last executing test programs: 23.18108485s ago: executing program 2 (id=767): syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x80801) r1 = userfaultfd(0x801) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x280}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000100)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x2}) mprotect(&(0x7f0000379000/0x1000)=nil, 0x1000, 0x3000006) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000300)) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000000)={&(0x7f00002b9000/0x400000)=nil, &(0x7f0000779000/0x1000)=nil, 0x400000, 0x3, 0x2}) munlockall() madvise(&(0x7f00009cb000/0x3000)=nil, 0x3000, 0xd) r2 = gettid() process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r3 = syz_usb_connect$uac1(0x3, 0xbc, &(0x7f0000000100)=ANY=[@ANYBLOB="12010002000000106b1d01014000010203010902aa0003011090090904000000010100000a2401ffff0102010205240406080924030101030103020a2405060c73c13659dc0c240203060203fc0900f9000b24040415b81ccc09cd4b0904010000010200000904010101010200000824020102090800040704072501839b0100090402000001020000090402010101020000072401030900000d240201010103016ab1d77d0509058209200005010207250103060500000000000000"], 0x0) syz_usb_control_io(r3, 0x0, 0x0) ioctl$BTRFS_IOC_FS_INFO(r1, 0x8400941f, &(0x7f0000000340)) r4 = syz_clone(0x2000100, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_pidfd_open(r4, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r5, 0xff06, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) 22.643496791s ago: executing program 2 (id=772): syz_usb_connect(0x5, 0x5a, &(0x7f00000000c0)=ANY=[@ANYBLOB="12010000ec13b2106d04f308280b0102030109024800010000000009046900000e0100002b41"], 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0xa2f01, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) socket(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup(r2) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000080)={'syzkaller1\x00', @broadcast}) write$tun(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0a0088a8ffffffffffffaaaaaaaaaabb86dd6900000000783a00fc020000000000000000000000000001ff020000000000000000000000000001620804046800080000000000000000000000000000000000fe8000000000000000000000000000aafc010000000000000000000000000001000000000000000000000000000000000402907800008a000633fffc01000000000000000000000000000100000000000000000000ffffffffffff0000000000"], 0xb2) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$pppl2tp(0x18, 0x1, 0x1) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r7, 0x4018620d, &(0x7f0000000280)={0x73622a85, 0x1000, 0x2}) r8 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder0\x00', 0x0, 0x0) r9 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000280)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0x8, 0x0, &(0x7f0000000180)=[@increfs], 0x0, 0x0, 0x0}) r10 = dup3(r9, r8, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000540)={0x10, 0x0, &(0x7f0000000440)=[@request_death={0x400c6313}], 0x42, 0x1000000, 0x0}) ioctl$BINDER_WRITE_READ(r10, 0xc0306201, &(0x7f0000000640)={0xfffffd88, 0x0, &(0x7f0000000000)=[@decrefs={0x400c6313}], 0x0, 0x0, 0x0}) connect$pppl2tp(r5, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r6, {0x2, 0x0, @multicast2}, 0x2, 0x0, 0x4}}, 0x2e) connect$pppl2tp(r5, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, r4, 0x1, 0x0, 0x0, 0x0, {0xa, 0x0, 0x6, @private0}}}, 0x3a) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000020c0)=ANY=[@ANYBLOB="5c0000000101010300000000000000000a00000248001980080001000e0000003c0001802c"], 0x5c}}, 0x0) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000740)) r11 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCETHTOOL(r11, 0x8946, &(0x7f0000000380)={'team_slave_0\x00', &(0x7f0000000200)=@ethtool_sset_info={0x2b, 0x0, 0x101}}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r12 = accept$packet(r2, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname$packet(r12, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) 22.087079414s ago: executing program 2 (id=778): r0 = socket$netlink(0x10, 0x3, 0x15) syz_usb_connect(0x0, 0x24, &(0x7f0000000440)={{0x12, 0x1, 0x0, 0x66, 0x84, 0x1e, 0x40, 0x7c4, 0xa109, 0x8a3, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x7f, 0x8, 0x0, 0x0, [{{0x9, 0x4, 0x4, 0x0, 0x0, 0x11, 0xeb, 0xe7}}]}}]}}, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x2) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) prctl$PR_MCE_KILL_GET(0x22) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="340000001d002106000000000000000007d5"], 0x34}}, 0x0) 21.574366713s ago: executing program 2 (id=782): sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000801}, 0x40800) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x19) mincore(&(0x7f0000000000/0x800000)=nil, 0x800000, &(0x7f0000000000)=""/188) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000400)=ANY=[], 0x8) connect$inet6(r0, &(0x7f00000003c0)={0xa, 0xfffe, 0x3000001, @mcast2, 0x6}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000240)='bridge0\x00', 0x10) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000003a80)='ns/net\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) r2 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r3, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000180)='./file1\x00', 0x4) renameat2(r3, &(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r3, &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) write(r0, &(0x7f00000000c0)="8f2a0a65bd8c002b0304000e0580a7b6070d63e286a5cefe", 0x5ac) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) r4 = syz_usb_connect$uac1(0x3, 0xbc, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0x0, 0x0, 0x0, 0x10, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xaa, 0x3, 0x1, 0x10, 0x90, 0x9, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x7f, 0x1}, [@mixer_unit={0x5, 0x24, 0x4, 0x6, 0x8}, @output_terminal={0x9, 0x24, 0x3, 0x1, 0x301, 0x1, 0x3, 0x2}, @selector_unit={0xa, 0x24, 0x5, 0x6, 0xc, "73c13659dc"}, @output_terminal={0x9, 0x24, 0x3, 0x1, 0x1ff, 0x6, 0x6, 0x40}, @mixer_unit={0xb, 0x24, 0x4, 0x4, 0x15, "b81ccc09cd4b"}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_discrete={0x8, 0x24, 0x2, 0x1, 0x2, 0x2, 0x0, 0x3}]}, {{0x9, 0x5, 0x1, 0x9, 0x8, 0x6, 0x7, 0x4, {0x7, 0x25, 0x1, 0x83, 0x9b, 0x1}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@as_header={0x7, 0x24, 0x1, 0x3, 0x9}, @format_type_i_discrete={0x10, 0x24, 0x2, 0x1, 0x1, 0x1, 0x3, 0x1, '\t\x00\x00\x00\x00\x00\x00\x00'}]}, {{0x9, 0x5, 0x82, 0x9, 0x20, 0x5, 0x1, 0x2, {0x7, 0x25, 0x1, 0x3, 0x6, 0x5}}}}}}}]}}, 0x0) syz_usb_control_io(r4, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) 20.94097636s ago: executing program 2 (id=789): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r1, &(0x7f0000000200)={0x18, 0x2, {0xfeff, @local}}, 0x1e) connect$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0xffff, @multicast1}}, 0x1e) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x3841, 0x0) ioctl$BLKFINISHZONE(r1, 0x40101288, &(0x7f0000000280)={0xffff, 0x87}) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r3, 0x0, 0x29, 0x0, 0xdab1f63843b39bd0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000100)) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000140)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000400)=[@increfs], 0x0, 0x0, 0x0}) dup3(r5, r4, 0x0) ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f00000000c0)) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x4010744d, &(0x7f00000002c0)=0x2f1) ppoll(&(0x7f00000003c0)=[{r2, 0x101}], 0x1, 0x0, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f0000000140)={&(0x7f0000000000)={0xa, 0x4e20, 0x2, @rand_addr=' \x01\x00', 0x2}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000000040)="d90545c034b622b8be232ade9663207b393a438e84029dbb02ad44e5591d", 0x1e}, {&(0x7f0000000080)="7a501aa401e5110805709d3f23b9a8974342594ea98cbdf12a3129305348dfd1949ac064355cc733e1bff4561557", 0x2e}, {&(0x7f00000000c0)="cf", 0x1}], 0x3}, 0x40) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0xa2f01, 0x0) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r9 = syz_kvm_setup_syzos_vm$x86(r8, &(0x7f0000bfe000/0x400000)=nil) r10 = syz_kvm_add_vcpu$x86(r9, &(0x7f0000000280)={0x0, &(0x7f0000000040)=[@code={0xa, 0x65, {"b9030100c00f32b904000000c461b9dd0764660f3882820058000066450ff7ecf044093966baf80cb86ab0d68d66bafc0c66edc421845ef366bad00466baf80cb8665abb89ef66bafc0c66ed430f01f86644def0"}}], 0x65}) ioctl$KVM_RUN(r10, 0xae80, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) socket$inet6_tcp(0xa, 0x1, 0x0) 20.892212123s ago: executing program 2 (id=792): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440), 0x141800, 0x0) r1 = dup2(r0, r0) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f00000000c0)={0x0, 0x0, @ioapic={0x1, 0x3ff, 0x1ff, 0x6, 0x0, [{0xc8, 0x1, 0x6, '\x00', 0x6}, {0xed, 0x2, 0x6, '\x00', 0x8}, {0x4, 0xdd, 0x2, '\x00', 0xc}, {0x5c, 0xa0, 0xac, '\x00', 0xff}, {0xd, 0x3, 0xf9, '\x00', 0x1}, {0x1, 0x40, 0x58, '\x00', 0x8}, {0x4, 0xa, 0x6, '\x00', 0x8}, {0x6, 0x2, 0x46, '\x00', 0x9}, {0x4, 0x80, 0x1, '\x00', 0x9}, {0x2, 0x41, 0x1, '\x00', 0xc}, {0x7, 0xfd, 0xdc, '\x00', 0x80}, {0x12, 0x4, 0x66, '\x00', 0x9}, {0x51, 0x5, 0x7}, {0x0, 0x8a, 0x2, '\x00', 0x12}, {0xf0, 0x5, 0x0, '\x00', 0x5}, {0x7, 0x6, 0xd6, '\x00', 0xa1}, {0x81, 0x21, 0x8, '\x00', 0x8}, {0xb, 0xf9, 0xd1, '\x00', 0x6}, {0x80, 0xa, 0xa, '\x00', 0x9}, {0x6, 0x5, 0x6, '\x00', 0x1}, {0x0, 0x1, 0x6, '\x00', 0x7f}, {0x8, 0x1, 0x1, '\x00', 0x7}, {0xfc, 0xa5, 0x2, '\x00', 0x8}, {0x40, 0x23, 0x7, '\x00', 0xdb}]}}) r2 = fsopen(&(0x7f0000000100)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000140)='.\x00', 0x8000, 0x112) r5 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1000003, 0x13, r7, 0x0) getdents(r4, &(0x7f0000001fc0)=""/184, 0xb8) getdents(r4, 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_X86_SET_MSR_FILTER(r8, 0x4188aec6, &(0x7f0000000a40)={0x1, [{0x2, 0x8, 0x106, &(0x7f0000000540)="d7"}, {0x2, 0x8, 0x2, &(0x7f0000000080)=':'}, {0x2, 0x0, 0x7ff, 0x0}, {0x9ddae253f24bceb, 0x0, 0x912b, 0x0}, {0x2, 0x0, 0x3cb3, 0x0}, {0x0, 0x0, 0x3fe, 0x0}, {0x0, 0x0, 0x2, 0x0}, {0x0, 0xffffffc5, 0xfffffffe, 0x0}, {0x1, 0x0, 0xb, 0x0}, {0x1, 0x0, 0x3, 0x0}, {0x0, 0x0, 0x9, 0x0}, {0x3, 0x0, 0x7, 0x0}, {0x60cf6ba5a5e3603a, 0x0, 0x0, 0x0}, {0x3, 0x0, 0x7ffffffb, 0x0}, {0x1, 0x0, 0x5, 0x0}, {0x1, 0x0, 0x8001, 0x0}]}) 20.795818459s ago: executing program 32 (id=792): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440), 0x141800, 0x0) r1 = dup2(r0, r0) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f00000000c0)={0x0, 0x0, @ioapic={0x1, 0x3ff, 0x1ff, 0x6, 0x0, [{0xc8, 0x1, 0x6, '\x00', 0x6}, {0xed, 0x2, 0x6, '\x00', 0x8}, {0x4, 0xdd, 0x2, '\x00', 0xc}, {0x5c, 0xa0, 0xac, '\x00', 0xff}, {0xd, 0x3, 0xf9, '\x00', 0x1}, {0x1, 0x40, 0x58, '\x00', 0x8}, {0x4, 0xa, 0x6, '\x00', 0x8}, {0x6, 0x2, 0x46, '\x00', 0x9}, {0x4, 0x80, 0x1, '\x00', 0x9}, {0x2, 0x41, 0x1, '\x00', 0xc}, {0x7, 0xfd, 0xdc, '\x00', 0x80}, {0x12, 0x4, 0x66, '\x00', 0x9}, {0x51, 0x5, 0x7}, {0x0, 0x8a, 0x2, '\x00', 0x12}, {0xf0, 0x5, 0x0, '\x00', 0x5}, {0x7, 0x6, 0xd6, '\x00', 0xa1}, {0x81, 0x21, 0x8, '\x00', 0x8}, {0xb, 0xf9, 0xd1, '\x00', 0x6}, {0x80, 0xa, 0xa, '\x00', 0x9}, {0x6, 0x5, 0x6, '\x00', 0x1}, {0x0, 0x1, 0x6, '\x00', 0x7f}, {0x8, 0x1, 0x1, '\x00', 0x7}, {0xfc, 0xa5, 0x2, '\x00', 0x8}, {0x40, 0x23, 0x7, '\x00', 0xdb}]}}) r2 = fsopen(&(0x7f0000000100)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000140)='.\x00', 0x8000, 0x112) r5 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1000003, 0x13, r7, 0x0) getdents(r4, &(0x7f0000001fc0)=""/184, 0xb8) getdents(r4, 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_X86_SET_MSR_FILTER(r8, 0x4188aec6, &(0x7f0000000a40)={0x1, [{0x2, 0x8, 0x106, &(0x7f0000000540)="d7"}, {0x2, 0x8, 0x2, &(0x7f0000000080)=':'}, {0x2, 0x0, 0x7ff, 0x0}, {0x9ddae253f24bceb, 0x0, 0x912b, 0x0}, {0x2, 0x0, 0x3cb3, 0x0}, {0x0, 0x0, 0x3fe, 0x0}, {0x0, 0x0, 0x2, 0x0}, {0x0, 0xffffffc5, 0xfffffffe, 0x0}, {0x1, 0x0, 0xb, 0x0}, {0x1, 0x0, 0x3, 0x0}, {0x0, 0x0, 0x9, 0x0}, {0x3, 0x0, 0x7, 0x0}, {0x60cf6ba5a5e3603a, 0x0, 0x0, 0x0}, {0x3, 0x0, 0x7ffffffb, 0x0}, {0x1, 0x0, 0x5, 0x0}, {0x1, 0x0, 0x8001, 0x0}]}) 9.113667449s ago: executing program 0 (id=824): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000440), 0x1074c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./bus\x00', 0x1e0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc8) setxattr$trusted_overlay_origin(&(0x7f0000000180)='./file0\x00', &(0x7f0000000000), &(0x7f0000000b40), 0x2, 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000300)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@nfs_export_on}]}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(r1, 0x0, 0x40) r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0xfffffffffffffffe, 0x80802) ioctl$USBDEVFS_ALLOC_STREAMS(r2, 0x8008551c, &(0x7f00000001c0)={0x369c, 0x1, [{0x1, 0x1}]}) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000010c0), 0x80, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CAP_DISABLE_QUIRKS(r6, 0x4068aea3, &(0x7f00000000c0)={0x74, 0x0, 0xe}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r4, 0x1, &(0x7f0000000040)={{0x77359400}, {0x0, 0x3938700}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) write$vga_arbiter(r3, &(0x7f0000000200)=@other={'trylock', ' ', 'mem'}, 0xc) ioctl$TIOCGISO7816(r1, 0x80285442, 0x0) r7 = socket$packet(0x11, 0x2, 0x300) recvfrom(r7, 0x0, 0x0, 0x40000002, 0x0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000040)=0x6, 0x4) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000005c0)=@migrate={0x50, 0x21, 0x1, 0x0, 0xfffffffe, {{@in6=@private2, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0x4e20, 0x0, 0x0, 0x0, 0xa, 0xe0, 0x80}, 0x2}}, 0x50}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 9.110296499s ago: executing program 3 (id=826): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x4180, 0x48) linkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00', 0x400) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000004500), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@debug={'debug', 0x3d, 0x10}}]}}) 9.041050263s ago: executing program 3 (id=827): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x1c, 0x2, 0x3, 0x5, 0x0, 0x0, {0x0, 0x0, 0x9}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1}}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000140)=0x47, 0x4) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)={0x20, 0x3, 0x3, 