651632][ T583] x64_sys_call+0x1878/0x2ee0 [ 35.651646][ T583] do_syscall_64+0x57/0xf0 [ 35.651661][ T583] ? clear_bhb_loop+0x50/0xa0 [ 35.651672][ T583] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 35.651689][ T583] RIP: 0033:0x7f846499c819 [ 35.651700][ T583] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 35.651713][ T583] RSP: 002b:00007f8465890028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 35.651727][ T583] RAX: ffffffffffffffda RBX: 00007f8464c15fa0 RCX: 00007f846499c819 [ 35.651735][ T583] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 000000000000000a [ 35.651742][ T583] RBP: 00007f8465890090 R08: 0000000000000000 R09: 0000000000000000 [ 35.651749][ T583] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 35.651755][ T583] R13: 00007f8464c16038 R14: 00007f8464c15fa0 R15: 00007fffce6292f8 [ 35.651764][ T583] [ 35.790906][ T421] usb 2-1: config 220 has an invalid interface number: 76 but max is 2 [ 36.034710][ T421] usb 2-1: config 220 has an invalid descriptor of length 0, skipping remainder of the config [ 36.045533][ T421] usb 2-1: config 220 has no interface number 2 [ 36.052033][ T421] usb 2-1: config 220 interface 1 altsetting 5 has 0 endpoint descriptors, different from the interface descriptor's value: 12 [ 36.065746][ T421] usb 2-1: config 220 interface 0 has no altsetting 0 [ 36.072864][ T421] usb 2-1: config 220 interface 76 has no altsetting 0 [ 36.080039][ T421] usb 2-1: config 220 interface 1 has no altsetting 0 [ 36.088572][ T421] usb 2-1: New USB device found, idVendor=8086, idProduct=0b07, bcdDevice=6c.b9 [ 36.097794][ T421] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 36.105960][ T421] usb 2-1: Product: syz [ 36.110189][ T421] usb 2-1: Manufacturer: syz [ 36.114861][ T421] usb 2-1: SerialNumber: syz [ 36.224503][ T598] netlink: 4 bytes leftover after parsing attributes in process `syz.0.98'. [ 36.325202][ T421] usb 2-1: selecting invalid altsetting 0 [ 36.331149][ T421] usb 2-1: Found UVC 7.01 device syz (8086:0b07) [ 36.337666][ T421] usb 2-1: No valid video chain found. [ 36.351630][ T421] usb 2-1: USB disconnect, device number 3 [ 36.384275][ T606] FAULT_INJECTION: forcing a failure. [ 36.384275][ T606] name failslab, interval 1, probability 0, space 0, times 0 [ 36.397762][ T606] CPU: 0 UID: 0 PID: 606 Comm: syz.2.102 Not tainted syzkaller #0 a40991d314adffa3075cd603e5b19eadab4cccf0 [ 36.397793][ T606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 36.397803][ T606] Call Trace: [ 36.397810][ T606] [ 36.397817][ T606] __dump_stack+0x21/0x30 [ 36.397847][ T606] dump_stack_lvl+0x140/0x1c0 [ 36.397867][ T606] ? __cfi_dump_stack_lvl+0x10/0x10 [ 36.397890][ T606] ? __cfi_avc_has_perm+0x10/0x10 [ 36.397916][ T606] ? kasan_save_alloc_info+0x40/0x50 [ 36.397939][ T606] dump_stack+0x19/0x20 [ 36.397958][ T606] should_fail_ex+0x3d7/0x530 [ 36.397982][ T606] should_failslab+0xac/0x100 [ 36.398000][ T606] __kmalloc_cache_noprof+0x41/0x470 [ 36.398027][ T606] ? vhost_task_create+0x12c/0x400 [ 36.398046][ T606] ? __cfi_kvm_nx_huge_page_recovery_worker+0x10/0x10 [ 36.398065][ T606] vhost_task_create+0x12c/0x400 [ 36.398081][ T606] ? __cfi_kvm_nx_huge_page_recovery_worker_kill+0x10/0x10 [ 36.398102][ T606] ? __cfi_vhost_task_create+0x10/0x10 [ 36.398118][ T606] ? __cfi_vhost_task_fn+0x10/0x10 [ 36.398135][ T606] ? __kasan_check_write+0x18/0x20 [ 36.398156][ T606] ? mutex_lock+0x97/0x1d0 [ 36.398176][ T606] ? __cfi_mutex_lock+0x10/0x10 [ 36.398194][ T606] ? kernel_text_address+0xa9/0xe0 [ 36.398216][ T606] kvm_mmu_post_init_vm+0x161/0x300 [ 36.398248][ T606] kvm_arch_vcpu_ioctl_run+0xf3/0x1bd0 [ 36.398273][ T606] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 36.398305][ T606] ? kstrtoull+0x13b/0x1e0 [ 36.398327][ T606] ? kstrtouint+0x78/0xf0 [ 36.398346][ T606] ? ioctl_has_perm+0x1bc/0x500 [ 36.398369][ T606] ? __asan_memcpy+0x5a/0x80 [ 36.398392][ T606] ? ioctl_has_perm+0x408/0x500 [ 36.398414][ T606] ? has_cap_mac_admin+0xd0/0xd0 [ 36.398437][ T606] ? __kasan_check_write+0x18/0x20 [ 36.398460][ T606] ? mutex_lock_killable+0x97/0x1d0 [ 36.398480][ T606] ? __cfi_mutex_lock_killable+0x10/0x10 [ 36.398500][ T606] ? proc_fail_nth_write+0x184/0x220 [ 36.398524][ T606] kvm_vcpu_ioctl+0xa48/0x1000 [ 36.398550][ T606] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 36.398575][ T606] ? __cfi_vfs_write+0x10/0x10 [ 36.398598][ T606] ? __kasan_check_write+0x18/0x20 [ 36.398621][ T606] ? mutex_unlock+0x90/0x240 [ 36.398640][ T606] ? __cfi_mutex_unlock+0x10/0x10 [ 36.398659][ T606] ? __fget_files+0x2c5/0x340 [ 36.398678][ T606] ? __fget_files+0x2c5/0x340 [ 36.398693][ T606] ? bpf_lsm_file_ioctl+0xd/0x20 [ 36.398713][ T606] ? security_file_ioctl+0x3e/0x110 [ 36.398736][ T606] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 36.398761][ T606] __se_sys_ioctl+0x135/0x1b0 [ 36.398780][ T606] __x64_sys_ioctl+0x7f/0xa0 [ 36.398797][ T606] x64_sys_call+0x1878/0x2ee0 [ 36.398822][ T606] do_syscall_64+0x57/0xf0 [ 36.398847][ T606] ? clear_bhb_loop+0x50/0xa0 [ 36.398864][ T606] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 36.398891][ T606] RIP: 0033:0x7f846499c819 [ 36.398908][ T606] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 36.398923][ T606] RSP: 002b:00007f8465890028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 36.398945][ T606] RAX: ffffffffffffffda RBX: 00007f8464c15fa0 RCX: 00007f846499c819 [ 36.398962][ T606] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 000000000000000a [ 36.398972][ T606] RBP: 00007f8465890090 R08: 0000000000000000 R09: 0000000000000000 [ 36.398984][ T606] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 36.398995][ T606] R13: 00007f8464c16038 R14: 00007f8464c15fa0 R15: 00007fffce6292f8 [ 36.399012][ T606] [ 36.689139][ T65] usb 4-1: new high-speed USB device number 5 using dummy_hcd [ 36.767103][ T31] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 36.920270][ T65] usb 4-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 36.930564][ T31] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 36.941605][ T65] usb 4-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 36.950801][ T31] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 36.962143][ T31] usb 1-1: New USB device found, idVendor=256c, idProduct=006d, bcdDevice= 0.00 [ 36.971470][ T31] usb 1-1: New USB device strings: Mfr=2, Product=0, SerialNumber=0 [ 36.980431][ T65] usb 4-1: New USB device found, idVendor=0582, idProduct=0089, bcdDevice= 0.40 [ 36.990484][ T31] usb 1-1: Manufacturer: syz [ 36.996278][ T31] usb 1-1: config 0 descriptor?? [ 37.001556][ T65] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 37.012301][ T65] usb 4-1: Product: syz [ 37.016526][ T65] usb 4-1: Manufacturer: syz [ 37.025248][ T65] usb 4-1: SerialNumber: syz [ 37.089673][ T45] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 37.237197][ T65] usb 4-1: unit 0 not found! [ 37.243418][ T45] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 37.257636][ T65] usb 4-1: USB disconnect, device number 5 [ 37.264799][ T45] usb 2-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 37.275070][ T45] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 37.284432][ T45] usb 2-1: config 0 descriptor?? [ 37.319990][ T311] udevd[311]: error opening ATTR{/sys/devices/platform/dummy_hcd.3/usb4/4-1/4-1:1.0/sound/card0/controlC0/../uevent} for writing: No such file or directory [ 37.624323][ T31] usbhid 1-1:0.0: can't add hid device: -71 [ 37.631091][ T31] usbhid 1-1:0.0: probe with driver usbhid failed with error -71 [ 37.641526][ T31] usb 1-1: USB disconnect, device number 3 [ 37.881996][ T629] netlink: 4 bytes leftover after parsing attributes in process `syz.2.110'. [ 37.904269][ T631] netlink: 96 bytes leftover after parsing attributes in process `syz.2.111'. [ 37.913444][ T631] FAULT_INJECTION: forcing a failure. [ 37.913444][ T631] name failslab, interval 1, probability 0, space 0, times 0 [ 37.926740][ T631] CPU: 0 UID: 0 PID: 631 Comm: syz.2.111 Not tainted syzkaller #0 a40991d314adffa3075cd603e5b19eadab4cccf0 [ 37.926767][ T631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 37.926778][ T631] Call Trace: [ 37.926784][ T631] [ 37.926791][ T631] __dump_stack+0x21/0x30 [ 37.926819][ T631] dump_stack_lvl+0x140/0x1c0 [ 37.926838][ T631] ? __cfi_dump_stack_lvl+0x10/0x10 [ 37.926862][ T631] dump_stack+0x19/0x20 [ 37.926883][ T631] should_fail_ex+0x3d7/0x530 [ 37.926905][ T631] should_failslab+0xac/0x100 [ 37.926922][ T631] kmem_cache_alloc_node_noprof+0x45/0x420 [ 37.926948][ T631] ? __alloc_skb+0x108/0x370 [ 37.926971][ T631] __alloc_skb+0x108/0x370 [ 37.926988][ T631] ? __kasan_check_read+0x15/0x20 [ 37.927011][ T631] netlink_ack+0x155/0xa50 [ 37.927036][ T631] ? avc_has_perm_noaudit+0x28a/0x360 [ 37.927064][ T631] ? avc_has_perm+0x155/0x240 [ 37.927084][ T631] netlink_rcv_skb+0x2dd/0x4f0 [ 37.927097][ T631] ? __cfi_rtnetlink_rcv_msg+0x10/0x10 [ 37.927110][ T631] ? __cfi_netlink_rcv_skb+0x10/0x10 [ 37.927125][ T631] ? netlink_autobind+0x1c0/0x1c0 [ 37.927142][ T631] ? is_vmalloc_addr+0x11/0x40 [ 37.927163][ T631] rtnetlink_rcv+0x20/0x30 [ 37.927182][ T631] netlink_unicast+0x8c3/0xa60 [ 37.927201][ T631] netlink_sendmsg+0x7fe/0xb10 [ 37.927220][ T631] ? __kasan_check_write+0x18/0x20 [ 37.927240][ T631] ? __cfi_netlink_sendmsg+0x10/0x10 [ 37.927260][ T631] ? __fget_files+0x2c5/0x340 [ 37.927270][ T631] ? bpf_lsm_socket_sendmsg+0xd/0x20 [ 37.927289][ T631] ? security_socket_sendmsg+0x3d/0x100 [ 37.927308][ T631] __sys_sendto+0x718/0x790 [ 37.927334][ T631] ? __cfi___sys_sendto+0x10/0x10 [ 37.927359][ T631] ? __kasan_check_write+0x18/0x20 [ 37.927376][ T631] ? __cfi_ksys_write+0x10/0x10 [ 37.927392][ T631] __x64_sys_sendto+0xe9/0x100 [ 37.927404][ T631] x64_sys_call+0x2c2c/0x2ee0 [ 37.927419][ T631] do_syscall_64+0x57/0xf0 [ 37.927448][ T631] ? clear_bhb_loop+0x50/0xa0 [ 37.927467][ T631] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 37.927494][ T631] RIP: 0033:0x7f846499c819 [ 37.927510][ T631] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 37.927519][ T631] RSP: 002b:00007f8465890028 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 37.927532][ T631] RAX: ffffffffffffffda RBX: 00007f8464c15fa0 RCX: 00007f846499c819 [ 37.927540][ T631] RDX: 0000000000000090 RSI: 0000200000000540 RDI: 0000000000000003 [ 37.927547][ T631] RBP: 00007f8465890090 R08: 0000000000000000 R09: 0000000000000000 [ 37.927553][ T631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 37.927560][ T631] R13: 00007f8464c16038 R14: 00007f8464c15fa0 R15: 00007fffce6292f8 [ 37.927569][ T631] [ 38.095417][ T45] usbhid 2-1:0.0: can't add hid device: -71 [ 38.159028][ T10] usb 4-1: new high-speed USB device number 6 using dummy_hcd [ 38.159209][ T45] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 38.236319][ T45] usb 2-1: USB disconnect, device number 4 [ 38.319309][ T10] usb 4-1: Using ep0 maxpacket: 8 [ 38.325918][ T10] usb 4-1: unable to get BOS descriptor or descriptor too short [ 38.337660][ T10] usb 4-1: config 1 descriptor has 1 excess byte, ignoring [ 38.345134][ T10] usb 4-1: config 1 has 1 interface, different from the descriptor's value: 2 [ 38.354919][ T10] usb 4-1: config 1 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 38.378321][ T10] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 38.388074][ T10] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 38.397310][ T10] usb 4-1: Product: syz [ 38.402384][ T10] usb 4-1: Manufacturer: syz [ 38.407453][ T10] usb 4-1: SerialNumber: syz [ 38.449189][ T9] usb 1-1: new full-speed USB device number 4 using dummy_hcd [ 38.589026][ T9] usb 1-1: device descriptor read/64, error -71 [ 38.619402][ T625] syzkaller1: entered promiscuous mode [ 38.625016][ T625] syzkaller1: entered allmulticast mode [ 38.670975][ T10] cdc_ncm 4-1:1.0: skipping garbage [ 38.678579][ T10] cdc_ncm 4-1:1.0: CDC Union missing and no IAD found [ 38.686083][ T10] cdc_ncm 4-1:1.0: bind() failure [ 38.693496][ T10] usb 4-1: USB disconnect, device number 6 [ 38.829118][ T9] usb 1-1: device descriptor read/64, error -71 [ 39.069056][ T9] usb 1-1: new full-speed USB device number 5 using dummy_hcd [ 39.219057][ T9] usb 1-1: device descriptor read/64, error -71 [ 39.469034][ T9] usb 1-1: device descriptor read/64, error -71 [ 39.589236][ T9] usb usb1-port1: attempt power cycle [ 39.719035][ T418] usb 4-1: new high-speed USB device number 7 using dummy_hcd [ 39.869017][ T418] usb 4-1: Using ep0 maxpacket: 16 [ 39.880381][ T418] usb 4-1: config 0 has an invalid interface number: 105 but max is 0 [ 39.888939][ T418] usb 4-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 39.919066][ T418] usb 4-1: config 0 has no interface number 0 [ 39.926901][ T418] usb 4-1: New USB device found, idVendor=046d, idProduct=08f3, bcdDevice= b.28 [ 39.939008][ T9] usb 1-1: new full-speed USB device number 6 using dummy_hcd [ 39.947596][ T418] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 39.956194][ T418] usb 4-1: Product: syz [ 39.970755][ T9] usb 1-1: device descriptor read/8, error -71 [ 39.971356][ T418] usb 4-1: Manufacturer: syz [ 39.981698][ T418] usb 4-1: SerialNumber: syz [ 39.992308][ T418] usb 4-1: config 0 descriptor?? [ 40.009706][ T418] usb 4-1: Found UVC 0.00 device syz (046d:08f3) [ 40.016190][ T418] usb 4-1: No valid video chain found. [ 40.111506][ T9] usb 1-1: device descriptor read/8, error -71 [ 40.359041][ T9] usb 1-1: new full-speed USB device number 7 using dummy_hcd [ 40.380018][ T9] usb 1-1: device descriptor read/8, error -71 [ 40.440414][ T210] usb 4-1: USB disconnect, device number 7 [ 40.474682][ T36] kauditd_printk_skb: 16 callbacks suppressed [ 40.474700][ T36] audit: type=1400 audit(1775177102.170:181): avc: denied { connect } for pid=695 comm="syz.2.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 40.503357][ T36] audit: type=1400 audit(1775177102.180:182): avc: denied { ioctl } for pid=695 comm="syz.2.133" path="socket:[10624]" dev="sockfs" ino=10624 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 40.509848][ T696] netlink: 'syz.2.133': attribute type 12 has an invalid length. [ 40.530306][ T9] usb 1-1: device descriptor read/8, error -71 [ 40.544794][ T36] audit: type=1400 audit(1775177102.230:183): avc: denied { accept } for pid=695 comm="syz.2.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 40.650581][ T9] usb usb1-port1: unable to enumerate USB device [ 40.766448][ T36] audit: type=1400 audit(1775177102.460:184): avc: denied { set_context_mgr } for pid=710 comm="syz.2.