last executing test programs: 5m15.279879798s ago: executing program 3 (id=618): prlimit64(0x0, 0xe, &(0x7f00000007c0)={0x8, 0x88}, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x21, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000840)=0x1, &(0x7f0000000880)=0x4) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) r1 = syz_open_dev$vcsu(&(0x7f0000000140), 0x1, 0x20800) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000001c0)={0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x98f903, 0x8000, '\x00', @value64=0x9}}) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000004d00)='./file1\x00', 0x351142, 0x1cd) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c0260000410007010000000007000000017c00000400fc80a72601"], 0x26c0}}, 0x4010) 5m14.853158404s ago: executing program 3 (id=620): mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x9, 0x15031, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x80001) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000100)) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8000}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000400000/0xc00000)=nil, 0xc00000}, 0x5}) ioctl$UFFDIO_CONTINUE(r0, 0xc020aa08, &(0x7f0000000080)={{&(0x7f0000400000/0xc00000)=nil, 0xc00000}}) 5m14.187957773s ago: executing program 3 (id=622): ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00'}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x5, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x400000bce) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000002000)=""/102400, 0x19000) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x8840) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x58000000, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x181900, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x121301, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000140)=0xe) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000085000000a000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = fsopen(&(0x7f0000000040)='exfat\x00', 0x1) fsconfig$FSCONFIG_SET_STRING(r6, 0x1, &(0x7f0000000240)='uid', &(0x7f00000008c0)='0\x00#\x00\xd0\x00 \x00\x00qS\x00\x00\x00\x00\x00\x00\x00\x00$\xf6_\xbdI\x1c\xf2\xa9]\xcc\xe0*\xef\x01\x8d\x15\xd2h\x93\xc9\xb57\xc3\xea\\Eb\xf8\xe6,\xdf\xd4\xfae\x84\xcc\xd5\"d\xf0D-\x98\x9f\x81{\xfc$\xc4\xbcF\xf8\xc8\x8d\xcb\xb8\xf2\x1e\xe4\'U\xb3\xb8\xd3\xe6\xd7\x80=\x8a\xeb\n\xb8_\xe8\x96YY\xe3\xc7\xe6\xf28\x19\xa6\xa7\xfa\xdb\x1ce\xc1\x03\x86J\xb2fh\x19\xee#\xcc\x0f\xed\xfea\xdc\x88\xcb%bW\xd35\xda=\xac\x1d\xae\x93\xfd\'T6\x94\n\xa4\x9cU\xc4\fA~[\xbf\x8b\x90\xfe\x04\xe7U\xf3h\x81\x14l7u\x95\x96t\\\x0f\xef;\x03\xa4C\xbc(Vc!a\xc1\xe39\xc6b\x905\x1f\x03\x00\x00\x00\x00\x00\x00\xdf9\xaf5\xc8a:z\xe4\xcbag&67\x814\xf6}\xe10v6l\xd6,\x1e\xa0\xcc\xbf\xfdkm\b?\x839\x85N\x1c\xc1\xcb\xfc\x85\xd2\n\x02\"\xf2\x81g\x90\x01n%\x7f_\xe1.f>>\xa5\xfb\"\xab\xdb\x06\x12e\x14\x11~\x9a\bR-\x85\xc3\xa9\xe6\xf6R\x11\"\xc3\xc9\xfc\x14s X\xec\xdd\xc2qB\x85\xf0\xd7\x04\xdd<\x9ak\x00\x00\x00\x00\x00\x00\x00\n\xa72\xa3\xef^\xe7\x8f', 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000280)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xffff93d3, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r7, 0x58, &(0x7f0000000300)}, 0x10) prlimit64(0x0, 0x6, &(0x7f00000006c0)={0x7fff, 0x100}, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000000900010073797a30000000002c000000030a01020000000000000000010000000900030073797a30000000000900010073797a300000000058000000060a010400000000000000000100000008000b40000000000900010073797a3000000000300004802c0001800a00010071756575650000001c000280060002400ffe009b06000140faff"], 0xcc}, 0x1, 0x0, 0x0, 0x24000090}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000580)={0x9c, 0x464, 0x200, 0x70bd2b, 0x25dfdbfb, "e00c60b0eda60303bde13d74dddde18f4891bf814cba793c20523011c3b0d09b8f5364ca2a3e437fb31cb874b90d7e5d64057768d1273e2898c77a5f89a710db509980b95e92b332700f00d412c9008cfcebfde4e22932ee834b2f4175e7ee8573584cda1cbf0d8ee33018e75d0408f48fb83ce4c2ed3e7fd6369089be4273d029d3d6760b6b1a91fe93", ["", "", ""]}, 0x9c}, 0x1, 0x0, 0x0, 0x4000}, 0x800) sendmsg$nl_route(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@ipv4_newrule={0x2c, 0x20, 0x301, 0x0, 0x25dfdbfb, {0x2, 0x20}, [@FRA_DST={0x8, 0x1, @empty}, @FRA_FLOW={0x8}]}, 0x2c}}, 0x0) sendmsg$RDMA_NLDEV_CMD_DELLINK(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x18, 0x1404, 0x1, 0x70bd28, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000}, 0x8044) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSMRU1(r2, 0x40047457, 0x0) 5m12.350302997s ago: executing program 3 (id=629): socket(0x10, 0x803, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f00000007c0)={0x8, 0x200088}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r2 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r2, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) openat$vmci(0xffffffffffffff9c, 0x0, 0x2, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x200, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000a00)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) chdir(&(0x7f00000001c0)='./bus\x00') rmdir(&(0x7f0000000380)='./file0/../file0\x00') mknodat$null(0xffffffffffffffff, 0x0, 0x4, 0x103) mount$9p_tcp(0x0, &(0x7f0000000040)='./cgroup\x00', 0x0, 0x800000, &(0x7f0000000140)={'trans=tcp,', {'port', 0x3d, 0x20000004e23}}) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0xf000) mmap$dsp(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000b, 0x30, r3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYRES32], 0x38}}, 0x0) syz_open_dev$dri(&(0x7f00000000c0), 0x1, 0x400) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) r4 = socket(0x15, 0x5, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[], 0x7c}}, 0x0) getsockopt(r4, 0x200000000114, 0x2715, 0x0, &(0x7f0000000000)) 5m10.923915492s ago: executing program 3 (id=634): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='clear_refs\x00') writev(r1, &(0x7f0000000100)=[{&(0x7f0000000140)="ce4f4b25814943ab14c80ee0d352e55647b9850d97c0332699a006e3ddfc94c9337ac05de912c8b3ac34a3a608e051aeba85ad04e0b40f4b3764e3477e99ea924cdc8abd795d017a309287fa2e124ea46b0874865a2d4ae277c6f55276cb38deefc3e96ff621bc06457069cddc7705c2844f1f6b96025fd1255bd0f569d43c0e433b409d0d5336b3081192a034bee316989fe5ccc08210", 0x97}], 0x1) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) add_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000002c0)="7d38dc21129acb6f6e7e6ce768fef8a9620243599be7a0001f9c65f3707e98dd8b6244db15fb11f0bf65ed86cf196647c4b67c747b5337faa29ac8408d9a55570cc3282c137e5810945323ce788deed6b970fc9fe71a998948026a919372c791f5aa90ac3cdef2bf5a823d198468b5edf115acf0d62408ed7e577c4f69a42bc1e1e182b189dfa01f65766463821352844fd5", 0x92, 0xfffffffffffffff8) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) sendmsg$nl_route_sched(r0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000080)=@getchain={0x2c, 0x66, 0x200, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x10, 0x3}, {0xf3aefd6ed11156e9}, {0x0, 0xb}}, [{0x8, 0xb, 0x9}]}, 0x2c}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), r3) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)={0x44, r4, 0x1, 0x70bd25, 0x25df5bfb, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_WPAN_DEV={0x0, 0x6, 0x200000002}]}, 0x44}, 0x1, 0x0, 0x0, 0x40c4}, 0x40800) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), r3) 5m10.288492495s ago: executing program 3 (id=636): mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000180)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(0xffffffffffffffff, 0xc1004110, &(0x7f0000000000)={0x0, [0x0, 0xffff133a, 0x3], [{0x0, 0x0, 0x0, 0x1}, {0x35, 0x35}, {0x0, 0x8}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xe6f6}], 0xc}) unshare(0x2040600) r4 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e27, 0xffffffff, @mcast2, 0x5}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r4, 0x29, 0x3b, &(0x7f0000000080)=ANY=[], 0x8) sendmmsg$inet6(r4, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x4001c00) chdir(&(0x7f0000000140)='./bus\x00') creat(&(0x7f0000000ac0)='./file0\x00', 0x0) chown(&(0x7f00000003c0)='./file0\x00', 0x0, 0xee01) lsetxattr$system_posix_acl(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='system.posix_acl_access\x00', &(0x7f0000000300)={{}, {}, [], {}, [], {0x10, 0x2}}, 0x24, 0x0) creat(&(0x7f0000000ac0)='./file0\x00', 0x0) 4m54.91943029s ago: executing program 32 (id=636): mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000180)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(0xffffffffffffffff, 0xc1004110, &(0x7f0000000000)={0x0, [0x0, 0xffff133a, 0x3], [{0x0, 0x0, 0x0, 0x1}, {0x35, 0x35}, {0x0, 0x8}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xe6f6}], 0xc}) unshare(0x2040600) r4 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e27, 0xffffffff, @mcast2, 0x5}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r4, 0x29, 0x3b, &(0x7f0000000080)=ANY=[], 0x8) sendmmsg$inet6(r4, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x4001c00) chdir(&(0x7f0000000140)='./bus\x00') creat(&(0x7f0000000ac0)='./file0\x00', 0x0) chown(&(0x7f00000003c0)='./file0\x00', 0x0, 0xee01) lsetxattr$system_posix_acl(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='system.posix_acl_access\x00', &(0x7f0000000300)={{}, {}, [], {}, [], {0x10, 0x2}}, 0x24, 0x0) creat(&(0x7f0000000ac0)='./file0\x00', 0x0) 4m50.563095314s ago: executing program 0 (id=706): ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00'}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x5, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x400000bce) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000002000)=""/102400, 0x19000) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x8840) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x58000000, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x181900, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x121301, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000140)=0xe) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000085000000a000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = fsopen(&(0x7f0000000040)='exfat\x00', 0x1) fsconfig$FSCONFIG_SET_STRING(r6, 0x1, &(0x7f0000000240)='uid', &(0x7f00000008c0)='0\x00#\x00\xd0\x00 \x00\x00qS\x00\x00\x00\x00\x00\x00\x00\x00$\xf6_\xbdI\x1c\xf2\xa9]\xcc\xe0*\xef\x01\x8d\x15\xd2h\x93\xc9\xb57\xc3\xea\\Eb\xf8\xe6,\xdf\xd4\xfae\x84\xcc\xd5\"d\xf0D-\x98\x9f\x81{\xfc$\xc4\xbcF\xf8\xc8\x8d\xcb\xb8\xf2\x1e\xe4\'U\xb3\xb8\xd3\xe6\xd7\x80=\x8a\xeb\n\xb8_\xe8\x96YY\xe3\xc7\xe6\xf28\x19\xa6\xa7\xfa\xdb\x1ce\xc1\x03\x86J\xb2fh\x19\xee#\xcc\x0f\xed\xfea\xdc\x88\xcb%bW\xd35\xda=\xac\x1d\xae\x93\xfd\'T6\x94\n\xa4\x9cU\xc4\fA~[\xbf\x8b\x90\xfe\x04\xe7U\xf3h\x81\x14l7u\x95\x96t\\\x0f\xef;\x03\xa4C\xbc(Vc!a\xc1\xe39\xc6b\x905\x1f\x03\x00\x00\x00\x00\x00\x00\xdf9\xaf5\xc8a:z\xe4\xcbag&67\x814\xf6}\xe10v6l\xd6,\x1e\xa0\xcc\xbf\xfdkm\b?\x839\x85N\x1c\xc1\xcb\xfc\x85\xd2\n\x02\"\xf2\x81g\x90\x01n%\x7f_\xe1.f>>\xa5\xfb\"\xab\xdb\x06\x12e\x14\x11~\x9a\bR-\x85\xc3\xa9\xe6\xf6R\x11\"\xc3\xc9\xfc\x14s X\xec\xdd\xc2qB\x85\xf0\xd7\x04\xdd<\x9ak\x00\x00\x00\x00\x00\x00\x00\n\xa72\xa3\xef^\xe7\x8f', 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000280)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xffff93d3, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0x0, @void, @value, @void, @value}, 0x50) prlimit64(0x0, 0x6, &(0x7f00000006c0)={0x7fff, 0x100}, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000000900010073797a30000000002c000000030a01020000000000000000010000000900030073797a30000000000900010073797a300000000058000000060a010400000000000000000100000008000b40000000000900010073797a3000000000300004802c0001800a00010071756575650000001c000280060002400ffe009b06000140faff"], 0xcc}, 0x1, 0x0, 0x0, 0x24000090}, 0x0) r7 = socket$nl_rdma(0x10, 0x3, 0x14) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000580)={0x9c, 0x464, 0x200, 0x70bd2b, 0x25dfdbfb, "e00c60b0eda60303bde13d74dddde18f4891bf814cba793c20523011c3b0d09b8f5364ca2a3e437fb31cb874b90d7e5d64057768d1273e2898c77a5f89a710db509980b95e92b332700f00d412c9008cfcebfde4e22932ee834b2f4175e7ee8573584cda1cbf0d8ee33018e75d0408f48fb83ce4c2ed3e7fd6369089be4273d029d3d6760b6b1a91fe93", ["", "", ""]}, 0x9c}, 0x1, 0x0, 0x0, 0x4000}, 0x800) sendmsg$nl_route(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@ipv4_newrule={0x2c, 0x20, 0x301, 0x0, 0x25dfdbfb, {0x2, 0x20}, [@FRA_DST={0x8, 0x1, @empty}, @FRA_FLOW={0x8}]}, 0x2c}}, 0x0) sendmsg$RDMA_NLDEV_CMD_DELLINK(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x18, 0x1404, 0x1, 0x70bd28, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000}, 0x8044) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSMRU1(r2, 0x40047457, 0x0) 4m49.9046059s ago: executing program 0 (id=711): syz_emit_ethernet(0x3e, &(0x7f00000003c0)={@local, @empty, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x2000, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010103, @local}, @time_exceeded={0xb, 0x1, 0x0, 0x3, 0xc3, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, @loopback, @local}}}}}}, 0x0) 4m49.706141972s ago: executing program 0 (id=713): prlimit64(0x0, 0xe, &(0x7f00000007c0)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB='<8\x00'/13, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012800b00010067726574617000000c00028005000a0001000000"], 0x3c}}, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r1, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000010c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x460, 0x280, 0x268, 0x300, 0x280, 0x268, 0x390, 0x460, 0x460, 0x390, 0x460, 0x9, 0x0, {[{{@uncond, 0x0, 0x240, 0x280, 0x0, {0x9401}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0xb, 0x0, 0x3, 0x0, 0x5, 0x9}}}, @common=@unspec=@limit={{0x48}, {0xfff, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x2}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x8, 0x21, "6bb6778f9bdec125b0fb4f26be757b1e6f2fb8e9079627dc6726c4bc85e9"}}}, {{@ipv6={@private2, @remote, [], [], 'ip6gretap0\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x511) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000480)={0xa, 0x102, 0x2, @private0, 0xa}, 0x44) setsockopt$inet6_tcp_int(r3, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r3, &(0x7f0000000340)='g', 0x1, 0x20000045, &(0x7f0000000700)={0xa, 0x2, 0x398, @empty}, 0x1c) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00', 0x0}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r6, @ANYBLOB="11072abd7000ffdbdf250500000008000300", @ANYRES32=r7], 0x1c}, 0x1, 0x0, 0x0, 0x28008000}, 0x40000) readv(r5, &(0x7f0000000740)=[{&(0x7f0000000240)=""/152, 0x98}], 0x1) r8 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)={0x3c, r8, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xffffffff}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}]}, 0x3c}, 0x1, 0x0, 0x0, 0x48880}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000500)=""/142, 0x8e}, {&(0x7f00000000c0)=""/36, 0x24}, {&(0x7f00000005c0)=""/241, 0xf1}, {0x0}, {&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f0000000880)=""/193, 0xc1}, {&(0x7f0000000240)=""/105, 0x69}, {&(0x7f0000000380)=""/80, 0x50}, {&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000002580)=""/4096, 0x1000}], 0xa}, 0x40000100) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='bic\x00', 0x4) shutdown(r3, 0x1) fanotify_init(0x8, 0x101000) openat$audio(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) 4m47.415240154s ago: executing program 0 (id=718): r0 = socket$packet(0x11, 0x3, 0x300) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x99) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x891018, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000240)='./file0/../file0\x00', 0x0, 0x101091, 0x0) syz_usb_connect(0x0, 0x24, &(0x7f0000000140)={{0x12, 0x1, 0x0, 0x41, 0x3f, 0x5f, 0x20, 0x61d, 0xc150, 0xce6f, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x10, 0x0, [{{0x9, 0x4, 0x33, 0x0, 0x0, 0x18, 0x70, 0xfd}}]}}]}}, 0x0) umount2(&(0x7f0000000480)='./file0\x00', 0x0) r2 = accept$packet(r0, &(0x7f0000000040), &(0x7f0000000080)=0x14) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000680), r4) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000300)={0x44, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010100}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @remote}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x4000) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000000180)=0x800001, 0x4) setsockopt$sock_int(r3, 0x1, 0x31, &(0x7f0000000200), 0x4) listen(r3, 0x0) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0xfc, 0x0, 0x7fff0000}]}) close_range(r6, 0xffffffffffffffff, 0x0) getsockopt$packet_int(r2, 0x107, 0x13, 0x0, &(0x7f0000000000)) 4m44.681877781s ago: executing program 0 (id=726): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="180300000005000000000000000000001801000011af000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000d5030000020000838500000071000000180100002020752500000000806020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) prlimit64(0x0, 0xa, &(0x7f0000000380)={0x6, 0xfffffffffffffffd}, 0x0) timer_create(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001d40)={&(0x7f00000009c0)='sched_switch\x00'}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xc, 0x8000008b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0xc) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000000), r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff}) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000280)={0x38, r3, 0x1, 0x70bd2a, 0x25dfdbfa, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_SOCKETS={0x10, 0x7, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r4}}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x5, 0xa, '.'}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000040}, 0x4010044) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000001c0)={'wpan0\x00'}) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') write$USERIO_CMD_REGISTER(r5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0x1, 0x0, 0x0) connect$unix(r6, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x0, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000300)={@local, @multicast, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "7f00ef", 0x30, 0x2c, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010102}, @mcast2, {[@hopopts={0x89, 0x1, '\x00', [@generic={0x4, 0x7, "6a092bd064beec"}]}], {0x0, 0x0, 0x18, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}, "00975a95ad972a6476a3f785"}}}}}}}, 0x0) recvmmsg(r6, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000000)={'syztnl1\x00', &(0x7f00000000c0)={'syztnl1\x00', 0x0, 0x4, 0x3, 0x3, 0x4, 0x2c, @private1={0xfc, 0x1, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0x33}, 0x7, 0x10, 0x75, 0x1800}}) bind$xdp(r8, &(0x7f0000000180)={0x2c, 0x0, r9, 0x33}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file1\x00', &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x1c, 0x0) 4m41.855397081s ago: executing program 0 (id=736): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x6f, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffcc8, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r1, 0x10f, 0x84, &(0x7f0000000780), &(0x7f00000007c0)=0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa33"], 0xfdef) socket$nl_sock_diag(0x10, 0x3, 0x4) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0)={0x0, r0}, 0x8) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000003c0), 0x10102, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x5, 0xd50, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x80040000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) syz_open_dev$dri(&(0x7f0000000100), 0x8, 0x10000) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@remote, @in=@local, 0x4e24, 0x0, 0x0, 0x4, 0xa, 0x0, 0x20}, {0x0, 0x0, 0x0, 0x1, 0x5}, {0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@rand_addr=0x64010102, 0x0, 0x2b}, 0x0, @in=@remote}}, 0xe8) r4 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020b000102"], 0x10}}, 0x0) sendmsg$key(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="0212000002"], 0x10}}, 0x0) r5 = fsopen(&(0x7f0000000280)='ceph\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r5, 0x1, &(0x7f0000000b40)='source', &(0x7f0000000040)='c:::\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r5, 0x6, 0x0, 0x0, 0x0) r6 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r6}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) fsconfig$FSCONFIG_SET_STRING(r5, 0x1, &(0x7f0000000480)='\xf5\xfc\xd2\xec]\x95zx8*\xa2d\x11\xb5\xb1\x01\x00\x00\x00\xe49{\x8a{\x81s\xea$\xdfg\xb1\x03DY!\x97\xadM\xd7\xff\x8a\xcd[>\x12e\xc3]d8\xba\x8ec\x00\x00\x00\x00\x00\x00\x00\xa0\xe2\xd5y\xec\x90\x00\x98Y\x91\x19\x16\x89\xd0\x1a\xad\xcd\xd6\xd0\xc6\xb9\xeb\x95\xd3\x9cl\x9cu#\xb4\xee\xe5\x9d\t\fV\xd4\xda\xfc`2?\x15P\xba\x14b\x1c\xcc\xd5\xb9jA$s\xb9g3\x15M\xd9\xb9 \xca[\xc7\xec\xa9;\xee\x01\xc9\xc4\x1f\xc3\xe4\xfa\xd3fU\x0e\x86\xc8\xa7\xaf\xaf\x04p\xa3\x8bb\xbf\\\xdb\x83\x00\x96sy\x14\x1eo\xcc9&\x946\xf9\xf5v\xee\xb5m$;\x01\xb8\xeau\x00\xd1S=\x920H\xc2z\xb5\xbe\x95\xef\xeb\xd1\xc8\xa1\xba\xach\xbef\xa8\x86\xc2\x18\x9cC\x15\x9c^\xcf\xe9\xbcp\xb4Ff\x00\x9d>p\"\x19\xd8}|~\xae\xdb\a59f\xb8?\xba\xf2\x8e\xa5y\\\xf0\fkd??-\x983\xf3\x19\xc7\xc0/\xe9\x1a\x80=\xa72)\xd2\x00'/277, &(0x7f0000000340)='/\x00\x01\x00H\x98', 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000015000103"], 0x14}}, 0x0) close(r3) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000480)={0x0, 0x22, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[], 0xb8}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) 4m40.53173355s ago: executing program 33 (id=736): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x6f, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffcc8, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r1, 0x10f, 0x84, &(0x7f0000000780), &(0x7f00000007c0)=0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa33"], 0xfdef) socket$nl_sock_diag(0x10, 0x3, 0x4) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0)={0x0, r0}, 0x8) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000003c0), 0x10102, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x5, 0xd50, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x80040000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) syz_open_dev$dri(&(0x7f0000000100), 0x8, 0x10000) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@remote, @in=@local, 0x4e24, 0x0, 0x0, 0x4, 0xa, 0x0, 0x20}, {0x0, 0x0, 0x0, 0x1, 0x5}, {0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@rand_addr=0x64010102, 0x0, 0x2b}, 0x0, @in=@remote}}, 0xe8) r4 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020b000102"], 0x10}}, 0x0) sendmsg$key(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="0212000002"], 0x10}}, 0x0) r5 = fsopen(&(0x7f0000000280)='ceph\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r5, 0x1, &(0x7f0000000b40)='source', &(0x7f0000000040)='c:::\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r5, 0x6, 0x0, 0x0, 0x0) r6 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r6}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) fsconfig$FSCONFIG_SET_STRING(r5, 0x1, &(0x7f0000000480)='\xf5\xfc\xd2\xec]\x95zx8*\xa2d\x11\xb5\xb1\x01\x00\x00\x00\xe49{\x8a{\x81s\xea$\xdfg\xb1\x03DY!\x97\xadM\xd7\xff\x8a\xcd[>\x12e\xc3]d8\xba\x8ec\x00\x00\x00\x00\x00\x00\x00\xa0\xe2\xd5y\xec\x90\x00\x98Y\x91\x19\x16\x89\xd0\x1a\xad\xcd\xd6\xd0\xc6\xb9\xeb\x95\xd3\x9cl\x9cu#\xb4\xee\xe5\x9d\t\fV\xd4\xda\xfc`2?\x15P\xba\x14b\x1c\xcc\xd5\xb9jA$s\xb9g3\x15M\xd9\xb9 \xca[\xc7\xec\xa9;\xee\x01\xc9\xc4\x1f\xc3\xe4\xfa\xd3fU\x0e\x86\xc8\xa7\xaf\xaf\x04p\xa3\x8bb\xbf\\\xdb\x83\x00\x96sy\x14\x1eo\xcc9&\x946\xf9\xf5v\xee\xb5m$;\x01\xb8\xeau\x00\xd1S=\x920H\xc2z\xb5\xbe\x95\xef\xeb\xd1\xc8\xa1\xba\xach\xbef\xa8\x86\xc2\x18\x9cC\x15\x9c^\xcf\xe9\xbcp\xb4Ff\x00\x9d>p\"\x19\xd8}|~\xae\xdb\a59f\xb8?\xba\xf2\x8e\xa5y\\\xf0\fkd??