0x101, 0x0, 0x0, {}, [@NFQA_VERDICT_HDR={0xc, 0x2, {0x0, 0x6}}]}, 0x20}}, 0x0) r1 = socket$inet(0x2, 0x2, 0x1) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000040)=0x8, 0x4) sendmsg$key(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x0, &(0x7f0000000000)={0x0}, 0x1, 0x7}, 0x10010000) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_procfs(0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000000c0)}], 0x1) r3 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) ptrace$setsig(0x4203, r3, 0x6, &(0x7f0000000000)={0xd, 0x8, 0x8}) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="9402000021000100fcffffff00000000ac1414aae5fffff8b49ed9825133a900fc0100000000000000070000000000000000add500200000000000801aeaaec1", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000700004e6706362632874776f666973682900000000000000000000000480000000000000000000000000000000000000000000000000000000000000000000000000000040010000dc06216ef2c68e9f6da05d886dbc3273ef99796b36698e2bd5179c3eea5474fc78c9720bfc4f90a708001f0001000000cc0111"], 0x294}}, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x5e21, @empty}, 0x10) 7.477033734s ago: executing program 0 (id=828): openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x280) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x8082, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_CLEAR_DIRTY_LOG(0xffffffffffffffff, 0xc018aec0, &(0x7f0000000040)={0x10200, 0x80, 0xc0, &(0x7f0000000340)=[0x2, 0xfffffffffffffffd, 0x3, 0x80, 0xe6b4, 0x101, 0xfffffffffffffffa, 0x2, 0x0, 0x2, 0x2, 0x700000000000000, 0x10006, 0xffff, 0xfffffffffffffffe, 0x7, 0x7fffffff, 0x5, 0x1, 0x2, 0x5, 0x6, 0x8, 0x2, 0x4, 0x20000000009, 0x401, 0x1fd, 0x6, 0x0, 0x7, 0x5, 0x5, 0x2, 0x501, 0x43, 0xfffffffffffffff5, 0x4, 0x7fffffff, 0x7d, 0x0, 0x4, 0x20008, 0x2e2, 0x3, 0x6, 0x2, 0xfffffffffffffff9, 0x100000000, 0xfffffffffffffffd, 0x8, 0x9, 0x7fff, 0x4, 0x8000000000000000, 0x2, 0x94f, 0xea5, 0x7fffffffffffffff, 0xa, 0xfffffffffffffffe, 0x9, 0x11, 0xa, 0x5, 0xa8, 0x1, 0x2000000000000007, 0x7fffffffffffffff, 0x0, 0x7, 0x7, 0xae8f, 0xfffffffffffffffc, 0xa, 0x20000000, 0x4000008, 0xdac, 0xe90, 0x7, 0x4c5d, 0xa7, 0xba00, 0x3, 0x7ff, 0x8, 0x1, 0x100, 0x4, 0xf, 0xfffffffffffffffc, 0x80000001, 0x5, 0x21, 0x8, 0xfffffffffffffffd, 0x401, 0x3, 0x7, 0x2, 0x79, 0xf, 0x10000, 0xf, 0x10000000002, 0x200, 0x3, 0xfffffffffffffffb, 0x4000, 0x4, 0xa, 0x6518, 0x9, 0x2, 0x100000001, 0x80, 0x0, 0xd, 0x4, 0xf, 0x9, 0x0, 0x401, 0x1, 0x2, 0x7, 0xea7, 0x1ffffffffffffffe]}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000008, 0x10010, r2, 0x21b17000) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f00000000c0)={0x29}) 7.476504854s ago: executing program 1 (id=829): r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) (async) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000000c0)='cifs.spnego\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="d6010a9d8704fa73a029f893bf17e9207cfefc8d309907effe080d90d33dba427392e843c189dd2f5f60bb14be1d1908e05b7cb10938a2164307fef0932f4ecf9d1e4893e0d89a071efd44341ed243250436ca80df89d1b7fd3e0d5fac5b800f", 0x60, r1) (async) r2 = add_key$keyring(&(0x7f0000000200), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, r2) 7.475548434s ago: executing program 3 (id=830): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000001180)=ANY=[@ANYBLOB="12010000090003206d0414c34000ffff000109022400010400a000090400000103010100093700086ce82201000905815f"], 0x0) syz_usb_control_io$hid(r0, &(0x7f00000001c0)={0x14, &(0x7f0000000dc0)=ANY=[@ANYBLOB="00020c0000000c0002"], 0x0, 0x0, 0x0}, 0x0) (async) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) (async) r2 = syz_usb_connect$cdc_ncm(0x6, 0x79, &(0x7f0000000040)={{0x12, 0x1, 0x300, 0x2, 0x0, 0x0, 0xff, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x67, 0x2, 0x1, 0x6, 0x80, 0x4, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x9, 0x24, 0x6, 0x0, 0x1, "86b44688"}, {0x5, 0x24, 0x0, 0x7fff}, {0xd, 0x24, 0xf, 0x1, 0x401, 0x20, 0xf001, 0xf0}, {0x6, 0x24, 0x1a, 0xfffc}, [@dmm={0x7, 0x24, 0x14, 0x5, 0x8}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x2, 0xc7, 0x16}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x9, 0xb4, 0xe}}, {{0x9, 0x5, 0x3, 0x2, 0x200, 0x3, 0x1, 0x9}}}}}}}]}}, &(0x7f0000000180)={0xa, &(0x7f00000000c0)={0xa, 0x6, 0x0, 0xfe, 0xe, 0xa, 0x8, 0x5}, 0x29, &(0x7f0000000100)={0x5, 0xf, 0x29, 0x1, [@ssp_cap={0x24, 0x10, 0xa, 0x5, 0x6, 0x7, 0xf, 0x5e88, [0x3f08, 0xff0f, 0xc000, 0x0, 0xc0, 0x0]}]}, 0x2, [{0xf0, &(0x7f0000000200)=@string={0xf0, 0x3, "e6f248f584124228304f14cab328bd63ef1af9485ca363e77b1ca812c6c66edd336ea6d84a9cf5aee68106d8672166c86ee73c1e5e30babd22cabe9f8cf8d8aebe1fc6263833a25c6668af21261231a76ecdb6b3b76d55e3dabd7e57a1cf714390095a0579bcc6c1c5fa08fb4b417e7451cc8259799a1daa7f3535f715a9fb8bd6d7a72418097003417557044b9c113f0a0859fd5984ebe50262d33e8e2fa47dc40844376a1384e02d1c329c14b7bd24a752adef07c73ea3eaec8981aa4b9428397d63dc05951df056e828a330e4b2047f9842defb03e6fb8af5255f2ef4fbeddd0bb38fd35e60f79ff0254b7755"}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x1c09}}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) (async) unlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200) (async) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x0) (async) syz_usb_control_io(r2, 0x0, &(0x7f0000000e40)={0x84, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x20, 0x0, 0x8, {0x40, 0x4, [0xf]}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) syz_usb_control_io$hid(r0, 0x0, 0x0) 5.765955154s ago: executing program 0 (id=831): mkdir(&(0x7f0000000040)='./cgroup/../file0\x00', 0x94) (async, rerun: 64) r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000000000105804105000000000000109022d00010700000009040005050300000009210002080122940309058103"], 0x0) (rerun: 64) syz_usb_control_io(r0, &(0x7f00000002c0)={0x2c, &(0x7f00000000c0)={0x0, 0x7, 0x78, {0x78, 0x0, "6a6433554bb22f36274b95c5b52145744ad9456fb7f28e6abfcd86b1f76389d780ef79f5298b691e6672b3db01e99873befa9cd721151ead32f3218465d5a37009c146a76ccb4f8474c6b8605b2c86081e2a83741a0db7959b891d064349cf19e8a2a9ef324959d7fd040059a64fd19bdad0afec082b"}}, &(0x7f0000000180)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x41d}}, &(0x7f00000001c0)={0x0, 0xf, 0x12, {0x5, 0xf, 0x12, 0x2, [@generic={0x6, 0x10, 0x3, "758c1d"}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x5, 0x0, 0x54e}]}}, &(0x7f0000000240)={0x20, 0x29, 0xf, {0xf, 0x29, 0x98, 0x18, 0xd, 0x1, "86d11572", "ef4e5fc2"}}, &(0x7f0000000280)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x0, 0x10, 0x70, 0xc0, 0x4, 0xce, 0x3}}}, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000340)={0x24, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00220508"], 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000000), 0x2, 0x0) (async) rmdir(&(0x7f0000000240)='./cgroup/../file0\x00') (async) socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gre0\x00', 0x0}) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000140)=0x8, 0x4) sendto$packet(r3, &(0x7f0000000340)="05030006e8fe091c6202a0ffffffff006003000000007f141434e3177f43055762cb80948864113b022543424aa608", 0xfef2, 0x0, &(0x7f0000000a80)={0x11, 0x88a8, r4, 0x1, 0x0, 0x6, @multicast}, 0x14) (async) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xc) 5.712840787s ago: executing program 1 (id=832): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[], 0x20}, 0x1, 0x0, 0x0, 0x4a091}, 0x500c5) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f00000003c0)=0x800000001, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x40000c0, &(0x7f0000000000)={0xa, 0x4e24, 0x1, @dev={0xfe, 0x80, '\x00', 0x2c}, 0x9}, 0x1c) recvmmsg(r1, &(0x7f0000009780)=[{{&(0x7f0000000480)=@nfc_llcp, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000500)=""/128, 0x80}, {&(0x7f0000000580)=""/123, 0x7b}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000600)=""/214, 0xd6}, {&(0x7f0000000700)=""/47, 0x2f}, {&(0x7f0000000740)=""/168, 0xa8}, {&(0x7f0000000800)=""/248, 0xf8}, {&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000000940)=""/154, 0x9a}, {&(0x7f0000000a00)=""/50, 0x32}], 0xa}, 0xa}, {{&(0x7f0000000b00)=@alg, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000b80)}, {&(0x7f0000000bc0)=""/254, 0xfe}, {&(0x7f0000003300)=""/4096, 0x1000}, {&(0x7f0000000cc0)=""/170, 0xaa}, {&(0x7f0000000d80)=""/247, 0xf7}], 0x5, &(0x7f0000000f00)=""/223, 0xdf}, 0x7}, {{&(0x7f0000001000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000004500)=[{&(0x7f0000001080)=""/238, 0xee}, {&(0x7f0000004300)=""/35, 0x23}, {&(0x7f0000004340)=""/240, 0xf0}, {&(0x7f0000004440)=""/187, 0xbb}], 0x4, &(0x7f0000004540)=""/223, 0xdf}, 0x8}, {{&(0x7f0000004640)=@isdn, 0x80, &(0x7f0000004880)=[{&(0x7f00000046c0)=""/39, 0x27}, {&(0x7f0000004700)=""/114, 0x72}, {&(0x7f0000004780)=""/153, 0x99}, {&(0x7f0000004840)=""/64, 0x40}], 0x4, &(0x7f00000048c0)=""/188, 0xbc}, 0x83}, {{&(0x7f0000004980)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000004b00)=[{&(0x7f0000004a00)=""/78, 0x4e}, {&(0x7f0000004a80)=""/100, 0x64}, {&(0x7f0000007780)=""/4096, 0x1000}, {&(0x7f0000008780)=""/4096, 0x1000}], 0x4, &(0x7f0000004b40)=""/36, 0x24}, 0x900}, {{&(0x7f0000004b80)=@hci, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004c00)=""/61, 0x3d}, {&(0x7f0000004c40)=""/26, 0x1a}, {&(0x7f0000004c80)=""/174, 0xae}, {&(0x7f0000004d40)=""/2, 0x2}, {&(0x7f0000004d80)=""/180, 0xb4}], 0x5, &(0x7f0000004ec0)=""/69, 0x45}, 0x3}, {{&(0x7f0000004f40)=@nfc, 0x80, &(0x7f0000005000)=[{&(0x7f0000004fc0)=""/30, 0x1e}], 0x1, &(0x7f0000005040)=""/158, 0x9e}, 0x8}, {{&(0x7f0000005100)=@alg, 0x80, &(0x7f0000005280)=[{&(0x7f0000005180)=""/245, 0xf5}], 0x1, &(0x7f00000052c0)=""/149, 0x95}, 0x380000}, {{&(0x7f0000005380)=@generic, 0x80, &(0x7f0000005500)=[{&(0x7f0000005400)=""/221, 0xdd}], 0x1, &(0x7f0000005540)=""/235, 0xeb}, 0x1}], 0x9, 0x12040, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f0000000040)="660f388173ab0fc76fb4360fc9bb25cc00007666ba6b41b000f303c70fae6e2fc0c00f0f2367260f01ca660f38817700c4c2459d78ad", 0x36}], 0x1, 0x53, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x3c8, 0x1f8, 0x110, 0x600, 0x2e0, 0x2e0, 0x2e0, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2}}, {@mac=@random="3c192477987a"}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 'bridge0\x00', 'erspan0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @empty, @dev={0xac, 0x14, 0x14, 0x22}, @broadcast, 0x4, 0x110}}}, {{@arp={@loopback, @private=0xa010102, 0xff, 0xffffff00, 0xd, 0x10, {@mac=@multicast, {[0xff, 0xff, 0x0, 0x0, 0xff]}}, {@empty, {[0x0, 0xff, 0x0, 0x0, 0xff]}}, 0x8, 0x0, 0x0, 0x8, 0x1, 0x5a, 'macvlan0\x00', 'ipvlan0\x00', {0xff}, {}, 0x0, 0x100}, 0xc0, 0xe8}, @unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x2}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xff, 0x0, 0x0, 0x0, {@mac=@link_local, {[0xff]}}, {@mac=@multicast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0xe8}, @unspec=@CLASSIFY={0x28, 'CLASSIFY\x00', 0x0, {0x3}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x418) ioctl$KVM_SET_NESTED_STATE(r4, 0x4080aebf, &(0x7f0000005700)=@vmx={0x0, 0x0, 0x2080, {0x0, 0xf000}, {'\x00', "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a5f2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fe00"}}) openat$dir(0xffffffffffffff9c, &(0x7f00000012c0)='./file0\x00', 0x400280, 0x20) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_syzos_vm$x86(r3, &(0x7f0000000000/0x400000)=nil) r5 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000100)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x40, 0x56a, 0x32a, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x3, [{{0x9, 0x4, 0x0, 0x3, 0x1, 0x3, 0x0, 0x2, 0x0, {0x9, 0x21, 0xffff, 0x3, 0x1, {0x22, 0x3}}, {{{0x9, 0x5, 0x81, 0x3, 0x3ff, 0x2, 0x0, 0x2}}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x68cd42, 0x4) openat$cgroup_ro(r6, &(0x7f0000000900)='net_prio.prioidx\x00', 0x275a, 0xb) write$binfmt_misc(r6, &(0x7f0000001180)="3776c2a0d8ef43f8f8002b77edf9874659fe3ce4dce3918b8e24dcbd31bffb9df01875dc6dff604fa17554f888d0cb8eda64033c72ddc9e51d45971a2a66e42ed874019f6070260a30d15eb4a61793b0acbe694949f563d2b84c0703fee7c2f6145ab74c47f763568e1f34af8219b232c4c4474985f85de036ebd7853f5823a633518ba99ca743978539578372ecbe349f6462bad23d472af67b9ca58e362015af0594b6c99522c101203ab1f5d68601b98a6395a1ef1aa24afec72e28d03045646bf2e489588920c38f275855a775f592ddf5863d497d5e295b48f435da7f7d12b705a14752428e67da269879d50dce7ac2662805a386cfe2", 0xf9) syz_usb_connect$printer(0x2, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0x0, 0x0, 0x0, 0x40, 0x3f0, 0x4, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x7, 0xc0, 0x0, [{{0x9, 0x4, 0x0, 0x3, 0x2, 0x7, 0x1, 0x3, 0x6, "", {{{0x9, 0x5, 0x1, 0x2, 0x8, 0x6, 0x7, 0x1}}, [{{0x9, 0x5, 0x82, 0x2, 0x8, 0x9, 0xfc, 0x2}}]}}}]}}]}}, &(0x7f00000002c0)={0xa, &(0x7f0000000340)={0xa, 0x6, 0x300, 0x80, 0x4, 0x19, 0xff, 0x5}, 0xc, &(0x7f0000000080)={0x5, 0xf, 0xc, 0x1, [@ext_cap={0x7, 0x10, 0x2, 0x1a, 0x1, 0x5, 0xd325}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x2401}}, {0x47, &(0x7f0000000140)=@string={0x47, 0x3, "f9ced4fce8febb323137835e1c73572ddcceea6728a0d38a64e691f2309721839f55f7876762df11153bf8aefd34e9477de29fcff9cea5795fdfde54b17a1d9b39e78f66d6"}}, {0x4, &(0x7f00000001c0)=@lang_id={0x4, 0x3, 0x1407}}, {0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0xc04}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x438}}, {0x25, &(0x7f0000000040)=@string={0x25, 0x3, "8c92455f8401a02877c65a2a5aa3ce3f238ea81d77b075fb89667a53ff2e529455652e"}}]}) syz_usb_control_io(r5, &(0x7f0000000440)={0x2c, &(0x7f0000000380)=ANY=[@ANYBLOB="60071c"], 0x0, 0x0, 0x0, 0x0}, 0x0) 5.625271742s ago: executing program 3 (id=833): syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) r0 = syz_usb_connect$uac1(0x3, 0xc5, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0x0, 0x0, 0x0, 0x10, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xb3, 0x3, 0x1, 0x10, 0x90, 0x9, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x7f, 0x1}, [@mixer_unit={0x5, 0x24, 0x4, 0x6, 0x8}, @output_terminal={0x9, 0x24, 0x3, 0x1, 0x301, 0x1, 0x3, 0x2}, @selector_unit={0xa, 0x24, 0x5, 0x6, 0xc, "73c13659dc"}, @input_terminal={0xc, 0x24, 0x2, 0x3, 0x206, 0x3, 0xfc, 0x9, 0xf9}, @mixer_unit={0xb, 0x24, 0x4, 0x4, 0x15, "b81ccc09cd4b"}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_discrete={0x11, 0x24, 0x2, 0x1, 0x2, 0x2, 0x0, 0x3, "5475ff01d0d45775e7"}]}, {{0x9, 0x5, 0x1, 0x9, 0x8, 0x4, 0x7, 0x4, {0x7, 0x25, 0x1, 0x83, 0x9b, 0x1}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@as_header={0x7, 