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 40.786565][ T36] audit: type=1400 audit(1775177102.490:185): avc: denied { map } for pid=710 comm="syz.2.139" path="/dev/binderfs/binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 40.787217][ T711] rust_binder: Error in use_page_slow: ESRCH [ 40.811483][ T36] audit: type=1400 audit(1775177102.490:186): avc: denied { call } for pid=710 comm="syz.2.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 40.812711][ T711] rust_binder: use_range failure ESRCH [ 40.837172][ T711] rust_binder: Failed to allocate buffer. len:1024, is_oneway:true [ 40.843221][ T711] rust_binder: Failure in copy_transaction_data: BR_FAILED_REPLY { source: ESRCH } [ 40.857295][ T711] rust_binder: Transaction failed: BR_FAILED_REPLY { source: ESRCH } my_pid:116 [ 40.878314][ T36] audit: type=1400 audit(1775177102.570:187): avc: denied { create } for pid=715 comm="syz.1.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 40.945074][ T36] audit: type=1400 audit(1775177102.640:188): avc: denied { watch watch_reads } for pid=715 comm="syz.1.140" path="/32" dev="tmpfs" ino=181 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 40.945914][ T717] UHID_CREATE from different security context by process 96 (syz.1.140), this is not allowed. [ 40.980919][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 40.999037][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.006657][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.035091][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.049101][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.067183][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.075337][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.083567][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.091478][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.100270][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.108280][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.124052][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.132191][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.140390][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.148331][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.156467][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.164536][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.172350][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.180482][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.188362][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.196234][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.227893][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.258912][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.283408][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.285697][ T720] netlink: 124 bytes leftover after parsing attributes in process `syz.3.141'. [ 41.303322][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.311374][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.320771][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.328539][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.336906][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.345572][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.355173][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.364525][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.375386][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.384598][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.392954][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.402443][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.439032][ T9] hid-generic 0001:0005:10004.0001: unknown main item tag 0x0 [ 41.453071][ T9] hid-generic 0001:0005:10004.0001: hidraw0: HID v0.02 Device [syz1] on syz0 [ 41.585863][ T36] audit: type=1400 audit(1775177103.280:189): avc: denied { create } for pid=729 comm="syz.0.143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 41.621387][ T732] random: crng reseeded on system resumption [ 41.659064][ T36] audit: type=1400 audit(1775177103.320:190): avc: denied { write } for pid=731 comm="syz.0.144" name="snapshot" dev="devtmpfs" ino=21 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 41.914301][ T761] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 41.928056][ T759] netlink: 124 bytes leftover after parsing attributes in process `syz.3.154'. [ 42.019040][ T31] usb 3-1: new high-speed USB device number 4 using dummy_hcd [ 42.119041][ T418] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 42.170366][ T31] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 42.181511][ T31] usb 3-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 42.191225][ T31] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 42.200310][ T31] usb 3-1: config 0 descriptor?? [ 42.280174][ T418] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 42.291433][ T418] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 42.302049][ T418] usb 2-1: New USB device found, idVendor=256c, idProduct=006d, bcdDevice= 0.00 [ 42.312020][ T418] usb 2-1: New USB device strings: Mfr=2, Product=0, SerialNumber=0 [ 42.320106][ T418] usb 2-1: Manufacturer: syz [ 42.326203][ T418] usb 2-1: config 0 descriptor?? [ 42.333550][ T786] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 42.610079][ T31] keytouch 0003:0926:3333.0002: fixing up Keytouch IEC report descriptor [ 42.628531][ T31] input: HID 0926:3333 as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:0926:3333.0002/input/input5 [ 42.703038][ T31] keytouch 0003:0926:3333.0002: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.2-1/input0 [ 42.722291][ T798] netlink: 57 bytes leftover after parsing attributes in process `syz.0.167'. [ 42.953573][ T418] uclogic 0003:256C:006D.0003: failed retrieving Huion firmware version: -71 [ 42.962880][ T418] uclogic 0003:256C:006D.0003: failed probing parameters: -71 [ 42.970611][ T418] uclogic 0003:256C:006D.0003: probe with driver uclogic failed with error -71 [ 42.982523][ T418] usb 2-1: USB disconnect, device number 5 [ 42.989053][ T31] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 43.019032][ T430] usb 3-1: USB disconnect, device number 4 [ 43.139067][ T31] usb 1-1: device descriptor read/64, error -71 [ 43.379129][ T31] usb 1-1: device descriptor read/64, error -71 [ 43.470387][ T418] usb 4-1: new high-speed USB device number 8 using dummy_hcd [ 43.622235][ T31] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 43.759109][ T31] usb 1-1: device descriptor read/64, error -71 [ 43.914480][ T837] fuse: Bad value for 'user_id' [ 43.919545][ T837] fuse: Bad value for 'user_id' [ 44.009097][ T31] usb 1-1: device descriptor read/64, error -71 [ 44.019141][ T430] usb 3-1: new full-speed USB device number 5 using dummy_hcd [ 44.119140][ T31] usb usb1-port1: attempt power cycle [ 44.180264][ T430] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 44.191495][ T430] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 44.202203][ T430] usb 3-1: New USB device found, idVendor=046d, idProduct=c31c, bcdDevice= 0.40 [ 44.211982][ T430] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 44.221109][ T430] usb 3-1: config 0 descriptor?? [ 44.228471][ T430] hub 3-1:0.0: USB hub found [ 44.427894][ T430] hub 3-1:0.0: 1 port detected [ 44.459042][ T31] usb 1-1: new high-speed USB device number 10 using dummy_hcd [ 44.480250][ T31] usb 1-1: device descriptor read/8, error -71 [ 44.610198][ T31] usb 1-1: device descriptor read/8, error -71 [ 44.689968][ T430] hub 3-1:0.0: hub_hub_status failed (err = -71) [ 44.696693][ T430] hub 3-1:0.0: config failed, can't get hub status (err -71) [ 44.705851][ T430] usbhid 3-1:0.0: can't add hid device: -71 [ 44.712096][ T430] usbhid 3-1:0.0: probe with driver usbhid failed with error -71 [ 44.739686][ T430] usb 3-1: USB disconnect, device number 5 [ 44.859054][ T31] usb 1-1: new high-speed USB device number 11 using dummy_hcd [ 44.882647][ T31] usb 1-1: device descriptor read/8, error -71 [ 44.904655][ T850] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=64 sclass=netlink_xfrm_socket pid=850 comm=syz.1.185 [ 45.020098][ T31] usb 1-1: device descriptor read/8, error -71 [ 45.129526][ T31] usb usb1-port1: unable to enumerate USB device [ 45.135977][ T859] capability: warning: `syz.1.188' uses 32-bit capabilities (legacy support in use) [ 45.389040][ T430] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 45.561003][ T430] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 45.572647][ T430] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 45.582838][ T430] usb 2-1: New USB device found, idVendor=10c4, idProduct=ea90, bcdDevice= 0.80 [ 45.592193][ T430] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 45.605604][ T430] usb 2-1: config 0 descriptor?? [ 46.013813][ T430] cp2112 0003:10C4:EA90.0004: unknown main item tag 0x0 [ 46.024904][ T430] cp2112 0003:10C4:EA90.0004: unknown main item tag 0x0 [ 46.032645][ T430] cp2112 0003:10C4:EA90.0004: unknown main item tag 0x0 [ 46.039854][ T430] cp2112 0003:10C4:EA90.0004: unknown main item tag 0x0 [ 46.046933][ T430] cp2112 0003:10C4:EA90.0004: unknown main item tag 0x0 [ 46.054202][ T430] cp2112 0003:10C4:EA90.0004: unknown main item tag 0x0 [ 46.061620][ T430] cp2112 0003:10C4:EA90.0004: unknown main item tag 0x0 [ 46.069524][ T430] cp2112 0003:10C4:EA90.0004: hidraw1: USB HID v0.00 Device [HID 10c4:ea90] on usb-dummy_hcd.1-1/input0 [ 46.099024][ T31] usb 3-1: new high-speed USB device number 6 using dummy_hcd [ 46.213238][ T430] cp2112 0003:10C4:EA90.0004: Part Number: 0x47 Device Version: 0xD0 [ 46.242168][ T418] usb 4-1: unable to get BOS descriptor or descriptor too short [ 46.250148][ T31] usb 3-1: Using ep0 maxpacket: 16 [ 46.256003][ T31] usb 3-1: too many configurations: 17, using maximum allowed: 8 [ 46.264246][ T65] usb 1-1: new high-speed USB device number 12 using dummy_hcd [ 46.272180][ T418] usb 4-1: unable to read config index 0 descriptor/start: -71 [ 46.280665][ T418] usb 4-1: can't read configurations, error -71 [ 46.308340][ T31] usb 3-1: string descriptor 0 read error: -71 [ 46.317125][ T31] usb 3-1: New USB device found, idVendor=04e8, idProduct=a101, bcdDevice= 4.48 [ 46.326967][ T31] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 46.340666][ T31] r8152-cfgselector 3-1: Unknown version 0x0000 [ 46.347569][ T31] r8152-cfgselector 3-1: rejected 8 configurations due to insufficient available bus power [ 46.358564][ T31] r8152-cfgselector 3-1: no configuration chosen from 8 choices [ 46.367850][ T31] r8152-cfgselector 3-1: USB disconnect, device number 6 [ 46.409032][ T65] usb 1-1: device descriptor read/64, error -71 [ 46.570951][ T430] cp2112 0003:10C4:EA90.0004: error requesting SMBus config [ 46.579538][ T430] cp2112 0003:10C4:EA90.0004: probe with driver cp2112 failed with error -71 [ 46.590437][ T430] usb 2-1: USB disconnect, device number 6 [ 46.669121][ T65] usb 1-1: device descriptor read/64, error -71 [ 46.909109][ T65] usb 1-1: new high-speed USB device number 13 using dummy_hcd [ 47.039121][ T65] usb 1-1: device descriptor read/64, error -71 [ 47.110502][ T31] usb 3-1: new high-speed USB device number 7 using dummy_hcd [ 47.131047][ T909] netlink: 12 bytes leftover after parsing attributes in process `syz.1.205'. [ 47.169333][ T36] kauditd_printk_skb: 21 callbacks suppressed [ 47.169353][ T36] audit: type=1400 audit(1775177108.870:212): avc: denied { create } for pid=910 comm="syz.1.206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 47.269215][ T31] usb 3-1: Using ep0 maxpacket: 8 [ 47.278035][ T31] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 47.290255][ T65] usb 1-1: device descriptor read/64, error -71 [ 47.296807][ T31] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 47.310595][ T31] usb 3-1: New USB device found, idVendor=5543, idProduct=0781, bcdDevice= 0.00 [ 47.320226][ T418] usb 4-1: new high-speed USB device number 9 using dummy_hcd [ 47.328055][ T31] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 47.337749][ T31] usb 3-1: config 0 descriptor?? [ 47.429191][ T65] usb usb1-port1: attempt power cycle [ 47.490373][ T418] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 47.501917][ T418] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 47.513275][ T418] usb 4-1: New USB device found, idVendor=256c, idProduct=006d, bcdDevice= 0.00 [ 47.522683][ T418] usb 4-1: New USB device strings: Mfr=2, Product=0, SerialNumber=0 [ 47.531480][ T418] usb 4-1: Manufacturer: syz [ 47.537100][ T418] usb 4-1: config 0 descriptor?? [ 47.539059][ T430] usb 2-1: new high-speed USB device number 7 using dummy_hcd [ 47.551230][ T36] audit: type=1400 audit(1775177109.250:213): avc: denied { create } for pid=899 comm="syz.2.201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 47.570785][ T36] audit: type=1400 audit(1775177109.250:214): avc: denied { getopt } for pid=899 comm="syz.2.201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 47.720231][ T430] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 47.731526][ T430] usb 2-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 47.740908][ T430] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 47.749955][ T430] usb 2-1: config 0 descriptor?? [ 47.779068][ T65] usb 1-1: new high-speed USB device number 14 using dummy_hcd [ 47.800332][ T65] usb 1-1: device descriptor read/8, error -71 [ 47.809671][ T31] uclogic 0003:5543:0781.0005: unknown main item tag 0x0 [ 47.817008][ T31] uclogic 0003:5543:0781.0005: unknown main item tag 0x0 [ 47.824701][ T31] uclogic 0003:5543:0781.0005: unknown main item tag 0x0 [ 47.832084][ T31] uclogic 0003:5543:0781.0005: unknown main item tag 0x0 [ 47.839438][ T31] uclogic 0003:5543:0781.0005: unknown main item tag 0x0 [ 47.846696][ T31] uclogic 0003:5543:0781.0005: unknown main item tag 0x0 [ 47.853839][ T31] uclogic 0003:5543:0781.0005: unknown main item tag 0x0 [ 47.861244][ T31] uclogic 0003:5543:0781.0005: unknown main item tag 0x0 [ 47.868475][ T31] uclogic 0003:5543:0781.0005: unknown main item tag 0x0 [ 47.876024][ T31] uclogic 0003:5543:0781.0005: unknown main item tag 0x0 [ 47.883236][ T31] uclogic 0003:5543:0781.0005: unknown main item tag 0x0 [ 47.890746][ T31] uclogic 0003:5543:0781.0005: unknown main item tag 0x0 [ 47.898295][ T31] uclogic 0003:5543:0781.0005: unknown main item tag 0x0 [ 47.905600][ T31] uclogic 0003:5543:0781.0005: unknown main item