-\x983\xf3\x19\xc7\xc0/\xe9\x1a\x80=\xa72)\xd2\x00'/277, &(0x7f0000000340)='/\x00\x01\x00H\x98', 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000015000103"], 0x14}}, 0x0) close(r3) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000480)={0x0, 0x22, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[], 0xb8}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) 4m24.623031065s ago: executing program 1 (id=774): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @my=0x1}, 0x10) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) sendmmsg$inet6(r2, &(0x7f0000000500)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f0000000440)=[{&(0x7f00000002c0)="701a868648113e6286dc556ba15e3a09575284a2d47cc8279d892403c059b03e585d31b926d58bfc5e2c7bee4fe40a80e277dc6b989b564e08ab5ad872b13110", 0x40}], 0x1}}, {{&(0x7f00000001c0)={0xa, 0x4e25, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9}, 0x1c, &(0x7f00000003c0)=[{&(0x7f0000001440)="95", 0x1}], 0x1}}], 0x2, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x2) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x74, 0x0, 0x0) setsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f0000000300)=0xff, 0x4) ioctl$KVM_RUN(r6, 0xae80, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000003, 0x4c831, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) r7 = syz_init_net_socket$ax25(0x3, 0x3, 0xc3) recvfrom$ax25(r7, 0x0, 0x0, 0x100, 0x0, 0x0) shutdown(r2, 0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e23, 0x4, @empty, 0x40}}, 0x2, 0x9}, 0x90) (fail_nth: 1) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000400)='dctcp\x00', 0x6) r8 = syz_io_uring_setup(0x400022f, &(0x7f0000000480)={0x0, 0x5325, 0x20000, 0x0, 0x113}, &(0x7f0000000180)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r9, r10, &(0x7f00000009c0)=@IORING_OP_CLOSE={0x13, 0x40, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x1}) io_uring_enter(r8, 0x7a98, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r8, 0x1c60, 0xbc59, 0x8, &(0x7f0000000140)={[0xafb]}, 0x8) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) 4m22.548196601s ago: executing program 1 (id=778): syz_usb_connect(0x3, 0x35, &(0x7f0000000340)=ANY=[@ANYBLOB="12010000b58f55408205d5b9f773000000010902230001000000000904080001fff56a00082502017f040e0009050b02ff"], 0x0) accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000000)) (async) r0 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000000)) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x10, r0, 0x48e6c000) openat$incfs(0xffffffffffffff9c, 0x0, 0x204100, 0x108) 4m20.776765791s ago: executing program 1 (id=783): openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000680), 0x652140, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') mount$9p_fd(0x0, &(0x7f0000000100)='.\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = socket$nl_route(0x10, 0x3, 0x0) syz_usb_control_io$printer(0xffffffffffffffff, &(0x7f0000000340)={0x14, &(0x7f0000000440)={0x20, 0x30, 0xbb, {0xbb, 0x6, "6acf5e46e0bd018b160dd9ee0e4460951d847026e92c6d47186b44b66949254692a35161a57ea5da9ce15dc7c08169bed302ce76e9c2880e62801ddcdde72b8c0d8b848e24db020647cf0ac6c7e41fbf80e7d50a72f0ba675e7f1d7bcad4402fcc9daebf14613fd0fd38a5b995d04d162410333dec9309370523224c32bda41276a6e7fa23c68d681a9533b284809e81cf00111bf12132f78bff3332a317e0fac8cda542d28b2d65219853b56dfed4b095d2906db8729f3591"}}, &(0x7f00000002c0)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x3409}}}, &(0x7f0000000640)={0x34, &(0x7f0000000380)={0x20, 0x17, 0x2a, "3de0017b8f4e14a71c12ed819b544aa049de19aa1c083d4749ea627bc03a19ca234fc6e8fcc4298e36ff"}, &(0x7f00000003c0)={0x0, 0xa, 0x1, 0x6c}, &(0x7f0000000540)={0x0, 0x8, 0x1, 0x9}, &(0x7f0000000580)={0x20, 0x0, 0x28, {0x26, "082d2831bc8ad7c97e670c012286c476a69ad0c610d57d610d0adcffb704f753fb95525b695e"}}, &(0x7f00000005c0)={0x20, 0x1, 0x1, 0xc}, &(0x7f0000000600)={0x20, 0x0, 0x1, 0x8}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000200)=@newlink={0x28, 0x12, 0x503, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000200)={'\x00', 0x3, 0x1ff, 0x8, 0xc000, 0x9e42, 0x0}) sched_setaffinity(r6, 0x8, &(0x7f0000000140)=0x2) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x76}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r8, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x409, 0x0, 0x0, {0x0, 0x0, 0x0, r9, 0x40}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_MCAST_TO_UCAST={0x5}]}}}]}, 0x44}}, 0x0) 4m19.291981633s ago: executing program 1 (id=785): memfd_create(0x0, 0xbd646ea69d32c8d5) socket$nl_netfilter(0x10, 0x3, 0xc) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x12b) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='configfs\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x118005, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000001000000850000000e000000850000000500000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000040)='sys_exit\x00', r1, 0x0, 0x4}, 0x18) capget(0x0, 0x0) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x80000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) move_mount(r0, &(0x7f00000001c0)='./file0/file0\x00', r2, &(0x7f0000000040)='./file0\x00', 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x1, 0x4, 0x201, 0x0, 0x0, {0x7, 0x0, 0x3}, [@NFULA_CFG_QTHRESH={0x0, 0x5, 0x1, 0x0, 0x8}, @NFULA_CFG_NLBUFSIZ={0xfffffffffffffe81, 0x3, 0x1, 0x0, 0x8dd2}]}, 0x24}, 0x1, 0x0, 0x0, 0x845}, 0x8000) 4m19.143928378s ago: executing program 1 (id=786): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000090f00080000000000000000850000000e000000850000007d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_emit_ethernet(0x46, 0x0, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000100), 0x2, 0x141121) r2 = dup(r1) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) r3 = syz_io_uring_setup(0x4518, &(0x7f0000000300)={0x0, 0x40ae, 0x10000, 0x2, 0x3f, 0x0, r2}, &(0x7f0000000380)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000140)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r1}) io_uring_enter(r3, 0x2def, 0x4000, 0x0, 0x0, 0x0) r6 = syz_open_dev$dri(&(0x7f0000000080), 0x1, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r6, 0xc018643a, &(0x7f00000000c0)={0x4000001, 0x71, 0x200000009}) pread64(r6, 0x0, 0x0, 0xce2) syz_usb_connect(0x0, 0x24, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000500)='sys_exit\x00', r0}, 0x10) writev(r0, &(0x7f0000000340)=[{&(0x7f00000001c0)="8c3b3395e8d135fa617e1cf477e004caae8738f0e2614190fbd3758ab620586f215f6e008a2e8fe742031ee6ddfa0a3203d9ad68eacd9cf62ece6f3030554e5fec9d84ea4f6db9a8c17ccf0a769d583c05a56641f9524ce279cd3025284b513c9f33a40387c5d25726d6c7fef5ae97013a8bb1bee9976e79c49e27f5ca615b7729d1462ea451c98704", 0x89}, {&(0x7f0000000000)="2b5ccb9e6a0b9fb72550c8bee925915ea1306991fbf645fcac891a6a88c0cbd379d5", 0x22}, {&(0x7f0000000480)="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", 0xfb}, {&(0x7f00000002c0)="32cab162c9508c29e3c6a66e5562323f5a10ab6e9720963f221ef1ee51c9752bf007fbedafdde949210c3ca119a690606474f6336283c790f231026be612feaba7534ee1a585bfa68e03c81f50c2bea9baf8360f48e39802e23aa96de81be7a58679f770714228857a73ce9e136bae4d33ad", 0x72}], 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000280)="db", 0x1}], 0x1}, 0x41) recvmsg(r7, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x10001) r9 = syz_usb_connect(0x2, 0x3f, &(0x7f0000000040)=ANY=[@ANYBLOB="1201000016038308c5109a8146e40102230109022d0001000000000904000003030000000905be3b"], 0x0) syz_usb_control_io(r9, 0x0, &(0x7f0000000bc0)={0x84, &(0x7f0000000600)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f00000005c0)={0x2, &(0x7f0000000580)=[{0x5, 0xf7, 0x9, 0x3}, {0x9, 0x8, 0x6, 0x289a}]}, 0x10) syz_usb_control_io$printer(r9, 0x0, &(0x7f0000000440)={0x34, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x20, 0x1, 0x1, 0x4}, 0x0}) syz_usb_control_io(r9, 0x0, 0x0) syz_usb_control_io$uac1(r9, 0x0, 0x0) syz_usb_control_io$printer(r9, 0x0, 0x0) syz_usb_control_io(r9, 0x0, 0x0) syz_usb_control_io$hid(r9, 0x0, &(0x7f0000000f40)={0x2c, 0x0, 0x0, 0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB="000000000003"], 0x0}) syz_usb_control_io$cdc_ecm(r9, 0x0, 0x0) sendmsg$inet(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000380)="fb", 0x1}], 0x1, &(0x7f00000000c0)=ANY=[@ANYRES8=r9], 0x58}, 0x8082) socket$nl_generic(0x10, 0x3, 0x10) 4m18.952798885s ago: executing program 1 (id=787): openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000500)=ANY=[@ANYBLOB="12010000000000207d1e5a2d00000000000109022400010000000009040000010300000009210000000122080009058103"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f0000000340)={0xd, {{0x2, 0x4e20, @multicast1}}, {{0x2, 0x4, @empty}}}, 0x108) getsockopt$inet_buf(r1, 0x0, 0x30, &(0x7f0000000340)=""/225, &(0x7f0000000180)=0xe1) syz_usb_control_io$hid(r0, &(0x7f0000000140)={0x24, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="002208000000a20100c3"], 0x0}, 0x0) syz_open_dev$hiddev(&(0x7f0000000080), 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xa, 0x9}) read$msr(r2, &(0x7f0000000300)=""/102392, 0x18ff8) semop(0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x1, 0x0, 0x0, 0x0, 0x0) r3 = fspick(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c0000005b08010003001000fdfeff74000000000000000004000200"], 0x1c}, 0x1, 0x0, 0x0, 0x4008018}, 0x4000080) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="190000000400000004000000ff"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000004340)={0x6, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000540)={r6, 0x8, 0x25, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff27, 0x0, 0x0}, 0x19) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x8, 0x0, 0x0, 0x0) fcntl$notify(r4, 0x402, 0xc) sched_setaffinity(0x0, 0x8, &(0x7f0000019380)=0x8ce3) semop(0x0, 0x0, 0x0) r7 = socket$kcm(0x2d, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000380)) 4m18.629147497s ago: executing program 34 (id=787): openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000500)=ANY=[@ANYBLOB="12010000000000207d1e5a2d00000000000109022400010000000009040000010300000009210000000122080009058103"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f0000000340)={0xd, {{0x2, 0x4e20, @multicast1}}, {{0x2, 0x4, @empty}}}, 0x108) getsockopt$inet_buf(r1, 0x0, 0x30, &(0x7f0000000340)=""/225, &(0x7f0000000180)=0xe1) syz_usb_control_io$hid(r0, &(0x7f0000000140)={0x24, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="002208000000a20100c3"], 0x0}, 0x0) syz_open_dev$hiddev(&(0x7f0000000080), 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xa, 0x9}) read$msr(r2, &(0x7f0000000300)=""/102392, 0x18ff8) semop(0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x1, 0x0, 0x0, 0x0, 0x0) r3 = fspick(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c0000005b08010003001000fdfeff74000000000000000004000200"], 0x1c}, 0x1, 0x0, 0x0, 0x4008018}, 0x4000080) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="190000000400000004000000ff"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000004340)={0x6, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000540)={r6, 0x8, 0x25, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff27, 0x0, 0x0}, 0x19) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x8, 0x0, 0x0, 0x0) fcntl$notify(r4, 0x402, 0xc) sched_setaffinity(0x0, 0x8, &(0x7f0000019380)=0x8ce3) semop(0x0, 0x0, 0x0) r7 = socket$kcm(0x2d, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000380)) 4.769641713s ago: executing program 2 (id=2664): mkdirat(0xffffffffffffff9c, 0x0, 0x180) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f00000041c0)="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", 0x2000, 0x0) r0 = open_tree(0xffffffffffffff9c, 0x0, 0x89901) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f00000003c0)={r0, 0xc35, {0x0, 0x0, 0x0, 0x73, 0x0, 0x0, 0x6, 0x17, 0x0, "88f4ed37e6c6fe9bee65d0e352ab81ecf1fe8d1e61217ad8c6d6af45d9826d483c45bc2b839dc9aab618676791b6df25246192cb3216912cb2b0cbff7b2d0695", "595093fad1636094ff5e62d3807f2713136161b2a42da2329b67e0c2390207f8457cc94c80c348a7c9a3496c1f21a9b147c82edb49fc642e4fbfb3ce4be81998", "dfb141bf761ff54e584e2cbf3cb21aa0541f36554b912d2f0c22a64e715f4047", [0x0, 0x5]}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r3 = getpid() r4 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_mptcp_buf(r4, 0x11c, 0x4, 0x0, &(0x7f0000000080)) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r7 = add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r7) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000300), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000640)=0x1800, 0x4) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="050000000000000000000600000008000300", @ANYRES32=r10, @ANYBLOB="0800050002000000da3a0e0ed8099a638e52b9e131fb4c4016ec9da5baf3c823866ca0367bd25b7abe968cd2711025"], 0x24}}, 0x0) r11 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000), 0x22c240, 0x0) fcntl$lock(r11, 0x404, 0x0) sendmsg$NL80211_CMD_CONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="280000d1", @ANYRES16=r9, @ANYBLOB="050000000011000000002e00000008000300", @ANYRES32=r10, @ANYBLOB="0a0034000202020202020000"], 0x28}, 0x1, 0x0, 0x0, 0x40880}, 0x0) 4.762770291s ago: executing program 6 (id=2665): r0 = syz_open_dev$video4linux(&(0x7f0000000000), 0x3b51, 0x82000) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000100)={0x0, 0xe, 0x300e, 0x1}) 4.489883318s ago: executing program 6 (id=2667): prlimit64(0x0, 0xe, &(0x7f00000007c0)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r0, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0x1}], 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000480)={0xa, 0x102, 0x2, @private0, 0xa}, 0x44) setsockopt$inet6_tcp_int(r2, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r2, &(0x7f0000000340)='g', 0x1, 0x20000045, &(0x7f0000000700)={0xa, 0x2, 0x398, @empty}, 0x1c) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="11072abd7000ffdbdf250500000008000300", @ANYRES32=r5], 0x1c}, 0x1, 0x0, 0x0, 0x28008000}, 0x40000) readv(r3, &(0x7f0000000740)=[{&(0x7f0000000240)=""/152, 0x98}], 0x1) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xffffffff}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}]}, 0x3c}, 0x1, 0x0, 0x0, 0x48880}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000500)=""/142, 0x8e}, {&(0x7f00000000c0)=""/36, 0x24}, {&(0x7f00000005c0)=""/241, 0xf1}, {0x0}, {&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f0000000880)=""/193, 0xc1}, {&(0x7f0000000240)=""/105, 0x69}, {&(0x7f0000000380)=""/80, 0x50}, {&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000002580)=""/4096, 0x1000}], 0xa}, 0x40000100) shutdown(r2, 0x1) fanotify_init(0x8, 0x101000) socket$nl_route(0x10, 0x3, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) 4.47429633s ago: executing program 6 (id=2668): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x5, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x400000bce) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000002000)=""/102400, 0x19000) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x58000000, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x121301, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) fsopen(&(0x7f0000000040)='exfat\x00', 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r4, 0x58, &(0x7f0000000300)}, 0x10) prlimit64(0x0, 0x6, &(0x7f00000006c0)={0x7fff, 0x100}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000000900010073797a30000000002c000000030a01020000000000000000010000000900030073797a30000000000900010073797a300000000058000000060a010400000000000000000100000008000b40000000000900010073797a3000000000300004802c0001800a00010071756575650000001c000280060002400ffe009b06000140faff"], 0xcc}, 0x1, 0x0, 0x0, 0x24000090}, 0x0) r5 = socket$nl_rdma(0x10, 0x3, 0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000580)={0x9c, 0x464, 0x200, 0x70bd2b, 0x25dfdbfb, "e00c60b0eda60303bde13d74dddde18f4891bf814cba793c20523011c3b0d09b8f5364ca2a3e437fb31cb874b90d7e5d64057768d1273e2898c77a5f89a710db509980b95e92b332700f00d412c9008cfcebfde4e22932ee834b2f4175e7ee8573584cda1cbf0d8ee33018e75d0408f48fb83ce4c2ed3e7fd6369089be4273d029d3d6760b6b1a91fe93", ["", "", ""]}, 0x9c}, 0x1, 0x0, 0x0, 0x4000}, 0x800) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@ipv4_newrule={0x2c, 0x20, 0x301, 0x0, 0x25dfdbfb, {0x2, 0x20}, [@FRA_DST={0x8, 0x1, @empty}, @FRA_FLOW={0x8}]}, 0x2c}}, 0x0) sendmsg$RDMA_NLDEV_CMD_DELLINK(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x18, 0x1404, 0x1, 0x70bd28, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000}, 0x8044) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047457, 0x0) 4.188445286s ago: executing program 6 (id=2670): r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000040)=0x90000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f0000000000)={@local, 0x1}) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r0, 0x7a8, &(0x7f0000000540)={{@hyper, 0x2}, @hyper, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1}) r1 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r1, 0x7a7, &(0x7f0000000040)=0x90000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r1, 0x7a0, &(0x7f0000000240)={@hyper}) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r1, 0x7a8, &(0x7f0000000540)={{@hyper, 0x2}, @hyper, 0x0, 0xf00000000000000, 0x5e, 0xfffffffffffffff9}) 3.875696183s ago: executing program 6 (id=2672): syz_usb_connect$hid(0x0, 0x36, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=@getchain={0x24, 0x66, 0x0, 0x0, 0x2000, {0x0, 0x0, 0x0, 0x0, {}, {}, {0x4}}}, 0x24}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newlink={0x38, 0x10, 0x401, 0x70bd2c, 0x0, {0x0, 0x0, 0x0, r2, 0x0, 0x1114}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x8, 0x2, 0x0, 0x1, [@IFLA_IPTUN_COLLECT_METADATA={0x4}]}}}]}, 0x38}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) r5 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x7) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0), 0x80280, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r6, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r8 = syz_io_uring_setup(0x117, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x3a6}, &(0x7f0000000000)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r9, 0x4, &(0x7f0000000080)=0xfffffc00, 0x0, 0x4) syz_io_uring_submit(r9, r10, &(0x7f00000000c0)=@IORING_OP_SENDMSG={0x9, 0x40, 0x0, r7, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000100000001"], 0x18}, 0x0, 0x20040000, 0x1}) io_uring_enter(r8, 0x47f6, 0x80ffff, 0x0, 0x0, 0x0) close_range(r5, 0xffffffffffffffff, 0x0) 3.788168519s ago: executing program 2 (id=2673): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r0, &(0x7f0000000300)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x4c, r1, 0x8, 0x70bd2b, 0x25dfdbfb, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5, 0x83, 0x1}}]}, 0x4c}}, 0x600c000) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r4, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0x50, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0xe}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0x9}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x20040080}, 0x55) r5 = io_uring_setup(0x3eae, &(0x7f0000000080)={0x0, 0x6d37, 0x100, 0x10, 0x3fffffe}) io_uring_register$IORING_REGISTER_BUFFERS(r5, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) 3.079041721s ago: executing program 4 (id=2679): r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x109482) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x1e8, 0x310, 0x25, 0x148, 0x310, 0x60, 0x408, 0x2a8, 0x2a8, 0x408, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xb8, 0x0, {0x200003ae, 0x7f00}}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'veth0\x00', {0xff}}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x248) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x4, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000600)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r2 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) socketpair$unix(0x1, 0x2, 0x0, 0x0) writev(r2, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) syz_io_uring_setup(0x110, &(0x7f0000000200)={0x0, 0xfec9, 0x8, 0x5, 0x3d4}, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r3 = syz_open_dev$dri(&(0x7f00000000c0), 0x1ff, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r3, 0xc04064a0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)=[0x0], 0x0, 0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r3, 0xc01864c6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, 0x0) ioctl$DRM_IOCTL_MODE_GETENCODER(r4, 0xc01464a6, &(0x7f0000000180)) ioctl$SNDCTL_TMR_TEMPO(r1, 0xc0045405, 0x0) mmap$binder(&(0x7f00000a0000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) mlockall(0x7) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5393, &(0x7f0000000000)) 2.675959997s ago: executing program 2 (id=2680): pipe2$9p(0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="700200001300290a000000000000000007000000", @ANYRES32=r2, @ANYBLOB="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"], 0x270}, 0x1, 0x0, 0x0, 0x8015}, 0x4) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xb, 0x4050, r0, 0x69133000) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0)="900000001c001f4d154a817393278bff0a80a578020000000104740014000100ac1414bb0542d6401051a2d708f37ac8da1a297e0099c5ac0000c5b068d0bf46d323456536016466fcb78dcaaf6c3efed495a46215be0000760700c0c80cefd28581d158ba86c9d2896c", 0x6a, 0x0, 0x0, 0x0) r3 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="12013f00000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f000905", @ANYRES16], 0x0) syz_usb_control_io(r3, 0x0, 0x0) syz_usb_control_io$hid(r3, &(0x7f0000000000)={0x24, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00220f0000000bf896e404296792f792039ef12d19a11d7f6c0ae26169c3242e0a2e7fc979c753737f1b0a1712ed18abaeea2473799c753cfdbd01d50a103895aa703328ed89c79b527583b3f47f74f1c84b2c455f9c9026818f4313d1c94a6d6606ff69216057bb0d8f27ee42ccaa"], 0x0}, 0x0) r4 = syz_open_dev$hiddev(&(0x7f0000000080), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r4, 0x501c4814, &(0x7f00000000c0)={0x2, 0xffffffff, 0x0, 0x0, 0x4e496f8}) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, 0x0) syz_usb_connect$cdc_ncm(0x4, 0x6e, &(0x7f00000000c0)=ANY=[@ANYBLOB="12010000020000002505a1a440000102030109025c0002010000000904000001a3f45747d649f9a30105240000000d240f8100000000000000000006241a0000000905810300000000000904010000020d00000904010102020d000009058202000000000009050302"], 0x0) r5 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000100)=ANY=[@ANYBLOB="120100001ddf8208c007121522300000000109021b0001000000010904010001faf40d00090582"], 0x0) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x802, 0x0) ioctl$UI_DEV_SETUP(r6, 0x405c5503, &(0x7f0000000280)={{0x0, 0x4, 0x0, 0x9}, 'syz1\x00', 0x3f}) ioctl$UI_SET_FFBIT(r6, 0x4004556b, 0x51) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000640)=@generic={0x0, 0x0, 0x4}, 0x18) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) ioctl$KVM_SET_IRQCHIP(r8, 0x4020aeb2, &(0x7f0000000300)={0x0, 0x12c, @ioapic={0xffff1000, 0x5, 0x5, 0x8, 0x0, [{0x1, 0x81, 0x1, '\x00', 0x4}, {0xfe, 0x3, 0x0, '\x00', 0x6}, {0x7, 0xff, 0xe, '\x00', 0x3b}, {0x4e, 0xe, 0xd6, '\x00', 0x86}, {0xc, 0xb, 0x6, '\x00', 0x2}, {0xf, 0x1, 0xf9, '\x00', 0x3}, {0x2, 0xa, 0x50, '\x00', 0x6}, {0x8, 0x9, 0x2a, '\x00', 0x8}, {0x4, 0x0, 0xa, '\x00', 0xff}, {0x8, 0xd6, 0x3, '\x00', 0x8}, {0x9e, 0x6, 0x3, '\x00', 0x6}, {0x2, 0x9, 0x0, '\x00', 0x7f}, {0x45, 0x51, 0xa}, {0xe, 0xfc, 0x0, '\x00', 0x1}, {0x8, 0xff, 0x6, '\x00', 0x9}, {0x7, 0x1b, 0xff, '\x00', 0x3}, {0x2, 0xa, 0x5, '\x00', 0x7f}, {0xa, 0x0, 0xca, '\x00', 0x6}, {0x4, 0x60, 0x4, '\x00', 0x12}, {0xb, 0x8, 0x40, '\x00', 0xda}, {0x3, 0x3, 0x6, '\x00', 0x9}, {0x9, 0x3, 0x1, '\x00', 0x2}, {0xf9, 0x1, 0x4, '\x00', 0xff}, {0x8, 0xc, 0x0, '\x00', 0x6}]}}) ioctl$UI_DEV_CREATE(r6, 0x5501) r9 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) syz_usb_ep_write$ath9k_ep1(r5, 0x82, 0xfffffffffffffdcb, 0x0) write$char_usb(r9, &(0x7f0000001300)="92", 0x2) 2.658380571s ago: executing program 4 (id=2681): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './cgroup\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) close(r3) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) r4 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000080), 0x20000, 0x0) sched_getaffinity(r0, 0x8, &(0x7f0000000040)) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0), r6, 0x0, 0x1, 0x4}}, 0x20) ioctl$IOMMU_TEST_OP_ADD_RESERVED(r4, 