0x24, 0x1, 0x3, 0x9}, @format_type_i_discrete={0xd, 0x24, 0x2, 0x1, 0x1, 0x1, 0x3, 0x1, "6ab1d77d05"}]}, {{0x9, 0x5, 0x82, 0x9, 0x20, 0x5, 0x1, 0x2, {0x7, 0x25, 0x1, 0x3, 0x6, 0x5}}}}}}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) 3.954183369s ago: executing program 0 (id=834): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x80) close_range(r2, r2, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20) sendmmsg(0xffffffffffffffff, &(0x7f00000030c0), 0x0, 0x9200000000000000) r3 = syz_usb_connect(0x0, 0x36, &(0x7f0000000540)=ANY=[@ANYBLOB="120100009f187620ef170372362e010203010902240001000010000904bc00029e8833000905020200020200000905820220"], 0x0) syz_usb_control_io$rtl8150(r3, 0x0, 0x0) syz_usb_control_io$uac1(r3, 0x0, &(0x7f0000000700)={0x44, &(0x7f0000000500)={0x20, 0xf, 0x2, "5cf0"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$uac1(r3, 0x0, &(0x7f0000000600)={0x44, &(0x7f0000000300)={0x20, 0x13, 0x4, "db8b6c67"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ncm(r3, 0x0, &(0x7f0000000480)={0x44, &(0x7f0000000180)={0x0, 0xa, 0x2, "9c7e"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r3, 0x0, &(0x7f0000000fc0)={0x2c, &(0x7f0000000d40)={0x40, 0xb, 0x2, "b100"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ncm(r3, 0x0, &(0x7f0000000840)={0x44, &(0x7f0000000280)={0x40, 0x11, 0x2, "8309"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_clone(0x1000, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) accept4$nfc_llcp(r2, 0x0, &(0x7f00000000c0), 0x80000) setns(r2, 0x40020000) setuid(0xee00) syz_clone(0x19804100, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x50, 0x0, 0x0, 0x80000006}, {0x6, 0xfa, 0x0, 0x4}]}, 0x10) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[], 0xfdef) 3.950868769s ago: executing program 1 (id=835): socket$inet_udp(0x2, 0x2, 0x0) (async) r0 = socket$inet_udp(0x2, 0x2, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)=0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@empty, @in6=@dev={0xfe, 0x80, '\x00', 0x2f}, 0x20, 0x0, 0x0, 0x0, 0x2, 0x20, 0x20, 0x0, 0x0, r1}, {0x3, 0x0, 0x0, 0x0, 0x3, 0x1, 0x100000001}, {}, 0x4, 0x0, 0x1, 0x0, 0x0, 0x2}, {{@in6=@private0, 0x0, 0x6c}, 0x2, @in6=@mcast2, 0x3501, 0x0, 0x0, 0xb7, 0xffffffff}}, 0xe8) mount$binderfs(0x0, &(0x7f0000000040)='./binderfs\x00', &(0x7f0000000140), 0x4800, &(0x7f00000001c0)={[{@max={'max', 0x3d, 0x5}}, {@stats}]}) 3.950537779s ago: executing program 3 (id=836): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002380), 0xffffffffffffffff) r2 = socket(0x10, 0x3, 0x0) recvmmsg$unix(r2, &(0x7f0000008f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000002c0), 0x4) syz_usb_connect(0x1, 0x3e9, &(0x7f0000000380)={{0x12, 0x1, 0x200, 0xad, 0xba, 0x62, 0xff, 0x1b80, 0xd700, 0x9d76, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3d7, 0x2, 0xff, 0x8, 0x0, 0x4, [{{0x9, 0x4, 0xfd, 0x8, 0xc, 0x3, 0x0, 0x0, 0x6, [], [{{0x9, 0x5, 0x3, 0x2, 0x20, 0x1, 0x3, 0x8}}, {{0x9, 0x5, 0x80, 0x2, 0x200, 0x8, 0x80, 0xaf, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0xb0, 0x7}, @generic={0x54, 0x21, "a6432428c424ec4c8e2bc7c4bf27e9e6fb2217aae63e7ee90ae44104a3d749cd41aa5afab7bc7d35cab9c17dad80d9b5591ad63590f774ce896f12853f745003e75cd3cb3c4b48600fed4dcc0a85bb665799"}]}}, {{0x9, 0x5, 0x8, 0x1, 0x40, 0x4, 0xed, 0x1e}}, {{0x9, 0x5, 0x0, 0x0, 0x40, 0x0, 0x3, 0x4}}, {{0x9, 0x5, 0x5, 0x10, 0x200, 0x40, 0x7, 0x9, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0xd, 0x7}, @generic={0xb2, 0x6, "6ff49a4bb30bdc9ff27186ee840c2ae544094a9e883068623c168f3144d19665a2328c8891afcd4001585b6c9650ea60f184dd8c6fa7ed9a84cb00e01536fc693b85cde7501e0a37cfc15548f1bc7c178c0a245a63bf68da8bd6e0b9dead2e20bcdc62043734d83d8ce231f363684240b49093b6069f58dc4da2e0760141f7341fd7b41fe4fdf420eae3c07b52f5c6d9250950ef423dbad4f3ae29d58be7c4777fd9ab8bef7ddff2bd8bd2798a38217f"}]}}, {{0x9, 0x5, 0x46, 0x10, 0x10, 0xd, 0x4, 0x8, [@generic={0x48, 0x23, "0e8fab36e0626e4112482704f365b21f0ce7a33940686bc37d055f11d617cced9e75506f994c70810102d4266287e270a65edd35bd84020ba4c7ed50061befd79ca7a947b8b3"}, @generic={0x4f, 0x2, "71352f3a0e530a8ea30e3e53be26cfcb9b248c3536e21aae9b74f213f2b5e9a0dca2e92c508ccddfa95f840b9c4033f6a362b3bbe7617fedea62f10a0b72c58e47847cfa0237b2298fea2f5e5f"}]}}, {{0x9, 0x5, 0xa, 0x1, 0x10, 0x4, 0xa, 0x1, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0x7, 0x6}, @uac_iso={0x7, 0x25, 0x1, 0x1, 0x4, 0x7f}]}}, {{0x9, 0x5, 0x4, 0x10, 0x400, 0x7f, 0x9, 0x5a}}, {{0x9, 0x5, 0xc, 0x2, 0x8, 0xdf, 0xfd, 0x3}}, {{0x9, 0x5, 0xc, 0x1c, 0x400, 0x0, 0x5, 0x4, [@generic={0x99, 0xa, "68e8d9da86bb1da1b4cbad6ec40d6a8db7719286bd460c4a87d2823cea1a420435e1a2557980e73cfbb2b69391a9f87849de81cad5e74d5762da918e5f6261e3c312dec69c40d9bb4951f6918bc5402089a6bd0586eaaf554d9f08993db79724ad27ae868ac862f7cfec88b9cb646c209dcd7d42d85a00e9e09eff9c7010a36f008a9756da84811e059401ad85d4af3eb9281422a83034"}]}}, {{0x9, 0x5, 0x7, 0xc, 0x8, 0x7, 0x1, 0x5, [@uac_iso={0x7, 0x25, 0x1, 0x83, 0x3, 0x8}, @uac_iso={0x7, 0x25, 0x1, 0x2, 0x3, 0x5b5a}]}}, {{0x9, 0x5, 0x0, 0x4, 0x20, 0xa9, 0x7, 0xf}}]}}, {{0x9, 0x4, 0x4, 0x2, 0x2, 0xaf, 0xd, 0x7f, 0x80, [], [{{0x9, 0x5, 0x0, 0x0, 0x40, 0x80, 0x0, 0x2, [@generic={0x38, 0x6, "afb7f1e744d18922f013842142e45f103f4798a6b418bd304f05be392bee5c30f3ae8dd629cd53e7350290196c713523aaaf8997ff91"}, @uac_iso={0x7, 0x25, 0x1, 0x3, 0x86, 0xfff}]}}, {{0x9, 0x5, 0xf, 0x10, 0x40, 0x1, 0x1, 0xb3, [@generic={0x92, 0x6, "7381ecceeffffd7a48c5256fbb1e55cbd0065ae0d2a7a3c502230577aeac4a99a59bc7c21f97f9f2a2fac0aee2c03d3a5370e3b6680e3a51faf451c38a10d9a9a3b29646d23de7983f7a16c7443f88b01b3702d8ec1ecb74991cd12dc4af5cd32c6301d6fa7a8288633fd0bfc79e3f87326579c80694fa03184dd4d4dd3892295ea77edc7812448ec80d2aba37e2eca1"}, @generic={0xd, 0x4, "865dc5c39ca01528479c31"}]}}]}}]}}]}}, &(0x7f0000000180)={0xa, &(0x7f00000000c0)={0xa, 0x6, 0x200, 0x2, 0x5, 0x21, 0x40, 0x1}, 0x1e6, &(0x7f0000000780)={0x5, 0xf, 0x1e6, 0x6, [@ptm_cap={0x3}, @generic={0xe7, 0x10, 0xb, "38f47763fd75773298a2bc08219c01b8af7a966051eb69373e0e9fe6d92441ab17132dc3054e55f59b2d40d7ee0d6cbc7c3f53a3c50e50591df23be1a9cae15d3efa9f87a5237c42aef81e794a057c47ac1b9ad32e0518397cb9ada06fcf4808d22b7ff11334d99fb73e5f36c59cdf009b54c2691aff807f14219865bb98f2bded8b6543053d1f207204d84be68fd19e4f076d8255aa614a835fac76eba1752ecf054b034f217ac4ad9bfd4c00f0e99d2ebd14b364388976b5e106c7e4d9f21a59836fe1b09539e5feea61fc17e11f4041c9ae6909080c2e29d49597b235d0b3a5181e2e"}, @generic={0xdb, 0x10, 0x4, "7b34d1d3906f230f6834b321e5ce6727089f2002fa9f7939bdff2473d85db97dd3484c7899a6e2d48871df3a62bd395a3108b438d08c3f48992aec9b750fa67829e119a4472f778478a04ab6d8d780ba3fc0dc9cdb983ae944ebd3794cceef230f38621e59b585c68d73f0d99af15cf7f15723bc30eec53b8c9babfaad34f338d4abcccfd7771d464d142abf4c05b49bdc7be419e7d9d51dd54be528f3468e3f9582f0af6bbbb3e96aba179f9f0e0527ca91f2022e30376a9e85d7d0902c53b0b07fc9fa9cc6d931536d514e9493d22ed1356e372a7aa878"}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0xd, 0x7, 0x240}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x4, 0x5, 0xc, 0x8}, @wireless={0xb, 0x10, 0x1, 0x2, 0x24, 0x3, 0x2, 0x3, 0x2}]}, 0x1, [{0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x3cf5}}]}) r4 = fcntl$dupfd(r3, 0x0, r3) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x2, &(0x7f0000000100)=@ccm_128={{0x304}, "2697312e4e898ca7", "35e23ca3a988def7dfbd438c536346cd", "11398f4a", "50cc97386065eda9"}, 0x28) prctl$PR_SCHED_CORE(0x3a, 0x1, 0x0, 0x2, 0x0) write(r2, &(0x7f0000000100)="1400000052004f7fb3e4bf80a000080000000000", 0x14) bind$inet(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) setuid(0xee00) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000002c0)={0x7, 0x4000, 0x0, 0xffffffffffffffff, 0x9}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)=0x1, 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_procs(r6, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f00000001c0), 0x12) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000023c0)={'veth1_to_batadv\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000002580)={0x0, 0x0, &(0x7f0000002540)={&(0x7f0000000340)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @ETHTOOL_A_FEATURES_WANTED={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}]}]}, 0x34}}, 0x0) 3.92960347s ago: executing program 1 (id=837): r0 = syz_open_dev$usbmon(&(0x7f00000005c0), 0x0, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000001, 0x13, r0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0xe83ff) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000009) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000380)=@newsa={0x1e0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote, 0x4e21}, {@in6=@remote, 0x0, 0x32}, @in6=@mcast1, {}, {}, {}, 0x0, 0x3, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0xa6, 0x14, {{'cmac(aes)\x00'}, 0x2d0, 0x0, "0a55b0ca9cce75f5c9b871603e40f7ec06ed1bda65dee2e1f2a3655cf644f778cddef1f44b15cc4892dfbaa7c335d5e935f6228bc99453742e8bb6921f83c77aa41af916fa7074e02ebebd831b4814bd3f84ed8303ab15641a03"}}]}, 0x1e0}}, 0x1) socket$nl_xfrm(0x10, 0x3, 0x6) 2.014594212s ago: executing program 0 (id=838): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x100000}) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000005c0), 0x2010800, 0x0) prlimit64(0x0, 0x1, &(0x7f0000000140)={0x8, 0x80000100008b}, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000240)="1d"}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x8c) r2 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0x0, 0x130) ioctl$TIOCL_GETKMSGREDIRECT(r2, 0xc058671e, &(0x7f00000000c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x47) setsockopt$inet_tcp_int(r4, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000340)=[@sack_perm, @window={0x3, 0x6, 0x7}, @mss={0x2, 0x7}, @window={0x3, 0x0, 0x4}, @window={0x3, 0x8, 0x6}, @timestamp, @window={0x3, 0xfffe}, @sack_perm], 0x200000000000005e) sendto$inet(r4, &(0x7f00000001c0)="6c68e5f9", 0x4, 0x24048015, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000000), 0x4) sendto$inet(r4, &(0x7f00000004c0)='<', 0x381, 0x805, 0x0, 0x0) getsockopt$sock_linger(r3, 0x1, 0xd, 0x0, &(0x7f0000000140)) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000480), 0x2, 0x0) write$UHID_CREATE2(r5, 0x0, 0x3000000) syz_usb_connect$uac1(0x0, 0xad, &(0x7f0000000200)=ANY=[@ANYBLOB="12010000000000106b1d010140000102030109029b0003010000000904000000010100000a2401000001020102092408000000004c58062404000052072405000053f10b24050000133b9bda531c092405000596efc359090401000001020000090401010101020000090501090000010000072501000300000904020000010200000904020101010200000b2402017f020001264e37072401000008000905820910"], 0x0) 2.012199173s ago: executing program 1 (id=839): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000740)={0xffffffff, {{0x2, 0x0, @multicast2}}}, 0x90) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="10002dbd7000fedbdf25010000000900030073797a320000000014000200726f736530000000000000000000000005000400020000000900010073797a31000000000900010073797a32000000000900030073797a3200000000"], 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x84) r3 = syz_clone(0x80151411, 0x0, 0xffffffffffffffd3, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000080), 0x4000, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x28001, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='maps\x00') preadv(r4, &(0x7f0000000480)=[{&(0x7f0000000200)=""/157, 0x9d}], 0x1, 0x1, 0x0) r5 = syz_open_procfs$pagemap(r3, &(0x7f00000002c0)) poll(&(0x7f0000000040)=[{r5, 0x42}], 0x1ffffffffffffd89, 0x138) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ptrace$getregs(0xc, r3, 0x7, &(0x7f00000001c0)=""/128) r7 = epoll_create1(0x80000) r8 = fcntl$dupfd(r6, 0x406, r7) r9 = openat$rnullb(0xffffffffffffff9c, &(0x7f0000001140), 0x60a00, 0x0) ioctl$IOC_PR_PREEMPT(r9, 0x401870cb, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5) connect$inet6(r8, 0x0, 0x0) accept$inet6(r8, 0x0, 0x0) 3.564699ms ago: executing program 0 (id=840): r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x80042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) setsockopt$inet6_buf(r2, 0x29, 0x6, &(0x7f0000000040)="91", 0x1) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f0000000a80)={0x1, 0x2, 0x1000, 0x0, 0x0, 0x100000, 0x0, 0x0}) r3 = syz_open_procfs$pagemap(0xffffffffffffffff, &(0x7f0000000140)) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x80, &(0x7f00000002c0)={[{@noswap}]}) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4002a, &(0x7f0000000000)={[{@noswap}]}) ioctl$PAGEMAP_SCAN(r3, 0xc0606610, &(0x7f0000000240)={0x60, 0x4000000, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, 0x4, 0x0, 0x0, 0x8, 0x40, 0x15, 0x4d}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x40400, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@version_9p2000}, {@msize={'msize', 0x3d, 0x4}}, {@cache_none}, {@aname={'aname', 0x3d, '$'}}, {@uname={'uname', 0x3d, '\x00'}}, {@noxattr}, {@privport}, {@posixacl}], [{@appraise_type}, {@context={'context', 0x3d, 'user_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fsmagic}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/ptp0\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x31, 0x36, 0x19, 0x35, 0x38, 0x62, 0x34], 0x2d, [0x66, 0x30, 0x37, 0x66], 0x2d, [0x64, 0x36, 0x36, 0x39], 0x2d, [0x63, 0x63, 0x36, 0x31], 0x2d, [0x32, 0x66, 0xced695e891df408, 0x61, 0x3f, 0x32, 0x32, 0x34]}}}, {@smackfshat={'smackfshat', 0x3d, '-%$\'-(-'}}, {@dont_measure}, {@euid_lt}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}}) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f0000000040)={{0x0, 0x45}, {0x0, 0xfffffffe}, 0xfffffe29, 0x1}) 2.487439ms ago: executing program 1 (id=841): r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x18, 0x1, 0x0, {0x7fff}}, 0x18) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000080)) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x8}) r2 = dup3(r1, r0, 0x0) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f0000000600)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000140)={0x480, 0x1, 0x3, 0x3, 0x0, 0x0, {0x5, 0x0, 0x3}, [@NFQA_EXP={0x78, 0xf, 0x0, 0x1, [@CTA_EXPECT_MASTER={0x6c, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x14, 0x4, @private0}}}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x2}]}, @NFQA_VLAN={0x14, 0x13, 0x0, 0x1, [@NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x200}, @NFQA_VLAN_TCI={0x6}]}, @NFQA_CT={0x6c, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x24, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x401}, @CTA_SYNPROXY_ITS={0x8}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xffffff6c}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0xfb}]}, @CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0xd0}]}, @CTA_PROTOINFO={0x38, 