tag 0x0 [ 47.912814][ T31] uclogic 0003:5543:0781.0005: unknown main item tag 0x0 [ 47.920484][ T31] uclogic 0003:5543:0781.0005: unknown main item tag 0x0 [ 47.927674][ T31] uclogic 0003:5543:0781.0005: unknown main item tag 0x0 [ 47.935505][ T31] uclogic 0003:5543:0781.0005: unknown main item tag 0x0 [ 47.943013][ T31] uclogic 0003:5543:0781.0005: unknown main item tag 0x0 [ 47.952894][ T31] uclogic 0003:5543:0781.0005: unknown main item tag 0x0 [ 47.961228][ T65] usb 1-1: device descriptor read/8, error -71 [ 47.969678][ T31] uclogic 0003:5543:0781.0005: unknown main item tag 0x0 [ 47.976961][ T31] uclogic 0003:5543:0781.0005: unbalanced collection at end of report description [ 47.987552][ T31] uclogic 0003:5543:0781.0005: parse failed [ 47.993921][ T31] uclogic 0003:5543:0781.0005: probe with driver uclogic failed with error -22 [ 48.014286][ T36] audit: type=1400 audit(1775177109.710:215): avc: denied { ioctl } for pid=899 comm="syz.2.201" path="socket:[14153]" dev="sockfs" ino=14153 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 48.037540][ T916] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=916 comm=syz.2.201 [ 48.056047][ T916] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 48.065168][ T916] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 48.157561][ T430] keytouch 0003:0926:3333.0007: fixing up Keytouch IEC report descriptor [ 48.168186][ T430] input: HID 0926:3333 as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/0003:0926:3333.0007/input/input6 [ 48.181159][ T418] uclogic 0003:256C:006D.0006: failed retrieving Huion firmware version: -71 [ 48.190337][ T418] uclogic 0003:256C:006D.0006: failed probing parameters: -71 [ 48.197879][ T418] uclogic 0003:256C:006D.0006: probe with driver uclogic failed with error -71 [ 48.207502][ T65] usb 1-1: new high-speed USB device number 15 using dummy_hcd [ 48.217667][ T418] usb 4-1: USB disconnect, device number 9 [ 48.240836][ T65] usb 1-1: device descriptor read/8, error -71 [ 48.249341][ T430] keytouch 0003:0926:3333.0007: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.1-1/input0 [ 48.370527][ T65] usb 1-1: device descriptor read/8, error -71 [ 48.479175][ T65] usb usb1-port1: unable to enumerate USB device [ 48.560606][ T210] usb 2-1: USB disconnect, device number 7 [ 48.700258][ T36] audit: type=1404 audit(1775177110.400:216): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 48.716315][ T36] audit: type=1400 audit(1775177110.410:217): avc: denied { write } for pid=919 comm="syz.3.208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 48.737147][ T36] audit: type=1400 audit(1775177110.410:218): avc: denied { write } for pid=919 comm="syz.3.208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 48.757692][ T36] audit: type=1400 audit(1775177110.410:219): avc: denied { read } for pid=919 comm="syz.3.208" path="socket:[15028]" dev="sockfs" ino=15028 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 48.782833][ T36] audit: type=1400 audit(1775177110.410:220): avc: denied { write } for pid=919 comm="syz.3.208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 48.803741][ T36] audit: type=1400 audit(1775177110.410:221): avc: denied { read write } for pid=919 comm="syz.3.208" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 49.091177][ T925] netlink: 'syz.0.210': attribute type 19 has an invalid length. [ 49.164577][ T931] FAULT_INJECTION: forcing a failure. [ 49.164577][ T931] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 49.178283][ T931] CPU: 0 UID: 0 PID: 931 Comm: syz.1.213 Not tainted syzkaller #0 a40991d314adffa3075cd603e5b19eadab4cccf0 [ 49.178307][ T931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 49.178314][ T931] Call Trace: [ 49.178319][ T931] [ 49.178323][ T931] __dump_stack+0x21/0x30 [ 49.178342][ T931] dump_stack_lvl+0x140/0x1c0 [ 49.178356][ T931] ? __cfi_dump_stack_lvl+0x10/0x10 [ 49.178370][ T931] ? vsnprintf+0x7b4/0x1ad0 [ 49.178394][ T931] ? check_stack_object+0x106/0x150 [ 49.178420][ T931] dump_stack+0x19/0x20 [ 49.178443][ T931] should_fail_ex+0x3d7/0x530 [ 49.178458][ T931] should_fail+0xf/0x20 [ 49.178470][ T931] should_fail_usercopy+0x1e/0x30 [ 49.178484][ T931] _copy_from_user+0x20/0xa0 [ 49.178494][ T931] kstrtouint_from_user+0xde/0x170 [ 49.178509][ T931] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 49.178521][ T931] ? selinux_file_permission+0x318/0xb60 [ 49.178536][ T931] ? __cfi_selinux_file_permission+0x10/0x10 [ 49.178548][ T931] proc_fail_nth_write+0x8f/0x220 [ 49.178561][ T931] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 49.178573][ T931] ? bpf_lsm_file_permission+0xd/0x20 [ 49.178584][ T931] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 49.178596][ T931] vfs_write+0x3c8/0xf90 [ 49.178611][ T931] ? __cfi_vfs_write+0x10/0x10 [ 49.178623][ T931] ? __kasan_check_write+0x18/0x20 [ 49.178638][ T931] ? mutex_lock+0x97/0x1d0 [ 49.178649][ T931] ? __cfi_mutex_lock+0x10/0x10 [ 49.178660][ T931] ? __fget_files+0x2c5/0x340 [ 49.178670][ T931] ksys_write+0x145/0x260 [ 49.178684][ T931] ? __cfi_ksys_write+0x10/0x10 [ 49.178697][ T931] ? fdget+0x188/0x1e0 [ 49.178707][ T931] ? __kasan_check_read+0x15/0x20 [ 49.178720][ T931] __x64_sys_write+0x7f/0x90 [ 49.178733][ T931] x64_sys_call+0x271c/0x2ee0 [ 49.178748][ T931] do_syscall_64+0x57/0xf0 [ 49.178762][ T931] ? clear_bhb_loop+0x50/0xa0 [ 49.178772][ T931] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 49.178788][ T931] RIP: 0033:0x7f545995d04e [ 49.178800][ T931] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 49.178809][ T931] RSP: 002b:00007f545a8f4fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 49.178821][ T931] RAX: ffffffffffffffda RBX: 00007f545a8f56c0 RCX: 00007f545995d04e [ 49.178829][ T931] RDX: 0000000000000001 RSI: 00007f545a8f50a0 RDI: 0000000000000005 [ 49.178836][ T931] RBP: 00007f545a8f5090 R08: 0000000000000000 R09: 0000000000000000 [ 49.178843][ T931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 49.178849][ T931] R13: 00007f5459c16038 R14: 00007f5459c15fa0 R15: 00007fff023b05a8 [ 49.178858][ T931] [ 49.882447][ T430] usb 3-1: USB disconnect, device number 7 [ 49.931872][ T961] netlink: 188 bytes leftover after parsing attributes in process `syz.2.227'. [ 50.018371][ T981] FAULT_INJECTION: forcing a failure. [ 50.018371][ T981] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 50.032044][ T981] CPU: 1 UID: 0 PID: 981 Comm: syz.3.234 Not tainted syzkaller #0 a40991d314adffa3075cd603e5b19eadab4cccf0 [ 50.032079][ T981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 50.032090][ T981] Call Trace: [ 50.032096][ T981] [ 50.032103][ T981] __dump_stack+0x21/0x30 [ 50.032133][ T981] dump_stack_lvl+0x140/0x1c0 [ 50.032155][ T981] ? __cfi_dump_stack_lvl+0x10/0x10 [ 50.032177][ T981] ? preempt_schedule_irq+0xab/0x110 [ 50.032197][ T981] ? check_stack_object+0x106/0x150 [ 50.032223][ T981] dump_stack+0x19/0x20 [ 50.032242][ T981] should_fail_ex+0x3d7/0x530 [ 50.032265][ T981] should_fail+0xf/0x20 [ 50.032285][ T981] should_fail_usercopy+0x1e/0x30 [ 50.032307][ T981] _copy_from_user+0x20/0xa0 [ 50.032375][ T981] kstrtouint_from_user+0xde/0x170 [ 50.032399][ T981] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 50.032422][ T981] ? selinux_file_permission+0x318/0xb60 [ 50.032448][ T981] ? __cfi_selinux_file_permission+0x10/0x10 [ 50.032472][ T981] proc_fail_nth_write+0x8f/0x220 [ 50.032495][ T981] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 50.032517][ T981] ? bpf_lsm_file_permission+0xd/0x20 [ 50.032538][ T981] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 50.032561][ T981] vfs_write+0x3c8/0xf90 [ 50.032585][ T981] ? __cfi_vfs_write+0x10/0x10 [ 50.032604][ T981] ? __kasan_check_write+0x18/0x20 [ 50.032627][ T981] ? mutex_lock+0x97/0x1d0 [ 50.032643][ T981] ? __cfi_mutex_lock+0x10/0x10 [ 50.032660][ T981] ? __fget_files+0x2c5/0x340 [ 50.032676][ T981] ksys_write+0x145/0x260 [ 50.032701][ T981] ? xfd_validate_state+0x68/0x140 [ 50.032722][ T981] ? __cfi_ksys_write+0x10/0x10 [ 50.032745][ T981] ? __kasan_check_write+0x18/0x20 [ 50.032763][ T981] ? fpregs_restore_userregs+0x11c/0x260 [ 50.032783][ T981] __x64_sys_write+0x7f/0x90 [ 50.032806][ T981] x64_sys_call+0x271c/0x2ee0 [ 50.032828][ T981] do_syscall_64+0x57/0xf0 [ 50.032850][ T981] ? clear_bhb_loop+0x50/0xa0 [ 50.032866][ T981] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 50.032889][ T981] RIP: 0033:0x7fc4bcb5d04e [ 50.032905][ T981] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 50.032920][ T981] RSP: 002b:00007fc4bd9d0fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 50.032939][ T981] RAX: ffffffffffffffda RBX: 00007fc4bd9d16c0 RCX: 00007fc4bcb5d04e [ 50.032950][ T981] RDX: 0000000000000001 RSI: 00007fc4bd9d10a0 RDI: 0000000000000003 [ 50.032962][ T981] RBP: 00007fc4bd9d1090 R08: 0000000000000000 R09: 0000000000000000 [ 50.032973][ T981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 50.032982][ T981] R13: 00007fc4bce16038 R14: 00007fc4bce15fa0 R15: 00007ffec596b078 [ 50.032995][ T981] [ 50.515549][ T993] netlink: 'syz.0.238': attribute type 4 has an invalid length. [ 50.527295][ T993] netlink: 'syz.0.238': attribute type 4 has an invalid length. [ 50.862327][ T1003] FAULT_INJECTION: forcing a failure. [ 50.862327][ T1003] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 50.875741][ T1003] CPU: 0 UID: 0 PID: 1003 Comm: syz.1.243 Not tainted syzkaller #0 a40991d314adffa3075cd603e5b19eadab4cccf0 [ 50.875778][ T1003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 50.875789][ T1003] Call Trace: [ 50.875797][ T1003] [ 50.875806][ T1003] __dump_stack+0x21/0x30 [ 50.875839][ T1003] dump_stack_lvl+0x140/0x1c0 [ 50.875855][ T1003] ? __cfi_dump_stack_lvl+0x10/0x10 [ 50.875869][ T1003] ? check_stack_object+0x12b/0x150 [ 50.875886][ T1003] dump_stack+0x19/0x20 [ 50.875898][ T1003] should_fail_ex+0x3d7/0x530 [ 50.875914][ T1003] should_fail+0xf/0x20 [ 50.875926][ T1003] should_fail_usercopy+0x1e/0x30 [ 50.875940][ T1003] _copy_to_user+0x24/0xa0 [ 50.875955][ T1003] simple_read_from_buffer+0xed/0x160 [ 50.875968][ T1003] proc_fail_nth_read+0x1aa/0x220 [ 50.875982][ T1003] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 50.875994][ T1003] ? bpf_lsm_file_permission+0xd/0x20 [ 50.876007][ T1003] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 50.876019][ T1003] vfs_read+0x286/0xcb0 [ 50.876034][ T1003] ? __cfi_vfs_read+0x10/0x10 [ 50.876047][ T1003] ? __kasan_check_write+0x18/0x20 [ 50.876067][ T1003] ? mutex_lock+0x97/0x1d0 [ 50.876086][ T1003] ? __cfi_mutex_lock+0x10/0x10 [ 50.876102][ T1003] ? __fget_files+0x2c5/0x340 [ 50.876114][ T1003] ksys_read+0x145/0x260 [ 50.876128][ T1003] ? __cfi_ksys_read+0x10/0x10 [ 50.876141][ T1003] ? fdget+0x188/0x1e0 [ 50.876151][ T1003] ? __kasan_check_read+0x15/0x20 [ 50.876164][ T1003] __x64_sys_read+0x7f/0x90 [ 50.876178][ T1003] x64_sys_call+0x2638/0x2ee0 [ 50.876193][ T1003] do_syscall_64+0x57/0xf0 [ 50.876209][ T1003] ? clear_bhb_loop+0x50/0xa0 [ 50.876220][ T1003] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 50.876236][ T1003] RIP: 0033:0x7f545995d04e [ 50.876248][ T1003] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 50.876258][ T1003] RSP: 002b:00007f545a8f4fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 50.876271][ T1003] RAX: ffffffffffffffda RBX: 00007f545a8f56c0 RCX: 00007f545995d04e [ 50.876280][ T1003] RDX: 000000000000000f RSI: 00007f545a8f50a0 RDI: 0000000000000003 [ 50.876287][ T1003] RBP: 00007f545a8f5090 R08: 0000000000000000 R09: 0000000000000000 [ 50.876295][ T1003] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 50.876308][ T1003] R13: 00007f5459c16038 R14: 00007f5459c15fa0 R15: 00007fff023b05a8 [ 50.876317][ T1003] [ 51.137907][ T1013] netlink: 96 bytes leftover after parsing attributes in process `syz.3.247'. [ 51.159557][ T1018] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5199 sclass=netlink_route_socket pid=1018 comm=syz.3.249 [ 51.163512][ T1020] FAULT_INJECTION: forcing a failure. [ 51.163512][ T1020] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 51.185656][ T1020] CPU: 0 UID: 0 PID: 1020 Comm: syz.1.250 Not tainted syzkaller #0 a40991d314adffa3075cd603e5b19eadab4cccf0 [ 51.185688][ T1020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 51.185704][ T1020] Call Trace: [ 51.185710][ T1020] [ 51.185718][ T1020] __dump_stack+0x21/0x30 [ 51.185749][ T1020] dump_stack_lvl+0x140/0x1c0 [ 51.185772][ T1020] ? __cfi_dump_stack_lvl+0x10/0x10 [ 51.185795][ T1020] ? check_stack_object+0x12b/0x150 [ 51.185823][ T1020] dump_stack+0x19/0x20 [ 51.185845][ T1020] should_fail_ex+0x3d7/0x530 [ 51.185870][ T1020] should_fail+0xf/0x20 [ 51.185891][ T1020] should_fail_usercopy+0x1e/0x30 [ 51.185915][ T1020] _copy_to_user+0x24/0xa0 [ 51.185933][ T1020] simple_read_from_buffer+0xed/0x160 [ 51.185960][ T1020] proc_fail_nth_read+0x1aa/0x220 [ 51.185984][ T1020] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 51.186005][ T1020] ? bpf_lsm_file_permission+0xd/0x20 [ 51.186025][ T1020] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 51.186046][ T1020] vfs_read+0x286/0xcb0 [ 51.186072][ T1020] ? __cfi_do_mmap+0x10/0x10 [ 51.186096][ T1020] ? __cfi_down_write_killable+0x10/0x10 [ 51.186128][ T1020] ? __cfi_vfs_read+0x10/0x10 [ 51.186150][ T1020] ? __kasan_check_write+0x18/0x20 [ 51.186175][ T1020] ? mutex_lock+0x97/0x1d0 [ 51.186194][ T1020] ? __cfi_mutex_lock+0x10/0x10 [ 51.186213][ T1020] ? __fget_files+0x2c5/0x340 [ 51.186232][ T1020] ksys_read+0x145/0x260 [ 51.186254][ T1020] ? __cfi_ksys_read+0x10/0x10 [ 51.186278][ T1020] ? __kasan_check_read+0x15/0x20 [ 51.186302][ T1020] __x64_sys_read+0x7f/0x90 [ 51.186326][ T1020] x64_sys_call+0x2638/0x2ee0 [ 51.186352][ T1020] do_syscall_64+0x57/0xf0 [ 51.186378][ T1020] ? clear_bhb_loop+0x50/0xa0 [ 51.186397][ T1020] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 51.186425][ T1020] RIP: 0033:0x7f545995d04e [ 51.186443][ T1020] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 51.186459][ T1020] RSP: 002b:00007f545a8f4fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 51.186481][ T1020] RAX: ffffffffffffffda RBX: 00007f545a8f56c0 RCX: 00007f545995d04e [ 51.186496][ T1020] RDX: 000000000000000f RSI: 00007f545a8f50a0 RDI: 0000000000000004 [ 51.186509][ T1020] RBP: 00007f545a8f5090 R08: 0000000000000000 R09: 0000000000000000 [ 51.186521][ T1020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 51.186533][ T1020] R13: 00007f5459c16038 R14: 00007f5459c15fa0 