0x3ba0, &(0x7f0000000440)={0x48, 0x1, 0x0, 0x0, 0x97, 0x8000000}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x802, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0xa, &(0x7f0000000340), &(0x7f0000000080)=""/10, 0x224e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x50) syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @val={@val={0x88a8, 0x3, 0x0, 0x2}, {0x8100, 0x0, 0x1, 0x1}}, {@ipv4={0x800, @tcp={{0x8, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local, {[@timestamp_addr={0x44, 0xc, 0x7, 0x1, 0x6, [{@empty}]}]}}, {{0x0, 0x4e24, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x8, 0x51b}}}}}}, 0x0) 2.343130577s ago: executing program 7 (id=2684): fsopen(&(0x7f0000000040)='tracefs\x00', 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000080)={0x40, 0xf47}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x7) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) writev(r1, &(0x7f0000000000), 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) r7 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$L2TP_CMD_TUNNEL_CREATE(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x3c, r6, 0x917, 0x70bd28, 0x25dfdbff, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r7}]}, 0x3c}, 0x1, 0x620b}, 0x0) 2.1495436s ago: executing program 2 (id=2685): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x1, &(0x7f0000000480)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex_waitv(&(0x7f0000001080)=[{0x3, &(0x7f0000001040)=0x3, 0x82}], 0x1, 0x0, 0x0, 0x1) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8000}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x2) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x600, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_VENDOR(r0, 0x0, 0x200040d0) r4 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r4, &(0x7f0000019680)=""/102392, 0x18ff8) socket$nl_generic(0x10, 0x3, 0x10) r5 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r5, 0x7a8, 0x0) socket$l2tp(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e22, @empty}, 0x10) 1.477791058s ago: executing program 5 (id=2686): r0 = syz_open_dev$cec(&(0x7f0000000000), 0x0, 0x400) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000380), 0x101040) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000300)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, 0x0) ioctl$CEC_S_MODE(r0, 0x40046109, &(0x7f0000000040)=0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000300)="c99b57381801238c09d0ff0f1d0dbd301e5a47b2f3caa73dcd2a6a370554375a", 0x20) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000100)=0x3, 0x8) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), r3) sendmsg$DEVLINK_CMD_SB_POOL_GET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)={0x128, r5, 0x800, 0x70bd2b, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x1}, {0x6, 0x11, 0x7}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x6}, {0x6, 0x11, 0x3ff}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0x6, 0x11, 0xfc00}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x2}, {0x6}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x420}, {0x6, 0x11, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x8}, {0x6, 0x11, 0xff}}]}, 0x128}, 0x1, 0x0, 0x0, 0x800}, 0x10000002) ioctl$CEC_S_MODE(r0, 0x40046109, &(0x7f00000000c0)=0x12) 1.347921716s ago: executing program 5 (id=2687): r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000540)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_KEY(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000000)={0x3c, r0, 0x801, 0x0, 0x3, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_KEY={0x20, 0x50, 0x0, 0x1, [@NL80211_KEY_IDX={0x5}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac09}, @NL80211_KEY_DATA_WEP40={0x9}]}]}, 0x3c}}, 0x0) 1.347541042s ago: executing program 4 (id=2688): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x1, &(0x7f0000000480)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex_waitv(&(0x7f0000001080)=[{0x3, &(0x7f0000001040)=0x3, 0x82}], 0x1, 0x0, 0x0, 0x1) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8000}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x2) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x600, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_VENDOR(r0, 0x0, 0x200040d0) r4 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r4, &(0x7f0000019680)=""/102392, 0x18ff8) socket$nl_generic(0x10, 0x3, 0x10) r5 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r5, 0x7a8, 0x0) r6 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r6, &(0x7f0000000040)={0x2, 0x4e22, @empty}, 0x10) 1.294018044s ago: executing program 7 (id=2689): prlimit64(0x0, 0xe, &(0x7f00000007c0)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r0, &(0x7f0000000840)=[{0x0}], 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000480)={0xa, 0x102, 0x2, @private0, 0xa}, 0x44) setsockopt$inet6_tcp_int(r2, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r2, &(0x7f0000000340)='g', 0x1, 0x20000045, &(0x7f0000000700)={0xa, 0x2, 0x398, @empty}, 0x1c) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="11072abd7000ffdbdf250500000008000300", @ANYRES32=r5], 0x1c}, 0x1, 0x0, 0x0, 0x28008000}, 0x40000) readv(r3, &(0x7f0000000740)=[{&(0x7f0000000240)=""/152, 0x98}], 0x1) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xffffffff}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}]}, 0x3c}, 0x1, 0x0, 0x0, 0x48880}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000500)=""/142, 0x8e}, {&(0x7f00000000c0)=""/36, 0x24}, {&(0x7f00000005c0)=""/241, 0xf1}, {0x0}, {&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f0000000880)=""/193, 0xc1}, {&(0x7f0000000240)=""/105, 0x69}, {&(0x7f0000000380)=""/80, 0x50}, {&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000002580)=""/4096, 0x1000}], 0xa}, 0x40000100) shutdown(r2, 0x1) fanotify_init(0x8, 0x101000) socket$nl_route(0x10, 0x3, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) 1.272959183s ago: executing program 5 (id=2690): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x40000000, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)={0x2, 0x18, 0x0, 0x0, 0x1b, 0x80ff, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private0}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@multicast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private1}}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in6={0xa, 0x0, 0x0, @private1}, @in={0x2, 0x0, @private}}]}, 0xd8}}, 0x0) 1.184511233s ago: executing program 5 (id=2691): r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x109482) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x1e8, 0x310, 0x25, 0x148, 0x310, 0x60, 0x408, 0x2a8, 0x2a8, 0x408, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xb8, 0x0, {0x200003ae, 0x7f00}}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'veth0\x00', {0xff}}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x248) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x4, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000600)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r2 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) socketpair$unix(0x1, 0x2, 0x0, 0x0) writev(r2, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) syz_io_uring_setup(0x110, &(0x7f0000000200)={0x0, 0xfec9, 0x8, 0x5, 0x3d4}, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r3 = syz_open_dev$dri(&(0x7f00000000c0), 0x1ff, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r3, 0xc04064a0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)=[0x0], 0x0, 0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r3, 0xc01864c6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, 0x0) ioctl$DRM_IOCTL_MODE_GETENCODER(r4, 0xc01464a6, &(0x7f0000000180)) ioctl$SNDCTL_TMR_TEMPO(r1, 0xc0045405, 0x0) mmap$binder(&(0x7f00000a0000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) mlockall(0x7) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5393, &(0x7f0000000000)) 1.182695748s ago: executing program 2 (id=2692): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b704000002000000850000001c00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0xfffff000, 0xe, 0x0, &(0x7f00000001c0)="61df712bc884fe68a02780b605a7", 0x0, 0x77ff, 0x7000000, 0x0, 0x0, 0x0, 0x0}, 0x50) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_init_net_socket$bt_rfcomm(0x1f, 0x5f19c169a6bc1198, 0x3) connect$unix(r3, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0xaf9) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000300)='rcu_utilization\x00', r5}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000d80)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000440)="ea", 0x1}], 0x1, &(0x7f00000002c0)=ANY=[@ANYBLOB="14"], 0x18}, 0xc800) recvmmsg(r7, &(0x7f0000001140), 0x700, 0x2, 0x0) r8 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r8, 0x0, 0x27, &(0x7f0000000280)={@multicast2, @local, @remote}, 0xc) r9 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r9, 0x0, 0x27, &(0x7f0000000180)={@multicast2, @local, @remote}, 0xc) r10 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x8400, 0x0) ioctl$FS_IOC_SETFLAGS(r10, 0x40186f40, &(0x7f0000000440)=0x1f) move_mount(r10, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x62) setsockopt$inet_msfilter(r9, 0x0, 0x29, &(0x7f00000000c0)=ANY=[@ANYBLOB="e0000002ac1414aa"], 0x1c) syz_emit_ethernet(0x36, &(0x7f0000001800)=ANY=[@ANYBLOB="ff00000000ffaaaaaaaaaa400800456c0028006400000002907800000000e000000211009078e0000002000000010100000000000000"], 0x0) 1.06801856s ago: executing program 7 (id=2693): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$MSR(&(0x7f0000000240), 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="f0000000120003"], 0xf0}, 0x1, 0x3f}, 0x0) 930.16014ms ago: executing program 7 (id=2694): r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x1f, 0x10, 0x1, 0x470bd27, 0x25dfdc00, {0x0, 0x0, 0x0, r2, 0x78e10, 0x36a01}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_MULTICAST_ROUTER={0x5, 0x19, 0x1}]}}}]}, 0x44}, 0x1, 0x0, 0x0, 0x400c080}, 0x8002) 919.383885ms ago: executing program 5 (id=2695): openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r0 = userfaultfd(0x80801) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000100)) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) r5 = geteuid() setresuid(r5, r4, 0x0) r6 = syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r6, 0xc04064a0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[0x0], 0x0, 0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r6, 0xc05064a7, &(0x7f00000003c0)={&(0x7f00000059c0)=[0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, r7}) syz_emit_vhci(&(0x7f0000000200)=@HCI_ACLDATA_PKT={0x2, {0x668543f06f3a07eb, 0x1, 0x1, 0x94}, @l2cap_cid_signaling={{0x90}, [@l2cap_info_rsp={{0xb, 0x78, 0x7d}, {0x5, 0x6, "13f04a7d6704c17bb6729b8d4f41d20d9017996dacd4103475dc96ad5f728c72c51ff24fd7fe448299d7f7098b7384c6e4860cb011b960109101e2905dd25e8b351eecbeb4206696ffb90f21ab0b1dc595b21b3646d3c16d33be49b8a249b0aebc063414b1f8cc41fa3c7a9758b2ee66b228a53ef7a9f6cc04"}}, @l2cap_conn_req={{0x2, 0x5, 0x4}, {0x6, 0x4}}, @l2cap_move_chan_req={{0xe, 0x6, 0x3}, {0x6, 0xd}}]}}, 0x99) prctl$PR_SET_SECUREBITS(0x1c, 0x40) r8 = syz_usb_connect(0x5, 0x852, &(0x7f00000009c0)={{0x12, 0x1, 0x200, 0x66, 0x46, 0xe4, 0x40, 0x7ca, 0xa868, 0x6426, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x840, 0x2, 0x1, 0xf2, 0x10, 0x7, [{{0x9, 0x4, 0xd1, 0xb2, 0x10, 0xf5, 0x34, 0x56, 0x5, [@uac_as={[@format_type_ii_discrete={0xf, 0x24, 0x2, 0x2, 0x5eb, 0x8000, 0x2, "a3fe89da9e97"}, @format_type_i_discrete={0xb, 0x24, 0x2, 0x1, 0x8, 0x4, 0xed, 0x6, "eb716a"}, @as_header={0x7, 0x24, 0x1, 0x0, 0x81, 0x1001}]}], [{{0x9, 0x5, 0xe, 0x1, 0x8, 0x4, 0x5, 0xec, [@generic={0xe7, 0x3, "24ec99b29af3dd9badf735a95bb3fc7891393f0d61245adc839483d807ca1cde301ca09c7f54a59c7fcd176b3fd67180b17472ed2168c5f39683a7faed82a53922ed1cb41a46ec07be8e886eb15c4ee611b6de623e6eb0c92cd3525a9c409f1bacc95bc7f6c2acec3a51b146561e276e05395abeddaee651a9cc92e3ebfcd02d0de19fed3902543fe4f53d1104ad9327a5b2a4c71159690e120d501e37e2fe96d9dfffd5000aa40957aae9659c2984fd3b4047a7dcbd3847c6260250e90741db8f2f3ea68438241921a0ce6e7df83fc538352dd3ef376c8c0f2981d730ff4f41dd86e35a07"}]}}, {{0x9, 0x5, 0x4, 0x10, 0x40, 0x1, 0x1, 0x9, [@generic={0xb1, 0x11, "650070ca8c227de1327db04b079fb1ace26d124008126e0504fe5effb1fb5920052d5ad010559062f70027a930665efc8f5f184dcf3343de3caa91dadf1ce6592d8360090e2eb157e782ced0518cc0c82cc146b869ff9797bf73e4965220a8966ece8ed53498510a137c846d34ba56e2065697e3c1211c3d871e4914ae389d8232706a9237d8e24b857b7ffece0fd41d6bafd2c8f99fdea83b7a9dcfcc6b71fb3c24fbad822b6a67470bb8ce28145a"}]}}, {{0x9, 0x5, 0x7, 0x0, 0x3ff, 0x0, 0xcc, 0xc0, [@generic={0x16, 0x23, "564f066c3ffb01c634ac4a7f8368acf74eb0e2b5"}]}}, {{0x9, 0x5, 0xf, 0x10, 0x10, 0x81, 0xa, 0x2, [@uac_iso={0x7, 0x25, 0x1, 0x80, 0xc, 0x7}, @generic={0xe6, 0x2, "480fdd905d87733af4b21889b1ce9d425b2983ff8abbdf4cf6c91a87df3e0594acc137e105c0577929072f575d8234451d529ef0991cc1aded3ab7fed51dfab4e291d1d7ccd509f12ea33d1947d559f112c96daaaffbd812d13924f972956d5542d290b0743fb2daa1ce212a2c5dec3871fad0673a96c5ebd5cd62a6da612f17e0b095879eb90b809698454e96c13b4c9ed834c20e017b7a154eabcf6571d1d6c6e560cf03ebda1edd7d94b020f0a850305c90f41d824be21cb5d6bbbb64c8c3c48708f4ce7e98640fd941fc69b7656642d12dafb8b5bba6acdc1134a571e75421b6f082"}]}}, {{0x9, 0x5, 0xd, 0x0, 0x8, 0x9, 0x3, 0x1, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0x7f, 0x2}]}}, {{0x9, 0x5, 0xb, 0xc, 0x0, 0x4, 0x80, 0x40, [@generic={0x5e, 0xb, "1ba0e524615f991c241016250c22e895cf36cc86054b4ea96b7318e6af8175c16ed1582c3e71cec98312bf65a199200f3a414f1ecfc0fafca58b366c1be9c8e152360be751ab9efa24ed92ca2eaf7870086c350b2c282c0713dd6bf5"}]}}, {{0x9, 0x5, 0xf, 0x10, 0x200, 0x4, 0x7f, 0x81, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0xd, 0x5e}]}}, {{0x9, 0x5, 0xe, 0x0, 0x200, 0x3, 0xfe, 0x7, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0x0, 0xc}]}}, {{0x9, 0x5, 0x1, 0x0, 0x8, 0x81, 0x5, 0x40, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0x3, 0xff7f}]}}, {{0x9, 0x5, 0x2, 0x10, 0x20, 0x2, 0x1b, 0x6, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0x2, 0x6}]}}, {{0x9, 0x5, 0xf, 0x2, 0x400, 0x6, 0x5, 0x9, [@generic={0xc7, 0x2, "804f3ddd752739cf66454ee9365c079e0b529bac1f8f0770f5f0c697d49e75c683b5e1bdcbf33be1dd8adc6308eb987b03e31ca13806262818e1fbe7bd9c3e1937f4613c9e1ee19d1b5aab273462d76a056c263ae301f31dac99609eb92a8facdb66feea89a4262747db603051fd3186db175174f6d69b35bf757f4137d57fb65dc21d0cf7a8710c60e9b672876bb266a332c0012e93b45ec8cea237c0b6c3549fb153ec81ab22ad6a9f45fa3c376a001357508565c17665def5882bd0845e6764d4ba55bd"}]}}, {{0x9, 0x5, 0x4, 0x0, 0x10, 0x1, 0x6, 0x0, [@generic={0xb5, 0x2d, "2c0ed82d501de67c4420198136153e88f1a358609359186da887ace566f46a955550850a647a728878d1b866d0e6de7d5f7a24f4d85e00d639780386fc763896d6bef730db9bb436de821612cf23d5605c5619278989b1c4223dce8eb2eb4bb6893f619647ca470da42f38161c09008056b6b4a3701ad2eb72ad00aad1ac1d9419597f17849c6086d74df61357d231ad68e78a6cc5508dd5564502049f9f77ec7ae054bb57fc7f7d21c7e2ccac193d5c7edc9a"}]}}, {{0x9, 0x5, 0xf, 0x10, 0x20, 0x1, 0x5d, 0x7, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0x10, 0xc9ea}]}}, {{0x9, 0x5, 0xa287be28c7a69f6e, 0x0, 0x200, 0x0, 0x1, 0xa, [@uac_iso={0x7, 0x25, 0x1, 0x80, 0x0, 0x88}, @generic={0x90, 0xc, "a49f625559f3fbe7f478faaacc95cc584b958dd4106a0d47a72e11e032d761d30bcac112bee4f2aba4d599fb668c2be2391bdb0ed90999ebb990f92372a48738aad58e59905d18d7c611e05d151460f27eb5d55faacb06c71dd6be8199ad52f3186f7324a70cd2f162d332788ac7db3944d5484772a149fa174b0abf7e3e11b4b0fffff04d35908588c273eb79a6"}]}}, {{0x9, 0x5, 0x6, 0x0, 0x20, 0x9, 0x7e, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x81, 0xb, 0x6}]}}, {{0x9, 0x5, 0x80, 0x0, 0x10, 0x6, 0x4, 0x2, [@generic={0x48, 0x10, "0062e4143778c1daa617823e4e5d2efb47c5f0d4f0648fbdeab2675648857374982953de035d7ead7d7424c1bcbec8b53db182d3c47ab1c6ccada60767c32c719ffc286919db"}]}}]}}, {{0x9, 0x4, 0xa3, 0x8, 0x4, 0xf1, 0x69, 0x4e, 0x3, [@uac_as={[@format_type_i_continuous={0x9, 0x24, 0x2, 0x1, 0x4, 0x2, 0x55, 0xb, "", "cb"}]}], [{{0x9, 0x5, 0xa, 0x3, 0x10, 0x6, 0x9, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0x4, 0x9}]}}, {{0x9, 0x5, 0x2, 0x1, 0x400, 0x6, 0x6, 0x7, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0x3, 0x6}, @generic={0x96, 0xf, "65641c3f254e6740660b85dee22af31f61336d22d857452ff24049a87473afa7ad9c3ae7532f17438f572725a71d5091e988dea8f3de06caa1e0607994916d77d1a79fb4989ffb8ed57df04e22de0fd8afe41aeae37c8b75b99c10fd0e2c19e2476373fdee73b1fcb3f5a1aa9a2be4edc5b1a52d0402c260c2ffd4d85b514bad972762988d5d42c1bafa7f99d7d24819f11ecb94"}]}}, {{0x9, 0x5, 0xb, 0x10, 0x200, 0x3, 0x5, 0x34, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0x2, 0x4}]}}, {{0x9, 0x5, 0x7, 0x956e7f36386cda26, 0x8, 0x7f, 0x6, 0x5, [@generic={0x8a, 0x30, "b331698252bc8d706238108e613ab63e56b69a0a0c1931e757ce9831e3805630c73bd7cb5b517bff22e19ac733efaeab8ee16e487e8c71cb031cf4dea41e6023bb5769dccef1652cc34e2bc5dc674d7af396340b3436698fc1c080ea3fa8180c61eabc831d49e9b47bbaac4cffe7f237d4c259ee827752d843f44a2beb73a00f08498802066ed43b"}, @generic={0x8d, 0xd, "2933dd47b028591e9d344948c0b230480457345dc3c3a6140b511d2bf2c51a65b1f6bb598a87aacf70fe678f32cc5974131a90e3b1065760aa8be77186df65def2028991a6a66b06c9b2405ee394496d207ed674e7bfe24c7c605e3792f3af2cb0fcb30afa686b6791f1623cd8fd1d9c9a2ba2ea4d227f03b50f291e4e4be821ba3532dbbaac27873c20d4"}]}}]}}]}}]}}, &(0x7f0000000800)={0xa, &(0x7f00000002c0)={0xa, 0x6, 0x300, 0x9, 0x66, 0x98, 0x20, 0x7}, 0x17, &(0x7f0000000300)={0x5, 0xf, 0x17, 0x2, [@ext_cap={0x7, 0x10, 0x2, 0x0, 0x4, 0x8, 0x8}, @wireless={0xb, 0x10, 0x1, 0x2, 0x89, 0x6, 0x3, 0x2, 0x5}]}, 0x9, [{0x4, &(0x7f0000000340)=@lang_id={0x4, 0x3, 0x4c0a}}, {0xdc, &(0x7f00000004c0)=@string={0xdc, 0x3, "e8698d1ee0c2e85f8eb7f547b87db09f165a83b2b89e1d584b21d708507ec6bb84db314890d83be25effffa32320a89dbe95fc9965cffe50f14a2e0778f9f14e0d3f3f17e6445890a5069c4d16556ed7a4c9b9ea5263cd65b386459b4716a1f4962e23943a777223413736e693baa8cdab0ccfb95648b90e3e75c5f5e7053e643a7b2df7c8b2ba08437fefcecaad6c7a1893606b802de2979f27c5eeb15f16d437bac0cc009e9f379e94e0bff1ef6a5d4fd979a7c8eadf6680ee9a32cd1c6dc98c9a7422c560ba020b59819686cb933ef54719fafdf466dee736"}}, {0x4, &(0x7f0000000440)=@lang_id={0x4, 0x3, 0xc04}}, {0x4, &(0x7f00000005c0)=@lang_id={0x4, 0x3, 0x2c0a}}, {0x4, &(0x7f0000000600)=@lang_id={0x4, 0x3, 0x812}}, {0xe9, &(0x7f0000000640)=@string={0xe9, 0x3, "4a596d316e12247b8f83e7073e8b47a404e40dd1dcb6600f9214cb6aa726c659014db04d8c88ed429b1a513b5ca95b737cccdc64f2c2d02dac3451647f584097113e47a5c4844954f2c3f8667b48e9579fda55eabe7cefd13992583f74c181e0bced3c7af9b3df27ee8de093ac75718943bc21adba4770b47b96aaad64ae9ebae54bea3c57e054dd3fcea68004faddfb9f0bc6f89dd1ea1f083f7567c9fc70c55803a5f36d47876bdccc4bebf485462f743853eb9e72c54a732f6b2845ce31f57a1257321b4f0a39211d76ab8553c20b6d4fc994e2cd29d378e692717b5606995e0dd005659792"}}, {0x4, &(0x7f0000000740)=@lang_id={0x4, 0x3, 0x44f}}, {0x4, &(0x7f0000000780)=@lang_id={0x4, 0x3, 0x807}}, {0x39, &(0x7f00000007c0)=@string={0x39, 0x3, "92021cb82999b9a2e2f89e8dc0970954dacf512ebfc1d01d20fc1172b4a711bd3ae8cd4d5d46b6b9d40ef6f3eb05875851f1909969547b"}}]}) syz_usb_control_io$uac1(r8, &(0x7f0000001280)={0x14, &(0x7f00000008c0)={0x40, 0x28, 0x88, {0x88, 0x24, "6d11c9d8730f4c91642da63233202aeccaa8831b9c227f212e5cbbf29402bfb29b2ad6a6071794a10f4e1c9888f32eee3ae2d37c306dff0ed1d4e2cc846cfe1d81a1d0c66d9f712c18212da680a81efda33dca5bf43636b91d5931bf96d07469b7a611e533842eccc46c725288429b9c9d4bdc1da488c52817d9e3f16ee11648966ea88556b0"}}, &(0x7f0000001240)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x4001}}}, &(0x7f00000014c0)={0x44, &(0x7f00000012c0)={0x0, 0x6, 0x1c, "86250736703e0cd7c2484b335c60447968cedcdb2746ae06b6f350bd"}, &(0x7f0000001300)={0x0, 0xa, 0x1, 0x9}, &(0x7f0000001340)={0x0, 0x8, 0x1}, &(0x7f0000001380)={0x20, 0x81, 0x2, "21db"}, &(0x7f00000013c0)={0x20, 0x82, 0x3, "56b0dc"}, &(0x7f0000001400)={0x20, 0x83, 0x1, "04"}, &(0x7f0000001440)={0x20, 0x84, 0x3, "d3acb3"}, &(0x7f0000001480)={0x20, 0x85, 0x3, "a12a63"}}) r9 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r9, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x1, 0x470bd2a, 0x25dfdbff, {0x0, 0x0, 0x0, r11, 0x64e10, 0x36a01}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_MCAST_FLOOD={0x5, 0x1b, 0x1}]}}}]}, 0x44}, 0x1, 0x0, 0x0, 0x400c080}, 0x4882) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x10b}) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000140)=0x1000) syz_genetlink_get_family_id$mptcp(&(0x7f0000000980), r2) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, &(0x7f00000001c0)) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) ioctl$UFFDIO_CONTINUE(r0, 0xc020aa08, &(0x7f0000000080)={{&(0x7f0000400000/0xc00000)=nil, 0xc00000}}) 794.946274ms ago: executing program 6 (id=2696): sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c0000001000030500"/20, @ANYRES32, @ANYBLOB="000000000000000014001280090001007663616e000000000400028008000a"], 0x3c}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="500000001000010400000000000000000000000074789748a49e410fe939e3d5297a73a2825c03e019d45b7cfdc6691a51a70fec62d4ba8eb3a6a0893045aecc385680bfe2e49c0d1859c8d31f3c8224a708553142cbf0c7b26100080000109b2084fa790d9f16e03d84bd8a37b50256eed4c0ea84c2aa0e1483c30fb6389b48f43312900ccca274338190cd548adcceb56a12aa9ca9156ae458b96692ffd64bb31fc814363c198ceb52d5", @ANYRES32=0x0, @ANYBLOB="9001010000000000280012800b000100697036746e6c000018000280140003002001000000000000000000000000000108001f0003000000"], 0x50}}, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000002b80)=[@zcopy_cookie={0x10, 0x114, 0xc, 0x58fd}], 0x10, 0x40010}, 0x4000000) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) r3 = syz_io_uring_setup(0x24fa, &(0x7f0000000b80)={0x0, 0x0, 0x10100, 0x2, 0x33a}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='8'], 0x38}}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r6, &(0x7f0000000180)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r6, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x56, 0x0, 0xffffffffffffffff, 0x0, 0x0}) io_uring_enter(r3, 0x2d3e, 0x0, 0x0, 0x0, 0x0) 715.850148ms ago: executing program 7 (id=2697): r0 = io_uring_setup(0x355b, &(0x7f0000000140)={0x0, 0xe24b, 0x10, 0x5, 0x4000020}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read(r1, 0x0, 0x5b) socket$vsock_stream(0x28, 0x1, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000080)={0x80000000005, 0x100000001000087}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0x43, &(0x7f0000000040)=0x2) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$rds(0xffffffffffffffff, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r3 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r3, 0x3b81, &(0x7f0000000040)={0xc, 0x0, 0x0}) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN(r3, 0x3ba0, &(0x7f0000000200)={0x48, 0x2, r4, 0x0, 0x0, 0x0, 0x0}) ioctl$IOMMU_HWPT_ALLOC$NONE(r3, 0x3b89, &(0x7f00000001c0)={0x28, 0x0, r5, r4, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$IOMMU_IOAS_MAP$PAGES(r3, 0x3b85, &(0x7f0000000180)={0x28, 0x4, r4, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x7}) r6 = memfd_create(&(0x7f0000000540)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x06\x00\x00\x00\x97A\xc2\xd8\xf0Uq!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\x16\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xf1k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9k\x83\xfc\xa4\xad4\x03\xa2X\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xdfY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96?\x00\x00\x00\x00\x00\x00\x00\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcb\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93>m\xd7q\'\xdf\xfajo\xd8n\xa7\xecJi\xde\xdf\x7f\xe3\xc4*Z 4\xe8S$\xa1H=\xdf\x05\xf3\xe3T\xd1\xdd\xc6f\xa4\xb4\x96\\\xa0\xf9\x0f\x17\x11{\xb6\x9d\xd21\xc1\x90Vj\x13r\x00\x00\xde\x03\xab\xff\x8as0\xc6E\xca\"\xd9*\x9a\x15\xb95r\x8f\xaaj\x82\xd6\xd2%\xed\xa2WQ\xec2\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xccX\xfdRB\xffU\xe9\xfa\x1f\xf6\xce\b\xde@\x061\xc6z\xe4\xe0\xc9?