0x4, 0x0, 0x1, @CTA_PROTOINFO_SCTP={0x34, 0x3, 0x0, 0x1, [@CTA_PROTOINFO_SCTP_STATE={0x5}, @CTA_PROTOINFO_SCTP_VTAG_REPLY={0x8, 0x3, 0x1, 0x0, 0x9}, @CTA_PROTOINFO_SCTP_VTAG_ORIGINAL={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_PROTOINFO_SCTP_VTAG_REPLY={0x8, 0x3, 0x1, 0x0, 0x5}, @CTA_PROTOINFO_SCTP_VTAG_ORIGINAL={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_PROTOINFO_SCTP_STATE={0x5, 0x1, 0xc}]}}]}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffb, 0x6}}, @NFQA_CT={0x138, 0xb, 0x0, 0x1, [@CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}, @CTA_NAT_DST={0xc4, 0xd, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @empty}, @CTA_NAT_PROTO={0x3c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e23}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e24}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e22}]}, @CTA_NAT_PROTO={0xc, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e23}]}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @mcast2}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @dev={0xfe, 0x80, '\x00', 0x14}}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}, @CTA_NAT_PROTO={0x34, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e21}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e23}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e20}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e24}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}]}]}, @CTA_STATUS_MASK={0x8}, @CTA_TUPLE_ORIG={0xc, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2007}, @CTA_PROTOINFO={0x40, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0x3c, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_WSCALE_ORIGINAL={0x5, 0x2, 0xb8}, @CTA_PROTOINFO_TCP_STATE={0x5, 0x1, 0x5}, @CTA_PROTOINFO_TCP_STATE={0x5, 0x1, 0x8}, @CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x7f}}, @CTA_PROTOINFO_TCP_FLAGS_ORIGINAL={0x6, 0x4, {0xd, 0x5}}, @CTA_PROTOINFO_TCP_FLAGS_ORIGINAL={0x6, 0x4, {0xc, 0x4}}, @CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x6, 0xe}}]}}]}, @NFQA_PAYLOAD={0xe4, 0xa, "f3553d4e78d60f187cf37a90591935ebfddd667e7f93c1bb98ffaac303071a444e49b6cdbdeb3d62f65538c2b806edfd59acdb1d6dbb77680677f90de2d17e0c29a2de9bd8bdf2280e1ab46ab813f008c3f08e25b1891a50793b8adbc01bfec2b4cc0c9e8525fff70de5a939fa643d9887f79f96249848c16ce6d813345dd54755ac556dccbc8db513be2ecb49f3b6b0fcc74d6c1fa4f3c14c5a741c075c98c29a91e562ea17fb7a2f2a3dbdddc65da48a9d1a1b0f3115ac051e89bf322f2c68809b18f398fd7f6b949fc35b15ff185b889d424a53104cc9b1229444dae3a4bd"}, @NFQA_EXP={0x14c, 0xf, 0x0, 0x1, [@CTA_EXPECT_MASTER={0x2c, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @broadcast}}}]}, @CTA_EXPECT_MASK={0x1c, 0x3, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @CTA_EXPECT_MASTER={0x4c, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_TUPLE={0xac, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x35}}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @private2}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @empty}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0xfffffffc}]}]}, 0x480}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) r3 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000000640), 0x1, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r3, 0xf504, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f0000000680)) setsockopt$inet_opts(r2, 0x0, 0xd, &(0x7f00000006c0)="f15ea07b89eaed58aee9f50cfd1aeadad473e31ce15548c11b61a8c61067d3026f1ecedd7cf7baeab9c0a1c24223d56a7e30753fcee5e30b412debd9a979ca4a139fbc44dc7b0e703de02499ebd8101fa65c3f1d1b42191b44d026b638", 0x5d) ioctl$NS_GET_PARENT(r2, 0xb702, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000780), r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000007c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r2, &(0x7f0000000ac0)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000a80)={&(0x7f0000000800)={0x248, r4, 0x400, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x5, 0x55}}}}, [@NL80211_ATTR_BSS_BASIC_RATES={0x24, 0x24, [{0x9}, {0x5, 0x1}, {0x9}, {0x6}, {0xb, 0x1}, {0x30, 0x1}, {0x48}, {0x2}, {0x30, 0x1}, {0x6, 0x1}, {0xb, 0x1}, {0x30, 0x1}, {0xb}, {0x48}, {0x9}, {0x4}, {0x60, 0x1}, {0x30, 0x1}, {0x4, 0x1}, {0xb, 0x1}, {0x48}, {0xb, 0x1}, {0x18, 0x1}, {0x1b}, {0x48}, {0x4}, {0x2, 0x1}, {0x4, 0x1}, {0xc, 0x1}, {0x1, 0x1}, {0x1b, 0x1}, {0x24, 0x1}]}, @NL80211_ATTR_TX_RATES={0x1a8, 0x5a, 0x0, 0x1, [@NL80211_BAND_6GHZ={0xc, 0x3, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x2}]}, @NL80211_BAND_2GHZ={0x28, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HT={0x8, 0x2, [{0x7, 0x5}, {0x6, 0x7}, {0x1, 0x5}, {0x0, 0x7}]}, @NL80211_TXRATE_HE_LTF={0x5, 0x7, 0x2}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0xbe, 0xfff8, 0x7, 0x800, 0x6df3, 0x9, 0x9]}}]}, @NL80211_BAND_6GHZ={0x3c, 0x3, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_LEGACY={0x6, 0x1, [0x30, 0x36]}, @NL80211_TXRATE_HE={0x14, 0x5, {[0xd, 0xfffb, 0x18c, 0x9, 0x1ff, 0x9, 0x0, 0xee1]}}, @NL80211_TXRATE_LEGACY={0xc, 0x1, [0x16, 0x3, 0x30, 0x60, 0xc, 0x6, 0xc, 0x6]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_60GHZ={0x6c, 0x2, 0x0, 0x1, [@NL80211_TXRATE_HT={0x32, 0x2, [{0x1, 0xa}, {0x6, 0x4}, {0x5}, {0x6, 0x1}, {0x6, 0x8}, {0x0, 0x1}, {0x0, 0x2}, {0x2, 0x4}, {0x4, 0x3}, {0x1, 0x8}, {0x0, 0x1}, {0x0, 0x5}, {0x4, 0x2}, {0x7, 0x7}, {0x5, 0x2}, {0x3, 0x4}, {0x5, 0x2}, {0x2, 0x9}, {0x7, 0x4}, {0x3, 0x5}, {0x1, 0x6}, {0x4, 0x4}, {0x3, 0x8}, {0x3, 0x7}, {0x3, 0x7}, {0x2, 0x7}, {0x2, 0xa}, {0x0, 0x6}, {0x0, 0x1}, {0x6, 0x3}, {0x4, 0x4}, {0x2, 0x8}, {0x1, 0xa}, {}, {0x4}, {0x7, 0x5}, {0x0, 0x2}, {0x7, 0x5}, {0x3, 0x9}, {0x3, 0x7}, {0x5, 0x2}, {0x0, 0x5}, {0x7, 0x8}, {0x5, 0x9}, {0x0, 0x4}, {0x4, 0x2}]}, @NL80211_TXRATE_HE_LTF={0x5, 0x7, 0x2}, @NL80211_TXRATE_HE_LTF={0x5}, @NL80211_TXRATE_HE_GI={0x5, 0x6, 0x1}, @NL80211_TXRATE_HE={0x14, 0x5, {[0x6, 0x3, 0xffc0, 0x8ae, 0x4, 0x1, 0x1ff, 0x1f68]}}, @NL80211_TXRATE_HE_GI={0x5}]}, @NL80211_BAND_6GHZ={0xc, 0x3, 0x0, 0x1, [@NL80211_TXRATE_HE_LTF={0x5, 0x7, 0x2}]}, @NL80211_BAND_2GHZ={0x14, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HE_LTF={0x5, 0x7, 0x2}, @NL80211_TXRATE_HE_GI={0x5}]}, @NL80211_BAND_60GHZ={0x6c, 0x2, 0x0, 0x1, [@NL80211_TXRATE_HT={0x39, 0x2, [{0x4, 0x9}, {0x4, 0x7}, {0x3, 0x7}, {0x4, 0x1}, {0x2, 0x4}, {0x1, 0x4}, {0x3, 0xa}, {0x4, 0x5}, {0x6}, {0x3, 0x1}, {0x0, 0x2}, {0x1, 0x5}, {0x1, 0xa}, {0x1, 0x7}, {0x7, 0x8}, {0x6, 0x4}, {0x2, 0x9}, {0x4, 0x2}, {0x0, 0x9}, {0x0, 0x3}, {0x6, 0x8}, {0x6, 0xa}, {0x5, 0x3}, {0x5, 0x5}, {0x3, 0x7}, {0x2, 0x2}, {0x5, 0x5}, {0x7, 0x4}, {0x0, 0x1}, {0x6, 0x4}, {0x1, 0xa}, {0x0, 0x3}, {0x3, 0x1}, {0x6, 0x7}, {0x4, 0x6}, {0x6}, {0x1, 0x6}, {0x4, 0x9}, {0x7, 0x1}, {0x2, 0xa}, {0x0, 0x7}, {0x7, 0x9}, {0x4, 0x5}, {0x1, 0x6}, {0x1, 0x5}, {0x0, 0x6}, {0x1}, {0x4, 0x2}, {0x5, 0xa}, {0x6, 0x9}, {0x4, 0x5}, {0x1}, {0x2, 0xa}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x8, 0x0, 0x1, 0x4, 0x4, 0xc, 0xc4e4, 0x7ff]}}, @NL80211_TXRATE_HE_GI={0x5, 0x6, 0x1}, @NL80211_TXRATE_HE_GI={0x5}]}, @NL80211_BAND_60GHZ={0x3c, 0x2, 0x0, 0x1, [@NL80211_TXRATE_HT={0xc, 0x2, [{0x5, 0x2}, {0x4, 0x9}, {0x1, 0xa}, {0x6, 0x1}, {0x0, 0x2}, {0x1, 0x1}, {0x7}, {0x1, 0x4}]}, @NL80211_TXRATE_HE_GI={0x5, 0x6, 0x2}, @NL80211_TXRATE_HE_LTF={0x5, 0x7, 0x1}, @NL80211_TXRATE_HE={0x14, 0x5, {[0x9, 0x1, 0x6, 0x1, 0x1, 0x9, 0x7f, 0xe]}}, @NL80211_TXRATE_HE_LTF={0x5, 0x7, 0x1}]}]}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_CONFIRM_TIMEOUT={0x6, 0x2, 0xc2}, @NL80211_MESHCONF_MAX_PEER_LINKS={0x6, 0x4, 0x66}, @NL80211_MESHCONF_GATE_ANNOUNCEMENTS={0x5}, @NL80211_MESHCONF_HWMP_PATH_TO_ROOT_TIMEOUT={0x8, 0x17, 0x5b3}, @NL80211_MESHCONF_HWMP_ROOT_INTERVAL={0x6, 0x18, 0x8}, @NL80211_MESHCONF_ELEMENT_TTL={0x5, 0xf, 0x7}, @NL80211_MESHCONF_HWMP_ROOT_INTERVAL={0x6, 0x18, 0xd}, @NL80211_MESHCONF_HWMP_MAX_PREQ_RETRIES={0x5, 0x8, 0x80}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x6}, @NL80211_MESHCONF_NOLEARN={0x5, 0x1e, 0x1}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x10}, 0x20000800) fsetxattr$trusted_overlay_opaque(r3, &(0x7f0000000b00), &(0x7f0000000b40), 0x2, 0x0) sendmsg$OSF_MSG_REMOVE(r2, &(0x7f00000010c0)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001080)={&(0x7f0000000bc0)={0x4bc, 0x1, 0x5, 0x801, 0x0, 0x0, {0x1, 0x0, 0x8}, [{{0x254, 0x1, {{0x1, 0x4}, 0x9, 0x3, 0x7edd, 0xfff5, 0x26, 'syz1\x00', "da0e24f7f49d3434365e42e1c8480a2f7ea379dbc84ae19cd370679e7eee92ed", "167c74eed026ba7720aeebd36d6d46dff81da55059b0c392fb91f32746c510c1", [{0x0, 0x400, {0x3, 0x100}}, {0x5, 0x6}, {0x0, 0xd, {0x2, 0x3}}, {0xff, 0x9, {0x1}}, {0x78, 0x40, {0x1, 0x7}}, {0x3, 0x5, {0x3, 0x5}}, {0x7, 0x101, {0x0, 0xe5}}, {0xff, 0x6, {0x1, 0x8}}, {0x4, 0x2, {0x2, 0x100}}, {0x8000, 0x9, {0x2, 0x400}}, {0x2, 0x9, {0x2, 0x10000}}, {0xd9d5, 0x2, {0x2, 0xcd}}, {0xfd9a, 0x2, {0x0, 0x9}}, {0x4, 0xbc, {0x1, 0x1}}, {0x6, 0x800, {0x2, 0x5}}, {0x6, 0x5, {0x0, 0x64d}}, {0xfe01, 0x9, {0x1, 0x2eed033e}}, {0x9, 0x9, {0x2, 0x9}}, {0x87, 0x6, {0x0, 0x99fa}}, {0x0, 0x7, {0x3, 0x401}}, {0xfffa, 0xb43a, {0x3, 0xd8}}, {0x2, 0x8}, {0x8001, 0x9, {0x2, 0x5}}, {0x4, 0x8, {0x0, 0x7}}, {0x9, 0x2, {0x1, 0x2}}, {0x3, 0x7fd3, {0x37f6471d2112030e}}, {0x0, 0x9, {0x3}}, {0x7, 0xff00, {0x0, 0x100}}, {0x3, 0x67, {0x1, 0x6}}, {0x6, 0x3, {0x3, 0xa7}}, {0x7, 0x6, {0x0, 0x3}}, {0x6, 0x3, {0x3, 0x80000000}}, {0x0, 0x2, {0x3, 0x246}}, {0x3, 0x6, {0x0, 0x9}}, {0x1ff, 0xfff3, {0x1, 0x2}}, {0x8, 0xd, {0x1, 0x27}}, {0xef8, 0x9, {0x0, 0x5}}, {0x3000, 0x5, {0x3, 0x8000}}, {0x0, 0x7, {0x2, 0x259}}, {0x4, 0xffff, {0x2, 0x9}}]}}}, {{0x254, 0x1, {{0x3, 0xffffffff}, 0xf7, 0x5, 0xfffc, 0x200, 0x21, 'syz1\x00', "e05f260e620312358a2334e1fde23a0fcaeb145d87b03e854ca78e0c23e22b6c", "3485979208e2b3a2f2639894f9287fb6a2d685b118748f13a3d421e47417d22d", [{0x10, 0x5, {0x0, 0x8}}, {0xb7, 0x1ff, {0x1, 0x3}}, {0x6, 0x4, {0x1, 0x3}}, {0xd, 0x7, {0x2, 0x9}}, {0x6, 0x7, {0x1, 0x3}}, {0x6, 0x4, {0x2, 0x6b5}}, {0xa1, 0x875f, {0x1, 0x1}}, {0x2, 0x40, {0x0, 0x1}}, {0xf, 0x2, {0x3, 0xffffffcf}}, {0xec02, 0x3, {0x0, 0x4}}, {0x9, 0x7, {0x3}}, {0x400, 0x0, {0x3, 0x7}}, {0x5, 0xcda8, {0x1, 0xfff}}, {0x0, 0xd5f9, {0x2, 0x6}}, {0x6, 0x800, {0x3, 0x6}}, {0x6, 0x7, {0x3, 0x1}}, {0xa, 0x88, {0x1, 0x240}}, {0x800, 0x7fff, {0x2, 0x9}}, {0x8, 0x8000, {0x2, 0xa}}, {0xfffb, 0x1, {0x2, 0x1}}, {0x1, 0x1, {0x2, 0x4}}, {0x6, 0x1, {0x1, 0x8001}}, {0x3ff, 0x3ff, {0x1, 0x5}}, {0x1ff, 0x2, {0x3, 0x7edb}}, {0x2, 0x7, {0x3, 0x779}}, {0xfff, 0x1, {0x3, 0x2}}, {0x5, 0x1, {0x0, 0x100}}, {0xc, 0x800, {0x2, 0x2}}, {0x4, 0xf28a, {0x3, 0xffffffff}}, {0xffff, 0x4e2, {0x1, 0x4}}, {0x431f, 0x7, {0x3}}, {0xffff, 0x7, {0x2, 0x3ff000}}, {0x8001, 0x7, {0x1, 0x1}}, {0x3, 0x7, {0x3, 0x80}}, {0x7, 0x1, {0x5, 0x7}}, {0x9, 0x1ff, {0x48e6727c75febe3e, 0x9}}, {0x3, 0x1, {0x1}}, {0x200, 0x9, {0x0, 0x3c25}}, {0x2d, 0x3, {0x3, 0x4}}, {0x9, 0x8}]}}}]}, 0x4bc}, 0x1, 0x0, 0x0, 0x40000}, 0x814) setsockopt$inet6_opts(r2, 0x29, 0x39, &(0x7f0000001100)=@hopopts={0x0, 0x7, '\x00', [@calipso={0x7, 0x10, {0x1, 0x2, 0xf, 0x40, [0x5]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x3, 0x4, [0x4]}}, @hao={0xc9, 0x10, @remote}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}]}, 0x48) ftruncate(0xffffffffffffffff, 0x6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000001180)={0x4, 0x200}) ioctl$HIDIOCGDEVINFO(r2, 0x801c4803, &(0x7f00000011c0)=""/4096) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f00000021c0)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x6, "9957d6bfbe9dfd"}) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f00000031c0)={r6, 0xcba}) getsockopt$sock_buf(r2, 0x1, 0x1c, &(0x7f00000041c0)=""/36, &(0x7f0000004200)=0x24) ioctl$RTC_WIE_ON(r2, 0x700f) setsockopt$TIPC_MCAST_REPLICAST(r2, 0x10f, 0x86) setsockopt$inet_mreqsrc(r2, 0x0, 0x28, &(0x7f0000004240)={@local, @local, @private=0xa010101}, 0xc) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f00000042c0), r2) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r2, &(0x7f0000004380)={&(0x7f0000004280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000004340)={&(0x7f0000004300)={0x1c, r7, 0x20, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040055}, 0x40810) 0s ago: executing program 3 (id=842): syz_clone(0x2011, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000400)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x50, 0x0, &(0x7f0000000380)="de547e22bade76f1a03b79e954ee20bc43f7fe47218a02ff8ba942478a7b69462fc21aff55002ce55e854564e7d309f20d222f9220c8d9b1b0d196137252587ab17948adf2dcbba03d2f3e0e647c2e70"}) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.75' (ED25519) to the list of known hosts. [ 21.016325][ T36] audit: type=1400 audit(1770515817.590:64): avc: denied { mounton } for pid=283 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.019272][ T283] cgroup: Unknown subsys name 'net' [ 21.039106][ T36] audit: type=1400 audit(1770515817.600:65): avc: denied { mount } for pid=283 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.066435][ T36] audit: type=1400 audit(1770515817.620:66): avc: denied { unmount } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.066963][ T283] cgroup: Unknown subsys name 'devices' [ 21.169042][ T283] cgroup: Unknown subsys name 'hugetlb' [ 21.174661][ T283] cgroup: Unknown subsys name 'rlimit' [ 21.269253][ T36] audit: type=1400 audit(1770515817.850:67): avc: denied { setattr } for pid=283 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.292434][ T36] audit: type=1400 audit(1770515817.850:68): avc: denied { mounton } for pid=283 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 21.317280][ T36] audit: type=1400 audit(1770515817.850:69): avc: denied { mount } for pid=283 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.326171][ T285] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 21.349191][ T36] audit: type=1400 audit(1770515817.930:70): avc: denied { relabelto } for pid=285 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.366029][ T283] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.374595][ T36] audit: type=1400 audit(1770515817.930:71): avc: denied { write } for pid=285 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.408960][ T36] audit: type=1400 audit(1770515817.940:72): avc: denied { read } for pid=283 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.434524][ T36] audit: type=1400 audit(1770515817.940:73): avc: denied { open } for pid=283 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.219796][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.226910][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.234242][ T290] bridge_slave_0: entered allmulticast mode [ 22.240595][ T290] bridge_slave_0: entered promiscuous mode [ 22.247186][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.254239][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.261381][ T290] bridge_slave_1: entered allmulticast mode [ 22.267689][ T290] bridge_slave_1: entered promiscuous mode [ 22.324699][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.331817][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.339026][ T291] bridge_slave_0: entered allmulticast mode [ 22.345245][ T291] bridge_slave_0: entered promiscuous mode [ 22.351686][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.358799][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.365976][ T291] bridge_slave_1: entered allmulticast mode [ 22.372212][ T291] bridge_slave_1: entered promiscuous mode [ 22.413688][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.420769][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.427953][ T293] bridge_slave_0: entered allmulticast mode [ 22.434209][ T293] bridge_slave_0: entered promiscuous mode [ 22.443084][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.450400][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.457484][ T293] bridge_slave_1: entered allmulticast mode [ 22.463678][ T293] bridge_slave_1: entered promiscuous mode [ 22.484457][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.491573][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.498680][ T292] bridge_slave_0: entered allmulticast mode [ 22.504937][ T292] bridge_slave_0: entered promiscuous mode [ 22.513901][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.521007][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.528095][ T292] bridge_slave_1: entered allmulticast mode [ 22.534419][ T292] bridge_slave_1: entered promiscuous mode [ 22.590692][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.597777][ T290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.605095][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.612146][ T290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.706472][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.713576][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.720922][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.727994][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.737596][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.744659][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.751974][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.759027][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.769600][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.776658][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.783992][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.791049][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.800259][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.807546][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.814705][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.822226][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.829892][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.837288][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.844434][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.851765][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.884080][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.891167][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.900547][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.907607][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.933114][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.940215][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.962490][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.969588][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.978036][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.985070][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.992841][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.999918][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.029855][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.036932][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.045765][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.052836][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.078766][ T290] veth0_vlan: entered promiscuous mode [ 23.092152][ T291] veth0_vlan: entered promiscuous mode [ 23.110222][ T293] veth0_vlan: entered promiscuous mode [ 23.115962][ T290] veth1_macvtap: entered promiscuous mode [ 23.135730][ T292] veth0_vlan: entered promiscuous mode [ 23.142423][ T291] veth1_macvtap: entered promiscuous mode [ 23.172795][ T293] veth1_macvtap: entered promiscuous mode [ 23.181446][ T292] veth1_macvtap: entered promiscuous mode [ 23.218437][ T291] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 23.276289][ T333] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 23.372198][ T350] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2816 sclass=netlink_route_socket pid=350 comm=syz.3.7 [ 23.536821][ T330] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 23.676967][ T45] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 23.688146][ T330] usb 2-1: config 0 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 16 [ 23.698152][ T330] usb 2-1: config 0 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 64 [ 23.706950][ T67] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 23.711708][ T330] usb 2-1: New USB device found, idVendor=0a46, idProduct=9621, bcdDevice=4f.32 [ 23.724792][ T330] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 23.732838][ T330] usb 2-1: Product: syz [ 23.737188][ T330] usb 2-1: Manufacturer: syz [ 23.741781][ T330] usb 2-1: SerialNumber: syz [ 23.748253][ T330] usb 2-1: config 0 descriptor?? [ 23.754095][ T335] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 23.761814][ T335] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 23.828207][ T45] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 23.839566][ T45] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 23.849561][ T45] usb 4-1: New USB device found, idVendor=10c4, idProduct=ea90, bcdDevice= 0.00 [ 23.858695][ T45] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 23.866828][ T67] usb 1-1: Using ep0 maxpacket: 32 [ 23.873054][ T45] usb 4-1: config 0 descriptor?? [ 23.878453][ T67] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 23.889469][ T67] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 23.900280][ T67] usb 1-1: New USB device found, idVendor=046d, idProduct=c31c, bcdDevice= 0.40 [ 23.910429][ T67] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 23.919665][ T67] usb 1-1: config 0 descriptor?? [ 23.926482][ T67] hub 1-1:0.0: USB hub found [ 23.972767][ T335] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 23.980060][ T335] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 24.125416][ T67] hub 1-1:0.0: config failed, hub doesn't have any ports! (err -19) [ 24.213827][ T361] netlink: 12 bytes leftover after parsing attributes in process `syz.2.10'. [ 24.224979][ T361] tipc: Started in network mode [ 24.230356][ T361] tipc: Node identity ac1414aa, cluster identity 4711 [ 24.237360][ T361] tipc: Enabling of bearer rejected, failed to enable media [ 24.292942][ T45] cp2112 0003:10C4:EA90.0001: unknown main item tag 0x0 [ 24.300012][ T45] cp2112 0003:10C4:EA90.0001: unknown main item tag 0x0 [ 24.308976][ T45] cp2112 0003:10C4:EA90.0001: unknown main item tag 0x0 [ 24.316023][ T45] cp2112 0003:10C4:EA90.0001: unknown main item tag 0x0 [ 24.323064][ T45] cp2112 0003:10C4:EA90.0001: unknown main item tag 0x0 [ 24.330934][ T45] cp2112 0003:10C4:EA90.0001: unknown main item tag 0x0 [ 24.338137][ T45] cp2112 0003:10C4:EA90.0001: unknown main item tag 0x0 [ 24.346127][ T45] cp2112 0003:10C4:EA90.0001: hidraw0: USB HID v0.00 Device [HID 10c4:ea90] on usb-dummy_hcd.3-1/input0 [ 24.361005][ T67] hid-generic 0003:046D:C31C.0002: hidraw1: USB HID v8.00 Device [HID 046d:c31c] on usb-dummy_hcd.0-1/input0 [ 24.491814][ T45] cp2112 0003:10C4:EA90.0001: Part Number: 0x00 Device Version: 0x00 [ 24.546805][ T31] usb 3-1: new high-speed USB device number 2 using dummy_hcd [ 24.558711][ T355] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 24.567309][ T355] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 24.589740][ T330] dm9601 2-1:0.0 (unnamed net_device) (uninitialized): Error reading chip ID [ 24.599883][ T330] usb 2-1: USB disconnect, device number 2 [ 24.718728][ T31] usb 3-1: unable to get BOS descriptor or descriptor too short [ 24.727478][ T31] usb 3-1: config 128 has an invalid interface number: 172 but max is 0 [ 24.735907][ T31] usb 3-1: config 128 has no interface number 0 [ 24.742300][ T31] usb 3-1: config 128 interface 172 has no altsetting 0 [ 24.747533][ T362] usb 1-1: USB disconnect, device number 2 [ 24.752098][ T31] usb 3-1: string descriptor 0 read error: -22 [ 24.763932][ T31] usb 3-1: New USB device found, idVendor=11ca, idProduct=0201, bcdDevice=d2.0a [ 24.773145][ T31] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 24.783107][ T31] cdc_acm 3-1:128.172: invalid descriptor buffer length [ 24.984863][ T330] usb 3-1: USB disconnect, device number 2 [ 25.095517][ T45] cp2112 0003:10C4:EA90.0001: error reading lock byte: -71 [ 25.108903][ T45] usb 4-1: USB disconnect, device number 2 [ 25.138477][ T374] 9pnet_fd: Insufficient options for proto=fd [ 25.219108][ T384] netlink: 140 bytes leftover after parsing attributes in process `syz.1.18'. [ 25.245449][ T389] netlink: 104 bytes leftover after parsing attributes in process `syz.0.19'. [ 25.249894][ T391] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 25.268818][ T391] overlay: ./file0 is not a directory [ 25.275011][ T391] process 'syz.1.20' launched './file0' with NULL argv: empty string added [ 25.496820][ T330] usb 1-1: new full-speed USB device number 3 using dummy_hcd [ 25.647285][ T397] FAULT_INJECTION: forcing a failure. [ 25.647285][ T397] name failslab, interval 1, probability 0, space 0, times 1 [ 25.659998][ T397] CPU: 0 UID: 0 PID: 397 Comm: syz.3.22 Not tainted syzkaller #0 e538f3f6a543b135812147031d083fd1f2699041 [ 25.660020][ T397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 25.660034][ T397] Call Trace: [ 25.660039][ T397] [ 25.660045][ T397] __dump_stack+0x21/0x30 [ 25.660070][ T397] dump_stack_lvl+0x140/0x1c0 [ 25.660087][ T397] ? __cfi_dump_stack_lvl+0x10/0x10 [ 25.660110][ T397] ? __cfi_avc_has_perm+0x10/0x10 [ 25.660127][ T397] ? kasan_save_alloc_info+0x40/0x50 [ 25.660143][ T397] dump_stack+0x19/0x20 [ 25.660159][ T397] should_fail_ex+0x3d7/0x530 [ 25.660175][ T397] should_failslab+0xac/0x100 [ 25.660194][ T397] __kmalloc_cache_noprof+0x41/0x470 [ 25.660230][ T397] ? vhost_task_create+0x12c/0x400 [ 25.660254][ T397] ? __cfi_kvm_nx_huge_page_recovery_worker+0x10/0x10 [ 25.660279][ T397] vhost_task_create+0x12c/0x400 [ 25.660300][ T397] ? __cfi_kvm_nx_huge_page_recovery_worker_kill+0x10/0x10 [ 25.660325][ T397] ? __cfi_vhost_task_create+0x10/0x10 [ 25.660348][ T397] ? __cfi_vhost_task_fn+0x10/0x10 [ 25.660370][ T397] ? __kasan_check_write+0x18/0x20 [ 25.660387][ T397] ? mutex_lock+0x97/0x1d0 [ 25.660402][ T397] ? __cfi_mutex_lock+0x10/0x10 [ 25.660416][ T397] ? kernel_text_address+0xa9/0xe0 [ 25.660435][ T397] kvm_mmu_post_init_vm+0x161/0x300 [ 25.660456][ T397] kvm_arch_vcpu_ioctl_run+0xf3/0x1bd0 [ 25.660476][ T397] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 25.660494][ T397] ? kstrtoull+0x13b/0x1e0 [ 25.660507][ T397] ? kstrtouint+0x78/0xf0 [ 25.660520][ T397] ? ioctl_has_perm+0x1bc/0x500 [ 25.660535][ T397] ? __asan_memcpy+0x5a/0x80 [ 25.660552][ T397] ? ioctl_has_perm+0x408/0x500 [ 25.660567][ T397] ? has_cap_mac_admin+0xd0/0xd0 [ 25.660581][ T397] ? __kasan_check_write+0x18/0x20 [ 25.660598][ T397] ? mutex_lock_killable+0x97/0x1d0 [ 25.660614][ T397] ? __cfi_mutex_lock_killable+0x10/0x10 [ 25.660630][ T397] ? proc_fail_nth_write+0x184/0x220 [ 25.660646][ T397] kvm_vcpu_ioctl+0xa48/0x1000 [ 25.660668][ T397] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 25.660689][ T397] ? __cfi_vfs_write+0x10/0x10 [ 25.660713][ T397] ? __kasan_check_write+0x18/0x20 [ 25.660730][ T397] ? mutex_unlock+0x90/0x240 [ 25.660745][ T397] ? __cfi_mutex_unlock+0x10/0x10 [ 25.660760][ T397] ? __fget_files+0x2c5/0x340 [ 25.660781][ T397] ? __fget_files+0x2c5/0x340 [ 25.660801][ T397] ? bpf_lsm_file_ioctl+0xd/0x20 [ 25.660815][ T397] ? security_file_ioctl+0x3e/0x110 [ 25.660829][ T397] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 25.660850][ T397] __se_sys_ioctl+0x132/0x1b0 [ 25.660871][ T397] __x64_sys_ioctl+0x7f/0xa0 [ 25.660891][ T397] x64_sys_call+0x1878/0x2ee0 [ 25.660912][ T397] do_syscall_64+0x57/0xf0 [ 25.660932][ T397] ? clear_bhb_loop+0x50/0xa0 [ 25.660954][ T397] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 25.660974][ T397] RIP: 0033:0x7f43b5d9aeb9 [ 25.660991][ T397] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 25.661003][ T397] RSP: 002b:00007f43b6c4d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 25.661024][ T397] RAX: ffffffffffffffda RBX: 00007f43b6015fa0 RCX: 00007f43b5d9aeb9 [ 25.661035][ T397] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 25.661044][ T397] RBP: 00007f43b6c4d090 R08: 0000000000000000 R09: 0000000000000000 [ 25.661054][ T397] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 25.661062][ T397] R13: 00007f43b6016038 R14: 00007f43b6015fa0 R15: 00007ffe834f8508 [ 25.661075][ T397] [ 25.663923][ T330] usb 1-1: unable to get BOS descriptor or descriptor too short [ 25.766832][ T67] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 25.771394][ T330] usb 1-1: not running at top speed; connect to a high speed hub [ 25.926795][ T67] usb 2-1: Using ep0 maxpacket: 32 [ 25.927740][ T9] usb 3-1: new high-speed USB device number 3 using dummy_hcd [ 25.937395][ T67] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 25.940251][ T330] usb 1-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xEE, changing to 0x8E [ 25.942538][ T67] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 25.962702][ T330] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8E has an invalid bInterval 0, changing to 10 [ 25.970878][ T67] usb 2-1: New USB device found, idVendor=046d, idProduct=c31c, bcdDevice= 0.40 [ 25.979145][ T330] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8E has invalid maxpacket 221, setting to 64 [ 25.987205][ T67] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 25.995682][ T330] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x3 has invalid wMaxPacketSize 0 [ 26.023844][ T67] usb 2-1: config 0 descriptor?? [ 26.038683][ T330] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0xF has invalid wMaxPacketSize 0 [ 26.045013][ T67] hub 2-1:0.0: USB hub found [ 26.067100][ T330] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x7 has invalid maxpacket 67, setting to 64 [ 26.136828][ T36] kauditd_printk_skb: 71 callbacks suppressed [ 26.136877][ T36] audit: type=1400 audit(1770515822.720:145): avc: denied { create } for pid=398 comm="syz.3.