R15: 00007fff023b05a8 [ 51.186550][ T1020] [ 51.500724][ T1042] FAULT_INJECTION: forcing a failure. [ 51.500724][ T1042] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 51.513832][ T1042] CPU: 0 UID: 0 PID: 1042 Comm: syz.1.260 Not tainted syzkaller #0 a40991d314adffa3075cd603e5b19eadab4cccf0 [ 51.513862][ T1042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 51.513870][ T1042] Call Trace: [ 51.513875][ T1042] [ 51.513880][ T1042] __dump_stack+0x21/0x30 [ 51.513900][ T1042] dump_stack_lvl+0x140/0x1c0 [ 51.513913][ T1042] ? __cfi_dump_stack_lvl+0x10/0x10 [ 51.513927][ T1042] ? vsnprintf+0x7b4/0x1ad0 [ 51.513941][ T1042] ? check_stack_object+0x106/0x150 [ 51.513956][ T1042] dump_stack+0x19/0x20 [ 51.513968][ T1042] should_fail_ex+0x3d7/0x530 [ 51.513982][ T1042] should_fail+0xf/0x20 [ 51.513994][ T1042] should_fail_usercopy+0x1e/0x30 [ 51.514007][ T1042] _copy_from_user+0x20/0xa0 [ 51.514017][ T1042] kstrtouint_from_user+0xde/0x170 [ 51.514031][ T1042] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 51.514043][ T1042] ? selinux_file_permission+0x318/0xb60 [ 51.514059][ T1042] ? __cfi_selinux_file_permission+0x10/0x10 [ 51.514072][ T1042] proc_fail_nth_write+0x8f/0x220 [ 51.514084][ T1042] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 51.514096][ T1042] ? bpf_lsm_file_permission+0xd/0x20 [ 51.514108][ T1042] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 51.514120][ T1042] vfs_write+0x3c8/0xf90 [ 51.514134][ T1042] ? __cfi_vfs_write+0x10/0x10 [ 51.514153][ T1042] ? __kasan_check_write+0x18/0x20 [ 51.514168][ T1042] ? mutex_lock+0x97/0x1d0 [ 51.514179][ T1042] ? __cfi_mutex_lock+0x10/0x10 [ 51.514189][ T1042] ? __fget_files+0x2c5/0x340 [ 51.514200][ T1042] ksys_write+0x145/0x260 [ 51.514214][ T1042] ? __cfi_ksys_write+0x10/0x10 [ 51.514227][ T1042] ? fdget+0x188/0x1e0 [ 51.514236][ T1042] ? __kasan_check_read+0x15/0x20 [ 51.514250][ T1042] __x64_sys_write+0x7f/0x90 [ 51.514263][ T1042] x64_sys_call+0x271c/0x2ee0 [ 51.514278][ T1042] do_syscall_64+0x57/0xf0 [ 51.514292][ T1042] ? clear_bhb_loop+0x50/0xa0 [ 51.514302][ T1042] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 51.514318][ T1042] RIP: 0033:0x7f545995d04e [ 51.514329][ T1042] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 51.514338][ T1042] RSP: 002b:00007f545a8f4fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 51.514351][ T1042] RAX: ffffffffffffffda RBX: 00007f545a8f56c0 RCX: 00007f545995d04e [ 51.514359][ T1042] RDX: 0000000000000001 RSI: 00007f545a8f50a0 RDI: 0000000000000003 [ 51.514366][ T1042] RBP: 00007f545a8f5090 R08: 0000000000000000 R09: 0000000000000000 [ 51.514373][ T1042] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 51.514380][ T1042] R13: 00007f5459c16038 R14: 00007f5459c15fa0 R15: 00007fff023b05a8 [ 51.514389][ T1042] [ 51.857293][ T1061] netlink: 'syz.0.269': attribute type 16 has an invalid length. [ 51.866098][ T1061] netlink: 64138 bytes leftover after parsing attributes in process `syz.0.269'. [ 51.890104][ T1066] netlink: 92 bytes leftover after parsing attributes in process `syz.1.264'. [ 51.901593][ T1067] capability: warning: `syz.0.270' uses deprecated v2 capabilities in a way that may be insecure [ 52.180935][ T36] kauditd_printk_skb: 253 callbacks suppressed [ 52.180958][ T36] audit: type=1400 audit(1775177113.880:475): avc: denied { read } for pid=1100 comm="syz.3.285" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 52.210566][ T36] audit: type=1400 audit(1775177113.910:476): avc: denied { read write } for pid=1100 comm="syz.3.285" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 52.234594][ T36] audit: type=1400 audit(1775177113.930:477): avc: denied { read } for pid=1100 comm="syz.3.285" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 52.257288][ T36] audit: type=1400 audit(1775177113.940:478): avc: denied { read write } for pid=290 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.283214][ T36] audit: type=1400 audit(1775177113.980:479): avc: denied { sys_module } for pid=1102 comm="syz.3.286" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 52.361166][ T36] audit: type=1400 audit(1775177114.060:480): avc: denied { read write } for pid=290 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.385730][ T36] audit: type=1400 audit(1775177114.070:481): avc: denied { read write } for pid=290 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.410100][ T36] audit: type=1400 audit(1775177114.080:482): avc: denied { read write } for pid=1107 comm="syz.3.288" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 52.435129][ T36] audit: type=1400 audit(1775177114.110:483): avc: denied { create } for pid=1107 comm="syz.3.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 52.455333][ T36] audit: type=1400 audit(1775177114.110:484): avc: denied { read } for pid=1107 comm="syz.3.288" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 53.065799][ T1128] netlink: 124 bytes leftover after parsing attributes in process `syz.3.297'. [ 53.301661][ T1159] netlink: 124 bytes leftover after parsing attributes in process `syz.3.310'. [ 53.679120][ T1187] netlink: 124 bytes leftover after parsing attributes in process `syz.3.323'. [ 53.707146][ T1191] FAULT_INJECTION: forcing a failure. [ 53.707146][ T1191] name failslab, interval 1, probability 0, space 0, times 0 [ 53.721040][ T1191] CPU: 0 UID: 0 PID: 1191 Comm: syz.0.325 Not tainted syzkaller #0 a40991d314adffa3075cd603e5b19eadab4cccf0 [ 53.721075][ T1191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 53.721088][ T1191] Call Trace: [ 53.721094][ T1191] [ 53.721102][ T1191] __dump_stack+0x21/0x30 [ 53.721130][ T1191] dump_stack_lvl+0x140/0x1c0 [ 53.721154][ T1191] ? __cfi_dump_stack_lvl+0x10/0x10 [ 53.721179][ T1191] dump_stack+0x19/0x20 [ 53.721202][ T1191] should_fail_ex+0x3d7/0x530 [ 53.721227][ T1191] should_failslab+0xac/0x100 [ 53.721247][ T1191] kmem_cache_alloc_noprof+0x42/0x410 [ 53.721273][ T1191] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 53.721294][ T1191] ? alloc_empty_file+0xbf/0x270 [ 53.721313][ T1191] ? arch_stack_walk+0x10a/0x170 [ 53.721343][ T1191] alloc_empty_file+0xbf/0x270 [ 53.721363][ T1191] path_openat+0xfe/0x34f0 [ 53.721383][ T1191] ? stack_depot_save_flags+0x38/0x800 [ 53.721411][ T1191] ? kasan_save_track+0x3e/0x80 [ 53.721439][ T1191] ? kasan_save_alloc_info+0x40/0x50 [ 53.721462][ T1191] ? __kasan_slab_alloc+0x73/0x90 [ 53.721480][ T1191] ? kmem_cache_alloc_noprof+0x1bf/0x410 [ 53.721506][ T1191] ? getname+0x1b/0x30 [ 53.721531][ T1191] ? do_sys_openat2+0xda/0x1d0 [ 53.721552][ T1191] ? __x64_sys_openat+0x13a/0x170 [ 53.721574][ T1191] ? x64_sys_call+0xe69/0x2ee0 [ 53.721600][ T1191] ? do_syscall_64+0x57/0xf0 [ 53.721627][ T1191] ? entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 53.721656][ T1191] ? do_filp_open+0x440/0x440 [ 53.721678][ T1191] do_filp_open+0x1f5/0x440 [ 53.721699][ T1191] ? __cfi_do_filp_open+0x10/0x10 [ 53.721722][ T1191] ? alloc_fd+0x4e6/0x5a0 [ 53.721749][ T1191] do_sys_openat2+0x134/0x1d0 [ 53.721770][ T1191] ? fput+0x1a4/0x240 [ 53.721789][ T1191] ? do_sys_open+0x100/0x100 [ 53.721867][ T1191] ? ksys_write+0x1f3/0x260 [ 53.721899][ T1191] ? __cfi_ksys_write+0x10/0x10 [ 53.721926][ T1191] __x64_sys_openat+0x13a/0x170 [ 53.721948][ T1191] x64_sys_call+0xe69/0x2ee0 [ 53.721973][ T1191] do_syscall_64+0x57/0xf0 [ 53.722000][ T1191] ? clear_bhb_loop+0x50/0xa0 [ 53.722017][ T1191] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 53.722043][ T1191] RIP: 0033:0x7ff32259c819 [ 53.722060][ T1191] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 53.722077][ T1191] RSP: 002b:00007ff323457028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 53.722099][ T1191] RAX: ffffffffffffffda RBX: 00007ff322815fa0 RCX: 00007ff32259c819 [ 53.722114][ T1191] RDX: 0000000000000001 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 53.722128][ T1191] RBP: 00007ff323457090 R08: 0000000000000000 R09: 0000000000000000 [ 53.722142][ T1191] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 53.722155][ T1191] R13: 00007ff322816038 R14: 00007ff322815fa0 R15: 00007fff75739538 [ 53.722173][ T1191] [ 55.359633][ T1323] FAULT_INJECTION: forcing a failure. [ 55.359633][ T1323] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 55.378924][ T1323] CPU: 1 UID: 0 PID: 1323 Comm: syz.3.381 Not tainted syzkaller #0 a40991d314adffa3075cd603e5b19eadab4cccf0 [ 55.378962][ T1323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 55.378973][ T1323] Call Trace: [ 55.378979][ T1323] [ 55.378986][ T1323] __dump_stack+0x21/0x30 [ 55.379012][ T1323] dump_stack_lvl+0x140/0x1c0 [ 55.379032][ T1323] ? __cfi_dump_stack_lvl+0x10/0x10 [ 55.379056][ T1323] ? check_stack_object+0x12b/0x150 [ 55.379079][ T1323] dump_stack+0x19/0x20 [ 55.379100][ T1323] should_fail_ex+0x3d7/0x530 [ 55.379124][ T1323] should_fail+0xf/0x20 [ 55.379145][ T1323] should_fail_usercopy+0x1e/0x30 [ 55.379170][ T1323] _copy_to_user+0x24/0xa0 [ 55.379187][ T1323] simple_read_from_buffer+0xed/0x160 [ 55.379209][ T1323] proc_fail_nth_read+0x1aa/0x220 [ 55.379230][ T1323] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 55.379249][ T1323] ? bpf_lsm_file_permission+0xd/0x20 [ 55.379266][ T1323] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 55.379285][ T1323] vfs_read+0x286/0xcb0 [ 55.379309][ T1323] ? __cfi_vfs_read+0x10/0x10 [ 55.379330][ T1323] ? __kasan_check_write+0x18/0x20 [ 55.379354][ T1323] ? mutex_lock+0x97/0x1d0 [ 55.379376][ T1323] ? __cfi_mutex_lock+0x10/0x10 [ 55.379391][ T1323] ? __fget_files+0x2c5/0x340 [ 55.379409][ T1323] ksys_read+0x145/0x260 [ 55.379433][ T1323] ? __cfi_ksys_read+0x10/0x10 [ 55.379456][ T1323] ? fdget+0x188/0x1e0 [ 55.379474][ T1323] ? __kasan_check_read+0x15/0x20 [ 55.379495][ T1323] __x64_sys_read+0x7f/0x90 [ 55.379516][ T1323] x64_sys_call+0x2638/0x2ee0 [ 55.379540][ T1323] do_syscall_64+0x57/0xf0 [ 55.379564][ T1323] ? clear_bhb_loop+0x50/0xa0 [ 55.379581][ T1323] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 55.379606][ T1323] RIP: 0033:0x7fc4bcb5d04e [ 55.379622][ T1323] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 55.379638][ T1323] RSP: 002b:00007fc4bd9d0fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 55.379659][ T1323] RAX: ffffffffffffffda RBX: 00007fc4bd9d16c0 RCX: 00007fc4bcb5d04e [ 55.379674][ T1323] RDX: 000000000000000f RSI: 00007fc4bd9d10a0 RDI: 0000000000000004 [ 55.379688][ T1323] RBP: 00007fc4bd9d1090 R08: 0000000000000000 R09: 0000000000000000 [ 55.379700][ T1323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 55.379712][ T1323] R13: 00007fc4bce16038 R14: 00007fc4bce15fa0 R15: 00007ffec596b078 [ 55.379728][ T1323] [ 56.768606][ T1406] FAULT_INJECTION: forcing a failure. [ 56.768606][ T1406] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 56.781872][ T1406] CPU: 0 UID: 0 PID: 1406 Comm: syz.3.421 Not tainted syzkaller #0 a40991d314adffa3075cd603e5b19eadab4cccf0 [ 56.781911][ T1406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 56.781924][ T1406] Call Trace: [ 56.781934][ T1406] [ 56.781943][ T1406] __dump_stack+0x21/0x30 [ 56.781968][ T1406] dump_stack_lvl+0x140/0x1c0 [ 56.781981][ T1406] ? __cfi_dump_stack_lvl+0x10/0x10 [ 56.781995][ T1406] ? vsnprintf+0x7b4/0x1ad0 [ 56.782011][ T1406] ? check_stack_object+0x106/0x150 [ 56.782028][ T1406] dump_stack+0x19/0x20 [ 56.782041][ T1406] should_fail_ex+0x3d7/0x530 [ 56.782056][ T1406] should_fail+0xf/0x20 [ 56.782068][ T1406] should_fail_usercopy+0x1e/0x30 [ 56.782081][ T1406] _copy_from_user+0x20/0xa0 [ 56.782091][ T1406] kstrtouint_from_user+0xde/0x170 [ 56.782105][ T1406] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 56.782117][ T1406] ? selinux_file_permission+0x318/0xb60 [ 56.782133][ T1406] ? __cfi_selinux_file_permission+0x10/0x10 [ 56.782145][ T1406] proc_fail_nth_write+0x8f/0x220 [ 56.782159][ T1406] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 56.782171][ T1406] ? bpf_lsm_file_permission+0xd/0x20 [ 56.782184][ T1406] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 56.782196][ T1406] vfs_write+0x3c8/0xf90 [ 56.782212][ T1406] ? __cfi_vfs_write+0x10/0x10 [ 56.782225][ T1406] ? __kasan_check_write+0x18/0x20 [ 56.782240][ T1406] ? mutex_lock+0x97/0x1d0 [ 56.782252][ T1406] ? __cfi_mutex_lock+0x10/0x10 [ 56.782263][ T1406] ? __fget_files+0x2c5/0x340 [ 56.782274][ T1406] ksys_write+0x145/0x260 [ 56.782288][ T1406] ? __cfi_ksys_write+0x10/0x10 [ 56.782301][ T1406] ? fdget+0x188/0x1e0 [ 56.782311][ T1406] ? __kasan_check_read+0x15/0x20 [ 56.782324][ T1406] __x64_sys_write+0x7f/0x90 [ 56.782338][ T1406] x64_sys_call+0x271c/0x2ee0 [ 56.782353][ T1406] do_syscall_64+0x57/0xf0 [ 56.782369][ T1406] ? clear_bhb_loop+0x50/0xa0 [ 56.782383][ T1406] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 56.782401][ T1406] RIP: 0033:0x7fc4bcb5d04e [ 56.782413][ T1406] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 56.782423][ T1406] RSP: 002b:00007fc4bd9d0fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 56.782437][ T1406] RAX: ffffffffffffffda RBX: 00007fc4bd9d16c0 RCX: 00007fc4bcb5d04e [ 56.782445][ T1406] RDX: 0000000000000001 RSI: 00007fc4bd9d10a0 RDI: 0000000000000003 [ 56.782453][ T1406] RBP: 00007fc4bd9d1090 R08: 0000000000000000 R09: 0000000000000000 [ 56.782460][ T1406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 56.782467][ T1406] R13: 00007fc4bce16038 R14: 00007fc4bce15fa0 R15: 00007ffec596b078 [ 56.782476][ T1406] [ 57.196331][ T36] kauditd_printk_skb: 467 callbacks suppressed [ 57.196351][ T36] audit: type=1400 audit(1775177118.890:952): avc: denied { read } for pid=1434 comm="syz.3.434" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 57.213446][ T1437] netlink: 4 bytes leftover after parsing attributes in process `syz.3.435'. [ 57.231388][ T36] audit: type=1400 audit(1775177118.890:953): avc: denied { create } for pid=1434 comm="syz.3.434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 57.255821][ T36] audit: type=1400 audit(1775177118.900:954): avc: denied { read write } for pid=290 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 57.282281][ T36] audit: type=1400 audit(1775177118.910:955): avc: denied { mount } for pid=1436 comm="syz.3.435" name="/" dev="configfs" ino=531 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=0 [ 57.306579][ T36] audit: type=1400 audit(1775177118.910:956): avc: denied { read } for pid=1436 comm="syz.3.435" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 57.331863][ T36] audit: type=1400 audit(1775177118.910:957): avc: denied { read } for pid=1436 comm="syz.3.435" dev="nsfs" ino=4026532304 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 57.353487][ T36] audit: type=1400 audit(1775177118.940:958): avc: denied { read } for pid=1436 comm="syz.3.435" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 57.376761][ T36] audit: type=1400 audit(1775177118.940:959): avc: denied { read write } for pid=290 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 57.402967][ T36] audit: type=1400 audit(1775177118.950:960): avc: denied { read append } for pid=1438 comm="syz.3.436" name="rtc0" dev="devtmpfs" ino=195 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=0 [ 57.428383][ T36] audit: type=1400 audit(1775177118.960:961): avc: denied { read write } for pid=290 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 59.402252][ T1548] netlink: 124 bytes leftover after parsing attributes in process `syz.3.487'. [ 61.689411][ T1708] netlink: 'syz.2.561': attribute type 4 has an invalid length. [ 61.700096][ T1708] netlink: 'syz.2.561': attribute type 4 has an invalid length. [ 62.131040][ T1738] FAULT_INJECTION: forcing a failure. [ 62.131040][ T1738] name failslab, interval 1, probability 0, space 0, times 0 [ 62.143966][ T1738] CPU: 0 UID: 0 PID: 1738 Comm: syz.3.576 Not tainted syzkaller #0 a40991d314adffa3075cd603e5b19eadab4cccf0 [ 62.144006][ T1738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 62.144022][ T1738] Call Trace: [ 62.144029][ T1738] [ 62.144036][ T1738] __dump_stack+0x21/0x30 [ 62.144068][ T1738] dump_stack_lvl+0x140/0x1c0 [ 62.144092][ T1738] ? __cfi_dump_stack_lvl+0x10/0x10 [ 62.144134][ T1738] ? handle_mm_fault+0x171c/0x1bf0 [ 62.144155][ T1738] dump_stack+0x19/0x20 [ 62.144175][ T1738] should_fail_ex+0x3d7/0x530 [ 62.144200][ T1738] should_failslab+0xac/0x100 [ 62.144219][ T1738] kmem_cache_alloc_noprof+0x42/0x410 [ 62.144244][ T1738] ? lock_vma_under_rcu+0x4d1/0x590 [ 62.144267][ T1738] ? getname_flags+0xc5/0x700 [ 62.144293][ T1738] getname_flags+0xc5/0x700 [ 62.144318][ T1738] getname+0x1b/0x30 [ 62.144341][ T1738] do_sys_openat2+0xda/0x1d0 [ 62.144362][ T1738] ? do_sys_open+0x100/0x100 [ 62.144382][ T1738] ? __kasan_check_write+0x18/0x20 [ 62.144407][ T1738] ? do_user_addr_fault+0xbbb/0x11e0 [ 62.144433][ T1738] ? __cfi_ksys_write+0x10/0x10 [ 62.144458][ T1738] __x64_sys_openat+0x13a/0x170 [ 62.144480][ T1738] x64_sys_call+0xe69/0x2ee0 [ 62.144505][ T1738] do_syscall_64+0x57/0xf0 [ 62.144532][ T1738] ? clear_bhb_loop+0x50/0xa0 [ 62.144552][ T1738] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 62.144580][ T1738] RIP: 0033:0x7fc4bcb5d04e [ 62.144597][ T1738] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 62.144613][ T1738] RSP: 002b:00007fc4bd9d0b28 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 62.144633][ T1738] RAX: ffffffffffffffda RBX: 00007fc4bd9d16c0 RCX: 00007fc4bcb5d04e [ 62.144648][ T1738] RDX: 0000000000004081 RSI: 00007fc4bd9d0c00 RDI: ffffffffffffff9c [ 62.144662][ T1738] RBP: 00007fc4bd9d0c00 R08: 0000000000000000 R09: 0000000000000000 [ 62.144673][ T1738] R10: 0000000000000000 R11: 0000000000000246 R12: cccccccccccccccd [ 62.144687][ T1738] R13: 00007fc4bce16038 R14: 00007fc4bce15fa0 R15: 00007ffec596b078 [ 62.144702][ T1738] [ 62.203354][ T36] kauditd_printk_skb: 419 callbacks suppressed [ 62.203371][ T36] audit: type=1400 audit(1775177123.900:1381): avc: denied { read write } for pid=351 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 62.264708][ T1748] netlink: 8 bytes leftover after parsing attributes in process `syz.3.581'. [ 62.265249][ T36] audit: type=1400 audit(1775177123.900:1382): avc: denied { read write } for pid=290 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 62.432741][ T36] audit: type=1400 audit(1775177123.920:1383): avc: denied { read } for pid=1739 comm="syz.1.577" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 62.468229][ T36] audit: type=1400 audit(1775177123.920:1384): avc: denied { read write } for pid=1739 comm="syz.1.577" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 62.494563][ T36] audit: type=1400 audit(1775177123.920:1385): avc: denied { read } for pid=1739 comm="syz.1.577" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 62.519465][ T36] audit: type=1400 audit(1775177123.930:1386): avc: denied { read write } for pid=351 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 62.545725][ T36] audit: type=1400 audit(1775177123.940:1387): avc: denied { read write } for pid=1742 comm="syz.1.578" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 62.580904][ T36] audit: type=1400 audit(1775177123.940:1388): avc: denied { read } for pid=1741 comm="syz.3.579" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 62.629003][ T36] audit: type=1400 audit(1775177123.940:1389): avc: denied { read write } for pid=1741 comm="syz.3.579" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 62.663372][ T36] audit: type=1400 audit(1775177123.940:1390): avc: denied { create } for pid=1741 comm="syz.3.579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 63.159609][ T1797] netlink: 96 bytes leftover after parsing attributes in process `syz.2.603'. [ 64.944910][ T1892] kernel profiling enabled (shift: 63) [ 64.951521][ T1892] profiling shift: 63 too large [ 64.984954][ T1900] netlink: 3 bytes leftover after parsing attributes in process `syz.2.650'. [ 65.043786][ T1914] netlink: 'syz.3.657': attribute type 4 has an invalid length. [ 65.054055][ T1914] netlink: 'syz.3.657': attribute type 4 has an invalid length. [ 65.319678][ T1940] netlink: 124 bytes leftover after parsing attributes in process `syz.1.667'. [ 65.857914][ T1972] FAULT_INJECTION: forcing a failure. [ 65.857914][ T1972] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 65.871432][ T1972] CPU: 0 UID: 0 PID: 1972 Comm: syz.0.682 Not tainted syzkaller #0 a40991d314adffa3075cd603e5b19eadab4cccf0 [ 65.871458][ T1972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 65.871466][ T1972] Call Trace: [ 65.871472][ T1972] [ 65.871478][ T1972] __dump_stack+0x21/0x30 [ 65.871500][ T1972] dump_stack_lvl+0x140/0x1c0 [ 65.871514][ T1972] ? __cfi_dump_stack_lvl+0x10/0x10 [ 65.871528][ T1972] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 65.871543][ T1972] dump_stack+0x19/0x20 [ 65.871555][ T1972] should_fail_ex+0x3d7/0x530 [ 65.871570][ T1972] should_fail_alloc_page+0xec/0x110 [ 65.871581][ T1972] __alloc_pages_noprof+0x1c0/0x7e0 [ 65.871594][ T1972] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 65.871607][ T1972] __folio_alloc_noprof+0x14/0x80 [ 65.871620][ T1972] folio_prealloc+0x46/0x220 [ 65.871632][ T1972] do_pte_missing+0x1e80/0x44f0 [ 65.871642][ T1972] ? _raw_spin_unlock+0x45/0x60 [ 65.871660][ T1972] ? pte_marker_clear+0x1b0/0x1b0 [ 65.871670][ T1972] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 65.871682][ T1972] ? walk_pgd_range+0x1b58/0x1c20 [ 65.871695][ T1972] ? __pte_offset_map+0x1b0/0x230 [ 65.871708][ T1972] ? pte_offset_map_rw_nolock+0xba/0x110 [ 65.871721][ T1972] handle_mm_fault+0x11b8/0x1bf0 [ 65.871731][ T1972] ? __kasan_check_write+0x18/0x20 [ 65.871748][ T1972] ? __cfi_handle_mm_fault+0x10/0x10 [ 65.871757][ T1972] ? follow_page_pte+0x4b9/0xbc0 [ 65.871770][ T1972] ? gup_must_unshare+0x1e0/0x1e0 [ 65.871781][ T1972] ? vma_is_secretmem+0x11/0x50 [ 65.871794][ T1972] __get_user_pages+0x1170/0x22b0 [ 65.871807][ T1972] ? populate_vma_page_range+0x220/0x220 [ 65.871818][ T1972] ? down_read+0x7f/0xe0 [ 65.871836][ T1972] ? __cfi_down_read+0x10/0x10 [ 65.871848][ T1972] __mm_populate+0x2f8/0x430 [ 65.871859][ T1972] do_mlock+0x7eb/0xa00 [ 65.871871][ T1972] ? fput+0x1a4/0x240 [ 65.871883][ T1972] ? lru_gen_add_folio+0x860/0x860 [ 65.871895][ T1972] ? ksys_write+0x1f3/0x260 [ 65.871910][ T1972] ? __cfi_ksys_write+0x10/0x10 [ 65.871924][ T1972] ? __kasan_check_read+0x15/0x20 [ 65.871937][ T1972] __x64_sys_mlock+0x64/0x80 [ 65.871949][ T1972] x64_sys_call+0x670/0x2ee0 [ 65.871964][ T1972] do_syscall_64+0x57/0xf0 [ 65.871980][ T1972] ? clear_bhb_loop+0x50/0xa0 [ 65.871991][ T1972] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 65.872007][ T1972] RIP: 0033:0x7ff32259c819 [ 65.872019][ T1972] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 65.872029][ T1972] RSP: 002b:00007ff323457028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 65.872042][ T1972] RAX: ffffffffffffffda RBX: 00007ff322815fa0 RCX: 00007ff32259c819 [ 65.872051][ T1972] RDX: 0000000000000000 RSI: 0000000000074490 RDI: 0000200000000000 [ 65.872059][ T1972] RBP: 00007ff323457090 R08: 0000000000000000 R09: 0000000000000000 [ 65.872066][ T1972] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 65.872073][ T1972] R13: 00007ff322816038 R14: 00007ff322815fa0 R15: 00007fff75739538 [ 65.872087][ T1972] [ 67.258848][ T2028] netlink: 'syz.1.708': attribute type 12 has an invalid length. [ 67.267445][ T36] kauditd_printk_skb: 395 callbacks suppressed [ 67.267463][ T36] audit: type=1400 audit(1775177128.960:1786): avc: denied { read write } for pid=2027 comm="syz.1.708" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 67.317492][ T36] audit: type=1400 audit(1775177128.980:1787): avc: denied { read write } for pid=291 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 67.343253][ T36] audit: type=1400 audit(1775177129.000:1788): avc: denied { read write } for pid=351 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 67.368754][ T36] audit: type=1400 audit(1775177129.000:1789): avc: denied { create } for pid=2029 comm="syz.1.710" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 67.389602][ T36] audit: type=1400 audit(1775177129.000:1790): avc: denied { create } for pid=2029 comm="syz.1.710" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 67.413822][ T36] audit: type=1400 audit(1775177129.000:1791): avc: denied { create } for pid=2029 comm="syz.1.710" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 67.435409][ T36] audit: type=1400 audit(1775177129.000:1792): avc: denied { create } for pid=2029 comm="syz.1.710" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 67.464887][ T36] audit: type=1400 audit(1775177129.000:1793): avc: denied { create } for pid=2029 comm="syz.1.710" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 67.489471][ T36] audit: type=1400 audit(1775177129.000:1794): avc: denied { create } for pid=2031 comm="syz.0.709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 67.513357][ T36] audit: type=1400 audit(1775177129.000:1795): avc: denied { create } for pid=2029 comm="syz.1.710" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 69.605457][ T2144] can0: slcan on ttyS3. [ 69.674826][ T2143] can0 (unregistered): slcan off ttyS3. [ 70.522851][ T2194] netlink: 4 bytes leftover after parsing attributes in process `syz.0.777'. [ 71.204383][ T2218] pimreg: tun_chr_ioctl cmd 1074025676 [ 71.210006][ T2218] pimreg: owner set to 0 [ 71.434947][ T2245] netlink: 'syz.3.800': attribute type 4 has an invalid length. [ 71.478908][ T2245] netlink: 'syz.3.800': attribute type 4 has an invalid length. [ 71.499393][ T2245] FAULT_INJECTION: forcing a failure. [ 71.499393][ T2245] name failslab, interval 1, probability 0, space 0, times 0 [ 71.689044][ T2245] CPU: 0 UID: 0 PID: 2245 Comm: syz.3.800 Not tainted syzkaller #0 a40991d314adffa3075cd603e5b19eadab4cccf0 [ 71.689078][ T2245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 71.689090][ T2245] Call Trace: [ 71.689097][ T2245] [ 71.689105][ T2245] __dump_stack+0x21/0x30 [ 71.689138][ T2245] dump_stack_lvl+0x140/0x1c0 [ 71.689162][ T2245] ? __cfi_dump_stack_lvl+0x10/0x10 [ 71.689186][ T2245] ? __cfi___switch_to+0x10/0x10 [ 71.689213][ T2245] dump_stack+0x19/0x20 [ 71.689235][ T2245] should_fail_ex+0x3d7/0x530 [ 71.689262][ T2245] should_failslab+0xac/0x100 [ 71.689281][ T2245] kmem_cache_alloc_node_noprof+0x45/0x420 [ 71.689309][ T2245] ? __alloc_skb+0x108/0x370 [ 71.689331][ T2245] __alloc_skb+0x108/0x370 [ 71.689352][ T2245] rtmsg_ifinfo_build_skb+0x85/0x270 [ 71.689381][ T2245] ? __asan_memset+0x39/0x50 [ 71.689403][ T2245] rtnetlink_event+0x1cc/0x290 [ 71.689423][ T2245] ? __cfi_rtnetlink_event+0x10/0x10 [ 71.689443][ T2245] notifier_call_chain+0x10b/0x2b0 [ 71.689472][ T2245] raw_notifier_call_chain+0x31/0x40 [ 71.689499][ T2245] call_netdevice_notifiers_info+0xcf/0x120 [ 71.689528][ T2245] dev_set_mtu_ext+0x4f2/0x730 [ 71.689556][ T2245] ? __cfi_dev_set_mtu_ext+0x10/0x10 [ 71.689582][ T2245] ? vprintk_emit+0x3e3/0x650 [ 71.689605][ T2245] ? __cfi_vprintk_emit+0x10/0x10 [ 71.689631][ T2245] do_setlink+0x8eb/0x4280 [ 71.689660][ T2245] ? __cfi__printk+0x10/0x10 [ 71.689681][ T2245] ? nlmsg_parse_deprecated_strict+0x130/0x130 [ 71.689708][ T2245] ? __nla_validate+0x70/0x70 [ 71.689728][ T2245] ? is_bpf_text_address+0x17b/0x1a0 [ 71.689753][ T2245] ? kernel_text_address+0xa9/0xe0 [ 71.689780][ T2245] rtnl_setlink+0x34b/0x4e0 [ 71.689798][ T2245] ? __cfi_rtnl_setlink+0x10/0x10 [ 71.689833][ T2245] ? __kasan_check_write+0x18/0x20 [ 71.689856][ T2245] ? mutex_lock+0x97/0x1d0 [ 71.689878][ T2245] ? __cfi_mutex_lock+0x10/0x10 [ 71.689897][ T2245] ? ns_capable+0x90/0xf0 [ 71.689922][ T2245] ? netlink_net_capable+0x129/0x160 [ 71.689946][ T2245] ? __cfi_rtnl_setlink+0x10/0x10 [ 71.689973][ T2245] rtnetlink_rcv_msg+0x8be/0xa40 [ 71.689993][ T2245] ? avc_has_perm_noaudit+0x26c/0x360 [ 71.690022][ T2245] ? __cfi_rtnetlink_rcv_msg+0x10/0x10 [ 71.690041][ T2245] ? avc_has_perm_noaudit+0x28a/0x360 [ 71.690069][ T2245] ? avc_has_perm+0x155/0x240 [ 71.690094][ T2245] netlink_rcv_skb+0x256/0x4f0 [ 71.690119][ T2245] ? __cfi_rtnetlink_rcv_msg+0x10/0x10 [ 71.690139][ T2245] ? __cfi_netlink_rcv_skb+0x10/0x10 [ 71.690166][ T2245] ? netlink_autobind+0x1c0/0x1c0 [ 71.690191][ T2245] ? is_vmalloc_addr+0x11/0x40 [ 71.690211][ T2245] rtnetlink_rcv+0x20/0x30 [ 71.690230][ T2245] netlink_unicast+0x8c3/0xa60 [ 71.690253][ T2245] netlink_sendmsg+0x7fe/0xb10 [ 71.690279][ T2245] ? __cfi_netlink_sendmsg+0x10/0x10 [ 71.690305][ T2245] ? bpf_lsm_socket_sendmsg+0xd/0x20 [ 71.690332][ T2245] ? security_socket_sendmsg+0x3d/0x100 [ 71.690352][ T2245] sock_write_iter+0x4d9/0x530 [ 71.690372][ T2245] ? __cfi_sock_write_iter+0x10/0x10 [ 71.690391][ T2245] ? selinux_file_permission+0x8a4/0xb60 [ 71.690416][ T2245] do_iter_readv_writev+0x62c/0x820 [ 71.690444][ T2245] ? vfs_iter_read+0x5f0/0x5f0 [ 71.690469][ T2245] ? bpf_lsm_file_permission+0xd/0x20 [ 71.690488][ T2245] vfs_writev+0x4a8/0xe50 [ 71.690507][ T2245] ? do_writev+0x2e0/0x2e0 [ 71.690525][ T2245] ? vfs_write+0x9a4/0xf90 [ 71.690554][ T2245] do_writev+0x151/0x2e0 [ 71.690572][ T2245] ? vfs_readv+0xa10/0xa10 [ 71.690590][ T2245] ? __kasan_check_read+0x15/0x20 [ 71.690614][ T2245] __x64_sys_writev+0x81/0x90 [ 71.690647][ T2245] x64_sys_call+0x1fbb/0x2ee0 [ 71.690675][ T2245] do_syscall_64+0x57/0xf0 [ 71.690701][ T2245] ? clear_bhb_loop+0x50/0xa0 [ 71.690720][ T2245] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 71.690748][ T2245] RIP: 0033:0x7fc4bcb9c819 [ 71.690765][ T2245] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 71.690783][ T2245] RSP: 002b:00007fc4bd9d1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 71.690805][ T2245] RAX: ffffffffffffffda RBX: 00007fc4bce15fa0 RCX: 00007fc4bcb9c819 [ 71.690821][ T2245] RDX: 0000000000000001 RSI: 0000200000000300 RDI: 0000000000000003 [ 71.690834][ T2245] RBP: 00007fc4bd9d1090 R08: 0000000000000000 R09: 0000000000000000 [ 71.690846][ T2245] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 71.690858][ T2245] R13: 00007fc4bce16038 R14: 00007fc4bce15fa0 R15: 00007ffec596b078 [ 71.690875][ T2245] [ 72.266849][ T2276] netlink: 124 bytes leftover after parsing attributes in process `syz.1.812'. [ 72.281470][ T36] kauditd_printk_skb: 13418 callbacks suppressed [ 72.281491][ T36] audit: type=1400 audit(1775177133.960:14146): avc: denied { read } for pid=2275 comm="syz.1.812" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 72.312369][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 72.329028][ T149] audit: audit_lost=357 audit_rate_limit=0 audit_backlog_limit=64 [ 72.367820][ T149] audit: backlog limit exceeded [ 72.394795][ T36] audit: type=1400 audit(1775177133.970:14147): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 72.417301][ T36] audit: type=1400 audit(1775177133.970:14148): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 72.439197][ T36] audit: type=1400 audit(1775177133.970:14149): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 72.454407][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 72.460719][ T36] audit: type=1400 audit(1775177133.970:14150): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 72.488139][ T149] audit: audit_lost=358 audit_rate_limit=0 audit_backlog_limit=64 [ 72.722356][ T2300] netlink: 124 bytes leftover after parsing attributes in process `syz.1.822'. [ 73.107185][ T2334] netlink: 124 bytes leftover after parsing attributes in process `syz.1.839'. [ 73.671798][ T2367] FAULT_INJECTION: forcing a failure. [ 73.671798][ T2367] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 73.780222][ T2367] CPU: 1 UID: 0 PID: 2367 Comm: syz.1.850 Not tainted syzkaller #0 a40991d314adffa3075cd603e5b19eadab4cccf0 [ 73.780266][ T2367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 73.780279][ T2367] Call Trace: [ 73.780286][ T2367] [ 73.780296][ T2367] __dump_stack+0x21/0x30 [ 73.780394][ T2367] dump_stack_lvl+0x140/0x1c0 [ 73.780419][ T2367] ? __cfi_dump_stack_lvl+0x10/0x10 [ 73.780443][ T2367] ? check_stack_object+0x12b/0x150 [ 73.780472][ T2367] dump_stack+0x19/0x20 [ 73.780494][ T2367] should_fail_ex+0x3d7/0x530 [ 73.780521][ T2367] should_fail+0xf/0x20 [ 73.780542][ T2367] should_fail_usercopy+0x1e/0x30 [ 73.780565][ T2367] _copy_to_user+0x24/0xa0 [ 73.780583][ T2367] simple_read_from_buffer+0xed/0x160 [ 73.780603][ T2367] proc_fail_nth_read+0x1aa/0x220 [ 73.780626][ T2367] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 73.780649][ T2367] ? bpf_lsm_file_permission+0xd/0x20 [ 73.780670][ T2367] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 73.780692][ T2367] vfs_read+0x286/0xcb0 [ 73.780718][ T2367] ? __cfi_vfs_read+0x10/0x10 [ 73.780751][ T2367] ? __kasan_check_write+0x18/0x20 [ 73.780777][ T2367] ? mutex_lock+0x97/0x1d0 [ 73.780797][ T2367] ? __cfi_mutex_lock+0x10/0x10 [ 73.780817][ T2367] ? __fget_files+0x2c5/0x340 [ 73.780837][ T2367] ksys_read+0x145/0x260 [ 73.780860][ T2367] ? xfd_validate_state+0x68/0x140 [ 73.780884][ T2367] ? __cfi_ksys_read+0x10/0x10 [ 73.780908][ T2367] ? fdget+0x188/0x1e0 [ 73.780926][ T2367] ? __kasan_check_read+0x15/0x20 [ 73.780956][ T2367] __x64_sys_read+0x7f/0x90 [ 73.780980][ T2367] x64_sys_call+0x2638/0x2ee0 [ 73.781007][ T2367] do_syscall_64+0x57/0xf0 [ 73.781033][ T2367] ? clear_bhb_loop+0x50/0xa0 [ 73.781051][ T2367] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 73.781078][ T2367] RIP: 0033:0x7f545995d04e [ 73.781096][ T2367] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 73.781114][ T2367] RSP: 002b:00007f545a8f4fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 73.781137][ T2367] RAX: ffffffffffffffda RBX: 00007f545a8f56c0 RCX: 00007f545995d04e [ 73.781153][ T2367] RDX: 000000000000000f RSI: 00007f545a8f50a0 RDI: 0000000000000003 [ 73.781165][ T2367] RBP: 00007f545a8f5090 R08: 0000000000000000 R09: 0000000000000000 [ 73.781177][ T2367] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 73.781189][ T2367] R13: 00007f5459c16038 R14: 00007f5459c15fa0 R15: 00007fff023b05a8 [ 73.781206][ T2367] [ 73.959740][ T2370] netlink: 124 bytes leftover after parsing attributes in process `syz.2.851'. [ 74.387078][ T2392] netlink: 'syz.2.861': attribute type 4 has an invalid length. [ 74.397949][ T2392] netlink: 'syz.2.861': attribute type 4 has an invalid length. [ 74.915176][ T2410] netlink: 124 bytes leftover after parsing attributes in process `syz.1.869'. [ 75.542539][ T2437] netlink: 124 bytes leftover after parsing attributes in process `syz.2.879'. [ 76.110081][ T2446] FAULT_INJECTION: forcing a failure. [ 76.110081][ T2446] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 76.113114][ T2448] FAULT_INJECTION: forcing a failure. [ 76.113114][ T2448] name failslab, interval 1, probability 0, space 0, times 0 [ 76.136710][ T2448] CPU: 1 UID: 0 PID: 2448 Comm: syz.0.884 Not tainted syzkaller #0 a40991d314adffa3075cd603e5b19eadab4cccf0 [ 76.136737][ T2448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 76.136748][ T2448] Call Trace: [ 76.136753][ T2448] [ 76.136761][ T2448] __dump_stack+0x21/0x30 [ 76.136791][ T2448] dump_stack_lvl+0x140/0x1c0 [ 76.136812][ T2448] ? __cfi_dump_stack_lvl+0x10/0x10 [ 76.136836][ T2448] dump_stack+0x19/0x20 [ 76.136855][ T2448] should_fail_ex+0x3d7/0x530 [ 76.136879][ T2448] should_failslab+0xac/0x100 [ 76.136898][ T2448] kmem_cache_alloc_noprof+0x42/0x410 [ 76.136924][ T2448] ? security_file_alloc+0x49/0x220 [ 76.136948][ T2448] ? kasan_save_alloc_info+0x40/0x50 [ 76.136973][ T2448] security_file_alloc+0x49/0x220 [ 76.136994][ T2448] init_file+0x9e/0x210 [ 76.137014][ T2448] alloc_empty_file+0xd9/0x270 [ 76.137033][ T2448] path_openat+0xfe/0x34f0 [ 76.137053][ T2448] ? stack_depot_save_flags+0x38/0x800 [ 76.137080][ T2448] ? kasan_save_track+0x3e/0x80 [ 76.137107][ T2448] ? kasan_save_alloc_info+0x40/0x50 [ 76.137129][ T2448] ? __kasan_slab_alloc+0x73/0x90 [ 76.137147][ T2448] ? kmem_cache_alloc_noprof+0x1bf/0x410 [ 76.137172][ T2448] ? getname+0x1b/0x30 [ 76.137192][ T2448] ? do_sys_openat2+0xda/0x1d0 [ 76.137208][ T2448] ? __x64_sys_openat+0x13a/0x170 [ 76.137224][ T2448] ? x64_sys_call+0xe69/0x2ee0 [ 76.137244][ T2448] ? do_syscall_64+0x57/0xf0 [ 76.137268][ T2448] ? entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 76.137302][ T2448] ? do_filp_open+0x440/0x440 [ 76.137324][ T2448] do_filp_open+0x1f5/0x440 [ 76.137342][ T2448] ? __cfi_do_filp_open+0x10/0x10 [ 76.137363][ T2448] ? alloc_fd+0x4e6/0x5a0 [ 76.137388][ T2448] do_sys_openat2+0x134/0x1d0 [ 76.137409][ T2448] ? fput+0x1a4/0x240 [ 76.137488][ T2448] ? do_sys_open+0x100/0x100 [ 76.137508][ T2448] ? ksys_write+0x1f3/0x260 [ 76.137532][ T2448] ? __cfi_ksys_write+0x10/0x10 [ 76.137558][ T2448] __x64_sys_openat+0x13a/0x170 [ 76.137579][ T2448] x64_sys_call+0xe69/0x2ee0 [ 76.137604][ T2448] do_syscall_64+0x57/0xf0 [ 76.137630][ T2448] ? clear_bhb_loop+0x50/0xa0 [ 76.137649][ T2448] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 76.137676][ T2448] RIP: 0033:0x7ff32259c819 [ 76.137694][ T2448] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 76.137710][ T2448] RSP: 002b:00007ff323457028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 76.137732][ T2448] RAX: ffffffffffffffda RBX: 00007ff322815fa0 RCX: 00007ff32259c819 [ 76.137747][ T2448] RDX: 0000000000000001 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 76.137761][ T2448] RBP: 00007ff323457090 R08: 0000000000000000 R09: 0000000000000000 [ 76.137774][ T2448] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 76.137787][ T2448] R13: 00007ff322816038 R14: 00007ff322815fa0 R15: 00007fff75739538 [ 76.137803][ T2448] [ 76.143085][ T2446] CPU: 0 UID: 0 PID: 2446 Comm: syz.3.883 Not tainted syzkaller #0 a40991d314adffa3075cd603e5b19eadab4cccf0 [ 76.143115][ T2446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 76.143126][ T2446] Call Trace: [ 76.143132][ T2446] [ 76.143139][ T2446] __dump_stack+0x21/0x30 [ 76.143167][ T2446] dump_stack_lvl+0x140/0x1c0 [ 76.143195][ T2446] ? __cfi_dump_stack_lvl+0x10/0x10 [ 76.143218][ T2446] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 76.143242][ T2446] dump_stack+0x19/0x20 [ 76.143263][ T2446] should_fail_ex+0x3d7/0x530 [ 76.143287][ T2446] should_fail_alloc_page+0xec/0x110 [ 76.143311][ T2446] __alloc_pages_noprof+0x1c0/0x7e0 [ 76.143332][ T2446] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 76.143357][ T2446] __folio_alloc_noprof+0x14/0x80 [ 76.143378][ T2446] folio_prealloc+0x46/0x220 [ 76.143398][ T2446] do_pte_missing+0x1e80/0x44f0 [ 76.143417][ T2446] ? _raw_spin_unlock+0x45/0x60 [ 76.143446][ T2446] ? pte_marker_clear+0x1b0/0x1b0 [ 76.143464][ T2446] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 76.143484][ T2446] ? walk_pgd_range+0x1b58/0x1c20 [ 76.143507][ T2446] ? __pte_offset_map+0x1b0/0x230 [ 76.143529][ T2446] ? pte_offset_map_rw_nolock+0xba/0x110 [ 76.143552][ T2446] handle_mm_fault+0x11b8/0x1bf0 [ 76.143568][ T2446] ? __kasan_check_write+0x18/0x20 [ 76.143594][ T2446] ? __cfi_handle_mm_fault+0x10/0x10 [ 76.143611][ T2446] ? follow_page_pte+0x4b9/0xbc0 [ 76.143632][ T2446] ? gup_must_unshare+0x1e0/0x1e0 [ 76.143652][ T2446] ? vma_is_secretmem+0x11/0x50 [ 76.143674][ T2446] __get_user_pages+0x1170/0x22b0 [ 76.143697][ T2446] ? populate_vma_page_range+0x220/0x220 [ 76.143716][ T2446] ? down_read+0x7f/0xe0 [ 76.143736][ T2446] ? __cfi_down_read+0x10/0x10 [ 76.143757][ T2446] __mm_populate+0x2f8/0x430 [ 76.143777][ T2446] do_mlock+0x7eb/0xa00 [ 76.143796][ T2446] ? fput+0x1a4/0x240 [ 76.143814][ T2446] ? lru_gen_add_folio+0x860/0x860 [ 76.143834][ T2446] ? ksys_write+0x1f3/0x260 [ 76.143858][ T2446] ? __cfi_ksys_write+0x10/0x10 [ 76.143882][ T2446] ? __kasan_check_read+0x15/0x20 [ 76.143904][ T2446] __x64_sys_mlock+0x64/0x80 [ 76.143924][ T2446] x64_sys_call+0x670/0x2ee0 [ 76.143948][ T2446] do_syscall_64+0x57/0xf0 [ 76.143973][ T2446] ? clear_bhb_loop+0x50/0xa0 [ 76.143990][ T2446] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 76.144016][ T2446] RIP: 0033:0x7fc4bcb9c819 [ 76.144032][ T2446] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 76.144048][ T2446] RSP: 002b:00007fc4bd9d1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 76.144068][ T2446] RAX: ffffffffffffffda RBX: 00007fc4bce15fa0 RCX: 00007fc4bcb9c819 [ 76.144081][ T2446] RDX: 0000000000000000 RSI: 0000000000074490 RDI: 0000200000000000 [ 76.144094][ T2446] RBP: 00007fc4bd9d1090 R08: 0000000000000000 R09: 0000000000000000 [ 76.144106][ T2446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 76.144117][ T2446] R13: 00007fc4bce16038 R14: 00007fc4bce15fa0 R15: 00007ffec596b078 [ 76.144133][ T2446] [ 77.289027][ T36] kauditd_printk_skb: 39083 callbacks suppressed [ 77.289043][ T36] audit: type=1400 audit(1775177138.980:41762): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 77.295401][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 77.295613][ T36] audit: type=1400 audit(1775177138.990:41763): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 77.327947][ T149] audit: audit_lost=4183 audit_rate_limit=0 audit_backlog_limit=64 [ 77.356847][ T36] audit: type=1400 audit(1775177138.990:41764): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 77.362731][ T149] audit: backlog limit exceeded [ 77.383527][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 77.388754][ T290] audit: audit_backlog=65 > audit_backlog_limit=64 [ 77.390573][ T149] audit: audit_lost=4184 audit_rate_limit=0 audit_backlog_limit=64 [ 77.398099][ T290] audit: audit_lost=4185 audit_rate_limit=0 audit_backlog_limit=64 [ 77.738165][ T2499] netlink: 'syz.2.908': attribute type 58 has an invalid length. [ 78.265060][ T2522] FAULT_INJECTION: forcing a failure. [ 78.265060][ T2522] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 78.292884][ T2522] CPU: 1 UID: 0 PID: 2522 Comm: syz.2.919 Not tainted syzkaller #0 a40991d314adffa3075cd603e5b19eadab4cccf0 [ 78.292919][ T2522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 78.292929][ T2522] Call Trace: [ 78.292936][ T2522] [ 78.292943][ T2522] __dump_stack+0x21/0x30 [ 78.292972][ T2522] dump_stack_lvl+0x140/0x1c0 [ 78.292992][ T2522] ? __cfi_dump_stack_lvl+0x10/0x10 [ 78.293021][ T2522] ? check_stack_object+0x12b/0x150 [ 78.293046][ T2522] dump_stack+0x19/0x20 [ 78.293065][ T2522] should_fail_ex+0x3d7/0x530 [ 78.293086][ T2522] should_fail+0xf/0x20 [ 78.293105][ T2522] should_fail_usercopy+0x1e/0x30 [ 78.293128][ T2522] _copy_to_user+0x24/0xa0 [ 78.293144][ T2522] simple_read_from_buffer+0xed/0x160 [ 78.293165][ T2522] proc_fail_nth_read+0x1aa/0x220 [ 78.293185][ T2522] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 78.293204][ T2522] ? bpf_lsm_file_permission+0xd/0x20 [ 78.293222][ T2522] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 78.293239][ T2522] vfs_read+0x286/0xcb0 [ 78.293262][ T2522] ? __cfi_vfs_read+0x10/0x10 [ 78.293284][ T2522] ? __kasan_check_write+0x18/0x20 [ 78.293308][ T2522] ? mutex_lock+0x97/0x1d0 [ 78.293326][ T2522] ? __cfi_mutex_lock+0x10/0x10 [ 78.293343][ T2522] ? __fget_files+0x2c5/0x340 [ 78.293361][ T2522] ksys_read+0x145/0x260 [ 78.293385][ T2522] ? __cfi_ksys_read+0x10/0x10 [ 78.293408][ T2522] ? fdget+0x188/0x1e0 [ 78.293425][ T2522] ? __kasan_check_read+0x15/0x20 [ 78.293449][ T2522] __x64_sys_read+0x7f/0x90 [ 78.293472][ T2522] x64_sys_call+0x2638/0x2ee0 [ 78.293497][ T2522] do_syscall_64+0x57/0xf0 [ 78.293522][ T2522] ? clear_bhb_loop+0x50/0xa0 [ 78.293540][ T2522] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 78.293567][ T2522] RIP: 