\xa7\x94>\x9c\xd1\xa5o\x04\xaaim\xae\xfe\xc7f\xa3\x96\xd7\xb4c)r{\r#\xddI&\n\xf2\xec\xd4\xff\x9f\x136zZ-2\x80\xfbH+\x9b8\xf3\xed\xdf\xa2my\xb28c[\xc3\xfe\xb5M\x84\x97\xa5\'s\xe9\xdc=)I\xabLt2\x9c\v\xd9S', 0x6) fallocate(r6, 0x0, 0x9, 0x4) close_range(r0, 0xffffffffffffffff, 0x0) 555.153367ms ago: executing program 7 (id=2698): sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000040)=ANY=[], 0x38}, 0x1, 0x0, 0x0, 0x4000011}, 0x200400f1) r0 = userfaultfd(0x801) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000007c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_BSS(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x24, r3, 0x90d, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_BSS_SHORT_PREAMBLE={0x5, 0x1d, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000600)={&(0x7f0000000540)={0xb4, r3, 0x4, 0x70bd27, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_MESH_CONFIG={0x2c, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PATH_TO_ROOT_TIMEOUT={0x8, 0x17, 0xa3}, @NL80211_MESHCONF_HWMP_PATH_TO_ROOT_TIMEOUT={0x8, 0x17, 0xfffffffa}, @NL80211_MESHCONF_HWMP_CONFIRMATION_INTERVAL={0x6, 0x19, 0x8e}, @NL80211_MESHCONF_CONFIRM_TIMEOUT={0x6, 0x2, 0x40}, @NL80211_MESHCONF_NOLEARN={0x5, 0x1e, 0x1}]}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x7, 0x33}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xcddb, 0x41}}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_RSSI_THRESHOLD={0x8, 0x14, 0xffffffffffffff32}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5, 0xe, 0x3}]}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x5, 0x10}}, @NL80211_ATTR_MESH_CONFIG={0x3c, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_TTL={0x5, 0x6, 0x2}, @NL80211_MESHCONF_GATE_ANNOUNCEMENTS={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x74}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0x42}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x5}, @NL80211_MESHCONF_HWMP_MAX_PREQ_RETRIES={0x5, 0x8, 0x4}, @NL80211_MESHCONF_HWMP_ACTIVE_PATH_TIMEOUT={0x8, 0xb, 0x7}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000400000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_CONTINUE(r0, 0xc020aa08, &(0x7f0000000080)={{&(0x7f0000400000/0xc00000)=nil, 0xc00000}}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r4, 0xc0286687, &(0x7f00000001c0)={0x3, 0x1, 0x58, &(0x7f00000002c0)=""/88}) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, 0x0}], 0x1, 0x43, 0x0, 0x0) ioctl$KVM_PRE_FAULT_MEMORY(r6, 0xc040aed5, &(0x7f0000000000)={0x3000, 0xb000}) r7 = openat$selinux_policy(0xffffff9c, &(0x7f0000000100), 0x0, 0x0) preadv(r7, &(0x7f0000000440)=[{&(0x7f0000000200)=""/85, 0x55}], 0x1, 0x5, 0x9) r8 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)=ANY=[@ANYBLOB="1201000003005740ed0b0011c3ec000000010902120001000000000904"], 0x0) r9 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r9, 0x1, 0xffffffffffffffff, &(0x7f0000000100)) close(r9) ioctl$BINDER_THREAD_EXIT(0xffffffffffffffff, 0x40046208, 0x0) syz_usb_control_io(r8, 0x0, &(0x7f00000010c0)={0x84, &(0x7f0000000080)=ANY=[@ANYBLOB="00000100000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x0, 0x0, &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$key(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)={0x2, 0x12, 0x0, 0x9, 0x14, 0x0, 0x70bd2a, 0x25dfdbfe, [@sadb_lifetime={0x4, 0x2, 0x6, 0x4, 0x61a, 0x7}, @sadb_address={0x5, 0x5, 0x3c, 0x0, 0x0, @in6={0xa, 0x4e22, 0x9, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x9}}, @sadb_spirange={0x2, 0x10, 0x4d2, 0x4d2}, @sadb_x_sa2={0x2, 0x13, 0x9, 0x0, 0x0, 0x70bd2d, 0x34ff}, @sadb_address={0x5, 0x5, 0xff, 0x20, 0x0, @in6={0xa, 0x4e21, 0x32e, @private2={0xfc, 0x2, '\x00', 0x1}, 0x600}}]}, 0xa0}}, 0x5) 404.422968ms ago: executing program 4 (id=2699): prlimit64(0x0, 0xe, &(0x7f00000007c0)={0x8, 0x88}, 0x0) ioctl$KDFONTOP_SET(0xffffffffffffffff, 0x4b72, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r0, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) pselect6(0x40, &(0x7f0000000000)={0x6, 0x2, 0x8000000000000000, 0x0, 0x2, 0x0, 0x100, 0x10001003}, 0x0, &(0x7f00000002c0)={0x3ff, 0x8, 0x1000000000, 0x689, 0x2, 0x3ffffffffd, 0x2, 0x7}, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000001600)=ANY=[@ANYRES8=0x0], &(0x7f0000000100)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000005e00679a3601ffc491c6170000501d0000be7ba9bd"], 0x1c}}, 0x0) recvmmsg$unix(r2, &(0x7f0000001a00)=[{{0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f00000036c0)=""/4122, 0x101a}, {&(0x7f0000000100)=""/212, 0xd4}, {&(0x7f0000000500)=""/242, 0xf2}], 0x3}}], 0x1, 0x0, 0x0) 180.684979ms ago: executing program 4 (id=2700): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1806000000000017000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b707000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x3, 0x8, &(0x7f0000000940)=@framed={{0x18, 0x9, 0x0, 0x11}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x42}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r1, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f0000001b40), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x47, 0x0}}, 0x10) 131.935664ms ago: executing program 5 (id=2701): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000004c0)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8808}, [@IFLA_LINKMODE={0x5, 0x11, 0x6}, @IFLA_OPERSTATE={0x5, 0x10, 0x1}, @IFLA_IFNAME={0xffffffffffffff8e, 0x3, 'batadv_slave_0\x00'}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}]}, 0x58}, 0x1, 0xba01, 0x0, 0x20004401}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r4, &(0x7f0000007fc0), 0x800001d, 0x0) setsockopt$inet_int(r4, 0x0, 0x13, &(0x7f0000000000)=0x2863, 0x4) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="700000000001010400000000141a000002000010240001801400018008000100e0c31e0108000200e00000010c00028005000100000000002400028014000180080001000000000008000200ac1e00010c000280050001000000000008000740000000010c0016400000000200000003"], 0x70}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="3c000000000101010000000000000000020000020400ff4023e001801400018008000100e000000108000200e00000010c0002800500010000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x4004881}, 0x20008820) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020700000000000002030207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000100850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sched_switch\x00', r7}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) r8 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x2) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1402) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCVHANGUP(r8, 0x5437, 0x0) 131.477261ms ago: executing program 2 (id=2702): r0 = socket(0x2, 0x80805, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0) sendmmsg$inet_sctp(r1, &(0x7f00000032c0), 0x13, 0x0) syz_usb_connect(0x0, 0x24, &(0x7f0000000040)=ANY=[@ANYBLOB="1201000003005740ed0b0011c3ec000000010902120001000000000904"], 0x0) sendmmsg$inet_sctp(r0, &(0x7f00000032c0)=[{&(0x7f00000003c0)=@in6={0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, '\x00', 0x2e}, 0x6}, 0x1c, &(0x7f00000004c0)=[{&(0x7f0000000100)='a', 0x1}], 0x1, &(0x7f0000000000)=ANY=[], 0x30}], 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) memfd_create(&(0x7f0000000300)='-B\xd5NI\xc5j\x9a\b\x00\x00\x00\b\x84\xa2{\x00\v\x18\x004\xa6Ey\xdb\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xc83\x12\xd7\xdb\x93\xcc]x\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x81\x01\xe5\x98\r\x1d\xa1\xce\x8b\x19\xea\xef\xe3\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xcc) syz_init_net_socket$bt_bnep(0x1f, 0x3, 0x4) fanotify_mark(0xffffffffffffffff, 0x601, 0x30, 0xffffffffffffffff, 0x0) sendmsg(r3, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) unlink(&(0x7f00000001c0)='./file0\x00') munlockall() madvise(&(0x7f00001ed000/0x3000)=nil, 0x3000, 0x10) r5 = syz_open_dev$radio(&(0x7f00000002c0), 0x0, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r5, 0xc0405665, &(0x7f00000000c0)={0x0, 0x1, 0x7, 0x8, 0x2, 0x100059a, 0xbfc4bb97dfede4bd}) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) munlockall() madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) syz_open_dev$radio(&(0x7f0000000000), 0x1, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r5, 0xc0205648, &(0x7f0000000200)={0x9b0000, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)={0x9b0905, 0xfffffff7, '\x00', @p_u32=&(0x7f0000000240)=0x2}}) 0s ago: executing program 4 (id=2703): syz_init_net_socket$rose(0xb, 0x5, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) r1 = socket$inet6(0xa, 0x2, 0x0) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYRES32=r1], 0xfffffffffffffdca) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x42000, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000080), 0x45ffffa, 0x281) r6 = socket(0x1e, 0xe1f99f1f919eb69e, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000001340)={'tunl0\x00', &(0x7f00000012c0)={'syztnl1\x00', 0x0, 0x8, 0x40, 0x9, 0x0, {{0x9, 0x4, 0x1, 0x21, 0x24, 0x65, 0x0, 0xc, 0x4, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@generic={0x83, 0xe, "7b8b0afb7d372447a0078127"}]}}}}}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r7 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r7, &(0x7f0000019680)=""/102392, 0x18ff8) ioctl$SW_SYNC_IOC_CREATE_FENCE(0xffffffffffffffff, 0xc0285700, 0x0) r8 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/kernel/notes', 0x0, 0x0) finit_module(r8, 0x0, 0x4) ioctl$LOOP_CONFIGURE(r5, 0x4c0a, &(0x7f0000001100)={r4, 0x4, {0x0, 0x0, 0x0, 0x1000000, 0xffffffffffffff7f, 0x0, 0x0, 0x0, 0x1c, "339f020bbe82b398000000000000000000000d0ec0c1b4e9b1c4369d03740250ceaac594b1b3d741dd17c1c50d38ef2a565ef1e83323691c58d66500", "a9103939c783a16c1ca43f80026d1a8554fe581b59ded130e04d528539f3d3289737f0374c72a964a02447a75df8a69ea917deb7ba193b3e7772fd29f35239d2", "244333791f045158d97405000000000000040000000100", [0xfffffffffeff7ff9]}}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x4048884) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x40000063, 0x0, 0x0) kernel console output (not intermixed with test programs): ice loop6): udf_read_tagged: read failed, block=512, location=512 [ 389.815908][ T9899] UDF-fs: warning (device loop6): udf_load_vrs: No anchor found [ 390.306374][ T9899] UDF-fs: Scanning with blocksize 4096 failed [ 390.330343][ T9899] UDF-fs: warning (device loop6): udf_fill_super: No partition found (1) [ 391.542435][ T9963] netlink: 8 bytes leftover after parsing attributes in process `syz.5.994'. [ 393.565606][ T9986] fuse: Bad value for 'group_id' [ 393.596029][ T9986] fuse: Bad value for 'group_id' [ 393.841373][ T24] usb 5-1: new high-speed USB device number 21 using dummy_hcd [ 393.875901][ T5868] usb 8-1: new low-speed USB device number 4 using dummy_hcd [ 394.821318][ T24] usb 5-1: Using ep0 maxpacket: 8 [ 394.827958][ T5868] usb 8-1: config 0 has an invalid interface number: 1 but max is 0 [ 394.945826][ T24] usb 5-1: unable to get BOS descriptor or descriptor too short [ 394.968505][ T30] audit: type=1400 audit(1750656901.137:597): avc: denied { getopt } for pid=9976 comm="syz.5.996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 394.969691][ T5868] usb 8-1: config 0 has no interface number 0 [ 395.585896][T10007] openvswitch: netlink: Message has 4 unknown bytes. [ 395.660986][ T24] usb 5-1: config 0 has an invalid interface number: 245 but max is 0 [ 395.793480][T10010] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1003'. [ 395.812092][ T24] usb 5-1: config 0 has no interface number 0 [ 395.838311][ T5868] usb 8-1: config 0 interface 1 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 10 [ 395.867845][ T5820] usb 7-1: new high-speed USB device number 4 using dummy_hcd [ 395.875701][ T5868] usb 8-1: config 0 interface 1 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 395.899304][ T24] usb 5-1: New USB device found, idVendor=10b8, idProduct=1bb2, bcdDevice= 0.c7 [ 395.925775][ T5868] usb 8-1: New USB device found, idVendor=07c0, idProduct=1512, bcdDevice=30.22 [ 395.942113][ T24] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 395.961872][ T5868] usb 8-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 396.013312][ T30] audit: type=1400 audit(1750656902.157:598): avc: denied { write } for pid=10009 comm="syz.2.1003" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 396.053533][ T24] usb 5-1: Product: syz [ 396.057796][ T24] usb 5-1: Manufacturer: syz [ 396.088415][ T30] audit: type=1400 audit(1750656902.207:599): avc: denied { connect } for pid=10009 comm="syz.2.1003" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 396.132946][ T5820] usb 7-1: Using ep0 maxpacket: 32 [ 396.144096][ T5820] usb 7-1: config index 0 descriptor too short (expected 29220, got 36) [ 396.169689][ T5820] usb 7-1: config 0 has too many interfaces: 81, using maximum allowed: 32 [ 396.195564][ T5820] usb 7-1: config 0 has 1 interface, different from the descriptor's value: 81 [ 396.226034][ T5820] usb 7-1: config 0 interface 0 altsetting 0 endpoint 0x1 has invalid wMaxPacketSize 0 [ 396.258205][ T5820] usb 7-1: config 0 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 396.289529][ T5820] usb 7-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 396.312915][ T5868] usb 8-1: config 0 descriptor?? [ 396.913934][ T5820] usb 7-1: New USB device found, idVendor=03f0, idProduct=6c17, bcdDevice= 0.40 [ 396.966898][ T24] usb 5-1: SerialNumber: syz [ 396.995687][ T5868] usb 8-1: can't set config #0, error -71 [ 397.001217][ T5820] usb 7-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 397.009567][ T24] usb 5-1: config 0 descriptor?? [ 397.112031][T10031] 9pnet_virtio: no channels available for device 127.0.0.1 [ 397.377847][ T24] usb 5-1: can't set config #0, error -71 [ 397.388508][ T5820] usb 7-1: config 0 descriptor?? [ 397.391220][ T5868] usb 8-1: USB disconnect, device number 4 [ 397.480411][ T24] usb 5-1: USB disconnect, device number 21 [ 397.545102][T10038] Invalid ELF header magic: != ELF [ 398.355659][ T5820] usblp 7-1:0.0: usblp0: USB Bidirectional printer dev 4 if 0 alt 0 proto 3 vid 0x03F0 pid 0x6C17 [ 398.638523][ T5875] usb 3-1: new high-speed USB device number 28 using dummy_hcd [ 399.382944][T10046] netlink: 8 bytes leftover after parsing attributes in process `syz.7.1010'. [ 399.652684][ T5875] usb 3-1: config 1 has too many interfaces: 66, using maximum allowed: 32 [ 399.743678][ T5875] usb 3-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 400.236162][ T5875] usb 3-1: config 1 has 1 interface, different from the descriptor's value: 66 [ 400.300017][ T5875] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 400.408493][ T5875] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 400.577525][ T5875] usb 3-1: string descriptor 0 read error: -71 [ 400.601940][ T5875] usb 3-1: New USB device found, idVendor=7d25, idProduct=a415, bcdDevice= 0.40 [ 400.625269][ T5875] usb 3-1: New USB device strings: Mfr=1, Product=4, SerialNumber=0 [ 400.651930][ T5827] Bluetooth: hci5: command 0x0406 tx timeout [ 400.711376][ T5875] usb 3-1: can't set config #1, error -71 [ 400.720391][ T5875] usb 3-1: USB disconnect, device number 28 [ 401.991081][ T5820] usb 7-1: USB disconnect, device number 4 [ 402.109359][ T5820] usblp0: removed [ 402.132328][ T30] audit: type=1400 audit(1750656908.307:600): avc: denied { getopt } for pid=10079 comm="syz.5.1018" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 402.351672][T10084] 9pnet_virtio: no channels available for device 127.0.0.1 [ 403.554306][T10096] netlink: 48 bytes leftover after parsing attributes in process `syz.7.1022'. [ 405.642275][ T5820] usb 3-1: new high-speed USB device number 29 using dummy_hcd [ 405.878055][ T5820] usb 3-1: Using ep0 maxpacket: 16 [ 405.954784][ T5820] usb 3-1: config 0 has an invalid interface number: 63 but max is 0 [ 406.503888][ T5820] usb 3-1: config 0 has no interface number 0 [ 406.527026][ T5820] usb 3-1: config 0 interface 63 altsetting 5 endpoint 0x9 has invalid maxpacket 1023, setting to 64 [ 406.547395][ T5820] usb 3-1: config 0 interface 63 has no altsetting 0 [ 406.577240][ T5820] usb 3-1: New USB device found, idVendor=0921, idProduct=1000, bcdDevice=d7.7b [ 406.699008][ T5820] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 406.809982][ T5820] usb 3-1: Product: syz [ 406.855511][ T5820] usb 3-1: Manufacturer: syz [ 406.885171][ T5820] usb 3-1: SerialNumber: syz [ 406.910203][ T5820] usb 3-1: config 0 descriptor?? [ 407.194614][T10110] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1025'. [ 407.230167][ T5820] belkin_sa 3-1:0.63: Belkin / Peracom / GoHubs USB Serial Adapter converter detected [ 407.262667][T10129] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1030'. [ 407.264649][ T5820] usb 3-1: bcdDevice: d77b, bfc: 0 [ 407.284203][T10127] netlink: 8 bytes leftover after parsing attributes in process `syz.7.1029'. [ 407.301877][ T5820] usb 3-1: Belkin / Peracom / GoHubs USB Serial Adapter converter now attached to ttyUSB0 [ 407.367578][ T5820] usb 3-1: USB disconnect, device number 29 [ 407.471722][ T5820] belkin ttyUSB0: Belkin / Peracom / GoHubs USB Serial Adapter converter now disconnected from ttyUSB0 [ 407.499328][ T5820] belkin_sa 3-1:0.63: device disconnected [ 407.514964][ T5829] Bluetooth: hci0: link tx timeout [ 407.522560][ T5829] Bluetooth: hci0: killing stalled connection 11:aa:aa:aa:aa:aa [ 407.612916][ T975] usb 6-1: new high-speed USB device number 6 using dummy_hcd [ 407.774369][ T975] usb 6-1: device descriptor read/64, error -71 [ 407.896429][T10125] delete_channel: no stack [ 408.542179][ T975] usb 6-1: new high-speed USB device number 7 using dummy_hcd [ 408.565220][ T30] audit: type=1400 audit(1750656914.737:601): avc: denied { connect } for pid=10146 comm="syz.2.1033" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 408.711364][ T975] usb 6-1: device descriptor read/64, error -71 [ 408.738602][ T30] audit: type=1400 audit(1750656914.907:602): avc: denied { mount } for pid=10150 comm="syz.4.1035" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 408.823891][ T975] usb usb6-port1: attempt power cycle [ 409.047306][T10156] netlink: 'syz.6.1036': attribute type 33 has an invalid length. [ 409.055332][T10156] netlink: 152 bytes leftover after parsing attributes in process `syz.6.1036'. [ 409.243485][ T975] usb 6-1: new high-speed USB device number 8 using dummy_hcd [ 409.299979][ T975] usb 6-1: device descriptor read/8, error -71 [ 409.718471][ T5827] Bluetooth: hci0: command 0x0406 tx timeout [ 409.729876][ T975] usb 6-1: new high-speed USB device number 9 using dummy_hcd [ 410.325919][ T30] audit: type=1400 audit(1750656915.937:603): avc: denied { search } for pid=10150 comm="syz.4.1035" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=dir permissive=1 [ 410.535575][ T975] usb 6-1: device descriptor read/8, error -71 [ 411.444358][ T975] usb usb6-port1: unable to enumerate USB device [ 411.554553][ T92] usb 8-1: new high-speed USB device number 5 using dummy_hcd [ 411.795016][ T92] usb 8-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 411.832140][ T92] usb 8-1: config 0 has no interfaces? [ 411.913757][ T92] usb 8-1: New USB device found, idVendor=0582, idProduct=0014, bcdDevice=bb.9d [ 411.992778][ T92] usb 8-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 412.214928][ T92] usb 8-1: config 0 descriptor?? [ 412.666227][T10194] FAULT_INJECTION: forcing a failure. [ 412.666227][T10194] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 412.679426][T10194] CPU: 1 UID: 0 PID: 10194 Comm: syz.5.1043 Not tainted 6.16.0-rc2-syzkaller-00378-gb67ec639010f #0 PREEMPT(full) [ 412.679449][T10194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 412.679459][T10194] Call Trace: [ 412.679465][T10194] [ 412.679472][T10194] dump_stack_lvl+0x16c/0x1f0 [ 412.679501][T10194] should_fail_ex+0x512/0x640 [ 412.679527][T10194] _copy_from_user+0x2e/0xd0 [ 412.679547][T10194] copy_msghdr_from_user+0x98/0x160 [ 412.679567][T10194] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 412.679601][T10194] ___sys_sendmsg+0xfe/0x1d0 [ 412.679620][T10194] ? __pfx____sys_sendmsg+0x10/0x10 [ 412.679636][T10194] ? __lock_acquire+0x622/0x1c90 [ 412.679680][T10194] __sys_sendmsg+0x16d/0x220 [ 412.679699][T10194] ? __pfx___sys_sendmsg+0x10/0x10 [ 412.679729][T10194] do_syscall_64+0xcd/0x4c0 [ 412.679750][T10194] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 412.679763][T10194] RIP: 0033:0x7fc7d178e929 [ 412.679774][T10194] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 412.679787][T10194] RSP: 002b:00007fc7d25ca038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 412.679800][T10194] RAX: ffffffffffffffda RBX: 00007fc7d19b6160 RCX: 00007fc7d178e929 [ 412.679808][T10194] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000009 [ 412.679817][T10194] RBP: 00007fc7d25ca090 R08: 0000000000000000 R09: 0000000000000000 [ 412.679824][T10194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 412.679832][T10194] R13: 0000000000000000 R14: 00007fc7d19b6160 R15: 00007ffca66849a8 [ 412.679850][T10194] [ 414.431407][ T24] usb 8-1: USB disconnect, device number 5 [ 414.974269][ T30] audit: type=1404 audit(1750656921.107:604): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 415.080267][ T30] audit: type=1400 audit(1750656921.117:605): avc: denied { read } for pid=10205 comm="syz.7.1047" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 415.128937][ T30] audit: type=1400 audit(1750656921.117:606): avc: denied { create } for pid=10205 comm="syz.7.1047" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 415.158447][ T30] audit: type=1400 audit(1750656921.127:607): avc: denied { read write } for pid=8657 comm="syz-executor" name="loop6" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 415.227047][ T30] audit: type=1400 audit(1750656921.157:608): avc: denied { read write } for pid=5809 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 415.279004][ T30] audit: type=1400 audit(1750656921.167:609): avc: denied { prog_load } for pid=10205 comm="syz.7.1047" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 415.306274][ T30] audit: type=1400 audit(1750656921.227:610): avc: denied { read write } for pid=10210 comm="syz.6.1048" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 415.361067][ T30] audit: type=1400 audit(1750656921.227:611): avc: denied { write } for pid=10201 comm="syz.5.1045" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 415.469204][ T30] audit: type=1400 audit(1750656921.227:612): avc: denied { setopt } for pid=10201 comm="syz.5.1045" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 415.514663][ T30] audit: type=1400 audit(1750656921.227:613): avc: denied { read } for pid=10201 comm="syz.5.1045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 416.332047][ T5827] Bluetooth: hci2: command 0x0406 tx timeout [ 418.529957][T10348] netlink: 8 bytes leftover after parsing attributes in process `syz.7.1086'. [ 418.559548][T10348] Cannot find add_set index 0 as target [ 419.985761][ T30] kauditd_printk_skb: 425 callbacks suppressed [ 419.985775][ T30] audit: type=1400 audit(1750656926.157:1039): avc: denied { bpf } for pid=10392 comm="syz.4.1102" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 420.022245][ T30] audit: type=1400 audit(1750656926.157:1040): avc: denied { create } for pid=10392 comm="syz.4.1102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 420.043944][ T30] audit: type=1400 audit(1750656926.197:1041): avc: denied { execmem } for pid=10392 comm="syz.4.1102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 420.083314][ T30] audit: type=1400 audit(1750656926.237:1042): avc: denied { prog_load } for pid=10392 comm="syz.4.1102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 420.105170][ T30] audit: type=1400 audit(1750656926.237:1043): avc: denied { read write } for pid=8447 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 420.144033][ T30] audit: type=1400 audit(1750656926.237:1044): avc: denied { read write } for pid=10392 comm="syz.4.1102" name="nullb0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 420.168064][ T30] audit: type=1400 audit(1750656926.257:1045): avc: denied { read write } for pid=5809 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 420.233459][ T30] audit: type=1400 audit(1750656926.317:1046): avc: denied { read write } for pid=10397 comm="syz.5.1103" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 420.342997][ T30] audit: type=1400 audit(1750656926.317:1047): avc: denied { write } for pid=10396 comm="syz.4.1104" name="ip_vs_stats" dev="proc" ino=4026533097 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 [ 420.370650][ T30] audit: type=1400 audit(1750656926.317:1048): avc: denied { execmem } for pid=10396 comm="syz.4.1104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 421.044207][T10423] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1113'. [ 421.082817][T10425] ptrace attach of "./syz-executor exec"[5809] was attempted by "./syz-executor exec"[10425] [ 421.237379][T10429] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(6) [ 421.243897][T10429] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 421.270661][T10429] vhci_hcd vhci_hcd.0: Device attached [ 421.498088][T10432] vhci_hcd: connection closed [ 421.512484][ T13] vhci_hcd: stop threads [ 421.547167][ T13] vhci_hcd: release socket [ 421.567878][ T13] vhci_hcd: disconnect device [ 421.581412][ T5875] usb 42-1: SetAddress Request (2) to port 0 [ 421.606925][ T5875] usb 42-1: new SuperSpeed USB device number 2 using vhci_hcd [ 422.516426][ T5829] Bluetooth: hci2: unexpected event for opcode 0x1004 [ 422.927923][T10496] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=46277 sclass=netlink_route_socket pid=10496 comm=syz.5.1131 [ 424.346334][T10550] netlink: 'syz.6.1145': attribute type 1 has an invalid length. [ 424.489609][T10553] bond1: (slave ip6gretap1): Enslaving as a backup interface with an up link [ 424.513714][T10550] netlink: 28 bytes leftover after parsing attributes in process `syz.6.1145'. [ 424.540420][T10550] bond1 (unregistering): (slave ip6gretap1): Releasing backup interface [ 424.558487][T10550] bond1 (unregistering): Released all slaves [ 424.996242][ T30] kauditd_printk_skb: 438 callbacks suppressed [ 424.996258][ T30] audit: type=1400 audit(1750656931.167:1487): avc: denied { create } for pid=10573 comm="syz.4.1153" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 425.048766][ T30] audit: type=1400 audit(1750656931.197:1488): avc: denied { read write } for pid=8447 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 425.077103][ T30] audit: type=1400 audit(1750656931.247:1489): avc: denied { prog_load } for pid=10573 comm="syz.4.1153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 425.221661][ T30] audit: type=1400 audit(1750656931.267:1490): avc: denied { prog_load } for pid=10573 comm="syz.4.1153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 425.241066][ T30] audit: type=1400 audit(1750656931.267:1491): avc: denied { read } for pid=10573 comm="syz.4.1153" name="iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 425.267964][ T30] audit: type=1400 audit(1750656931.267:1492): avc: denied { read } for pid=10573 comm="syz.4.1153" name="iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 425.409002][ T30] audit: type=1400 audit(1750656931.327:1493): avc: denied { create } for pid=10577 comm="syz.5.1154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 425.441628][ T30] audit: type=1400 audit(1750656931.337:1494): avc: denied { read append } for pid=10577 comm="syz.5.1154" name="sg0" dev="devtmpfs" ino=753 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=0 [ 425.467541][ T30] audit: type=1400 audit(1750656931.347:1495): avc: denied { create } for pid=10577 comm="syz.5.1154" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 425.489215][ T30] audit: type=1400 audit(1750656931.387:1496): avc: denied { read write } for pid=5809 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 425.768395][T10581] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1155'. [ 425.783061][T10593] netlink: 48 bytes leftover after parsing attributes in process `syz.6.1159'. [ 426.581443][ T5829] Bluetooth: hci2: Controller not accepting commands anymore: ncmd = 0 [ 426.590215][ T5829] Bluetooth: hci2: Injecting HCI hardware error event [ 426.598672][ T5829] Bluetooth: hci2: hardware error 0x00 [ 426.652047][ T5875] usb 42-1: device descriptor read/8, error -110 [ 426.715837][T10628] ptrace attach of "./syz-executor exec"[5815] was attempted by "./syz-executor exec"[10628] [ 426.807273][T10633] netlink: 'syz.4.1173': attribute type 7 has an invalid length. [ 426.849804][T10633] netlink: 'syz.4.1173': attribute type 8 has an invalid length. [ 426.921486][ T5875] usb 42-1: SetAddress Request (3) to port 0 [ 426.928126][ T5875] usb 42-1: new SuperSpeed USB device number 3 using vhci_hcd [ 428.113033][T10686] bridge0: port 2(bridge_slave_1) entered disabled state [ 428.120665][T10686] bridge0: port 1(bridge_slave_0) entered disabled state [ 428.325427][T10686] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 428.346451][T10686] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 428.409552][T10686] netdevsim netdevsim6 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 428.424334][T10686] netdevsim netdevsim6 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 428.439806][T10686] netdevsim netdevsim6 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 428.453133][T10686] netdevsim netdevsim6 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 428.655003][ T5829] Bluetooth: hci2: Opcode 0x0c03 failed: -110 [ 428.682759][T10715] SELinux: security_context_str_to_sid (5ýÆÉ] ÖS9q#“ë) failed with errno=-22 [ 430.005694][ T30] kauditd_printk_skb: 823 callbacks suppressed [ 430.005709][ T30] audit: type=1400 audit(1750656936.177:2320): avc: denied { prog_load } for pid=10772 comm="syz.5.1214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 430.089929][ T30] audit: type=1400 audit(1750656936.177:2321): avc: denied { allowed } for pid=10772 comm="syz.5.1214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 430.124686][T10775] audit: audit_backlog=65 > audit_backlog_limit=64 [ 430.139134][T10776] audit: audit_backlog=65 > audit_backlog_limit=64 [ 430.156356][T10775] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 430.171378][ T30] audit: type=1400 audit(1750656936.207:2322): avc: denied { create } for pid=10772 comm="syz.5.1214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 430.191895][T10776] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 430.199642][T10775] audit: backlog limit exceeded [ 430.204734][T10776] audit: backlog limit exceeded [ 430.205046][T10775] audit: audit_backlog=65 > audit_backlog_limit=64 [ 431.459069][T10842] netlink: 40 bytes leftover after parsing attributes in process `syz.2.1236'. [ 431.850915][T10859] FAULT_INJECTION: forcing a failure. [ 431.850915][T10859] name failslab, interval 1, probability 0, space 0, times 0 [ 431.866635][T10859] CPU: 0 UID: 0 PID: 10859 Comm: syz.6.1240 Not tainted 6.16.0-rc2-syzkaller-00378-gb67ec639010f #0 PREEMPT(full) [ 431.866660][T10859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 431.866670][T10859] Call Trace: [ 431.866675][T10859] [ 431.866681][T10859] dump_stack_lvl+0x16c/0x1f0 [ 431.866709][T10859] should_fail_ex+0x512/0x640 [ 431.866731][T10859] ? __kmalloc_noprof+0xbf/0x510 [ 431.866755][T10859] ? iter_file_splice_write+0x1cc/0x1150 [ 431.866777][T10859] should_failslab+0xc2/0x120 [ 431.866802][T10859] __kmalloc_noprof+0xd2/0x510 [ 431.866828][T10859] iter_file_splice_write+0x1cc/0x1150 [ 431.866851][T10859] ? current_time+0x11d/0x1a0 [ 431.866874][T10859] ? __pfx_current_time+0x10/0x10 [ 431.866896][T10859] ? __pfx_make_vfsgid+0x10/0x10 [ 431.866920][T10859] ? atime_needs_update+0x8b/0x710 [ 431.866941][T10859] ? __pfx_iter_file_splice_write+0x10/0x10 [ 431.866964][T10859] ? __lock_acquire+0xb8a/0x1c90 [ 431.867008][T10859] ? __pfx_iter_file_splice_write+0x10/0x10 [ 431.867033][T10859] direct_splice_actor+0x18f/0x6c0 [ 431.867058][T10859] splice_direct_to_actor+0x345/0xa30 [ 431.867081][T10859] ? __pfx_direct_splice_actor+0x10/0x10 [ 431.867108][T10859] ? __pfx_splice_direct_to_actor+0x10/0x10 [ 431.867129][T10859] ? get_pid_task+0xfc/0x250 [ 431.867162][T10859] do_splice_direct+0x174/0x240 [ 431.867184][T10859] ? __pfx_do_splice_direct+0x10/0x10 [ 431.867212][T10859] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 431.867237][T10859] ? rw_verify_area+0xcf/0x680 [ 431.867265][T10859] do_sendfile+0xb06/0xe50 [ 431.867290][T10859] ? __pfx_do_sendfile+0x10/0x10 [ 431.867320][T10859] __x64_sys_sendfile64+0x154/0x220 [ 431.867347][T10859] ? __pfx___x64_sys_sendfile64+0x10/0x10 [ 431.867381][T10859] do_syscall_64+0xcd/0x4c0 [ 431.867408][T10859] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 431.867425][T10859] RIP: 0033:0x7fbc1898e929 [ 431.867439][T10859] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 431.867455][T10859] RSP: 002b:00007fbc19848038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 431.867471][T10859] RAX: ffffffffffffffda RBX: 00007fbc18bb6080 RCX: 00007fbc1898e929 [ 431.867482][T10859] RDX: 0000200000000080 RSI: 0000000000000007 RDI: 0000000000000007 [ 431.867492][T10859] RBP: 00007fbc19848090 R08: 0000000000000000 R09: 0000000000000000 [ 431.867503][T10859] R10: 0000000000007f03 R11: 0000000000000246 R12: 0000000000000002 [ 431.867512][T10859] R13: 0000000000000000 R14: 00007fbc18bb6080 R15: 00007ffd8f35ca18 [ 431.867535][T10859] [ 432.123746][ T5875] usb 42-1: device descriptor read/8, error -110 [ 432.231565][ T5875] usb usb42-port1: attempt power cycle [ 432.521677][ T5875] usb 42-1: SetAddress Request (4) to port 0 [ 432.528009][ T5875] usb 42-1: new SuperSpeed USB device number 4 using vhci_hcd [ 433.621840][T10902] Bluetooth: Invalid esc byte 0x00 [ 433.732826][ T36] Bluetooth: (null): Invalid header checksum [ 433.745920][ T36] Bluetooth: (null): Invalid header checksum [ 434.480800][T10941] netlink: 'syz.2.1265': attribute type 10 has an invalid length. [ 434.587929][T10941] bond0: (slave wlan1): Enslaving as an active interface with an up link [ 435.015772][ T30] kauditd_printk_skb: 1020 callbacks suppressed [ 435.015782][ T30] audit: type=1400 audit(1750656941.187:3251): avc: denied { read write } for pid=8447 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 435.345724][ T30] audit: type=1400 audit(1750656941.227:3252): avc: denied { read write } for pid=10942 comm="syz.6.1264" name="nullb0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 435.405244][T10968] netlink: 'syz.2.1272': attribute type 1 has an invalid length. [ 435.416339][T10968] netlink: 'syz.2.1272': attribute type 4 has an invalid length. [ 435.452920][T10968] netlink: 9462 bytes leftover after parsing attributes in process `syz.2.1272'. [ 435.474350][ T30] audit: type=1400 audit(1750656941.247:3253): avc: denied { execmem } for pid=10955 comm="syz.2.1269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 435.511473][T10970] netlink: 'syz.2.1272': attribute type 1 has an invalid length. [ 435.549084][T10970] netlink: 'syz.2.1272': attribute type 4 has an invalid length. [ 435.589280][ T30] audit: type=1400 audit(1750656941.287:3254): avc: denied { create } for pid=10959 comm="syz.5.1270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 435.624089][T10972] netlink: 8 bytes leftover after parsing attributes in process `syz.5.1273'. [ 435.638474][T10970] netlink: 9462 bytes leftover after parsing attributes in process `syz.2.1272'. [ 435.731311][ T30] audit: type=1400 audit(1750656941.307:3255): avc: denied { read } for pid=10955 comm="syz.2.1269" dev="nsfs" ino=4026532997 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 435.818981][T10978] audit: audit_backlog=65 > audit_backlog_limit=64 [ 435.837909][T10978] audit: audit_lost=34 audit_rate_limit=0 audit_backlog_limit=64 [ 435.856314][ T30] audit: type=1400 audit(1750656941.307:3256): avc: denied { create } for pid=10955 comm="syz.2.1269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 435.857926][T10978] audit: backlog limit exceeded [ 435.906747][T10981] audit: audit_backlog=65 > audit_backlog_limit=64 [ 436.546825][ T5974] libceph: connect (1)[c::]:6789 error -101 [ 436.580625][ T5974] libceph: mon0 (1)[c::]:6789 connect error [ 436.893449][ T5974] libceph: connect (1)[c::]:6789 error -101 [ 436.916780][ T5974] libceph: mon0 (1)[c::]:6789 connect error [ 437.259057][T11006] ceph: No mds server is up or the cluster is laggy [ 437.612782][ T5875] usb 42-1: device descriptor read/8, error -110 [ 437.891261][ T5875] usb 42-1: SetAddress Request (5) to port 0 [ 437.900509][ T5875] usb 42-1: new SuperSpeed USB device number 5 using vhci_hcd [ 438.952501][T11129] netlink: 'syz.7.1315': attribute type 10 has an invalid length. [ 438.965918][T11129] veth1_macvtap: left promiscuous mode [ 439.422386][T11143] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11143 comm=syz.4.1318 [ 439.429173][T11145] netlink: 'syz.6.1319': attribute type 4 has an invalid length. [ 439.523490][T11143] vlan2: entered promiscuous mode [ 439.537436][ T1299] ieee802154 phy0 wpan0: encryption failed: -22 [ 439.543846][ T1299] ieee802154 phy1 wpan1: encryption failed: -22 [ 439.552084][T11143] bridge0: entered promiscuous mode [ 439.582840][T11143] vlan2: entered allmulticast mode [ 439.588775][T11143] bridge0: entered allmulticast mode [ 440.036325][ T30] kauditd_printk_skb: 1148 callbacks suppressed [ 440.036341][ T30] audit: type=1400 audit(1750656946.207:4229): avc: denied { read write } for pid=11168 comm="syz.7.1327" name="vhost-vsock" dev="devtmpfs" ino=1275 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=0 [ 440.075720][ T30] audit: type=1400 audit(1750656946.207:4230): avc: denied { prog_load } for pid=11168 comm="syz.7.1327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 440.111968][ T30] audit: type=1400 audit(1750656946.207:4231): avc: denied { read } for pid=11168 comm="syz.7.1327" name="card1" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=0 [ 440.215340][ T30] audit: type=1400 audit(1750656946.237:4232): avc: denied { read } for pid=11168 comm="syz.7.1327" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 440.241278][ T30] audit: type=1400 audit(1750656946.247:4233): avc: denied { create } for pid=11169 comm="syz.6.1328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 440.263253][ T30] audit: type=1400 audit(1750656946.247:4234): avc: denied { execmem } for pid=11172 comm="syz.4.1329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 440.282860][ T30] audit: type=1400 audit(1750656946.277:4235): avc: denied { read write } for pid=8447 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 440.308160][ T30] audit: type=1400 audit(1750656946.317:4236): avc: denied { create } for pid=11172 comm="syz.4.1329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 440.433863][ T30] audit: type=1400 audit(1750656946.317:4237): avc: denied { create } for pid=11172 comm="syz.4.1329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 440.433908][ T30] audit: type=1400 audit(1750656946.317:4238): avc: denied { create } for pid=11172 comm="syz.4.1329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 442.453670][T11255] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1353'. [ 442.470599][T11255] bridge: RTM_NEWNEIGH bridge0 without NUD_PERMANENT [ 442.976414][ T5875] usb 42-1: device descriptor read/8, error -110 [ 443.058266][T11269] netlink: 48 bytes leftover after parsing attributes in process `syz.4.1358'. [ 443.111514][ T5875] usb usb42-port1: unable to enumerate USB device [ 443.649287][ T5827] Bluetooth: hci0: unexpected event 0x03 length: 1 < 11 [ 444.274337][T11301] ptm ptm3: ldisc open failed (-12), clearing slot 3 [ 445.046861][ T30] kauditd_printk_skb: 481 callbacks suppressed [ 445.046876][ T30] audit: type=1400 audit(1750656951.217:4720): avc: denied { read write } for pid=8447 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 445.149082][ T30] audit: type=1400 audit(1750656951.317:4721): avc: denied { read write } for pid=5815 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 445.233764][ T30] audit: type=1400 audit(1750656951.357:4722): avc: denied { read } for pid=11328 comm="syz.4.1381" dev="nsfs" ino=4026532914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 445.256161][ T30] audit: type=1400 audit(1750656951.407:4723): avc: denied { create } for pid=11330 comm="syz.5.1380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 445.370005][ T30] audit: type=1400 audit(1750656951.407:4724): avc: denied { read write } for pid=8657 comm="syz-executor" name="loop6" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 445.399979][T11338] ptrace attach of "./syz-executor exec"[8657] was attempted by "./syz-executor exec"[11338] [ 445.452231][T11341] lo: entered promiscuous mode [ 445.484501][ T30] audit: type=1400 audit(1750656951.407:4725): avc: denied { read write } for pid=8955 comm="syz-executor" name="loop7" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 445.553935][ T30] audit: type=1400 audit(1750656951.437:4726): avc: denied { create } for pid=11330 comm="syz.5.1380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 445.574908][ T30] audit: type=1400 audit(1750656951.437:4727): avc: denied { create } for pid=11330 comm="syz.5.1380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 445.673432][ T30] audit: type=1400 audit(1750656951.437:4728): avc: denied { create } for pid=11330 comm="syz.5.1380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 445.736285][ T30] audit: type=1400 audit(1750656951.457:4729): avc: denied { read } for pid=11333 comm="syz.2.1382" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 446.265626][T11376] netlink: 48 bytes leftover after parsing attributes in process `syz.2.1400'. [ 446.315976][T11378] ptrace attach of "./syz-executor exec"[5809] was attempted by "./syz-executor exec"[11378] [ 446.493612][T11381] netlink: 'syz.4.1402': attribute type 33 has an invalid length. [ 446.522507][T11381] netlink: 152 bytes leftover after parsing attributes in process `syz.4.1402'. [ 446.590067][T11384] netlink: 'syz.7.1403': attribute type 33 has an invalid length. [ 446.640058][T11384] netlink: 152 bytes leftover after parsing attributes in process `syz.7.1403'. [ 446.664029][T11388] netlink: 'syz.4.1405': attribute type 8 has an invalid length. [ 447.700641][T11408] ptrace attach of "./syz-executor exec"[8657] was attempted by "./syz-executor exec"[11408] [ 449.146378][T11448] ptrace attach of "./syz-executor exec"[5809] was attempted by "./syz-executor exec"[11448] [ 449.384799][T11459] netlink: 'syz.2.1431': attribute type 13 has an invalid length. [ 450.365445][ T30] kauditd_printk_skb: 342 callbacks suppressed [ 450.365459][ T30] audit: type=1400 audit(1750656956.537:5072): avc: denied { read write } for pid=8447 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 450.693099][T11493] ptrace attach of "./syz-executor exec"[5809] was attempted by "./syz-executor exec"[11493] [ 450.741300][ T30] audit: type=1400 audit(1750656956.547:5073): avc: denied { read write } for pid=8657 comm="syz-executor" name="loop6" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 450.832835][ T30] audit: type=1400 audit(1750656956.717:5074): avc: denied { read write } for pid=5809 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 450.873448][ T30] audit: type=1400 audit(1750656956.727:5075): avc: denied { read write } for pid=11487 comm="syz.6.1443" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 450.929382][ T30] audit: type=1400 audit(1750656956.737:5076): avc: denied { create } for pid=11489 comm="syz.5.1442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 450.952173][ T30] audit: type=1400 audit(1750656956.737:5077): avc: denied { read } for pid=11487 comm="syz.6.1443" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 450.975891][ T30] audit: type=1400 audit(1750656956.737:5078): avc: denied { read write } for pid=11487 comm="syz.6.1443" name="fb0" dev="devtmpfs" ino=629 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=0 [ 451.082111][ T30] audit: type=1400 audit(1750656956.757:5079): avc: denied { create } for pid=11489 comm="syz.5.1442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 451.102369][ T30] audit: type=1400 audit(1750656956.757:5080): avc: denied { create } for pid=11489 comm="syz.5.1442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 451.134171][ T30] audit: type=1400 audit(1750656956.767:5081): avc: denied { create } for pid=11489 comm="syz.5.1442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 453.307219][T11569] netlink: 48 bytes leftover after parsing attributes in process `syz.4.1473'. [ 453.989050][T11591] netlink: 44 bytes leftover after parsing attributes in process `syz.6.1483'. [ 454.040340][T11593] netlink: 24 bytes leftover after parsing attributes in process `syz.5.1482'. [ 454.505028][T11615] netlink: 'syz.7.1491': attribute type 33 has an invalid length. [ 454.520758][T11615] netlink: 152 bytes leftover after parsing attributes in process `syz.7.1491'. [ 454.623342][T11624] netlink: 40 bytes leftover after parsing attributes in process `syz.4.1494'. [ 454.897639][T11646] netdevsim netdevsim5 netdevsim0: set [1, 1] type 2 family 0 port 20000 - 0 [ 454.909887][T11646] netdevsim netdevsim5 netdevsim1: set [1, 1] type 2 family 0 port 20000 - 0 [ 454.919040][T11646] netdevsim netdevsim5 netdevsim2: set [1, 1] type 2 family 0 port 20000 - 0 [ 454.928100][T11646] netdevsim netdevsim5 netdevsim3: set [1, 1] type 2 family 0 port 20000 - 0 [ 454.937494][T11646] geneve2: entered allmulticast mode [ 455.200986][T11652] FAULT_INJECTION: forcing a failure. [ 455.200986][T11652] name failslab, interval 1, probability 0, space 0, times 0 [ 455.215577][T11652] CPU: 1 UID: 0 PID: 11652 Comm: syz.5.1503 Not tainted 6.16.0-rc2-syzkaller-00378-gb67ec639010f #0 PREEMPT(full) [ 455.215601][T11652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 455.215608][T11652] Call Trace: [ 455.215612][T11652] [ 455.215617][T11652] dump_stack_lvl+0x16c/0x1f0 [ 455.215635][T11652] should_fail_ex+0x512/0x640 [ 455.215649][T11652] ? fs_reclaim_acquire+0xae/0x150 [ 455.215661][T11652] ? tomoyo_encode2+0x100/0x3e0 [ 455.215674][T11652] should_failslab+0xc2/0x120 [ 455.215689][T11652] __kmalloc_noprof+0xd2/0x510 [ 455.215702][T11652] ? d_absolute_path+0x136/0x1a0 [ 455.215715][T11652] tomoyo_encode2+0x100/0x3e0 [ 455.215731][T11652] tomoyo_encode+0x29/0x50 [ 455.215748][T11652] tomoyo_realpath_from_path+0x18f/0x6e0 [ 455.215766][T11652] tomoyo_mount_acl+0x1ae/0x850 [ 455.215778][T11652] ? kernel_text_address+0x8d/0x100 [ 455.215790][T11652] ? __kernel_text_address+0xd/0x40 [ 455.215800][T11652] ? unwind_get_return_address+0x59/0xa0 [ 455.215817][T11652] ? arch_stack_walk+0xa6/0x100 [ 455.215828][T11652] ? __pfx_tomoyo_mount_acl+0x10/0x10 [ 455.215844][T11652] ? stack_trace_save+0x8e/0xc0 [ 455.215872][T11652] ? tomoyo_domain+0xbb/0x150 [ 455.215887][T11652] ? tomoyo_profile+0x47/0x60 [ 455.215904][T11652] tomoyo_mount_permission+0x16d/0x420 [ 455.215917][T11652] ? tomoyo_mount_permission+0x14f/0x420 [ 455.215930][T11652] ? __pfx_tomoyo_mount_permission+0x10/0x10 [ 455.215952][T11652] security_sb_mount+0x9b/0x260 [ 455.215966][T11652] path_mount+0x128/0x2020 [ 455.215983][T11652] ? kmem_cache_free+0x2d1/0x4d0 [ 455.215996][T11652] ? __pfx_path_mount+0x10/0x10 [ 455.216013][T11652] ? putname+0x154/0x1a0 [ 455.216031][T11652] __x64_sys_mount+0x28d/0x310 [ 455.216047][T11652] ? __pfx___x64_sys_mount+0x10/0x10 [ 455.216068][T11652] do_syscall_64+0xcd/0x4c0 [ 455.216084][T11652] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 455.216095][T11652] RIP: 0033:0x7fc7d178e929 [ 455.216104][T11652] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 455.216114][T11652] RSP: 002b:00007fc7d260c038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 455.216124][T11652] RAX: ffffffffffffffda RBX: 00007fc7d19b5fa0 RCX: 00007fc7d178e929 [ 455.216131][T11652] RDX: 00002000000000c0 RSI: 0000200000000000 RDI: 0000200000000140 [ 455.216137][T11652] RBP: 00007fc7d260c090 R08: 0000000000000000 R09: 0000000000000000 [ 455.216143][T11652] R10: 0000000000208000 R11: 0000000000000246 R12: 0000000000000001 [ 455.216149][T11652] R13: 0000000000000000 R14: 00007fc7d19b5fa0 R15: 00007ffca66849a8 [ 455.216162][T11652] [ 455.216183][T11652] ERROR: Out of memory at tomoyo_realpath_from_path. [ 455.490796][ T30] kauditd_printk_skb: 272 callbacks suppressed [ 455.490811][ T30] audit: type=1400 audit(1750656961.657:5354): avc: denied { read write } for pid=8955 comm="syz-executor" name="loop7" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 