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 26.162895][ T330] usb 1-1: New USB device found, idVendor=0763, idProduct=1002, bcdDevice=5f.84 [ 26.195275][ T330] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 26.203468][ T330] usb 1-1: Product: syz [ 26.208262][ T36] audit: type=1404 audit(1770515822.790:146): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 26.223271][ T36] audit: type=1400 audit(1770515822.790:147): avc: denied { ioctl } for pid=394 comm="syz.2.21" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 26.250572][ T9] usb 3-1: unable to read config index 0 descriptor/start: -71 [ 26.258765][ T9] usb 3-1: can't read configurations, error -71 [ 26.266501][ T36] audit: type=1400 audit(1770515822.810:148): avc: denied { read } for pid=398 comm="syz.3.23" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 26.285501][ T330] usb 1-1: Manufacturer: syz [ 26.289419][ T67] hub 2-1:0.0: config failed, can't read hub descriptor (err -22) [ 26.299026][ T330] usb 1-1: SerialNumber: syz [ 26.302885][ T36] audit: type=1400 audit(1770515822.810:149): avc: denied { create } for pid=398 comm="syz.3.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 26.316923][ T330] usb 1-1: config 0 descriptor?? [ 26.327304][ T36] audit: type=1400 audit(1770515822.820:150): avc: denied { write } for pid=398 comm="syz.3.23" path="socket:[4245]" dev="sockfs" ino=4245 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 26.352827][ T67] usbhid 2-1:0.0: can't add hid device: -71 [ 26.354957][ T36] audit: type=1400 audit(1770515822.820:151): avc: denied { read } for pid=398 comm="syz.3.23" path="socket:[4245]" dev="sockfs" ino=4245 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 26.358883][ T67] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 26.385171][ T36] audit: type=1400 audit(1770515822.830:152): avc: denied { read write } for pid=392 comm="syz.1.29" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 26.412601][ T36] audit: type=1400 audit(1770515822.830:153): avc: denied { read } for pid=392 comm="syz.1.29" dev="nsfs" ino=4026532301 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 26.419368][ T67] usb 2-1: USB disconnect, device number 3 [ 26.433807][ T36] audit: type=1400 audit(1770515822.830:154): avc: denied { read write } for pid=293 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 26.870760][ T330] usb 1-1: can't set config #0, error -71 [ 26.885546][ T423] FAULT_INJECTION: forcing a failure. [ 26.885546][ T423] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 26.887200][ T330] usb 1-1: USB disconnect, device number 3 [ 26.899705][ T423] CPU: 1 UID: 0 PID: 423 Comm: syz.0.34 Not tainted syzkaller #0 e538f3f6a543b135812147031d083fd1f2699041 [ 26.899790][ T423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 26.899823][ T423] Call Trace: [ 26.899844][ T423] [ 26.899865][ T423] __dump_stack+0x21/0x30 [ 26.899949][ T423] dump_stack_lvl+0x140/0x1c0 [ 26.900013][ T423] ? __cfi_dump_stack_lvl+0x10/0x10 [ 26.900086][ T423] ? vsnprintf+0x7b4/0x1ad0 [ 26.900160][ T423] ? check_stack_object+0x106/0x150 [ 26.900255][ T423] dump_stack+0x19/0x20 [ 26.900335][ T423] should_fail_ex+0x3d7/0x530 [ 26.900397][ T423] should_fail+0xf/0x20 [ 26.900451][ T423] should_fail_usercopy+0x1e/0x30 [ 26.900512][ T423] _copy_from_user+0x20/0xa0 [ 26.900585][ T423] kstrtouint_from_user+0xde/0x170 [ 26.900640][ T423] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 26.900712][ T423] ? selinux_file_permission+0x318/0xb60 [ 26.900782][ T423] ? __cfi_selinux_file_permission+0x10/0x10 [ 26.900843][ T423] proc_fail_nth_write+0x8f/0x220 [ 26.900897][ T423] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 26.900951][ T423] ? bpf_lsm_file_permission+0xd/0x20 [ 26.901003][ T423] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 26.901056][ T423] vfs_write+0x3c8/0xf90 [ 26.901121][ T423] ? __cfi_vfs_write+0x10/0x10 [ 26.901185][ T423] ? __kasan_check_write+0x18/0x20 [ 26.901261][ T423] ? mutex_lock+0x97/0x1d0 [ 26.901315][ T423] ? __cfi_mutex_lock+0x10/0x10 [ 26.901369][ T423] ? __fget_files+0x2c5/0x340 [ 26.901601][ T423] ksys_write+0x145/0x260 [ 26.901698][ T423] ? __cfi_ksys_write+0x10/0x10 [ 26.901793][ T423] ? fdget+0x188/0x1e0 [ 26.901873][ T423] ? __kasan_check_read+0x15/0x20 [ 26.901936][ T423] __x64_sys_write+0x7f/0x90 [ 26.902003][ T423] x64_sys_call+0x271c/0x2ee0 [ 26.902088][ T423] do_syscall_64+0x57/0xf0 [ 26.902162][ T423] ? clear_bhb_loop+0x50/0xa0 [ 26.902244][ T423] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 26.902320][ T423] RIP: 0033:0x7f548b15b78e [ 26.902412][ T423] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 26.902455][ T423] RSP: 002b:00007f548c08afe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 26.902518][ T423] RAX: ffffffffffffffda RBX: 00007f548c08b6c0 RCX: 00007f548b15b78e [ 26.902560][ T423] RDX: 0000000000000001 RSI: 00007f548c08b0a0 RDI: 0000000000000003 [ 26.902599][ T423] RBP: 00007f548c08b090 R08: 0000000000000000 R09: 0000000000000000 [ 26.902633][ T423] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 26.902672][ T423] R13: 00007f548b416038 R14: 00007f548b415fa0 R15: 00007fffabe0ac68 [ 26.902717][ T423] [ 27.183627][ T432] capability: warning: `syz.3.38' uses deprecated v2 capabilities in a way that may be insecure [ 27.265595][ T437] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=437 comm=syz.3.40 [ 27.370657][ T449] syz.3.44 (449): attempted to duplicate a private mapping with mremap. This is not supported. [ 28.447228][ T486] ªªªªªª: renamed from vlan0 (while UP) [ 29.881283][ T518] netlink: 'syz.1.70': attribute type 16 has an invalid length. [ 29.888991][ T518] netlink: 'syz.1.70': attribute type 25 has an invalid length. [ 29.896901][ T518] netlink: 64094 bytes leftover after parsing attributes in process `syz.1.70'. [ 30.521538][ T534] capability: warning: `syz.3.78' uses 32-bit capabilities (legacy support in use) [ 31.102272][ T558] syzkaller1: entered promiscuous mode [ 31.107904][ T558] syzkaller1: entered allmulticast mode [ 31.178978][ T36] kauditd_printk_skb: 216 callbacks suppressed [ 31.178996][ T36] audit: type=1400 audit(1770515827.760:371): avc: denied { read write } for pid=293 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 31.209306][ T36] audit: type=1400 audit(1770515827.770:372): avc: denied { create } for pid=561 comm="syz.3.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 31.229041][ T36] audit: type=1400 audit(1770515827.770:373): avc: denied { create } for pid=561 comm="syz.3.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 31.250639][ T36] audit: type=1400 audit(1770515827.780:374): avc: denied { read write } for pid=561 comm="syz.3.87" name="rnullb0" dev="devtmpfs" ino=31 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 31.274055][ T36] audit: type=1400 audit(1770515827.780:375): avc: denied { read } for pid=561 comm="syz.3.87" dev="nsfs" ino=4026532534 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 31.301980][ T36] audit: type=1400 audit(1770515827.780:376): avc: denied { create } for pid=561 comm="syz.3.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=0 [ 31.321618][ T36] audit: type=1400 audit(1770515827.800:377): avc: denied { read write } for pid=293 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 31.345576][ T36] audit: type=1400 audit(1770515827.840:378): avc: denied { read write } for pid=290 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 31.369722][ T36] audit: type=1400 audit(1770515827.850:379): avc: denied { write } for pid=566 comm="syz.3.88" name="psched" dev="proc" ino=4026532566 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 [ 31.392447][ T36] audit: type=1400 audit(1770515827.850:380): avc: denied { write } for pid=566 comm="syz.3.88" dev="proc" ino=4026532566 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 [ 32.019386][ T588] mmap: syz.2.95 (588) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 32.427380][ T634] netlink: 25 bytes leftover after parsing attributes in process `syz.1.108'. [ 32.540168][ T636] pim6reg1: entered promiscuous mode [ 32.545511][ T636] pim6reg1: entered allmulticast mode [ 32.940338][ T655] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=655 comm=syz.2.119 [ 35.088029][ T738] netlink: 20 bytes leftover after parsing attributes in process `syz.0.151'. [ 35.108333][ T740] syz.2.152: attempt to access beyond end of device [ 35.108333][ T740] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 35.493193][ T53] Bluetooth: hci0: Frame reassembly failed (-84) [ 35.499927][ T759] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 35.507859][ T53] Bluetooth: hci0: Frame reassembly failed (-84) [ 36.192093][ T36] kauditd_printk_skb: 274 callbacks suppressed [ 36.192112][ T36] audit: type=1400 audit(1770515832.770:655): avc: denied { read write } for pid=290 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.208233][ T777] netlink: 'syz.0.166': attribute type 12 has an invalid length. [ 36.223349][ T36] audit: type=1400 audit(1770515832.780:656): avc: denied { read write } for pid=776 comm="syz.0.166" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 36.258115][ T36] audit: type=1400 audit(1770515832.840:657): avc: denied { read write } for pid=292 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.289880][ T36] audit: type=1400 audit(1770515832.870:658): avc: denied { read write } for pid=292 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.313933][ T36] audit: type=1400 audit(1770515832.870:659): avc: denied { read } for pid=780 comm="syz.2.168" dev="nsfs" ino=4026532465 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 36.334888][ T36] audit: type=1400 audit(1770515832.870:660): avc: denied { read write } for pid=780 comm="syz.2.168" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 36.357911][ T36] audit: type=1400 audit(1770515832.870:661): avc: denied { execmem } for pid=780 comm="syz.2.168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 36.376938][ T36] audit: type=1400 audit(1770515832.870:662): avc: denied { name_bind } for pid=780 comm="syz.2.168" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 36.398277][ T36] audit: type=1400 audit(1770515832.900:663): avc: denied { read write } for pid=292 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.422238][ T36] audit: type=1400 audit(1770515832.920:664): avc: denied { read write } for pid=782 comm="syz.2.169" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 37.308332][ T811] netlink: 'syz.3.179': attribute type 4 has an invalid length. [ 37.482222][ T831] syz.3.188 uses obsolete (PF_INET,SOCK_PACKET) [ 37.507692][ T761] Bluetooth: hci0: command 0x1003 tx timeout [ 37.513747][ T55] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 37.642709][ T869] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=16420 sclass=netlink_route_socket pid=869 comm=syz.3.203 [ 39.658069][ T910] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53 sclass=netlink_route_socket pid=910 comm=syz.0.220 [ 39.708234][ T924] sock: sock_timestamping_bind_phc: sock not bind to device [ 40.109450][ T959] sock: sock_set_timeout: `syz.2.234' (pid 959) tries to set negative timeout [ 41.211752][ T36] kauditd_printk_skb: 331 callbacks suppressed [ 41.211772][ T36] audit: type=1400 audit(1770515837.790:996): avc: denied { read write } for pid=292 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 41.241998][ T36] audit: type=1400 audit(1770515837.800:997): avc: denied { execmem } for pid=982 comm="syz.2.243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 41.261166][ T36] audit: type=1400 audit(1770515837.810:998): avc: denied { create } for pid=982 comm="syz.2.243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 41.280747][ T36] audit: type=1400 audit(1770515837.810:999): avc: denied { create } for pid=982 comm="syz.2.243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 41.300405][ T36] audit: type=1400 audit(1770515837.810:1000): avc: denied { create } for pid=982 comm="syz.2.243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 41.383136][ T36] audit: type=1400 audit(1770515837.960:1001): avc: denied { read write } for pid=290 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 41.407273][ T36] audit: type=1400 audit(1770515837.970:1002): avc: denied { write } for pid=985 comm="syz.0.244" name="protocols" dev="proc" ino=4026532311 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 [ 41.430922][ T36] audit: type=1400 audit(1770515837.980:1003): avc: denied { execute } for pid=985 comm="syz.0.244" name="file1" dev="tmpfs" ino=390 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 41.453259][ T36] audit: type=1400 audit(1770515838.000:1004): avc: denied { read write } for pid=290 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 41.477422][ T36] audit: type=1400 audit(1770515838.010:1005): avc: denied { read write } for pid=987 comm="syz.0.245" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 42.601986][ T1018] netlink: 'syz.2.255': attribute type 5 has an invalid length. [ 42.609690][ T1018] netlink: 'syz.2.255': attribute type 5 has an invalid length. [ 42.617352][ T1018] netlink: 3657 bytes leftover after parsing attributes in process `syz.2.255'. [ 43.353973][ T1053] netlink: 8 bytes leftover after parsing attributes in process `syz.3.269'. [ 43.552819][ T1072] netlink: 'syz.0.275': attribute type 46 has an invalid length. [ 43.560660][ T1072] netlink: 'syz.0.275': attribute type 28 has an invalid length. [ 44.317197][ T1093] netlink: 4 bytes leftover after parsing attributes in process `syz.1.283'. [ 45.139777][ T1120] netlink: 4 bytes leftover after parsing attributes in process `syz.3.293'. [ 46.224638][ T36] kauditd_printk_skb: 258 callbacks