0033:0x7f846495d04e [ 78.293585][ T2522] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 78.293600][ T2522] RSP: 002b:00007f846588ffe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 78.293620][ T2522] RAX: ffffffffffffffda RBX: 00007f84658906c0 RCX: 00007f846495d04e [ 78.293633][ T2522] RDX: 000000000000000f RSI: 00007f84658900a0 RDI: 0000000000000003 [ 78.293645][ T2522] RBP: 00007f8465890090 R08: 0000000000000000 R09: 0000000000000000 [ 78.293656][ T2522] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 78.293667][ T2522] R13: 00007f8464c16038 R14: 00007f8464c15fa0 R15: 00007fffce6292f8 [ 78.293683][ T2522] [ 80.703945][ T2599] FAULT_INJECTION: forcing a failure. [ 80.703945][ T2599] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 80.749702][ T2599] CPU: 0 UID: 0 PID: 2599 Comm: syz.1.955 Not tainted syzkaller #0 a40991d314adffa3075cd603e5b19eadab4cccf0 [ 80.749738][ T2599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 80.749750][ T2599] Call Trace: [ 80.749757][ T2599] [ 80.749765][ T2599] __dump_stack+0x21/0x30 [ 80.749800][ T2599] dump_stack_lvl+0x140/0x1c0 [ 80.749824][ T2599] ? __cfi_dump_stack_lvl+0x10/0x10 [ 80.749848][ T2599] ? check_stack_object+0x12b/0x150 [ 80.749876][ T2599] dump_stack+0x19/0x20 [ 80.749898][ T2599] should_fail_ex+0x3d7/0x530 [ 80.749922][ T2599] should_fail+0xf/0x20 [ 80.749944][ T2599] should_fail_usercopy+0x1e/0x30 [ 80.749975][ T2599] _copy_to_user+0x24/0xa0 [ 80.749993][ T2599] simple_read_from_buffer+0xed/0x160 [ 80.750015][ T2599] proc_fail_nth_read+0x1aa/0x220 [ 80.750038][ T2599] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 80.750061][ T2599] ? bpf_lsm_file_permission+0xd/0x20 [ 80.750082][ T2599] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 80.750103][ T2599] vfs_read+0x286/0xcb0 [ 80.750128][ T2599] ? __cfi_vfs_read+0x10/0x10 [ 80.750151][ T2599] ? __kasan_check_write+0x18/0x20 [ 80.750176][ T2599] ? mutex_lock+0x97/0x1d0 [ 80.750196][ T2599] ? __cfi_mutex_lock+0x10/0x10 [ 80.750216][ T2599] ? __fget_files+0x2c5/0x340 [ 80.750235][ T2599] ksys_read+0x145/0x260 [ 80.750259][ T2599] ? __cfi_ksys_read+0x10/0x10 [ 80.750283][ T2599] ? fdget+0x188/0x1e0 [ 80.750300][ T2599] ? __kasan_check_read+0x15/0x20 [ 80.750324][ T2599] __x64_sys_read+0x7f/0x90 [ 80.750348][ T2599] x64_sys_call+0x2638/0x2ee0 [ 80.750373][ T2599] do_syscall_64+0x57/0xf0 [ 80.750401][ T2599] ? clear_bhb_loop+0x50/0xa0 [ 80.750420][ T2599] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 80.750447][ T2599] RIP: 0033:0x7f545995d04e [ 80.750465][ T2599] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 80.750482][ T2599] RSP: 002b:00007f545a8f4fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 80.750504][ T2599] RAX: ffffffffffffffda RBX: 00007f545a8f56c0 RCX: 00007f545995d04e [ 80.750519][ T2599] RDX: 000000000000000f RSI: 00007f545a8f50a0 RDI: 0000000000000003 [ 80.750532][ T2599] RBP: 00007f545a8f5090 R08: 0000000000000000 R09: 0000000000000000 [ 80.750544][ T2599] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 80.750556][ T2599] R13: 00007f5459c16038 R14: 00007f5459c15fa0 R15: 00007fff023b05a8 [ 80.750573][ T2599] [ 81.030184][ T2609] netlink: 'syz.0.959': attribute type 4 has an invalid length. [ 81.546590][ T2613] netlink: 124 bytes leftover after parsing attributes in process `syz.3.961'. [ 82.299068][ T36] kauditd_printk_skb: 38379 callbacks suppressed [ 82.299086][ T36] audit: type=1400 audit(1775177144.000:79386): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 82.305058][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 82.305598][ T36] audit: type=1400 audit(1775177144.000:79387): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 82.326929][ T149] audit: audit_lost=4438 audit_rate_limit=0 audit_backlog_limit=64 [ 82.334274][ T36] audit: type=1400 audit(1775177144.000:79388): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 82.362650][ T149] audit: backlog limit exceeded [ 82.363802][ T36] audit: type=1400 audit(1775177144.000:79389): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 82.387473][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 82.392204][ T36] audit: type=1400 audit(1775177144.000:79390): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 82.412381][ T149] audit: audit_lost=4439 audit_rate_limit=0 audit_backlog_limit=64 [ 82.676500][ T2642] netlink: 124 bytes leftover after parsing attributes in process `syz.1.975'. [ 82.883292][ T2658] syzkaller1: entered promiscuous mode [ 82.889132][ T2658] syzkaller1: entered allmulticast mode [ 82.943975][ T2658] netlink: 'syz.2.983': attribute type 6 has an invalid length. [ 83.050282][ T2672] netlink: 124 bytes leftover after parsing attributes in process `syz.3.989'. [ 83.075671][ T2676] mmap: syz.2.990 (2676) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 83.225468][ T2687] FAULT_INJECTION: forcing a failure. [ 83.225468][ T2687] name failslab, interval 1, probability 0, space 0, times 0 [ 83.239098][ T2687] CPU: 1 UID: 0 PID: 2687 Comm: syz.3.994 Not tainted syzkaller #0 a40991d314adffa3075cd603e5b19eadab4cccf0 [ 83.239131][ T2687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 83.239143][ T2687] Call Trace: [ 83.239150][ T2687] [ 83.239159][ T2687] __dump_stack+0x21/0x30 [ 83.239192][ T2687] dump_stack_lvl+0x140/0x1c0 [ 83.239218][ T2687] ? __cfi_dump_stack_lvl+0x10/0x10 [ 83.239244][ T2687] dump_stack+0x19/0x20 [ 83.239268][ T2687] should_fail_ex+0x3d7/0x530 [ 83.239295][ T2687] should_failslab+0xac/0x100 [ 83.239315][ T2687] kmem_cache_alloc_noprof+0x42/0x410 [ 83.239344][ T2687] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 83.239367][ T2687] ? alloc_empty_file+0xbf/0x270 [ 83.239389][ T2687] ? arch_stack_walk+0x10a/0x170 [ 83.239418][ T2687] alloc_empty_file+0xbf/0x270 [ 83.239440][ T2687] path_openat+0xfe/0x34f0 [ 83.239462][ T2687] ? stack_depot_save_flags+0x38/0x800 [ 83.239502][ T2687] ? kasan_save_track+0x3e/0x80 [ 83.239530][ T2687] ? kasan_save_alloc_info+0x40/0x50 [ 83.239555][ T2687] ? __kasan_slab_alloc+0x73/0x90 [ 83.239574][ T2687] ? kmem_cache_alloc_noprof+0x1bf/0x410 [ 83.239599][ T2687] ? getname+0x1b/0x30 [ 83.239625][ T2687] ? do_sys_openat2+0xda/0x1d0 [ 83.239648][ T2687] ? __x64_sys_openat+0x13a/0x170 [ 83.239671][ T2687] ? x64_sys_call+0xe69/0x2ee0 [ 83.239697][ T2687] ? do_syscall_64+0x57/0xf0 [ 83.239724][ T2687] ? entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 83.239756][ T2687] ? do_filp_open+0x440/0x440 [ 83.239779][ T2687] do_filp_open+0x1f5/0x440 [ 83.239800][ T2687] ? __cfi_do_filp_open+0x10/0x10 [ 83.239823][ T2687] ? alloc_fd+0x4e6/0x5a0 [ 83.239854][ T2687] do_sys_openat2+0x134/0x1d0 [ 83.239876][ T2687] ? do_sys_open+0x100/0x100 [ 83.239898][ T2687] ? __kasan_check_write+0x18/0x20 [ 83.239924][ T2687] ? __kasan_check_write+0x18/0x20 [ 83.239948][ T2687] ? fpregs_restore_userregs+0x11c/0x260 [ 83.239970][ T2687] __x64_sys_openat+0x13a/0x170 [ 83.239994][ T2687] x64_sys_call+0xe69/0x2ee0 [ 83.240020][ T2687] do_syscall_64+0x57/0xf0 [ 83.240046][ T2687] ? clear_bhb_loop+0x50/0xa0 [ 83.240065][ T2687] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 83.240093][ T2687] RIP: 0033:0x7fc4bcb5d04e [ 83.240112][ T2687] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 83.240130][ T2687] RSP: 002b:00007fc4bd9d0b28 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 83.240153][ T2687] RAX: ffffffffffffffda RBX: 00007fc4bd9d16c0 RCX: 00007fc4bcb5d04e [ 83.240168][ T2687] RDX: 0000000000004081 RSI: 00007fc4bd9d0c00 RDI: ffffffffffffff9c [ 83.240183][ T2687] RBP: 00007fc4bd9d0c00 R08: 0000000000000000 R09: 0000000000000000 [ 83.240198][ T2687] R10: 0000000000000000 R11: 0000000000000246 R12: cccccccccccccccd [ 83.240212][ T2687] R13: 00007fc4bce16038 R14: 00007fc4bce15fa0 R15: 00007ffec596b078 [ 83.240230][ T2687] [ 83.664083][ T2699] FAULT_INJECTION: forcing a failure. [ 83.664083][ T2699] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 83.679100][ T2699] CPU: 1 UID: 0 PID: 2699 Comm: syz.1.999 Not tainted syzkaller #0 a40991d314adffa3075cd603e5b19eadab4cccf0 [ 83.679134][ T2699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 83.679147][ T2699] Call Trace: [ 83.679154][ T2699] [ 83.679163][ T2699] __dump_stack+0x21/0x30 [ 83.679196][ T2699] dump_stack_lvl+0x140/0x1c0 [ 83.679220][ T2699] ? __cfi_dump_stack_lvl+0x10/0x10 [ 83.679246][ T2699] ? check_stack_object+0x12b/0x150 [ 83.679273][ T2699] dump_stack+0x19/0x20 [ 83.679296][ T2699] should_fail_ex+0x3d7/0x530 [ 83.679322][ T2699] should_fail+0xf/0x20 [ 83.679345][ T2699] should_fail_usercopy+0x1e/0x30 [ 83.679370][ T2699] _copy_to_user+0x24/0xa0 [ 83.679388][ T2699] simple_read_from_buffer+0xed/0x160 [ 83.679412][ T2699] proc_fail_nth_read+0x1aa/0x220 [ 83.679436][ T2699] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 83.679459][ T2699] ? bpf_lsm_file_permission+0xd/0x20 [ 83.679481][ T2699] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 83.679502][ T2699] vfs_read+0x286/0xcb0 [ 83.679528][ T2699] ? __cfi_vfs_read+0x10/0x10 [ 83.679548][ T2699] ? __kasan_check_write+0x18/0x20 [ 83.679571][ T2699] ? mutex_lock+0x97/0x1d0 [ 83.679593][ T2699] ? __cfi_mutex_lock+0x10/0x10 [ 83.679613][ T2699] ? __fget_files+0x2c5/0x340 [ 83.679633][ T2699] ksys_read+0x145/0x260 [ 83.679657][ T2699] ? __cfi_ksys_read+0x10/0x10 [ 83.679680][ T2699] ? fdget+0x188/0x1e0 [ 83.679697][ T2699] ? __kasan_check_read+0x15/0x20 [ 83.679722][ T2699] __x64_sys_read+0x7f/0x90 [ 83.679754][ T2699] x64_sys_call+0x2638/0x2ee0 [ 83.679781][ T2699] do_syscall_64+0x57/0xf0 [ 83.679809][ T2699] ? clear_bhb_loop+0x50/0xa0 [ 83.679829][ T2699] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 83.679858][ T2699] RIP: 0033:0x7f545995d04e [ 83.679877][ T2699] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 83.679895][ T2699] RSP: 002b:00007f545a8f4fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 83.679918][ T2699] RAX: ffffffffffffffda RBX: 00007f545a8f56c0 RCX: 00007f545995d04e [ 83.679934][ T2699] RDX: 000000000000000f RSI: 00007f545a8f50a0 RDI: 0000000000000005 [ 83.679948][ T2699] RBP: 00007f545a8f5090 R08: 0000000000000000 R09: 0000000000000000 [ 83.679961][ T2699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 83.679975][ T2699] R13: 00007f5459c16038 R14: 00007f5459c15fa0 R15: 00007fff023b05a8 [ 83.680001][ T2699] [ 83.717937][ T2705] netlink: 124 bytes leftover after parsing attributes in process `syz.1.1002'. [ 84.552295][ T2730] netlink: 124 bytes leftover after parsing attributes in process `syz.1.1012'. [ 85.248891][ T2759] netlink: 124 bytes leftover after parsing attributes in process `syz.2.1024'. [ 86.538446][ T2808] netlink: 124 bytes leftover after parsing attributes in process `syz.0.1046'. [ 87.096065][ T2823] FAULT_INJECTION: forcing a failure. [ 87.096065][ T2823] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 87.110083][ T2823] CPU: 1 UID: 0 PID: 2823 Comm: syz.1.1053 Not tainted syzkaller #0 a40991d314adffa3075cd603e5b19eadab4cccf0 [ 87.110114][ T2823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 87.110124][ T2823] Call Trace: [ 87.110131][ T2823] [ 87.110138][ T2823] __dump_stack+0x21/0x30 [ 87.110167][ T2823] dump_stack_lvl+0x140/0x1c0 [ 87.110187][ T2823] ? __cfi_dump_stack_lvl+0x10/0x10 [ 87.110207][ T2823] ? check_stack_object+0x12b/0x150 [ 87.110230][ T2823] dump_stack+0x19/0x20 [ 87.110251][ T2823] should_fail_ex+0x3d7/0x530 [ 87.110274][ T2823] should_fail+0xf/0x20 [ 87.110294][ T2823] should_fail_usercopy+0x1e/0x30 [ 87.110316][ T2823] _copy_to_user+0x24/0xa0 [ 87.110334][ T2823] simple_read_from_buffer+0xed/0x160 [ 87.110357][ T2823] proc_fail_nth_read+0x1aa/0x220 [ 87.110381][ T2823] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 87.110401][ T2823] ? bpf_lsm_file_permission+0xd/0x20 [ 87.110422][ T2823] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 87.110453][ T2823] vfs_read+0x286/0xcb0 [ 87.110481][ T2823] ? __cfi_vfs_read+0x10/0x10 [ 87.110503][ T2823] ? __kasan_check_write+0x18/0x20 [ 87.110528][ T2823] ? mutex_lock+0x97/0x1d0 [ 87.110549][ T2823] ? __cfi_mutex_lock+0x10/0x10 [ 87.110569][ T2823] ? __fget_files+0x2c5/0x340 [ 87.110589][ T2823] ksys_read+0x145/0x260 [ 87.110612][ T2823] ? __cfi_ksys_read+0x10/0x10 [ 87.110635][ T2823] ? fdget+0x188/0x1e0 [ 87.110651][ T2823] ? __kasan_check_read+0x15/0x20 [ 87.110676][ T2823] __x64_sys_read+0x7f/0x90 [ 87.110700][ T2823] x64_sys_call+0x2638/0x2ee0 [ 87.110725][ T2823] do_syscall_64+0x57/0xf0 [ 87.110751][ T2823] ? clear_bhb_loop+0x50/0xa0 [ 87.110770][ T2823] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 87.110798][ T2823] RIP: 0033:0x7f545995d04e [ 87.110815][ T2823] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 87.110832][ T2823] RSP: 002b:00007f545a8f4fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 87.110855][ T2823] RAX: ffffffffffffffda RBX: 00007f545a8f56c0 RCX: 00007f545995d04e [ 87.110870][ T2823] RDX: 000000000000000f RSI: 00007f545a8f50a0 RDI: 0000000000000005 [ 87.110883][ T2823] RBP: 00007f545a8f5090 R08: 0000000000000000 R09: 0000000000000000 [ 87.110896][ T2823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 87.110908][ T2823] R13: 00007f5459c16038 R14: 00007f5459c15fa0 R15: 00007fff023b05a8 [ 87.110924][ T2823] [ 87.309043][ T149] audit_log_start: 76783 callbacks suppressed [ 87.309070][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 87.315393][ T36] audit: type=1400 audit(1775177148.810:117542): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.323916][ T149] audit: audit_lost=17317 audit_rate_limit=0 audit_backlog_limit=64 [ 87.331941][ T36] audit: type=1400 audit(1775177148.820:117543): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.340218][ T149] audit: backlog limit exceeded [ 87.348173][ T36] audit: type=1400 audit(1775177148.820:117544): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.356695][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 87.364155][ T36] audit: type=1400 audit(1775177148.820:117545): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.367162][ T149] audit: audit_lost=17318 audit_rate_limit=0 audit_backlog_limit=64 [ 87.373517][ T36] audit: type=1400 audit(1775177148.820:117546): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.399996][ T2825] netlink: 'syz.1.1054': attribute type 10 has an invalid length. [ 87.527371][ T2825] netlink: 5 bytes leftover after parsing attributes in process `syz.1.1054'. [ 87.536939][ T2825] bridge_slave_1: left promiscuous mode [ 87.545612][ T2825] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.462275][ T2870] netlink: 679 bytes leftover after parsing attributes in process `syz.1.1073'. [ 92.319001][ T36] kauditd_printk_skb: 46744 callbacks suppressed [ 92.319022][ T36] audit: type=1400 audit(1775177154.010:160090): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.325421][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 92.325444][ T149] audit: audit_lost=18719 audit_rate_limit=0 audit_backlog_limit=64 [ 92.346815][ T36] audit: type=1400 audit(1775177154.020:160091): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.353697][ T149] audit: backlog limit exceeded [ 92.361407][ T36] audit: type=1400 audit(1775177154.020:160092): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.383918][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 92.388239][ T36] audit: type=1400 audit(1775177154.020:160093): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.409645][ T149] audit: audit_lost=18720 audit_rate_limit=0 audit_backlog_limit=64 [ 92.416787][ T36] audit: type=1400 audit(1775177154.020:160094): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.329036][ T36] kauditd_printk_skb: 55298 callbacks suppressed [ 97.329059][ T36] audit: type=1400 audit(1775177159.020:212869): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.335476][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 97.335530][ T36] audit: type=1400 audit(1775177159.030:212870): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.356913][ T149] audit: audit_lost=19562 audit_rate_limit=0 audit_backlog_limit=64 [ 97.364027][ T36] audit: type=1400 audit(1775177159.030:212871): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.385450][ T149] audit: backlog limit exceeded [ 97.394870][ T36] audit: type=1400 audit(1775177159.030:212872): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.416469][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 97.427017][ T2942] audit: audit_backlog=65 > audit_backlog_limit=64 [ 97.442078][ T149] audit: audit_lost=19563 audit_rate_limit=0 audit_backlog_limit=64 [ 100.460828][ T2962] netlink: 'syz.0.1102': attribute type 27 has an invalid length. [ 102.339081][ T36] kauditd_printk_skb: 53375 callbacks suppressed [ 102.339099][ T36] audit: type=1400 audit(1775177164.040:266245): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.345416][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 102.345620][ T36] audit: type=1400 audit(1775177164.040:266246): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.367012][ T149] audit: audit_lost=19565 audit_rate_limit=0 audit_backlog_limit=64 [ 102.373936][ T36] audit: type=1400 audit(1775177164.040:266247): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.395267][ T149] audit: backlog limit exceeded [ 102.403478][ T36] audit: type=1400 audit(1775177164.040:266248): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.425604][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 102.430230][ T36] audit: type=1400 audit(1775177164.040:266249): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.451613][ T149] audit: audit_lost=19566 audit_rate_limit=0 audit_backlog_limit=64 [ 105.642766][ T2986] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=2986 comm=syz.0.1113 [ 107.349031][ T36] kauditd_printk_skb: 54822 callbacks suppressed [ 107.349051][ T36] audit: type=1400 audit(1775177169.050:321071): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 107.355264][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 107.355430][ T36] audit: type=1400 audit(1775177169.050:321072): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 107.377027][ T149] audit: audit_lost=19567 audit_rate_limit=0 audit_backlog_limit=64 [ 107.383905][ T36] audit: type=1400 audit(1775177169.050:321073): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 107.406221][ T149] audit: backlog limit exceeded [ 107.414339][ T36] audit: type=1400 audit(1775177169.050:321074): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 107.436588][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 107.441082][ T36] audit: type=1400 audit(1775177169.050:321075): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 107.462321][ T149] audit: audit_lost=19568 audit_rate_limit=0 audit_backlog_limit=64 [ 109.942751][ T306] bridge_slave_1: left allmulticast mode [ 109.948544][ T306] bridge_slave_1: left promiscuous mode [ 109.954978][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.964188][ T306] bridge_slave_0: left allmulticast mode [ 109.970395][ T306] bridge_slave_0: left promiscuous mode [ 109.976040][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.985597][ T306] bridge_slave_1: left allmulticast mode [ 109.991840][ T306] bridge_slave_1: left promiscuous mode [ 109.997853][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.006636][ T306] bridge_slave_0: left allmulticast mode [ 110.012834][ T306] bridge_slave_0: left promiscuous mode [ 110.019461][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.028655][ T306] bridge_slave_1: left allmulticast mode [ 110.034568][ T306] bridge_slave_1: left promiscuous mode [ 110.040388][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.048081][ T306] bridge_slave_0: left allmulticast mode [ 110.054227][ T306] bridge_slave_0: left promiscuous mode [ 110.060023][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.291733][ T306] veth1_macvtap: left promiscuous mode [ 110.297286][ T306] veth0_vlan: left promiscuous mode [ 110.303260][ T306] veth1_macvtap: left promiscuous mode [ 110.308799][ T306] veth0_vlan: left promiscuous mode [ 110.314876][ T306] veth1_macvtap: left promiscuous mode [ 110.320576][ T306] veth0_vlan: left promiscuous mode [ 110.883043][ T306] ------------[ cut here ]------------ [ 110.888696][ T306] WARNING: CPU: 1 PID: 306 at net/ipv6/xfrm6_tunnel.c:341 xfrm6_tunnel_net_exit+0xc4/0x140 [ 110.899203][ T306] Modules linked in: [ 110.903143][ T306] CPU: 1 UID: 0 PID: 306 Comm: kworker/u8:3 Not tainted syzkaller #0 a40991d314adffa3075cd603e5b19eadab4cccf0 [ 110.914938][ T306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 110.925131][ T306] Workqueue: netns cleanup_net [ 110.930133][ T306] RIP: 0010:xfrm6_tunnel_net_exit+0xc4/0x140 [ 110.936402][ T306] Code: e8 91 47 d9 fc 4b 83 3c 3e 00 75 19 e8 05 11 81 fc 49 81 ff f8 07 00 00 74 1b e8 f7 10 81 fc 49 83 c7 08 eb c9 e8 ec 10 81 fc <0f> 0b 49 81 ff f8 07 00 00 75 e5 49 8d 9e 00 08 00 00 45 31 ff 4a [ 110.956330][ T306] RSP: 0018:ffffc9000b74fb90 EFLAGS: 00010293 [ 110.962542][ T306] RAX: ffffffff850699f4 RBX: ffff8881037b58c0 RCX: ffff8881037ddf00 [ 110.970716][ T306] RDX: 0000000000000000 RSI: 0000000000c00000 RDI: ffff888103330000 [ 110.978732][ T306] RBP: ffffc9000b74fbb0 R08: ffffffff87d38c07 R09: 1ffffffff0fa7180 [ 110.986761][ T306] R10: dffffc0000000000 R11: fffffbfff0fa7181 R12: dffffc0000000000 [ 110.994954][ T306] R13: dffffc0000000000 R14: ffff888103330000 R15: 0000000000000000 [ 111.003247][ T306] FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 111.012314][ T306] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 111.019112][ T306] CR2: 0000562b5087eaf8 CR3: 000000010bfce000 CR4: 00000000003526b0 [ 111.027372][ T306] Call Trace: [ 111.030696][ T306] [ 111.033643][ T306] cleanup_net+0x6bd/0xc90 [ 111.038077][ T306] ? __cfi_cleanup_net+0x10/0x10 [ 111.043063][ T306] ? kick_pool+0xb9/0x550 [ 111.047418][ T306] process_scheduled_works+0x7d1/0x1020 [ 111.053024][ T306] worker_thread+0xc70/0x10b0 [ 111.057819][ T306] ? __cfi_try_to_wake_up+0x10/0x10 [ 111.063075][ T306] kthread+0x2c6/0x370 [ 111.067251][ T306] ? __cfi_worker_thread+0x10/0x10 [ 111.072427][ T306] ? __cfi_kthread+0x10/0x10 [ 111.077035][ T306] ret_from_fork+0x67/0xa0 [ 111.081626][ T306] ? __cfi_kthread+0x10/0x10 [ 111.086324][ T306] ret_from_fork_asm+0x1a/0x30 [ 111.091142][ T306] [ 111.094173][ T306] ---[ end trace 0000000000000000 ]--- [ 111.100541][ T306] ------------[ cut here ]------------ [ 111.106104][ T306] WARNING: CPU: 1 PID: 306 at net/ipv6/xfrm6_tunnel.c:344 xfrm6_tunnel_net_exit+0x119/0x140 [ 111.116436][ T306] Modules linked in: [ 111.120542][ T306] CPU: 1 UID: 0 PID: 306 Comm: kworker/u8:3 Tainted: G W syzkaller #0 a40991d314adffa3075cd603e5b19eadab4cccf0 [ 111.133800][ T306] Tainted: [W]=WARN [ 111.137622][ T306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 111.147723][ T306] Workqueue: netns cleanup_net [ 111.152590][ T306] RIP: 0010:xfrm6_tunnel_net_exit+0x119/0x140 [ 111.158693][ T306] Code: fc 4b 83 bc 3e 00 08 00 00 00 75 19 e8 b0 10 81 fc 49 81 ff f8 07 00 00 74 1b e8 a2 10 81 fc 49 83 c7 08 eb c5 e8 97 10 81 fc <0f> 0b 49 81 ff f8 07 00 00 75 e5 e8 87 10 81 fc 5b 41 5c 41 5e 41 [ 111.178887][ T306] RSP: 0018:ffffc9000b74fb90 EFLAGS: 00010293 [ 111.185430][ T306] RAX: ffffffff85069a49 RBX: ffff888103330800 RCX: ffff8881037ddf00 [ 111.193462][ T306] RDX: 0000000000000000 RSI: 0000000000c00000 RDI: ffff888103330808 [ 111.201504][ T306] RBP: ffffc9000b74fbb0 R08: ffffffff87d38c07 R09: 1ffffffff0fa7180 [ 111.209530][ T306] R10: dffffc0000000000 R11: fffffbfff0fa7181 R12: dffffc0000000000 [ 111.217528][ T306] R13: dffffc0000000000 R14: ffff888103330000 R15: 0000000000000008 [ 111.225558][ T306] FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 111.234558][ T306] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 111.241205][ T306] CR2: 0000562b5087eaf8 CR3: 000000010b3d4000 CR4: 00000000003526b0 [ 111.249231][ T306] Call Trace: [ 111.252537][ T306] [ 111.256005][ T306] cleanup_net+0x6bd/0xc90 [ 111.260475][ T306] ? __cfi_cleanup_net+0x10/0x10 [ 111.265440][ T306] ? kick_pool+0xb9/0x550 [ 111.270112][ T306] process_scheduled_works+0x7d1/0x1020 [ 111.275775][ T306] worker_thread+0xc70/0x10b0 [ 111.280523][ T306] ? __cfi_try_to_wake_up+0x10/0x10 [ 111.285917][ T306] kthread+0x2c6/0x370 [ 111.290136][ T306] ? __cfi_worker_thread+0x10/0x10 [ 111.295270][ T306] ? __cfi_kthread+0x10/0x10 [ 111.299909][ T306] ret_from_fork+0x67/0xa0 [ 111.304550][ T306] ? __cfi_kthread+0x10/0x10 [ 111.309274][ T306] ret_from_fork_asm+0x1a/0x30 [ 111.314419][ T306] [ 111.317456][ T306] ---[ end trace 0000000000000000 ]--- [ 111.328925][ T306] ------------[ cut here ]------------ [ 111.334682][ T306] WARNING: CPU: 1 PID: 306 at net/xfrm/xfrm_state.c:3216 xfrm_state_fini+0x2be/0x310 [ 111.344221][ T306] Modules linked in: [ 111.348149][ T306] CPU: 1 UID: 0 PID: 306 Comm: kworker/u8:3 Tainted: G W syzkaller #0 a40991d314adffa3075cd603e5b19eadab4cccf0 [ 111.361498][ T306] Tainted: [W]=WARN [ 111.365314][ T306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 111.375610][ T306] Workqueue: netns cleanup_net [ 111.380590][ T306] RIP: 0010:xfrm_state_fini+0x2be/0x310 [ 111.386164][ T306] Code: 3c 20 00 74 08 48 89 df e8 8f 13 f4 fc 48 8b 3b e8 f7 3b df fc 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc cc e8 f2 dc 9b fc <0f> 0b e9 b0 fd ff ff e8 e6 dc 9b fc 0f 0b e9 18 fe ff ff e8 da dc [ 111.406367][ T306] RSP: 0018:ffffc9000b74fb70 EFLAGS: 00010293 [ 111.412672][ T306] RAX: ffffffff84ebcdee RBX: ffff8881037b58c0 RCX: ffff8881037ddf00 [ 111.420959][ T306] RDX: 0000000000000000 RSI: 0000000000c00000 RDI: ffff8881037ddf00 [ 111.428949][ T306] RBP: ffffc9000b74fb98 R08: ffffffff87d38c07 R09: 1ffffffff0fa7180 [ 111.437074][ T306] R10: dffffc0000000000 R11: fffffbfff0fa7181 R12: 1ffffffff0fa6ed0 [ 111.445369][ T306] R13: dffffc0000000000 R14: ffff8881037b64c0 R15: dffffc0000000000 [ 111.453573][ T306] FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 111.462653][ T306] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 111.469419][ T306] CR2: 0000562b5087eaf8 CR3: 000000010b3d4000 CR4: 00000000003526b0 [ 111.477757][ T306] Call Trace: [ 111.481086][ T306] [ 111.484031][ T306] xfrm_net_exit+0x31/0x80 [ 111.488492][ T306] cleanup_net+0x6bd/0xc90 [ 111.493076][ T306] ? __cfi_cleanup_net+0x10/0x10 [ 111.498386][ T306] ? kick_pool+0xb9/0x550 [ 111.503070][ T306] process_scheduled_works+0x7d1/0x1020 [ 111.508744][ T306] worker_thread+0xc70/0x10b0 [ 111.513586][ T306] ? __cfi_try_to_wake_up+0x10/0x10 [ 111.518832][ T306] kthread+0x2c6/0x370 [ 111.522961][ T306] ? __cfi_worker_thread+0x10/0x10 [ 111.528798][ T306] ? __cfi_kthread+0x10/0x10 [ 111.533457][ T306] ret_from_fork+0x67/0xa0 [ 111.537989][ T306] ? __cfi_kthread+0x10/0x10 [ 111.542715][ T306] ret_from_fork_asm+0x1a/0x30 [ 111.547608][ T306] [ 111.550660][ T306] ---[ end trace 0000000000000000 ]--- [ 112.359054][ T36] kauditd_printk_skb: 54254 callbacks suppressed [ 112.359076][ T36] audit: type=1400 audit(1775177174.050:370166): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 112.365826][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 112.366247][ T36] audit: type=1400 audit(1775177174.060:370167): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 112.388320][ T149] audit: audit_lost=21290 audit_rate_limit=0 audit_backlog_limit=64 [ 112.395585][ T36] audit: type=1400 audit(1775177174.060:370168): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 112.416865][ T149] audit: backlog limit exceeded [ 112.425479][ T36] audit: type=1400 audit(1775177174.060:370169): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 112.447041][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 112.451817][ T36] audit: type=1400 audit(1775177174.060:370170): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 112.473229][ T149] audit: audit_lost=21291 audit_rate_limit=0 audit_backlog_limit=64 [ 117.369164][ T36] kauditd_printk_skb: 55491 callbacks suppressed [ 117.369183][ T36] audit: type=1400 audit(1775177179.070:425661): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 117.376309][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 117.397581][ T36] audit: type=1400 audit(1775177179.070:425662): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 117.404174][ T149] audit: audit_lost=21292 audit_rate_limit=0 audit_backlog_limit=64 [ 117.426010][ T36] audit: type=1400 audit(1775177179.070:425663): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 117.434263][ T149] audit: backlog limit exceeded [ 117.455561][ T36] audit: type=1400 audit(1775177179.070:425664): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 117.460876][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 117.482955][ T36] audit: type=1400 audit(1775177179.070:425665): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 117.490211][ T149] audit: audit_lost=21293 audit_rate_limit=0 audit_backlog_limit=64