455.568230][ T30] audit: type=1400 audit(1750656961.717:5355): avc: denied { read write } for pid=8447 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 455.597419][ T30] audit: type=1400 audit(1750656961.737:5356): avc: denied { bpf } for pid=11654 comm="syz.7.1504" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 455.623397][ T30] audit: type=1400 audit(1750656961.737:5357): avc: denied { create } for pid=11653 comm="syz.5.1505" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 455.648292][ T30] audit: type=1400 audit(1750656961.737:5358): avc: denied { create } for pid=11654 comm="syz.7.1504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 455.706398][ T30] audit: type=1400 audit(1750656961.737:5359): avc: denied { execmem } for pid=11654 comm="syz.7.1504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 455.730779][ T30] audit: type=1400 audit(1750656961.767:5360): avc: denied { prog_load } for pid=11654 comm="syz.7.1504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 455.753552][ T30] audit: type=1400 audit(1750656961.787:5361): avc: denied { read write } for pid=11653 comm="syz.5.1505" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 455.781019][ T30] audit: type=1400 audit(1750656961.787:5362): avc: denied { mounton } for pid=11653 comm="syz.5.1505" path="/167/file0" dev="tmpfs" ino=884 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 455.807169][ T30] audit: type=1400 audit(1750656961.797:5363): avc: denied { read write } for pid=11653 comm="syz.5.1505" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 455.836018][T11658] netlink: 'syz.4.1506': attribute type 33 has an invalid length. [ 455.844319][T11658] netlink: 152 bytes leftover after parsing attributes in process `syz.4.1506'. [ 456.163848][T11678] ptrace attach of "./syz-executor exec"[8447] was attempted by "./syz-executor exec"[11678] [ 456.327817][T11686] netlink: 'syz.6.1519': attribute type 33 has an invalid length. [ 456.335730][T11686] netlink: 152 bytes leftover after parsing attributes in process `syz.6.1519'. [ 456.374849][T11689] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11689 comm=syz.7.1521 [ 457.954129][T11711] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1528'. [ 459.459742][T11721] ptrace attach of "./syz-executor exec"[8657] was attempted by "./syz-executor exec"[11721] [ 459.500529][T11719] netlink: 'syz.4.1532': attribute type 33 has an invalid length. [ 459.508660][T11719] netlink: 152 bytes leftover after parsing attributes in process `syz.4.1532'. [ 460.302065][T11747] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1542'. [ 460.543156][ T30] kauditd_printk_skb: 191 callbacks suppressed [ 460.543171][ T30] audit: type=1400 audit(1750656966.717:5555): avc: denied { prog_load } for pid=11752 comm="syz.2.1545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 460.588991][ T30] audit: type=1400 audit(1750656966.737:5556): avc: denied { prog_load } for pid=11752 comm="syz.2.1545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 460.638129][ T30] audit: type=1400 audit(1750656966.757:5557): avc: denied { read write } for pid=8657 comm="syz-executor" name="loop6" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 460.735261][ T30] audit: type=1400 audit(1750656966.797:5558): avc: denied { read write } for pid=8955 comm="syz-executor" name="loop7" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 460.762918][ T30] audit: type=1400 audit(1750656966.817:5559): avc: denied { read } for pid=11756 comm="syz.6.1546" dev="nsfs" ino=4026533005 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 460.784571][ T30] audit: type=1400 audit(1750656966.827:5560): avc: denied { read } for pid=11756 comm="syz.6.1546" name="rtc0" dev="devtmpfs" ino=921 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=0 [ 460.807876][ T30] audit: type=1400 audit(1750656966.827:5561): avc: denied { create } for pid=11756 comm="syz.6.1546" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 460.835316][T11762] ptrace attach of "./syz-executor exec"[8447] was attempted by "./syz-executor exec"[11762] [ 460.847999][ T30] audit: type=1400 audit(1750656966.827:5562): avc: denied { create } for pid=11756 comm="syz.6.1546" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 460.881877][T11763] netlink: 'syz.6.1550': attribute type 33 has an invalid length. [ 460.896873][ T30] audit: type=1400 audit(1750656966.827:5563): avc: denied { create } for pid=11756 comm="syz.6.1546" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 460.918828][T11763] netlink: 152 bytes leftover after parsing attributes in process `syz.6.1550'. [ 460.979876][ T30] audit: type=1400 audit(1750656966.857:5564): avc: denied { read write } for pid=8447 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 461.068625][T11776] netlink: 8 bytes leftover after parsing attributes in process `syz.6.1555'. [ 461.887582][T11804] netlink: 8 bytes leftover after parsing attributes in process `syz.7.1566'. [ 463.066469][T11846] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1580'. [ 463.477210][T11869] netlink: 'syz.4.1589': attribute type 33 has an invalid length. [ 463.491306][T11869] netlink: 152 bytes leftover after parsing attributes in process `syz.4.1589'. [ 464.344360][T11911] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 464.350897][T11911] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 464.384280][T11911] vhci_hcd vhci_hcd.0: Device attached [ 464.436075][T11912] vhci_hcd: connection closed [ 464.436280][ T7731] vhci_hcd: stop threads [ 464.448073][T11918] ptrace attach of "./syz-executor exec"[8447] was attempted by "./syz-executor exec"[11918] [ 464.463858][ T7731] vhci_hcd: release socket [ 464.473227][ T7731] vhci_hcd: disconnect device [ 464.975454][T11936] netlink: 'syz.6.1616': attribute type 33 has an invalid length. [ 465.007885][T11936] netlink: 152 bytes leftover after parsing attributes in process `syz.6.1616'. [ 465.465921][T11961] netlink: 8 bytes leftover after parsing attributes in process `syz.7.1625'. [ 465.554109][ T30] kauditd_printk_skb: 551 callbacks suppressed [ 465.554124][ T30] audit: type=1326 audit(1750656971.727:6114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11962 comm="syz.5.1626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7fc7d178e929 code=0x7ffc0000 [ 465.648422][ T30] audit: type=1326 audit(1750656971.727:6115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11962 comm="syz.5.1626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc7d178e929 code=0x7ffc0000 [ 465.730988][ T30] audit: type=1326 audit(1750656971.727:6116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11962 comm="syz.5.1626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc7d178e929 code=0x7ffc0000 [ 465.759271][ T30] audit: type=1326 audit(1750656971.757:6117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11962 comm="syz.5.1626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7fc7d178e929 code=0x7ffc0000 [ 465.837027][ T30] audit: type=1326 audit(1750656971.757:6118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11962 comm="syz.5.1626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc7d178e929 code=0x7ffc0000 [ 465.941347][ T30] audit: type=1326 audit(1750656971.757:6119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11962 comm="syz.5.1626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc7d178e929 code=0x7ffc0000 [ 466.041029][ T30] audit: type=1326 audit(1750656971.787:6120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11962 comm="syz.5.1626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7fc7d178e929 code=0x7ffc0000 [ 466.098415][ T30] audit: type=1326 audit(1750656971.787:6121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11962 comm="syz.5.1626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc7d178e929 code=0x7ffc0000 [ 466.154086][ T30] audit: type=1326 audit(1750656971.787:6122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11962 comm="syz.5.1626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc7d178e929 code=0x7ffc0000 [ 466.233344][ T30] audit: type=1326 audit(1750656971.787:6123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11962 comm="syz.5.1626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=248 compat=0 ip=0x7fc7d178e929 code=0x7ffc0000 [ 466.528403][T11996] netlink: 8 bytes leftover after parsing attributes in process `syz.5.1640'. [ 467.119098][T12026] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=23 sclass=netlink_tcpdiag_socket pid=12026 comm=syz.7.1652 [ 467.454451][T12042] netlink: 52 bytes leftover after parsing attributes in process `syz.4.1660'. [ 467.623448][T12040] netlink: 'syz.7.1659': attribute type 9 has an invalid length. [ 467.805215][T12058] ptrace attach of "./syz-executor exec"[8955] was attempted by "./syz-executor exec"[12058] [ 468.367681][T12085] netlink: 48 bytes leftover after parsing attributes in process `syz.2.1674'. [ 468.677701][T12105] netlink: 'syz.2.1682': attribute type 33 has an invalid length. [ 468.712759][T12105] netlink: 152 bytes leftover after parsing attributes in process `syz.2.1682'. [ 468.839673][T12116] netlink: 48 bytes leftover after parsing attributes in process `syz.2.1687'. [ 469.319045][T12132] ptrace attach of "./syz-executor exec"[8447] was attempted by "./syz-executor exec"[12132] [ 469.567947][T12141] netlink: 48 bytes leftover after parsing attributes in process `syz.4.1698'. [ 469.937537][T12156] netlink: 'syz.2.1704': attribute type 33 has an invalid length. [ 469.949429][T12156] netlink: 152 bytes leftover after parsing attributes in process `syz.2.1704'. [ 470.297535][T12170] netlink: 48 bytes leftover after parsing attributes in process `syz.4.1710'. [ 470.479908][T12181] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=50630 sclass=netlink_route_socket pid=12181 comm=syz.2.1716 [ 470.679409][ T30] kauditd_printk_skb: 430 callbacks suppressed [ 470.679425][ T30] audit: type=1400 audit(1750656976.847:6554): avc: denied { allowed } for pid=12183 comm="syz.5.1717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 470.710881][T12188] netlink: 'syz.5.1717': attribute type 30 has an invalid length. [ 470.768147][ T30] audit: type=1400 audit(1750656976.877:6555): avc: denied { create } for pid=12183 comm="syz.5.1717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=0 [ 470.928789][ T30] audit: type=1400 audit(1750656976.877:6556): avc: denied { read } for pid=12183 comm="syz.5.1717" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 470.987180][ T30] audit: type=1400 audit(1750656976.897:6557): avc: denied { map_create } for pid=12183 comm="syz.5.1717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 471.025502][ T30] audit: type=1400 audit(1750656976.897:6558): avc: denied { create } for pid=12183 comm="syz.5.1717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 471.058539][ T30] audit: type=1400 audit(1750656977.097:6559): avc: denied { read write } for pid=8657 comm="syz-executor" name="loop6" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 471.096306][ T30] audit: type=1400 audit(1750656977.157:6560): avc: denied { create } for pid=12189 comm="syz.6.1718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=0 [ 471.118816][ T30] audit: type=1400 audit(1750656977.157:6561): avc: denied { prog_load } for pid=12189 comm="syz.6.1718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 471.141377][ T30] audit: type=1400 audit(1750656977.157:6562): avc: denied { execmem } for pid=12189 comm="syz.6.1718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 471.163281][ T30] audit: type=1400 audit(1750656977.187:6563): avc: denied { read write } for pid=5809 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 471.563180][T12203] netlink: 48 bytes leftover after parsing attributes in process `syz.2.1723'. [ 472.458378][T12233] netlink: 48 bytes leftover after parsing attributes in process `syz.6.1734'. [ 472.959398][T12247] FAULT_INJECTION: forcing a failure. [ 472.959398][T12247] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 472.984651][T12247] CPU: 0 UID: 0 PID: 12247 Comm: syz.7.1740 Not tainted 6.16.0-rc2-syzkaller-00378-gb67ec639010f #0 PREEMPT(full) [ 472.984675][T12247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 472.984683][T12247] Call Trace: [ 472.984689][T12247] [ 472.984695][T12247] dump_stack_lvl+0x16c/0x1f0 [ 472.984724][T12247] should_fail_ex+0x512/0x640 [ 472.984750][T12247] _copy_to_user+0x32/0xd0 [ 472.984783][T12247] simple_read_from_buffer+0xcb/0x170 [ 472.984807][T12247] proc_fail_nth_read+0x197/0x270 [ 472.984830][T12247] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 472.984852][T12247] ? rw_verify_area+0xcf/0x680 [ 472.984870][T12247] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 472.984890][T12247] vfs_read+0x1e4/0xc60 [ 472.984912][T12247] ? __pfx___mutex_lock+0x10/0x10 [ 472.984935][T12247] ? __pfx_vfs_read+0x10/0x10 [ 472.984960][T12247] ? __fget_files+0x20e/0x3c0 [ 472.984990][T12247] ksys_read+0x12a/0x250 [ 472.985009][T12247] ? __pfx_ksys_read+0x10/0x10 [ 472.985031][T12247] ? fdget+0x187/0x210 [ 472.985057][T12247] do_syscall_64+0xcd/0x4c0 [ 472.985084][T12247] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 472.985099][T12247] RIP: 0033:0x7fdb3f58d33c [ 472.985114][T12247] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 472.985129][T12247] RSP: 002b:00007fdb40443030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 472.985145][T12247] RAX: ffffffffffffffda RBX: 00007fdb3f7b5fa0 RCX: 00007fdb3f58d33c [ 472.985156][T12247] RDX: 000000000000000f RSI: 00007fdb404430a0 RDI: 0000000000000003 [ 472.985165][T12247] RBP: 00007fdb40443090 R08: 0000000000000000 R09: 0000000000000000 [ 472.985175][T12247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 472.985185][T12247] R13: 0000000000000000 R14: 00007fdb3f7b5fa0 R15: 00007ffcaa6dd0d8 [ 472.985206][T12247] [ 473.438417][T12264] netlink: 48 bytes leftover after parsing attributes in process `syz.2.1746'. [ 473.609533][T12273] trusted_key: encrypted_key: master key parameter 'trurted:syz' is invalid [ 473.690303][T12275] netlink: 'syz.2.1750': attribute type 33 has an invalid length. [ 473.704291][T12275] netlink: 152 bytes leftover after parsing attributes in process `syz.2.1750'. [ 473.953306][T12282] [U]  [ 474.375893][T12294] netlink: 48 bytes leftover after parsing attributes in process `syz.4.1759'. [ 474.523727][T12301] netlink: 'syz.7.1761': attribute type 33 has an invalid length. [ 474.566993][T12301] netlink: 152 bytes leftover after parsing attributes in process `syz.7.1761'. [ 475.409531][T12328] netlink: 48 bytes leftover after parsing attributes in process `syz.2.1772'. [ 475.758282][ T30] kauditd_printk_skb: 300 callbacks suppressed [ 475.758297][ T30] audit: type=1400 audit(1750657210.931:6864): avc: denied { read write } for pid=8657 comm="syz-executor" name="loop6" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 475.852989][ T30] audit: type=1400 audit(1750657211.031:6865): avc: denied { read } for pid=12336 comm="syz.6.1776" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 475.881223][T12337] netlink: 'syz.6.1776': attribute type 33 has an invalid length. [ 475.896995][T12337] netlink: 152 bytes leftover after parsing attributes in process `syz.6.1776'. [ 475.906282][ T30] audit: type=1400 audit(1750657211.051:6866): avc: denied { write } for pid=12336 comm="syz.6.1776" name="sg0" dev="devtmpfs" ino=753 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=0 [ 475.987887][ T30] audit: type=1400 audit(1750657211.051:6867): avc: denied { read } for pid=12336 comm="syz.6.1776" name="ptp0" dev="devtmpfs" ino=1265 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=0 [ 476.015941][ T30] audit: type=1400 audit(1750657211.111:6868): avc: denied { read write } for pid=8955 comm="syz-executor" name="loop7" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 476.047417][ T30] audit: type=1400 audit(1750657211.151:6869): avc: denied { read } for pid=12338 comm="syz.7.1777" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 476.085740][ T30] audit: type=1400 audit(1750657211.151:6870): avc: denied { read } for pid=12338 comm="syz.7.1777" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 476.154554][ T30] audit: type=1400 audit(1750657211.151:6871): avc: denied { create } for pid=12338 comm="syz.7.1777" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 476.199002][ T30] audit: type=1400 audit(1750657211.151:6872): avc: denied { read } for pid=12338 comm="syz.7.1777" dev="nsfs" ino=4026533391 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 476.222370][ T30] audit: type=1400 audit(1750657211.151:6873): avc: denied { create } for pid=12338 comm="syz.7.1777" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 476.283842][T12349] FAULT_INJECTION: forcing a failure. [ 476.283842][T12349] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 476.300650][T12349] CPU: 0 UID: 0 PID: 12349 Comm: syz.7.1779 Not tainted 6.16.0-rc2-syzkaller-00378-gb67ec639010f #0 PREEMPT(full) [ 476.300677][T12349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 476.300687][T12349] Call Trace: [ 476.300693][T12349] [ 476.300699][T12349] dump_stack_lvl+0x16c/0x1f0 [ 476.300730][T12349] should_fail_ex+0x512/0x640 [ 476.300756][T12349] _copy_to_user+0x32/0xd0 [ 476.300783][T12349] simple_read_from_buffer+0xcb/0x170 [ 476.300807][T12349] proc_fail_nth_read+0x197/0x270 [ 476.300828][T12349] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 476.300849][T12349] ? rw_verify_area+0xcf/0x680 [ 476.300868][T12349] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 476.300889][T12349] vfs_read+0x1e4/0xc60 [ 476.300915][T12349] ? __pfx___mutex_lock+0x10/0x10 [ 476.300940][T12349] ? __pfx_vfs_read+0x10/0x10 [ 476.300968][T12349] ? __fget_files+0x20e/0x3c0 [ 476.301000][T12349] ksys_read+0x12a/0x250 [ 476.301020][T12349] ? __pfx_ksys_read+0x10/0x10 [ 476.301049][T12349] do_syscall_64+0xcd/0x4c0 [ 476.301074][T12349] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 476.301092][T12349] RIP: 0033:0x7fdb3f58d33c [ 476.301106][T12349] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 476.301125][T12349] RSP: 002b:00007fdb40422030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 476.301141][T12349] RAX: ffffffffffffffda RBX: 00007fdb3f7b6080 RCX: 00007fdb3f58d33c [ 476.301151][T12349] RDX: 000000000000000f RSI: 00007fdb404220a0 RDI: 0000000000000005 [ 476.301160][T12349] RBP: 00007fdb40422090 R08: 0000000000000000 R09: 0000000000000000 [ 476.301170][T12349] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 476.301180][T12349] R13: 0000000000000000 R14: 00007fdb3f7b6080 R15: 00007ffcaa6dd0d8 [ 476.301203][T12349] [ 476.969962][T12361] netlink: 48 bytes leftover after parsing attributes in process `syz.5.1784'. [ 477.170373][T12367] netlink: 'syz.6.1788': attribute type 33 has an invalid length. [ 477.178364][T12367] netlink: 152 bytes leftover after parsing attributes in process `syz.6.1788'. [ 477.598872][T12389] netlink: 48 bytes leftover after parsing attributes in process `syz.6.1796'. [ 477.849975][T12394] netlink: 'syz.2.1799': attribute type 33 has an invalid length. [ 477.888613][T12394] netlink: 152 bytes leftover after parsing attributes in process `syz.2.1799'. [ 478.283452][T12418] netlink: 48 bytes leftover after parsing attributes in process `syz.2.1807'. [ 478.589978][T12428] netlink: 'syz.7.1811': attribute type 33 has an invalid length. [ 478.598043][T12428] netlink: 152 bytes leftover after parsing attributes in process `syz.7.1811'. [ 479.319593][T12459] netlink: 'syz.7.1824': attribute type 33 has an invalid length. [ 479.329276][T12459] netlink: 152 bytes leftover after parsing attributes in process `syz.7.1824'. [ 479.531437][T12468] FAULT_INJECTION: forcing a failure. [ 479.531437][T12468] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 479.560565][T12468] CPU: 0 UID: 0 PID: 12468 Comm: syz.6.1828 Not tainted 6.16.0-rc2-syzkaller-00378-gb67ec639010f #0 PREEMPT(full) [ 479.560589][T12468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 479.560599][T12468] Call Trace: [ 479.560604][T12468] [ 479.560611][T12468] dump_stack_lvl+0x16c/0x1f0 [ 479.560641][T12468] should_fail_ex+0x512/0x640 [ 479.560666][T12468] _copy_to_user+0x32/0xd0 [ 479.560691][T12468] simple_read_from_buffer+0xcb/0x170 [ 479.560713][T12468] proc_fail_nth_read+0x197/0x270 [ 479.560732][T12468] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 479.560754][T12468] ? rw_verify_area+0xcf/0x680 [ 479.560772][T12468] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 479.560791][T12468] vfs_read+0x1e4/0xc60 [ 479.560814][T12468] ? __pfx___mutex_lock+0x10/0x10 [ 479.560838][T12468] ? __pfx_vfs_read+0x10/0x10 [ 479.560863][T12468] ? __fget_files+0x20e/0x3c0 [ 479.560892][T12468] ksys_read+0x12a/0x250 [ 479.560913][T12468] ? __pfx_ksys_read+0x10/0x10 [ 479.560934][T12468] ? fdget+0x187/0x210 [ 479.560958][T12468] do_syscall_64+0xcd/0x4c0 [ 479.560983][T12468] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 479.561000][T12468] RIP: 0033:0x7fbc1898d33c [ 479.561015][T12468] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 479.561030][T12468] RSP: 002b:00007fbc19869030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 479.561046][T12468] RAX: ffffffffffffffda RBX: 00007fbc18bb5fa0 RCX: 00007fbc1898d33c [ 479.561057][T12468] RDX: 000000000000000f RSI: 00007fbc198690a0 RDI: 0000000000000003 [ 479.561066][T12468] RBP: 00007fbc19869090 R08: 0000000000000000 R09: 0000000000000000 [ 479.561076][T12468] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 479.561085][T12468] R13: 0000000000000000 R14: 00007fbc18bb5fa0 R15: 00007ffd8f35ca18 [ 479.561108][T12468] [ 480.580448][T12491] netlink: 'syz.6.1837': attribute type 33 has an invalid length. [ 480.606859][T12491] netlink: 152 bytes leftover after parsing attributes in process `syz.6.1837'. [ 480.766898][ T30] kauditd_printk_skb: 351 callbacks suppressed [ 480.766911][ T30] audit: type=1400 audit(1750657215.941:7225): avc: denied { sys_module } for pid=12496 comm="syz.5.1840" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 480.810354][ T30] audit: type=1400 audit(1750657215.981:7226): avc: denied { read write } for pid=8447 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 480.845260][ T30] audit: type=1400 audit(1750657216.021:7227): avc: denied { read write } for pid=12501 comm="syz.5.1842" name="dlm_plock" dev="devtmpfs" ino=96 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 480.886911][ T30] audit: type=1400 audit(1750657216.051:7228): avc: denied { read } for pid=12501 comm="syz.5.1842" name="nullb0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 480.912281][ T30] audit: type=1400 audit(1750657216.051:7229): avc: denied { read } for pid=12501 comm="syz.5.1842" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 480.937597][ T30] audit: type=1400 audit(1750657216.051:7230): avc: denied { create } for pid=12501 comm="syz.5.1842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 480.964006][ T30] audit: type=1400 audit(1750657216.051:7231): avc: denied { create } for pid=12501 comm="syz.5.1842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 480.991236][ T30] audit: type=1400 audit(1750657216.061:7232): avc: denied { read write } for pid=8447 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 481.035523][ T30] audit: type=1400 audit(1750657216.141:7233): avc: denied { create } for pid=12503 comm="syz.5.1843" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 481.112510][ T30] audit: type=1400 audit(1750657216.141:7234): avc: denied { read append } for pid=12503 comm="syz.5.1843" name="sg0" dev="devtmpfs" ino=753 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=0 [ 481.224327][T12511] ptrace attach of "./syz-executor exec"[5809] was attempted by "./syz-executor exec"[12511] [ 481.299025][ T5829] Bluetooth: hci0: command 0x0406 tx timeout [ 481.516669][T12524] netlink: 'syz.6.1851': attribute type 33 has an invalid length. [ 481.546992][T12524] netlink: 152 bytes leftover after parsing attributes in process `syz.6.1851'. [ 482.253701][T12557] netlink: 'syz.2.1864': attribute type 33 has an invalid length. [ 482.264393][T12557] netlink: 152 bytes leftover after parsing attributes in process `syz.2.1864'. [ 483.269943][T12596] netlink: 