suppressed [ 46.224658][ T36] audit: type=1400 audit(1770515842.790:1264): avc: denied { read } for pid=1145 comm="syz.1.304" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 46.254077][ T36] audit: type=1400 audit(1770515842.790:1265): avc: denied { create } for pid=1145 comm="syz.1.304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 46.275000][ T36] audit: type=1400 audit(1770515842.790:1266): avc: denied { mounton } for pid=1145 comm="syz.1.304" path="/51/bus" dev="tmpfs" ino=297 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 46.297601][ T36] audit: type=1400 audit(1770515842.790:1267): avc: denied { mounton } for pid=1145 comm="syz.1.304" path="/51/bus" dev="tmpfs" ino=297 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 46.332202][ T36] audit: type=1400 audit(1770515842.800:1268): avc: denied { read write } for pid=291 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 46.337142][ T1153] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=1153 comm=syz.3.306 [ 46.357142][ T36] audit: type=1400 audit(1770515842.800:1269): avc: denied { create } for pid=1149 comm="syz.1.305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 46.388542][ T36] audit: type=1400 audit(1770515842.840:1270): avc: denied { mounton } for pid=1149 comm="syz.1.305" path="/52/file0" dev="tmpfs" ino=303 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 46.411257][ T36] audit: type=1400 audit(1770515842.840:1271): avc: denied { read write } for pid=1149 comm="syz.1.305" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 46.435538][ T36] audit: type=1400 audit(1770515842.860:1272): avc: denied { remount } for pid=1149 comm="syz.1.305" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 46.455463][ T36] audit: type=1400 audit(1770515842.860:1273): avc: denied { read write } for pid=293 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 58.118264][ T36] kauditd_printk_skb: 8 callbacks suppressed [ 58.118281][ T36] audit: type=1400 audit(1770515854.700:1282): avc: denied { create } for pid=1157 comm="syz.1.309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 58.142862][ T1161] netlink: 'syz.0.308': attribute type 7 has an invalid length. [ 58.166443][ T36] audit: type=1400 audit(1770515854.700:1283): avc: denied { read } for pid=1159 comm="syz.3.311" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 58.190761][ T36] audit: type=1400 audit(1770515854.700:1284): avc: denied { create } for pid=1156 comm="syz.0.308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 58.211065][ T36] audit: type=1400 audit(1770515854.700:1285): avc: denied { create } for pid=1156 comm="syz.0.308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 58.231037][ T36] audit: type=1400 audit(1770515854.700:1286): avc: denied { name_bind } for pid=1156 comm="syz.0.308" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 58.262155][ T36] audit: type=1400 audit(1770515854.730:1287): avc: denied { mounton } for pid=1157 comm="syz.1.309" path="/53/file0" dev="tmpfs" ino=309 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 58.285091][ T36] audit: type=1400 audit(1770515854.730:1288): avc: denied { mounton } for pid=1157 comm="syz.1.309" path="/53/file0" dev="tmpfs" ino=309 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 58.310920][ T36] audit: type=1400 audit(1770515854.740:1289): avc: denied { read write } for pid=293 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 58.335317][ T36] audit: type=1400 audit(1770515854.740:1290): avc: denied { create } for pid=1160 comm="syz.2.310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 58.355090][ T36] audit: type=1400 audit(1770515854.740:1291): avc: denied { read write } for pid=291 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 58.769887][ T1212] syzkaller0: tun_chr_ioctl cmd 1074025676 [ 58.775760][ T1212] syzkaller0: owner set to 0 [ 59.147159][ T1235] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=1235 comm=syz.1.338 [ 59.874695][ T1269] netlink: 'syz.0.351': attribute type 27 has an invalid length. [ 59.882647][ T1269] netlink: 'syz.0.351': attribute type 27 has an invalid length. [ 59.890554][ T1269] netlink: 'syz.0.351': attribute type 27 has an invalid length. [ 59.898417][ T1269] netlink: 'syz.0.351': attribute type 27 has an invalid length. [ 59.906483][ T1269] netlink: 'syz.0.351': attribute type 27 has an invalid length. [ 59.914402][ T1269] netlink: 'syz.0.351': attribute type 27 has an invalid length. [ 59.922249][ T1269] netlink: 'syz.0.351': attribute type 27 has an invalid length. [ 59.930154][ T1269] netlink: 'syz.0.351': attribute type 27 has an invalid length. [ 59.937987][ T1269] netlink: 'syz.0.351': attribute type 27 has an invalid length. [ 60.538296][ T1292] netlink: 8 bytes leftover after parsing attributes in process `syz.3.361'. [ 62.680658][ T1345] netlink: 4 bytes leftover after parsing attributes in process `syz.0.381'. [ 63.130433][ T36] kauditd_printk_skb: 380 callbacks suppressed [ 63.130449][ T36] audit: type=1400 audit(1770515859.710:1672): avc: denied { read write } for pid=291 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 63.161519][ T36] audit: type=1400 audit(1770515859.750:1673): avc: denied { read write } for pid=293 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 63.185946][ T36] audit: type=1400 audit(1770515859.750:1674): avc: denied { create } for pid=1359 comm="syz.1.386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 63.207784][ T36] audit: type=1400 audit(1770515859.750:1675): avc: denied { create } for pid=1359 comm="syz.1.386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 63.227925][ T36] audit: type=1400 audit(1770515859.750:1676): avc: denied { read write } for pid=1359 comm="syz.1.386" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 63.260636][ T36] audit: type=1400 audit(1770515859.790:1677): avc: denied { read } for pid=1361 comm="syz.3.387" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 63.284777][ T36] audit: type=1400 audit(1770515859.790:1678): avc: denied { read write } for pid=291 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 63.308956][ T36] audit: type=1400 audit(1770515859.810:1679): avc: denied { create } for pid=1361 comm="syz.3.387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 63.328511][ T36] audit: type=1400 audit(1770515859.810:1680): avc: denied { create } for pid=1361 comm="syz.3.387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 63.348164][ T36] audit: type=1400 audit(1770515859.810:1681): avc: denied { read write } for pid=1361 comm="syz.3.387" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 64.324280][ T1437] IPv6: A: Disabled Multicast RS [ 65.321432][ T1480] validate_nla: 25 callbacks suppressed [ 65.321464][ T1480] netlink: 'syz.2.432': attribute type 4 has an invalid length. [ 65.335049][ T1480] netlink: 8 bytes leftover after parsing attributes in process `syz.2.432'. [ 65.733605][ T1486] netlink: 1363 bytes leftover after parsing attributes in process `syz.1.434'. [ 66.328690][ T1500] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2580 sclass=netlink_route_socket pid=1500 comm=syz.3.440 [ 66.358697][ T1502] Zero length message leads to an empty skb [ 66.385870][ T1507] netlink: 'syz.2.443': attribute type 16 has an invalid length. [ 66.394026][ T1507] netlink: 64130 bytes leftover after parsing attributes in process `syz.2.443'. [ 67.127235][ T1530] netlink: 5 bytes leftover after parsing attributes in process `syz.3.451'. [ 67.136096][ T1530] 0ªî{X¹¦: renamed from gretap0 [ 67.151306][ T1530] 0ªî{X¹¦: entered allmulticast mode [ 67.157406][ T1530] A link change request failed with some changes committed already. Interface 30ªî{X¹¦ may have been left with an inconsistent configuration, please check. [ 67.697897][ T1540] netlink: 'syz.3.455': attribute type 13 has an invalid length. [ 68.218371][ T36] kauditd_printk_skb: 312 callbacks suppressed [ 68.218390][ T36] audit: type=1400 audit(1770516120.804:1994): avc: denied { read write } for pid=293 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 68.249149][ T36] audit: type=1400 audit(1770516120.804:1995): avc: denied { mount } for pid=1548 comm="syz.3.459" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=0 [ 68.271804][ T36] audit: type=1400 audit(1770516120.804:1996): avc: denied { read write } for pid=1548 comm="syz.3.459" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 68.295318][ T36] audit: type=1400 audit(1770516120.804:1997): avc: denied { read write } for pid=1548 comm="syz.3.459" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 68.318754][ T36] audit: type=1400 audit(1770516120.804:1998): avc: denied { load_policy } for pid=1548 comm="syz.3.459" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=0 [ 68.339020][ T36] audit: type=1400 audit(1770516120.834:1999): avc: denied { read write } for pid=293 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 68.367503][ T46] Bluetooth: hci0: Frame reassembly failed (-84) [ 68.374528][ T1563] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 68.383042][ T36] audit: type=1400 audit(1770516120.854:2000): avc: denied { create } for pid=1552 comm="syz.3.460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 68.402631][ T36] audit: type=1400 audit(1770516120.884:2001): avc: denied { read write } for pid=293 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 68.426680][ T36] audit: type=1400 audit(1770516120.904:2002): avc: denied { create } for pid=1554 comm="syz.3.461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 68.446157][ T36] audit: type=1400 audit(1770516120.904:2003): avc: denied { create } for pid=1554 comm="syz.3.461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 69.015977][ T1583] netlink: 'syz.0.470': attribute type 10 has an invalid length. [ 69.023837][ T1583] netlink: 17 bytes leftover after parsing attributes in process `syz.0.470'. [ 70.372606][ T1681] netlink: 4 bytes leftover after parsing attributes in process `syz.1.497'. [ 70.381669][ T1681] bridge_slave_1: left allmulticast mode [ 70.387450][ T55] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 70.393577][ T761] Bluetooth: hci0: command 0x1003 tx timeout [ 70.399672][ T1681] bridge_slave_1: left promiscuous mode [ 70.411357][ T1681] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.419181][ T1681] bridge_slave_0: left allmulticast mode [ 70.424908][ T1681] bridge_slave_0: left promiscuous mode [ 70.435265][ T1681] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.452571][ T1763] syzkaller1: entered promiscuous mode [ 72.458251][ T1763] syzkaller1: entered allmulticast mode [ 72.538668][ T1770] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=1770 comm=syz.0.527 [ 72.551682][ T1772] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=1772 comm=syz.0.527 [ 73.253753][ T36] kauditd_printk_skb: 541 callbacks suppressed [ 73.253769][ T36] audit: type=1400 audit(1770516125.834:2545): avc: denied { read write } for pid=292 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.284377][ T36] audit: type=1400 audit(1770516125.854:2546): avc: denied { mounton } for pid=1824 comm="syz.2.545" path="/130/file0" dev="tmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 73.316913][ T36] audit: type=1400 audit(1770516125.894:2547): avc: denied { read write } for pid=291 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.342184][ T36] audit: type=1400 audit(1770516125.924:2548): avc: denied { mounton } for pid=1824 comm="syz.2.545" path="/130/file0/file0" dev="tmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 73.376236][ T36] audit: type=1400 audit(1770516125.954:2549): avc: denied { read } for pid=1826 comm="syz.1.546" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 73.399367][ T36] audit: type=1400 audit(1770516125.984:2550): avc: denied { read append } for pid=1826 comm="syz.1.546" name="usbmon1" dev="devtmpfs" ino=88 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=0 [ 73.424550][ T36] audit: type=1400 audit(1770516126.004:2551): avc: denied { create } for pid=1826 comm="syz.1.546" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 73.507708][ T36] audit: type=1400 audit(1770516126.094:2552): avc: denied { execmem } for pid=1826 comm="syz.1.546" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 73.565052][ T36] audit: type=1400 audit(1770516126.144:2553): avc: denied { read write } for pid=292 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.591892][ T36] audit: type=1400 audit(1770516126.174:2554): avc: denied { read write } for pid=292 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.758349][ T1858] netlink: 'syz.3.558': attribute type 27 has an invalid length. [ 75.227902][ T1904] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2048 sclass=netlink_route_socket pid=1904 comm=syz.3.576 [ 75.289887][ T1906] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=1906 comm=syz.0.577 [ 75.505817][ T1909] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=1909 comm=syz.0.577 [ 78.268520][ T36] kauditd_printk_skb: 431 callbacks suppressed [ 78.268537][ T36] audit: type=1400 audit(1770516130.854:2986): avc: denied { read write } for pid=291 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 78.299095][ T36] audit: type=1400 audit(1770516130.864:2987): avc: denied { create } for pid=2047 comm="syz.1.628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 78.318848][ T36] audit: type=1400 audit(1770516130.864:2988): avc: denied { read } for pid=2047 comm="syz.1.628" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 78.341701][ T36] audit: type=1400 audit(1770516130.864:2989): avc: denied { create } for pid=2047 comm="syz.1.628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 78.361393][ T36] audit: type=1400 audit(1770516130.884:2990): avc: denied { read write } for pid=291 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 78.385716][ T36] audit: type=1400 audit(1770516130.904:2991): avc: denied { mounton } for pid=2049 comm="syz.1.629" path="/127/file0" dev="tmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 78.408461][ T36] audit: type=1400 audit(1770516130.904:2992): avc: denied { create } for pid=2049 comm="syz.1.629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 78.428772][ T36] audit: type=1400 audit(1770516130.904:2993): avc: denied { mounton } for pid=2049 comm="syz.1.629" path="/127/bus" dev="tmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 78.451168][ T36] audit: type=1400 audit(1770516130.904:2994): avc: denied { read } for pid=2049 