'syz.5.1878': attribute type 33 has an invalid length. [ 483.284610][T12596] netlink: 152 bytes leftover after parsing attributes in process `syz.5.1878'. [ 483.543551][T12611] netlink: 8 bytes leftover after parsing attributes in process `syz.7.1884'. [ 484.563796][T12632] netlink: 'syz.2.1892': attribute type 33 has an invalid length. [ 484.577938][T12632] netlink: 152 bytes leftover after parsing attributes in process `syz.2.1892'. [ 484.885151][T12649] xt_CT: No such helper "syz1" [ 485.594551][T12666] netlink: 'syz.7.1906': attribute type 33 has an invalid length. [ 485.603045][T12666] netlink: 152 bytes leftover after parsing attributes in process `syz.7.1906'. [ 485.945924][ T30] kauditd_printk_skb: 415 callbacks suppressed [ 485.945941][ T30] audit: type=1400 audit(1750657221.101:7650): avc: denied { prog_load } for pid=12677 comm="syz.7.1910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 485.997109][ T5827] Bluetooth: hci0: link tx timeout [ 486.002423][ T5827] Bluetooth: hci0: killing stalled connection 10:aa:aa:aa:aa:aa [ 486.092917][ T30] audit: type=1400 audit(1750657221.111:7651): avc: denied { read } for pid=12677 comm="syz.7.1910" name="iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 486.100126][T12685] futex_wake_op: syz.5.1913 tries to shift op by -1; fix this program [ 486.244314][ T30] audit: type=1400 audit(1750657221.151:7652): avc: denied { create } for pid=12677 comm="syz.7.1910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 486.311306][ T30] audit: type=1400 audit(1750657221.151:7653): avc: denied { read } for pid=12677 comm="syz.7.1910" name="iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 486.351107][ T30] audit: type=1400 audit(1750657221.201:7654): avc: denied { create } for pid=12679 comm="syz.6.1911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=0 [ 486.374524][ T30] audit: type=1400 audit(1750657221.241:7655): avc: denied { read write } for pid=8447 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 486.449924][ T30] audit: type=1400 audit(1750657221.241:7656): avc: denied { read write } for pid=8657 comm="syz-executor" name="loop6" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 486.476096][T12701] netlink: 192 bytes leftover after parsing attributes in process `syz.2.1918'. [ 486.535216][ T30] audit: type=1400 audit(1750657221.251:7657): avc: denied { read write } for pid=8955 comm="syz-executor" name="loop7" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 486.560500][ T30] audit: type=1400 audit(1750657221.271:7658): avc: denied { prog_load } for pid=12683 comm="syz.5.1913" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 486.583389][ T30] audit: type=1400 audit(1750657221.271:7659): avc: denied { create } for pid=12683 comm="syz.5.1913" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 486.993368][T12714] netlink: 'syz.5.1923': attribute type 33 has an invalid length. [ 487.016041][T12714] netlink: 152 bytes leftover after parsing attributes in process `syz.5.1923'. [ 487.254903][T12732] sch_tbf: peakrate 8 is lower than or equals to rate 12 ! [ 487.519247][T12743] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=46277 sclass=netlink_route_socket pid=12743 comm=syz.6.1935 [ 487.575348][T12746] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1936'. [ 487.622800][T12748] netlink: 'syz.4.1937': attribute type 33 has an invalid length. [ 487.630769][T12748] netlink: 152 bytes leftover after parsing attributes in process `syz.4.1937'. [ 488.007584][T12774] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1947'. [ 488.028417][ T5827] Bluetooth: hci0: command 0x0406 tx timeout [ 488.175065][T12780] netlink: 'syz.4.1948': attribute type 33 has an invalid length. [ 488.190159][T12780] netlink: 152 bytes leftover after parsing attributes in process `syz.4.1948'. [ 488.725134][T12808] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1958'. [ 489.078418][T12818] netlink: 'syz.7.1961': attribute type 33 has an invalid length. [ 489.108540][T12818] netlink: 152 bytes leftover after parsing attributes in process `syz.7.1961'. [ 489.954163][T12853] snd_dummy snd_dummy.0: control 5:0:10:syz0:0 is already present [ 490.225580][T12863] netlink: 8 bytes leftover after parsing attributes in process `syz.7.1973'. [ 490.265951][T12859] netlink: 24 bytes leftover after parsing attributes in process `syz.2.1975'. [ 490.742660][T12876] netlink: 'syz.6.1977': attribute type 33 has an invalid length. [ 490.954341][ T30] kauditd_printk_skb: 902 callbacks suppressed [ 490.954351][ T30] audit: type=1400 audit(1750657226.131:8562): avc: denied { search } for pid=12885 comm="chmod" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 491.096230][ T30] audit: type=1400 audit(1750657226.171:8563): avc: denied { read write } for pid=8657 comm="syz-executor" name="loop6" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 491.365641][ T30] audit: type=1400 audit(1750657226.181:8564): avc: denied { prog_load } for pid=12881 comm="syz.2.1978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 491.419852][ T30] audit: type=1400 audit(1750657226.191:8565): avc: denied { read write } for pid=8955 comm="syz-executor" name="loop7" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 491.445279][ T30] audit: type=1400 audit(1750657226.321:8566): avc: denied { read } for pid=12891 comm="syz.6.1981" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 491.460669][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 491.468293][T12897] audit: audit_backlog=65 > audit_backlog_limit=64 [ 491.481440][ T30] audit: type=1400 audit(1750657226.321:8567): avc: denied { create } for pid=12891 comm="syz.6.1981" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 491.502365][T12897] audit: audit_lost=95 audit_rate_limit=0 audit_backlog_limit=64 [ 491.502385][T12897] audit: backlog limit exceeded [ 491.575823][T12900] bridge0: port 2(bridge_slave_1) entered disabled state [ 491.949471][T12917] __nla_validate_parse: 1 callbacks suppressed [ 491.949491][T12917] netlink: 8 bytes leftover after parsing attributes in process `syz.5.1989'. [ 492.445031][T12930] netlink: 48 bytes leftover after parsing attributes in process `syz.6.1993'. [ 493.491051][T12961] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2000'. [ 493.979076][T12981] netlink: 'syz.7.2010': attribute type 2 has an invalid length. [ 494.022079][T12984] PKCS8: Unsupported PKCS#8 version [ 494.037740][T12981] netlink: 'syz.7.2010': attribute type 8 has an invalid length. [ 494.096432][T12981] netlink: 32 bytes leftover after parsing attributes in process `syz.7.2010'. [ 495.961398][ T30] kauditd_printk_skb: 4959 callbacks suppressed [ 495.961414][ T30] audit: type=1400 audit(1750657487.134:13477): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 496.031694][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 496.061144][ T5480] audit: audit_lost=113 audit_rate_limit=0 audit_backlog_limit=64 [ 496.073963][T13052] audit: audit_backlog=65 > audit_backlog_limit=64 [ 496.112610][T13052] audit: audit_lost=114 audit_rate_limit=0 audit_backlog_limit=64 [ 496.124100][ T5480] audit: backlog limit exceeded [ 496.134784][ T30] audit: type=1400 audit(1750657487.134:13478): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 496.157332][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 496.167333][T13054] audit: audit_backlog=65 > audit_backlog_limit=64 [ 496.179040][T13056] audit: audit_backlog=65 > audit_backlog_limit=64 [ 496.718586][ T5829] Bluetooth: hci0: unexpected event for opcode 0x0000 [ 497.210003][T13076] netlink: 'syz.5.2044': attribute type 33 has an invalid length. [ 497.217921][T13076] netlink: 152 bytes leftover after parsing attributes in process `syz.5.2044'. [ 500.731282][ T5829] Bluetooth: hci0: Controller not accepting commands anymore: ncmd = 0 [ 500.739993][ T5829] Bluetooth: hci0: Injecting HCI hardware error event [ 500.748417][ T5829] Bluetooth: hci0: hardware error 0x00 [ 500.938826][T13162] netlink: 'syz.6.2077': attribute type 33 has an invalid length. [ 500.948696][T13162] netlink: 152 bytes leftover after parsing attributes in process `syz.6.2077'. [ 500.975128][ T1299] ieee802154 phy0 wpan0: encryption failed: -22 [ 500.981478][ T1299] ieee802154 phy1 wpan1: encryption failed: -22 [ 500.991394][ T30] kauditd_printk_skb: 6006 callbacks suppressed [ 500.991404][ T30] audit: type=1400 audit(1750657492.144:18347): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 501.034588][ T30] audit: type=1400 audit(1750657492.154:18348): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 501.095403][ T30] audit: type=1400 audit(1750657492.154:18349): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 501.128574][ T30] audit: type=1400 audit(1750657492.154:18350): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 501.128969][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 501.153630][ T30] audit: type=1400 audit(1750657492.154:18351): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 501.177658][ C1] vkms_vblank_simulate: vblank timer overrun [ 501.194105][T13169] audit: audit_backlog=65 > audit_backlog_limit=64 [ 501.200702][T13165] audit: audit_backlog=65 > audit_backlog_limit=64 [ 501.207940][T13165] audit: audit_lost=495 audit_rate_limit=0 audit_backlog_limit=64 [ 501.216107][T13169] audit: audit_lost=496 audit_rate_limit=0 audit_backlog_limit=64 [ 502.295442][T13182] xt_TPROXY: Can be used only with -p tcp or -p udp [ 502.785909][T13200] netlink: 'syz.2.2090': attribute type 33 has an invalid length. [ 502.814086][ T5829] Bluetooth: hci0: Opcode 0x0c03 failed: -110 [ 502.829087][T13200] netlink: 152 bytes leftover after parsing attributes in process `syz.2.2090'. [ 503.972386][T13225] netlink: 'syz.2.2103': attribute type 33 has an invalid length. [ 503.980251][T13225] netlink: 152 bytes leftover after parsing attributes in process `syz.2.2103'. [ 504.894346][T13248] netlink: 12 bytes leftover after parsing attributes in process `syz.6.2109'. [ 505.086232][T13248] netdevsim netdevsim6 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 505.095167][T13248] netdevsim netdevsim6 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 505.103961][T13248] netdevsim netdevsim6 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 505.112801][T13248] netdevsim netdevsim6 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 505.137812][T13248] vxlan0: entered promiscuous mode [ 505.235097][T13260] bridge0: port 1(bridge_slave_0) entered disabled state [ 505.254268][T13261] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2113'. [ 505.255311][T13260] bridge0: port 2(bridge_slave_1) entered disabled state [ 505.304550][T13261] lo: left promiscuous mode [ 505.319771][T13261] 0·: left allmulticast mode [ 505.335304][T13261] hsr_slave_0: left allmulticast mode [ 505.352184][T13261] hsr_slave_1: left allmulticast mode [ 506.021542][ T30] kauditd_printk_skb: 5671 callbacks suppressed [ 506.021557][ T30] audit: type=1400 audit(1750657497.204:23587): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 506.169598][ T30] audit: type=1400 audit(1750657497.204:23588): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 506.191339][ T30] audit: type=1400 audit(1750657497.204:23589): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 506.212811][ T30] audit: type=1400 audit(1750657497.204:23590): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 506.234649][ T30] audit: type=1400 audit(1750657497.204:23591): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 506.257121][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 506.299585][ T5480] audit: audit_lost=642 audit_rate_limit=0 audit_backlog_limit=64 [ 506.314788][T13272] audit: audit_backlog=65 > audit_backlog_limit=64 [ 506.371404][T13272] audit: audit_lost=643 audit_rate_limit=0 audit_backlog_limit=64 [ 506.379171][ T30] audit: type=1400 audit(1750657497.204:23592): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 506.915881][T13281] netlink: 8 bytes leftover after parsing attributes in process `syz.6.2121'. [ 506.955945][T13281] netlink: 4 bytes leftover after parsing attributes in process `syz.6.2121'. [ 507.001311][T13281] netlink: 'syz.6.2121': attribute type 12 has an invalid length. [ 507.046693][T13281] netlink: 'syz.6.2121': attribute type 11 has an invalid length. [ 507.675293][T13296] netlink: 'syz.2.2125': attribute type 33 has an invalid length. [ 507.686682][T13296] netlink: 152 bytes leftover after parsing attributes in process `syz.2.2125'. [ 509.195336][T13337] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2141'. [ 511.034076][ T30] kauditd_printk_skb: 8979 callbacks suppressed [ 511.034088][ T30] audit: type=1400 audit(1750657502.204:31895): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 511.069529][ T30] audit: type=1400 audit(1750657502.204:31896): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 511.101972][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 511.102665][T13382] audit: audit_backlog=65 > audit_backlog_limit=64 [ 511.121198][ T5480] audit: audit_lost=869 audit_rate_limit=0 audit_backlog_limit=64 [ 511.121401][T13382] audit: audit_lost=870 audit_rate_limit=0 audit_backlog_limit=64 [ 511.144377][ T5480] audit: backlog limit exceeded [ 511.145858][ T8955] audit: audit_backlog=65 > audit_backlog_limit=64 [ 511.149639][ T30] audit: type=1400 audit(1750657502.204:31897): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 511.156478][T13382] audit: backlog limit exceeded [ 513.429361][T13417] FAULT_INJECTION: forcing a failure. [ 513.429361][T13417] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 513.479000][T13417] CPU: 1 UID: 0 PID: 13417 Comm: syz.2.2173 Not tainted 6.16.0-rc2-syzkaller-00378-gb67ec639010f #0 PREEMPT(full) [ 513.479026][T13417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 513.479035][T13417] Call Trace: [ 513.479041][T13417] [ 513.479048][T13417] dump_stack_lvl+0x16c/0x1f0 [ 513.479077][T13417] should_fail_ex+0x512/0x640 [ 513.479104][T13417] _copy_to_user+0x32/0xd0 [ 513.479127][T13417] simple_read_from_buffer+0xcb/0x170 [ 513.479150][T13417] proc_fail_nth_read+0x197/0x270 [ 513.479171][T13417] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 513.479193][T13417] ? rw_verify_area+0xcf/0x680 [ 513.479210][T13417] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 513.479229][T13417] vfs_read+0x1e4/0xc60 [ 513.479252][T13417] ? __pfx___mutex_lock+0x10/0x10 [ 513.479276][T13417] ? __pfx_vfs_read+0x10/0x10 [ 513.479302][T13417] ? __fget_files+0x20e/0x3c0 [ 513.479332][T13417] ksys_read+0x12a/0x250 [ 513.479352][T13417] ? __pfx_ksys_read+0x10/0x10 [ 513.479373][T13417] ? fdget+0x187/0x210 [ 513.479399][T13417] do_syscall_64+0xcd/0x4c0 [ 513.479431][T13417] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 513.479448][T13417] RIP: 0033:0x7fbd6838d33c [ 513.479462][T13417] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 513.479477][T13417] RSP: 002b:00007fbd691cc030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 513.479494][T13417] RAX: ffffffffffffffda RBX: 00007fbd685b5fa0 RCX: 00007fbd6838d33c [ 513.479505][T13417] RDX: 000000000000000f RSI: 00007fbd691cc0a0 RDI: 0000000000000003 [ 513.479514][T13417] RBP: 00007fbd691cc090 R08: 0000000000000000 R09: 0000000000000000 [ 513.479524][T13417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 513.479534][T13417] R13: 0000000000000000 R14: 00007fbd685b5fa0 R15: 00007ffed6310078 [ 513.479557][T13417] [ 514.081051][T13427] Unknown options in mask 5 [ 514.974739][T13453] netlink: 'syz.7.2189': attribute type 33 has an invalid length. [ 515.006765][T13453] netlink: 152 bytes leftover after parsing attributes in process `syz.7.2189'. [ 515.049346][T13458] FAULT_INJECTION: forcing a failure. [ 515.049346][T13458] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 515.081763][T13458] CPU: 0 UID: 0 PID: 13458 Comm: syz.4.2191 Not tainted 6.16.0-rc2-syzkaller-00378-gb67ec639010f #0 PREEMPT(full) [ 515.081788][T13458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 515.081795][T13458] Call Trace: [ 515.081799][T13458] [ 515.081803][T13458] dump_stack_lvl+0x16c/0x1f0 [ 515.081822][T13458] should_fail_ex+0x512/0x640 [ 515.081844][T13458] _copy_to_iter+0x463/0x16f0 [ 515.081874][T13458] ? __pfx__copy_to_iter+0x10/0x10 [ 515.081893][T13458] ? get_pid_task+0xfc/0x250 [ 515.081914][T13458] seq_read_iter+0xcf8/0x12c0 [ 515.081934][T13458] seq_read+0x39e/0x4e0 [ 515.081950][T13458] ? __pfx_seq_read+0x10/0x10 [ 515.081963][T13458] ? import_ubuf+0x1b6/0x220 [ 515.081978][T13458] ? __import_iovec+0x1dd/0x650 [ 515.081991][T13458] ? avc_policy_seqno+0x9/0x20 [ 515.082005][T13458] ? rw_verify_area+0xcf/0x680 [ 515.082017][T13458] ? __pfx_seq_read+0x10/0x10 [ 515.082028][T13458] vfs_readv+0x5c1/0x8b0 [ 515.082043][T13458] ? __pfx_vfs_readv+0x10/0x10 [ 515.082055][T13458] ? find_held_lock+0x2b/0x80 [ 515.082076][T13458] ? __fget_files+0x20e/0x3c0 [ 515.082093][T13458] ? do_preadv+0x1a6/0x270 [ 515.082104][T13458] do_preadv+0x1a6/0x270 [ 515.082116][T13458] ? __pfx_do_preadv+0x10/0x10 [ 515.082131][T13458] do_syscall_64+0xcd/0x4c0 [ 515.082148][T13458] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 515.082158][T13458] RIP: 0033:0x7f44cbf8e929 [ 515.082167][T13458] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 515.082177][T13458] RSP: 002b:00007f44c9df6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 515.082188][T13458] RAX: ffffffffffffffda RBX: 00007f44cc1b5fa0 RCX: 00007f44cbf8e929 [ 515.082194][T13458] RDX: 0000000000000001 RSI: 00002000000003c0 RDI: 0000000000000003 [ 515.082202][T13458] RBP: 00007f44c9df6090 R08: 0000000000000000 R09: 0000000000000000 [ 515.082208][T13458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 515.082214][T13458] R13: 0000000000000000 R14: 00007f44cc1b5fa0 R15: 00007ffc81edb5c8 [ 515.082226][T13458] [ 515.968383][T13466] netlink: 28 bytes leftover after parsing attributes in process `syz.6.2194'. [ 516.115583][ T30] kauditd_printk_skb: 13614 callbacks suppressed [ 516.115598][ T30] audit: type=1400 audit(1750657507.204:44721): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 516.160948][T13471] IPv6: syztnl0: Disabled Multicast RS [ 516.162267][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 516.182688][ T8447] audit: audit_backlog=65 > audit_backlog_limit=64 [ 516.203472][ T8447] audit: audit_lost=1135 audit_rate_limit=0 audit_backlog_limit=64 [ 516.321010][ T5480] audit: audit_lost=1136 audit_rate_limit=0 audit_backlog_limit=64 [ 516.329040][ T5480] audit: backlog limit exceeded [ 516.335417][ T30] audit: type=1400 audit(1750657507.294:44722): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 516.361382][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 516.376063][ T5480] audit: audit_lost=1137 audit_rate_limit=0 audit_backlog_limit=64 [ 516.384092][ T5480] audit: backlog limit exceeded [ 516.615723][T13480] netlink: 92 bytes leftover after parsing attributes in process `syz.7.2200'. [ 516.837637][T13485] netlink: 'syz.4.2202': attribute type 33 has an invalid length. [ 516.850542][T13485] netlink: 152 bytes leftover after parsing attributes in process `syz.4.2202'. [ 517.308735][T13494] netlink: 'syz.5.2205': attribute type 33 has an invalid length. [ 517.365765][T13494] netlink: 152 bytes leftover after parsing attributes in process `syz.5.2205'. [ 518.210568][T13517] netlink: 'syz.7.2213': attribute type 33 has an invalid length. [ 518.218612][T13517] netlink: 152 bytes leftover after parsing attributes in process `syz.7.2213'. [ 518.291885][T13526] netlink: 'syz.4.2217': attribute type 10 has an invalid length. [ 518.373321][T13526] bond0: (slave wlan1): Enslaving as an active interface with an up link [ 518.599227][T13536] netlink: 'syz.2.2221': attribute type 33 has an invalid length. [ 518.645353][T13536] netlink: 152 bytes leftover after parsing attributes in process `syz.2.2221'. [ 521.126163][ T30] kauditd_printk_skb: 5811 callbacks suppressed [ 521.126178][ T30] audit: type=1400 audit(1750657512.294:50104): avc: denied { read write } for pid=13596 comm="syz.7.2239" name="dlm_plock" dev="devtmpfs" ino=96 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 521.147510][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 521.174124][T13599] audit: audit_backlog=65 > audit_backlog_limit=64 [ 521.181571][T13600] audit: audit_backlog=65 > audit_backlog_limit=64 [ 521.188143][T13600] audit: audit_lost=1281 audit_rate_limit=0 audit_backlog_limit=64 [ 521.200351][T13599] audit: audit_lost=1282 audit_rate_limit=0 audit_backlog_limit=64 [ 521.209624][ T5480] audit: audit_lost=1283 audit_rate_limit=0 audit_backlog_limit=64 [ 521.217911][T13600] audit: backlog limit exceeded [ 521.223188][T13599] audit: backlog limit exceeded [ 521.234716][ T5480] audit: backlog limit exceeded [ 522.186456][T13626] ptrace attach of "./syz-executor exec"[8955] was attempted by "./syz-executor exec"[13626] [ 523.124676][T13642] FAULT_INJECTION: forcing a failure. [ 523.124676][T13642] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 523.197103][T13642] CPU: 0 UID: 0 PID: 13642 Comm: syz.7.2255 Not tainted 6.16.0-rc2-syzkaller-00378-gb67ec639010f #0 PREEMPT(full) [ 523.197130][T13642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 523.197140][T13642] Call Trace: [ 523.197146][T13642] [ 523.197153][T13642] dump_stack_lvl+0x16c/0x1f0 [ 523.197184][T13642] should_fail_ex+0x512/0x640 [ 523.197210][T13642] _copy_to_user+0x32/0xd0 [ 523.197237][T13642] simple_read_from_buffer+0xcb/0x170 [ 523.197263][T13642] proc_fail_nth_read+0x197/0x270 [ 523.197285][T13642] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 523.197309][T13642] ? rw_verify_area+0xcf/0x680 [ 523.197327][T13642] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 523.197348][T13642] vfs_read+0x1e4/0xc60 [ 523.197372][T13642] ? __pfx___mutex_lock+0x10/0x10 [ 523.197398][T13642] ? __pfx_vfs_read+0x10/0x10 [ 523.197427][T13642] ? __fget_files+0x20e/0x3c0 [ 523.197458][T13642] ksys_read+0x12a/0x250 [ 523.197479][T13642] ? __pfx_ksys_read+0x10/0x10 [ 523.197508][T13642] do_syscall_64+0xcd/0x4c0 [ 523.197535][T13642] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 523.197553][T13642] RIP: 0033:0x7fdb3f58d33c [ 523.197568][T13642] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 523.197584][T13642] RSP: 002b:00007fdb40443030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 523.197601][T13642] RAX: ffffffffffffffda RBX: 00007fdb3f7b5fa0 RCX: 00007fdb3f58d33c [ 523.197612][T13642] RDX: 000000000000000f RSI: 00007fdb404430a0 RDI: 000000000000000b [ 523.197622][T13642] RBP: 00007fdb40443090 R08: 0000000000000000 R09: 0000000000000000 [ 523.197632][T13642] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 523.197642][T13642] R13: 0000000000000000 R14: 00007fdb3f7b5fa0 R15: 00007ffcaa6dd0d8 [ 523.197666][T13642] [ 523.466816][T13647] netlink: 'syz.6.2257': attribute type 10 has an invalid length. [ 523.608944][T13647] 8021q: adding VLAN 0 to HW filter on device bond0 [ 523.623357][T13647] team0: Port device bond0 added [ 523.650325][T13647] netlink: 4 bytes leftover after parsing attributes in process `syz.6.2257'. [ 524.150805][T13647] team0 (unregistering): Port device team_slave_0 removed [ 524.159722][T13647] team0 (unregistering): Port device team_slave_1 removed [ 524.173788][T13647] team0 (unregistering): Port device bond0 removed [ 525.293476][T13680] xt_TPROXY: Can be used only with -p tcp or -p udp [ 525.386127][T13688] FAULT_INJECTION: forcing a failure. [ 525.386127][T13688] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 525.442414][T13688] CPU: 1 UID: 0 PID: 13688 Comm: syz.4.2272 Not tainted 6.16.0-rc2-syzkaller-00378-gb67ec639010f #0 PREEMPT(full) [ 525.442437][T13688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 525.442446][T13688] Call Trace: [ 525.442452][T13688] [ 525.442458][T13688] dump_stack_lvl+0x16c/0x1f0 [ 525.442486][T13688] should_fail_ex+0x512/0x640 [ 525.442509][T13688] _copy_to_user+0x32/0xd0 [ 525.442535][T13688] simple_read_from_buffer+0xcb/0x170 [ 525.442559][T13688] proc_fail_nth_read+0x197/0x270 [ 525.442582][T13688] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 525.442605][T13688] ? rw_verify_area+0xcf/0x680 [ 525.442624][T13688] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 525.442645][T13688] vfs_read+0x1e4/0xc60 [ 