comm="syz.1.629" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 78.474194][ T36] audit: type=1400 audit(1770516130.934:2995): avc: denied { read write } for pid=291 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.045981][ T2112] syzkaller0: entered promiscuous mode [ 80.051558][ T2112] syzkaller0: entered allmulticast mode [ 80.416664][ T2132] netlink: 16 bytes leftover after parsing attributes in process `syz.3.659'. [ 81.185436][ T2163] netlink: 'syz.2.669': attribute type 16 has an invalid length. [ 81.193275][ T2163] netlink: 'syz.2.669': attribute type 3 has an invalid length. [ 81.200988][ T2163] netlink: 64054 bytes leftover after parsing attributes in process `syz.2.669'. [ 81.309406][ T2175] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2816 sclass=netlink_route_socket pid=2175 comm=syz.2.673 [ 82.647105][ T2235] sit0: entered promiscuous mode [ 82.653418][ T2235] netlink: 'syz.1.696': attribute type 1 has an invalid length. [ 82.661229][ T2235] netlink: 'syz.1.696': attribute type 3 has an invalid length. [ 83.533417][ T36] kauditd_printk_skb: 273 callbacks suppressed [ 83.533434][ T36] audit: type=1400 audit(1770516136.114:3269): avc: denied { read write } for pid=291 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 83.590836][ T36] audit: type=1400 audit(1770516136.174:3270): avc: denied { read write } for pid=293 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 83.617425][ T761] Bluetooth: hci0: sending frame failed (-49) [ 83.624033][ T55] Bluetooth: hci0: Opcode 0x1003 failed: -49 [ 83.635563][ T36] audit: type=1400 audit(1770516136.194:3271): avc: denied { create } for pid=2265 comm="syz.3.706" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 83.655819][ T36] audit: type=1400 audit(1770516136.194:3272): avc: denied { create } for pid=2265 comm="syz.3.706" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 83.675841][ T36] audit: type=1400 audit(1770516136.194:3273): avc: denied { read write } for pid=2265 comm="syz.3.706" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 83.699925][ T36] audit: type=1400 audit(1770516136.214:3274): avc: denied { read write } for pid=291 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 83.724274][ T36] audit: type=1400 audit(1770516136.214:3275): avc: denied { read write } for pid=290 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 83.738182][ T2274] ªªªªªª: renamed from vlan0 (while UP) [ 83.748852][ T36] audit: type=1400 audit(1770516136.214:3276): avc: denied { read } for pid=2268 comm="syz.1.707" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 83.778737][ T36] audit: type=1400 audit(1770516136.214:3277): avc: denied { create } for pid=2268 comm="syz.1.707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 83.798270][ T36] audit: type=1400 audit(1770516136.214:3278): avc: denied { create } for pid=2268 comm="syz.1.707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 84.383778][ T2300] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2300 comm=syz.2.719 [ 85.424641][ T2361] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2361 comm=syz.1.743 [ 86.860172][ T2414] netlink: 'syz.3.762': attribute type 15 has an invalid length. [ 86.868137][ T2414] netlink: 24 bytes leftover after parsing attributes in process `syz.3.762'. [ 87.286459][ T2423] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=12821 sclass=netlink_tcpdiag_socket pid=2423 comm=syz.2.765 [ 87.881049][ T2441] syzkaller1: entered promiscuous mode [ 87.886575][ T2441] syzkaller1: entered allmulticast mode [ 87.964978][ T2452] IPv6: NLM_F_CREATE should be specified when creating new route [ 88.967666][ T36] kauditd_printk_skb: 343 callbacks suppressed [ 88.967743][ T36] audit: type=1400 audit(1770516141.554:3622): avc: denied { read write } for pid=292 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 88.998651][ T36] audit: type=1400 audit(1770516141.564:3623): avc: denied { create } for pid=2463 comm="syz.2.782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 89.018369][ T36] audit: type=1400 audit(1770516141.564:3624): avc: denied { read } for pid=2463 comm="syz.2.782" name="msr" dev="devtmpfs" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 89.041230][ T36] audit: type=1400 audit(1770516141.604:3625): avc: denied { read write } for pid=290 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 89.065959][ T36] audit: type=1400 audit(1770516141.614:3626): avc: denied { read } for pid=2463 comm="syz.2.782" dev="nsfs" ino=4026532465 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 89.087202][ T36] audit: type=1400 audit(1770516141.624:3627): avc: denied { read write } for pid=2463 comm="syz.2.782" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 89.111532][ T36] audit: type=1400 audit(1770516141.634:3628): avc: denied { create } for pid=2465 comm="syz.0.783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 89.131879][ T36] audit: type=1400 audit(1770516141.634:3629): avc: denied { create } for pid=2465 comm="syz.0.783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=0 [ 89.153390][ T36] audit: type=1400 audit(1770516141.644:3630): avc: denied { read write } for pid=2465 comm="syz.0.783" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 89.177006][ T36] audit: type=1400 audit(1770516141.644:3631): avc: denied { validate_trans } for pid=2465 comm="syz.0.783" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=0 [ 89.637140][ T13] bridge_slave_1: left allmulticast mode [ 89.642842][ T13] bridge_slave_1: left promiscuous mode [ 89.656803][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.664966][ T13] bridge_slave_0: left allmulticast mode [ 89.671422][ T13] bridge_slave_0: left promiscuous mode [ 89.677455][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.703204][ T2485] cgroup: fork rejected by pids controller in /syz0 [ 89.830723][ T13] tipc: Left network mode [ 89.836924][ T13] veth1_macvtap: left promiscuous mode [ 89.842452][ T13] veth0_vlan: left promiscuous mode [ 92.084448][ T2648] netlink: 'syz.0.802': attribute type 6 has an invalid length. [ 94.823506][ T36] kauditd_printk_skb: 114 callbacks suppressed [ 94.823523][ T36] audit: type=1400 audit(1770516147.404:3746): avc: denied { execmem } for pid=2669 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 94.850209][ T36] audit: type=1400 audit(1770516147.434:3747): avc: denied { mounton } for pid=2670 comm="syz.1.811" path="/172" dev="tmpfs" ino=941 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 94.855114][ T2674] netlink: 'syz.3.812': attribute type 4 has an invalid length. [ 94.880235][ T2674] netlink: 3657 bytes leftover after parsing attributes in process `syz.3.812'. [ 94.896015][ T36] audit: type=1400 audit(1770516147.474:3748): avc: denied { read write } for pid=291 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 94.920154][ T36] audit: type=1400 audit(1770516147.484:3749): avc: denied { read write } for pid=293 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 95.938019][ T36] audit: type=1400 audit(1770516148.524:3751): avc: denied { read write } for pid=2677 comm="syz.3.814" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 95.964125][ T36] audit: type=1400 audit(1770516148.524:3750): avc: denied { execmem } for pid=2676 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 95.983643][ T36] audit: type=1400 audit(1770516148.524:3752): avc: denied { mounton } for pid=2677 comm="syz.3.814" path="/230/file0" dev="tmpfs" ino=1238 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 96.006364][ T36] audit: type=1400 audit(1770516148.544:3753): avc: denied { read write } for pid=2679 comm="syz.1.813" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 96.029999][ T36] audit: type=1400 audit(1770516148.544:3754): avc: denied { write } for pid=2679 comm="syz.1.813" name="netlink" dev="proc" ino=4026532310 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 [ 96.052950][ T36] audit: type=1400 audit(1770516148.544:3755): avc: denied { mount } for pid=2679 comm="syz.1.813" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=0 [ 97.161844][ T2687] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2687 comm=syz.3.817 [ 99.897058][ T36] kauditd_printk_skb: 23 callbacks suppressed [ 99.897075][ T36] audit: type=1400 audit(1770516152.484:3779): avc: denied { execmem } for pid=2697 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 99.924937][ T36] audit: type=1400 audit(1770516152.484:3780): avc: denied { read write } for pid=2699 comm="syz.0.821" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 99.948519][ T36] audit: type=1400 audit(1770516152.504:3781): avc: denied { create } for pid=2698 comm="syz.3.823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=0 [ 99.968052][ T36] audit: type=1400 audit(1770516152.504:3782): avc: denied { read write } for pid=2700 comm="syz.1.822" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 99.991645][ T36] audit: type=1400 audit(1770516152.514:3783): avc: denied { read } for pid=2698 comm="syz.3.823" dev="nsfs" ino=4026532534 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 100.012741][ T36] audit: type=1400 audit(1770516152.514:3784): avc: denied { create } for pid=2698 comm="syz.3.823" anonclass=[secretmem] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 100.034012][ T36] audit: type=1400 audit(1770516152.534:3785): avc: denied { read write } for pid=293 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 100.420254][ T36] audit: type=1400 audit(1770516153.004:3786): avc: denied { read write } for pid=290 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 100.451855][ T36] audit: type=1400 audit(1770516153.034:3787): avc: denied { read write } for pid=291 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 101.436314][ T36] audit: type=1400 audit(1770516154.014:3788): avc: denied { execmem } for pid=2704 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 105.295806][ T36] kauditd_printk_skb: 101 callbacks suppressed [ 105.295826][ T36] audit: type=1400 audit(1770516157.874:3887): avc: denied { read write } for pid=290 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 105.328053][ T36] audit: type=1400 audit(1770516157.914:3888): avc: denied { read write } for pid=293 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 105.352129][ T36] audit: type=1400 audit(1770516157.924:3889): avc: denied { read write } for pid=291 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 106.594435][ T36] audit: type=1400 audit(1770516159.174:3890): avc: denied { read write } for pid=2734 comm="syz.0.834" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 106.623915][ T36] audit: type=1400 audit(1770516159.174:3891): avc: denied { mounton } for pid=2735 comm="syz.1.835" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=0 [ 106.648033][ T36] audit: type=1400 audit(1770516159.174:3892): avc: denied { read write } for pid=291 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 106.672179][ T36] audit: type=1400 audit(1770516159.204:3893): avc: denied { execmem } for pid=2733 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 106.691614][ T36] audit: type=1400 audit(1770516159.204:3894): avc: denied { read } for pid=2739 comm="syz.1.837" name="usbmon0" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=0 [ 106.714918][ T36] audit: type=1400 audit(1770516159.204:3895): avc: denied { create } for pid=2737 comm="syz.3.836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 106.735376][ T36] audit: type=1400 audit(1770516159.204:3896): avc: denied { create } for pid=2739 comm="syz.1.837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 110.545890][ T36] kauditd_printk_skb: 18 callbacks suppressed [ 110.545907][ T36] audit: type=1400 audit(1770516163.124:3915): avc: denied { read write } for pid=2752 comm="syz.1.841" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 110.625431][ T36] audit: type=1400 audit(1770516163.134:3916): avc: denied { create } for pid=2752 comm="syz.1.841" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 110.671396][ T36] audit: type=1400 audit(1770516163.134:3917): avc: denied { create } for pid=2752 comm="syz.1.841" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 110.716742][ T36] audit: type=1400 audit(1770516163.144:3918): avc: denied { read } for pid=2751 comm="syz.3.842" name="binder1" dev="binder" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 110.766717][ T36] audit: type=1400 audit(1770516163.164:3919): avc: denied { execmem } for pid=2749 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 110.808756][ T36] audit: type=1400 audit(1770516163.164:3920): avc: denied { write } for pid=283 comm="syz-executor" path="pipe:[3130]" dev="pipefs" ino=3130 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 110.834103][ T36] audit: type=1400 audit(1770516163.164:3921): avc: denied { write } for pid=283 comm="syz-executor" path="pipe:[3130]" dev="pipefs" ino=3130 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 110.857306][ T36] audit: type=1400 audit(1770516163.164:3922): avc: denied { write } for pid=283 comm="syz-executor" path="pipe:[3130]" dev="pipefs" ino=3130 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 110.880442][ T36] audit: type=1400 audit(1770516163.164:3923): avc: denied { write } for pid=283 comm="syz-executor" path="pipe:[3130]" dev="pipefs" ino=3130 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 110.904347][ T36] audit: type=1400 audit(1770516163.164:3924): avc: denied { write } for pid=283 comm="syz-executor" path="pipe:[3130]" dev="pipefs" ino=3130 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 110.928578][ T46] bridge_slave_1: left allmulticast mode [ 110.934251][ T46] bridge_slave_1: left promiscuous mode [ 110.939964][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.957276][ T46] bridge_slave_0: left allmulticast mode [ 110.962971][ T46] bridge_slave_0: left promiscuous mode [ 110.976788][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.109919][ T46] veth1_macvtap: left promiscuous mode [ 111.115432][ T46] veth0_vlan: left promiscuous mode [ 111.358239][ T46] bridge_slave_1: left allmulticast mode [ 111.363897][ T46] bridge_slave_1: left promiscuous mode [ 111.369586][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.377151][ T46] bridge_slave_0: left allmulticast mode [ 111.382798][ T46] bridge_slave_0: left promiscuous mode [ 111.388525][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.558903][ T46] veth1_macvtap: left promiscuous mode [ 111.564418][ T46] veth0_vlan: left promiscuous mode