525.442668][T13688] ? __pfx___mutex_lock+0x10/0x10 [ 525.442693][T13688] ? __pfx_vfs_read+0x10/0x10 [ 525.442721][T13688] ? __fget_files+0x20e/0x3c0 [ 525.442760][T13688] ksys_read+0x12a/0x250 [ 525.442780][T13688] ? __pfx_ksys_read+0x10/0x10 [ 525.442806][T13688] do_syscall_64+0xcd/0x4c0 [ 525.442840][T13688] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 525.442856][T13688] RIP: 0033:0x7f44cbf8d33c [ 525.442870][T13688] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 525.442885][T13688] RSP: 002b:00007f44c9df6030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 525.442900][T13688] RAX: ffffffffffffffda RBX: 00007f44cc1b5fa0 RCX: 00007f44cbf8d33c [ 525.442910][T13688] RDX: 000000000000000f RSI: 00007f44c9df60a0 RDI: 0000000000000003 [ 525.442919][T13688] RBP: 00007f44c9df6090 R08: 0000000000000000 R09: 0000000000000000 [ 525.442928][T13688] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 525.442936][T13688] R13: 0000000000000000 R14: 00007f44cc1b5fa0 R15: 00007ffc81edb5c8 [ 525.442956][T13688] [ 525.719924][T13700] netlink: 8 bytes leftover after parsing attributes in process `syz.7.2273'. [ 526.160405][ T30] kauditd_printk_skb: 7344 callbacks suppressed [ 526.160420][ T30] audit: type=1400 audit(1750657517.334:54245): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 526.193659][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 526.198464][T13717] audit: audit_backlog=65 > audit_backlog_limit=64 [ 526.200637][ T8447] audit: audit_backlog=65 > audit_backlog_limit=64 [ 526.215676][ T5480] audit: audit_lost=2352 audit_rate_limit=0 audit_backlog_limit=64 [ 526.233743][ T5480] audit: backlog limit exceeded [ 526.234898][T13717] audit: audit_lost=2353 audit_rate_limit=0 audit_backlog_limit=64 [ 526.243714][ T8447] audit: audit_lost=2354 audit_rate_limit=0 audit_backlog_limit=64 [ 526.255129][T13717] audit: backlog limit exceeded [ 526.264771][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 527.447032][T13751] netlink: 176 bytes leftover after parsing attributes in process `syz.2.2294'. [ 527.486253][T13751] netlink: 176 bytes leftover after parsing attributes in process `syz.2.2294'. [ 528.039842][T13770] netlink: 'syz.4.2302': attribute type 33 has an invalid length. [ 528.050787][T13770] netlink: 152 bytes leftover after parsing attributes in process `syz.4.2302'. [ 528.435317][T13785] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2309'. [ 528.618542][T13791] IPv6: NLM_F_CREATE should be specified when creating new route [ 528.844518][T13802] ptrace attach of "./syz-executor exec"[8657] was attempted by "./syz-executor exec"[13802] [ 531.162240][ T30] kauditd_printk_skb: 7593 callbacks suppressed [ 531.162255][ T30] audit: type=1400 audit(1750657522.344:61122): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 531.179679][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 531.198569][ T8447] audit: audit_backlog=65 > audit_backlog_limit=64 [ 531.209964][ T5480] audit: audit_lost=2594 audit_rate_limit=0 audit_backlog_limit=64 [ 531.225616][ T8955] audit: audit_backlog=65 > audit_backlog_limit=64 [ 531.232529][ T8447] audit: audit_lost=2595 audit_rate_limit=0 audit_backlog_limit=64 [ 531.245398][ T8955] audit: audit_lost=2596 audit_rate_limit=0 audit_backlog_limit=64 [ 531.257353][ T5815] audit: audit_backlog=65 > audit_backlog_limit=64 [ 531.257354][ T5809] audit: audit_backlog=65 > audit_backlog_limit=64 [ 531.257369][ T5815] audit: audit_lost=2597 audit_rate_limit=0 audit_backlog_limit=64 [ 532.439477][ T5829] Bluetooth: hci5: command 0x0406 tx timeout [ 533.135024][T13919] netlink: 'syz.5.2360': attribute type 10 has an invalid length. [ 533.238163][T13922] netlink: 'syz.5.2360': attribute type 4 has an invalid length. [ 533.871301][T13936] netlink: 48 bytes leftover after parsing attributes in process `syz.4.2367'. [ 535.011394][T13952] ptrace attach of "./syz-executor exec"[5809] was attempted by "./syz-executor exec"[13952] [ 535.496971][ T5829] Bluetooth: hci3: unexpected event for opcode 0x2060 [ 535.652958][T13969] netlink: 666 bytes leftover after parsing attributes in process `syz.7.2376'. [ 536.194726][ T30] kauditd_printk_skb: 7994 callbacks suppressed [ 536.194740][ T30] audit: type=1400 audit(1750657527.374:68490): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 536.222883][ T30] audit: type=1400 audit(1750657527.404:68491): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 536.273358][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 536.280188][ T30] audit: type=1400 audit(1750657527.404:68492): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 536.301732][ T30] audit: type=1400 audit(1750657527.404:68493): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 536.307863][ T5480] audit: audit_lost=2806 audit_rate_limit=0 audit_backlog_limit=64 [ 536.323155][ T30] audit: type=1400 audit(1750657527.404:68494): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 536.353174][ T30] audit: type=1400 audit(1750657527.404:68495): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 536.374553][ T30] audit: type=1400 audit(1750657527.404:68496): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 536.396196][ T30] audit: type=1400 audit(1750657527.404:68497): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 537.808723][T14022] netlink: 'syz.5.2398': attribute type 4 has an invalid length. [ 538.429356][T14049] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2406'. [ 540.208323][T14102] netlink: 2048 bytes leftover after parsing attributes in process `syz.4.2428'. [ 540.231994][T14102] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2428'. [ 541.142962][T14122] netlink: 24 bytes leftover after parsing attributes in process `syz.5.2433'. [ 541.204419][ T30] kauditd_printk_skb: 10533 callbacks suppressed [ 541.204434][ T30] audit: type=1400 audit(1750657532.384:76130): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 541.236822][ T30] audit: type=1400 audit(1750657532.384:76131): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 541.263299][ T30] audit: type=1400 audit(1750657532.384:76132): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 541.286801][ T30] audit: type=1400 audit(1750657532.384:76133): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 541.338486][T14124] netlink: 'syz.4.2434': attribute type 33 has an invalid length. [ 541.379092][ T30] audit: type=1400 audit(1750657532.384:76134): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 541.425468][T14124] netlink: 152 bytes leftover after parsing attributes in process `syz.4.2434'. [ 541.488718][ T30] audit: type=1400 audit(1750657532.384:76135): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 541.497112][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 541.517539][ T5480] audit: audit_lost=3774 audit_rate_limit=0 audit_backlog_limit=64 [ 541.541826][T14130] audit: audit_backlog=65 > audit_backlog_limit=64 [ 541.551704][ T5480] audit: backlog limit exceeded [ 541.937191][T14144] netlink: 4 bytes leftover after parsing attributes in process `syz.7.2443'. [ 542.067650][T14149] netlink: 24 bytes leftover after parsing attributes in process `syz.4.2444'. [ 542.920798][T14161] ptrace attach of "./syz-executor exec"[8447] was attempted by "./syz-executor exec"[14161] [ 544.000402][T14184] netlink: 'syz.2.2459': attribute type 33 has an invalid length. [ 544.055733][T14184] netlink: 152 bytes leftover after parsing attributes in process `syz.2.2459'. [ 544.112171][T14191] xt_CHECKSUM: unsupported CHECKSUM operation 68 [ 544.145631][T14193] ptrace attach of "./syz-executor exec"[8955] was attempted by "./syz-executor exec"[14193] [ 545.418580][T14225] ptrace attach of "./syz-executor exec"[5815] was attempted by "./syz-executor exec"[14225] [ 545.538988][T14228] netlink: 'syz.5.2475': attribute type 33 has an invalid length. [ 545.574681][T14228] netlink: 152 bytes leftover after parsing attributes in process `syz.5.2475'. [ 546.211346][ T30] kauditd_printk_skb: 9217 callbacks suppressed [ 546.211361][ T30] audit: type=1400 audit(1750657537.394:84988): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 546.225724][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 546.246441][T14249] audit: audit_backlog=65 > audit_backlog_limit=64 [ 546.256029][T14249] audit: audit_lost=3897 audit_rate_limit=0 audit_backlog_limit=64 [ 546.256137][T14247] audit: audit_backlog=65 > audit_backlog_limit=64 [ 546.264450][ T5480] audit: audit_lost=3898 audit_rate_limit=0 audit_backlog_limit=64 [ 546.280381][ T5480] audit: backlog limit exceeded [ 546.285915][T14249] audit: backlog limit exceeded [ 546.293969][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 546.301202][T14247] audit: audit_lost=3899 audit_rate_limit=0 audit_backlog_limit=64 [ 546.941853][T14263] netlink: 'syz.6.2487': attribute type 33 has an invalid length. [ 546.962785][T14263] netlink: 152 bytes leftover after parsing attributes in process `syz.6.2487'. [ 547.128259][T14268] FAULT_INJECTION: forcing a failure. [ 547.128259][T14268] name failslab, interval 1, probability 0, space 0, times 0 [ 547.160544][T14268] CPU: 1 UID: 0 PID: 14268 Comm: syz.4.2489 Not tainted 6.16.0-rc2-syzkaller-00378-gb67ec639010f #0 PREEMPT(full) [ 547.160568][T14268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 547.160574][T14268] Call Trace: [ 547.160578][T14268] [ 547.160582][T14268] dump_stack_lvl+0x16c/0x1f0 [ 547.160602][T14268] should_fail_ex+0x512/0x640 [ 547.160618][T14268] should_failslab+0xc2/0x120 [ 547.160635][T14268] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 547.160649][T14268] ? skb_clone+0x190/0x3f0 [ 547.160667][T14268] skb_clone+0x190/0x3f0 [ 547.160688][T14268] netlink_deliver_tap+0xabd/0xd30 [ 547.160719][T14268] netlink_dump+0xb4d/0xce0 [ 547.160739][T14268] ? __pfx_netlink_dump+0x10/0x10 [ 547.160772][T14268] __netlink_dump_start+0x6d6/0x990 [ 547.160794][T14268] packet_diag_handler_dump+0x1f0/0x290 [ 547.160821][T14268] ? __pfx_packet_diag_handler_dump+0x10/0x10 [ 547.160845][T14268] ? __pfx_packet_diag_dump+0x10/0x10 [ 547.160870][T14268] ? sock_diag_lock_handler+0x10f/0x2e0 [ 547.160899][T14268] sock_diag_rcv_msg+0x438/0x790 [ 547.160925][T14268] netlink_rcv_skb+0x155/0x420 [ 547.160942][T14268] ? __pfx_sock_diag_rcv_msg+0x10/0x10 [ 547.160965][T14268] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 547.160992][T14268] ? netlink_deliver_tap+0x1ae/0xd30 [ 547.161025][T14268] netlink_unicast+0x53a/0x7f0 [ 547.161046][T14268] ? __pfx_netlink_unicast+0x10/0x10 [ 547.161072][T14268] netlink_sendmsg+0x8d1/0xdd0 [ 547.161092][T14268] ? __pfx_netlink_sendmsg+0x10/0x10 [ 547.161119][T14268] sock_write_iter+0x4fc/0x5b0 [ 547.161139][T14268] ? __pfx_sock_write_iter+0x10/0x10 [ 547.161166][T14268] ? bpf_lsm_file_permission+0x9/0x10 [ 547.161192][T14268] ? security_file_permission+0x71/0x210 [ 547.161217][T14268] ? rw_verify_area+0xcf/0x680 [ 547.161238][T14268] vfs_write+0x6c4/0x1150 [ 547.161259][T14268] ? __pfx_sock_write_iter+0x10/0x10 [ 547.161279][T14268] ? __pfx_vfs_write+0x10/0x10 [ 547.161297][T14268] ? find_held_lock+0x2b/0x80 [ 547.161333][T14268] ksys_write+0x1f8/0x250 [ 547.161352][T14268] ? __pfx_ksys_write+0x10/0x10 [ 547.161378][T14268] do_syscall_64+0xcd/0x4c0 [ 547.161406][T14268] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 547.161423][T14268] RIP: 0033:0x7f44cbf8e929 [ 547.161436][T14268] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 547.161451][T14268] RSP: 002b:00007f44c9df6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 547.161467][T14268] RAX: ffffffffffffffda RBX: 00007f44cc1b5fa0 RCX: 00007f44cbf8e929 [ 547.161478][T14268] RDX: 0000000000000027 RSI: 0000200000000040 RDI: 0000000000000003 [ 547.161487][T14268] RBP: 00007f44c9df6090 R08: 0000000000000000 R09: 0000000000000000 [ 547.161497][T14268] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 547.161506][T14268] R13: 0000000000000000 R14: 00007f44cc1b5fa0 R15: 00007ffc81edb5c8 [ 547.161528][T14268] [ 547.773781][ T5829] Bluetooth: hci4: Opcode 0x1003 failed: -110 [ 548.681071][T14299] netlink: 'syz.5.2500': attribute type 33 has an invalid length. [ 548.689475][T14299] netlink: 152 bytes leftover after parsing attributes in process `syz.5.2500'. [ 549.303382][T14318] ptrace attach of "./syz-executor exec"[5809] was attempted by "./syz-executor exec"[14318] [ 549.730948][T14333] netlink: 12 bytes leftover after parsing attributes in process `syz.7.2511'. [ 550.152977][T14347] netlink: 'syz.2.2513': attribute type 33 has an invalid length. [ 550.175118][T14347] netlink: 152 bytes leftover after parsing attributes in process `syz.2.2513'. [ 551.226749][ T30] kauditd_printk_skb: 6780 callbacks suppressed [ 551.226764][ T30] audit: type=1400 audit(1750657542.354:91205): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 551.288653][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 551.312599][ T5480] audit: audit_lost=4088 audit_rate_limit=0 audit_backlog_limit=64 [ 551.320757][ T5480] audit: backlog limit exceeded [ 551.328243][T14391] audit: audit_backlog=65 > audit_backlog_limit=64 [ 551.335266][ T30] audit: type=1400 audit(1750657542.404:91206): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 551.357230][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 551.364482][ T5480] audit: audit_lost=4089 audit_rate_limit=0 audit_backlog_limit=64 [ 551.373701][T14391] audit: audit_lost=4090 audit_rate_limit=0 audit_backlog_limit=64 [ 551.384998][ T5480] audit: backlog limit exceeded [ 551.680394][T14399] netlink: 28 bytes leftover after parsing attributes in process `syz.5.2534'. [ 551.699672][T14399] netlink: 16 bytes leftover after parsing attributes in process `syz.5.2534'. [ 552.542911][T14419] libceph: resolve '400' (ret=-3): failed [ 554.244478][T14468] netlink: 28 bytes leftover after parsing attributes in process `syz.5.2558'. [ 554.264111][T14468] netlink: 28 bytes leftover after parsing attributes in process `syz.5.2558'. [ 554.625225][T14484] netlink: 'syz.5.2565': attribute type 33 has an invalid length. [ 554.652509][T14484] netlink: 152 bytes leftover after parsing attributes in process `syz.5.2565'. [ 556.235197][ T30] kauditd_printk_skb: 12366 callbacks suppressed [ 556.235212][ T30] audit: type=1400 audit(1750657547.404:97395): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 556.318179][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 556.335977][ T5480] audit: audit_lost=6150 audit_rate_limit=0 audit_backlog_limit=64 [ 556.356476][ T30] audit: type=1400 audit(1750657547.414:97396): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 556.387315][ T5480] audit: backlog limit exceeded [ 556.394473][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 556.403521][ T5480] audit: audit_lost=6151 audit_rate_limit=0 audit_backlog_limit=64 [ 556.416871][T14513] audit: audit_backlog=65 > audit_backlog_limit=64 [ 556.426052][ T30] audit: type=1400 audit(1750657547.414:97397): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 556.450630][ T5480] audit: backlog limit exceeded [ 556.479107][T14513] netlink: 4 bytes leftover after parsing attributes in process `syz.5.2575'. [ 556.545126][T14517] netlink: 'syz.6.2577': attribute type 33 has an invalid length. [ 556.579300][T14517] netlink: 152 bytes leftover after parsing attributes in process `syz.6.2577'. [ 558.083568][T14557] netlink: 'syz.6.2591': attribute type 33 has an invalid length. [ 558.173777][T14557] netlink: 152 bytes leftover after parsing attributes in process `syz.6.2591'. [ 559.287907][T14591] netlink: 'syz.6.2605': attribute type 33 has an invalid length. [ 559.337878][T14591] netlink: 152 bytes leftover after parsing attributes in process `syz.6.2605'. [ 561.303791][ T30] kauditd_printk_skb: 8917 callbacks suppressed [ 561.303810][ T30] audit: type=1400 audit(1750657552.404:104259): avc: denied { create } for pid=14619 comm="syz.7.2616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 561.368437][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 561.417433][T14626] audit: audit_backlog=65 > audit_backlog_limit=64 [ 561.428685][ T30] audit: type=1400 audit(1750657552.404:104258): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 561.461798][T14626] audit: audit_lost=6838 audit_rate_limit=0 audit_backlog_limit=64 [ 561.469764][ T5480] audit: audit_lost=6839 audit_rate_limit=0 audit_backlog_limit=64 [ 561.474588][ T8955] audit: audit_backlog=65 > audit_backlog_limit=64 [ 561.487176][T14626] audit: backlog limit exceeded [ 561.496433][ T5480] audit: backlog limit exceeded [ 561.501644][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 561.595702][T14632] netlink: 'syz.7.2619': attribute type 33 has an invalid length. [ 561.626819][T14632] netlink: 152 bytes leftover after parsing attributes in process `syz.7.2619'. [ 561.953622][T14642] netlink: 'syz.6.2623': attribute type 33 has an invalid length. [ 562.003299][T14642] netlink: 152 bytes leftover after parsing attributes in process `syz.6.2623'. [ 562.416878][ T1299] ieee802154 phy0 wpan0: encryption failed: -22 [ 562.423359][ T1299] ieee802154 phy1 wpan1: encryption failed: -22 [ 563.285692][T14667] netlink: 'syz.6.2632': attribute type 33 has an invalid length. [ 563.322880][T14667] netlink: 152 bytes leftover after parsing attributes in process `syz.6.2632'. [ 563.334914][T14671] FAULT_INJECTION: forcing a failure. [ 563.334914][T14671] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 563.371125][T14671] CPU: 1 UID: 0 PID: 14671 Comm: syz.2.2633 Not tainted 6.16.0-rc2-syzkaller-00378-gb67ec639010f #0 PREEMPT(full) [ 563.371149][T14671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 563.371159][T14671] Call Trace: [ 563.371164][T14671] [ 563.371170][T14671] dump_stack_lvl+0x16c/0x1f0 [ 563.371199][T14671] should_fail_ex+0x512/0x640 [ 563.371223][T14671] _copy_from_user+0x2e/0xd0 [ 563.371245][T14671] kstrtouint_from_user+0xd6/0x1d0 [ 563.371261][T14671] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 563.371272][T14671] ? __lock_acquire+0xb8a/0x1c90 [ 563.371295][T14671] proc_fail_nth_write+0x83/0x250 [ 563.371309][T14671] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 563.371325][T14671] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 563.371337][T14671] vfs_write+0x29d/0x1150 [ 563.371353][T14671] ? __pfx___mutex_lock+0x10/0x10 [ 563.371369][T14671] ? __pfx_vfs_write+0x10/0x10 [ 563.371385][T14671] ? __fget_files+0x20e/0x3c0 [ 563.371405][T14671] ksys_write+0x12a/0x250 [ 563.371418][T14671] ? __pfx_ksys_write+0x10/0x10 [ 563.371435][T14671] do_syscall_64+0xcd/0x4c0 [ 563.371451][T14671] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 563.371462][T14671] RIP: 0033:0x7fbd6838d3df [ 563.371471][T14671] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 563.371482][T14671] RSP: 002b:00007fbd691cc030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 563.371492][T14671] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fbd6838d3df [ 563.371498][T14671] RDX: 0000000000000001 RSI: 00007fbd691cc0a0 RDI: 0000000000000003 [ 563.371506][T14671] RBP: 00007fbd691cc090 R08: 0000000000000000 R09: 0000000000000000 [ 563.371512][T14671] R10: 0000000000000002 R11: 0000000000000293 R12: 0000000000000001 [ 563.371517][T14671] R13: 0000000000000000 R14: 00007fbd685b5fa0 R15: 00007ffed6310078 [ 563.371531][T14671] [ 564.477564][T14707] netlink: 'syz.4.2648': attribute type 33 has an invalid length. [ 564.494841][T14707] netlink: 152 bytes leftover after parsing attributes in process `syz.4.2648'. [ 566.313664][ T30] kauditd_printk_skb: 9355 callbacks suppressed [ 566.313680][ T30] audit: type=1400 audit(1750657557.494:112918): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 566.368424][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 566.375119][ T5480] audit: audit_lost=7073 audit_rate_limit=0 audit_backlog_limit=64 [ 566.383772][ T30] audit: type=1400 audit(1750657557.494:112919): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 566.387444][T14737] audit: audit_backlog=65 > audit_backlog_limit=64 [ 566.405041][ T5480] audit: backlog limit exceeded [ 566.405168][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 566.405183][ T5480] audit: audit_lost=7074 audit_rate_limit=0 audit_backlog_limit=64 [ 566.405195][ T5480] audit: backlog limit exceeded [ 566.405240][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 566.536052][T14737] netlink: 20 bytes leftover after parsing attributes in process `syz.5.2658'. [ 566.564793][T14737] netlink: 20 bytes leftover after parsing attributes in process `syz.5.2658'. [ 567.096437][T14747] netlink: 'syz.2.2661': attribute type 33 has an invalid length. [ 567.121728][T14747] netlink: 152 bytes leftover after parsing attributes in process `syz.2.2661'. [ 568.475484][T14781] netlink: 'syz.4.2674': attribute type 33 has an invalid length. [ 568.510916][T14781] netlink: 152 bytes leftover after parsing attributes in process `syz.4.2674'. [ 571.139747][ T5829] Bluetooth: hci5: ACL packet for unknown connection handle 2027 [ 571.246984][T14840] netlink: 48 bytes leftover after parsing attributes in process `syz.6.2696'. [ 571.321450][ T30] kauditd_printk_skb: 10033 callbacks suppressed [ 571.321464][ T30] audit: type=1400 audit(1750657562.504:122052): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 571.357811][ T30] audit: type=1400 audit(1750657562.504:122053): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 571.386170][ T30] audit: type=1400 audit(1750657562.504:122054): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 571.411058][ T30] audit: type=1400 audit(1750657562.504:122055): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 571.413838][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 571.435700][ T30] audit: type=1400 audit(1750657562.504:122056): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 571.467300][ T30] audit: type=1400 audit(1750657562.504:122057): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 571.496019][ T30] audit: type=1400 audit(1750657562.504:122058): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 571.524859][T14847] audit: audit_backlog=65 > audit_backlog_limit=64 [ 571.532906][T14847] audit: audit_lost=7376 audit_rate_limit=0 audit_backlog_limit=64 [ 571.902938][T14854] netlink: 40 bytes leftover after parsing attributes in process `syz.5.2701'. [ 571.950453][T14854] sp0: Synchronizing with TNC [ 571.982059][ T7159] [ 571.984412][ T7159] ===================================================== [ 571.991313][ T7159] WARNING: HARDIRQ-safe -> HARDIRQ-unsafe lock order detected [ 571.998735][ T7159] 6.16.0-rc2-syzkaller-00378-gb67ec639010f #0 Not tainted [ 572.005816][ T7159] ----------------------------------------------------- [ 572.012721][ T7159] kworker/u8:18/7159 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire: [ 572.020592][ T7159] ffffffff8f799998 (disc_data_lock#2){.+.+}-{3:3}, at: sp_get+0x18/0xf0 [ 572.028923][ T7159] [ 572.028923][ T7159] and this task is already holding: [ 572.036258][ T7159] ffffffff9b087e38 (&port_lock_key){-.-.}-{3:3}, at: uart_write+0x13b/0xb30 [ 572.044921][ T7159] which would create a new lock dependency: [ 572.050778][ T7159] (&port_lock_key){-.-.}-{3:3} -> (disc_data_lock#2){.+.+}-{3:3} [ 572.058583][ T7159] [ 572.058583][ T7159] but this new dependency connects a HARDIRQ-irq-safe lock: [ 572.067999][ T7159] (&port_lock_key){-.-.}-{3:3} [ 572.068014][ T7159] [ 572.068014][ T7159] ... which became HARDIRQ-irq-safe at: [ 572.080535][ T7159] lock_acquire+0x179/0x350 [ 572.085111][ T7159] _raw_spin_lock_irqsave+0x3a/0x60 [ 572.090369][ T7159] serial8250_handle_irq+0x95/0xcb0 [ 572.095645][ T7159] serial8250_default_handle_irq+0x9a/0x210 [ 572.101598][ T7159] serial8250_interrupt+0x103/0x210 [ 572.106854][ T7159] __handle_irq_event_percpu+0x229/0x7d0 [ 572.112551][ T7159] handle_irq_event+0xab/0x1e0 [ 572.117371][ T7159] handle_edge_irq+0x28e/0xab0 [ 572.122191][ T7159] __common_interrupt+0xdf/0x250 [ 572.127186][ T7159] common_interrupt+0xba/0xe0 [ 572.131919][ T7159] asm_common_interrupt+0x26/0x40 [ 572.137000][ T7159] pv_native_safe_halt+0xf/0x20 [ 572.141918][ T7159] default_idle+0x13/0x20 [ 572.146300][ T7159] default_idle_call+0x6d/0xb0 [ 572.151118][ T7159] do_idle+0x391/0x510 [ 572.155253][ T7159] cpu_startup_entry+0x4f/0x60 [ 572.160074][ T7159] start_secondary+0x21d/0x2b0 [ 572.164894][ T7159] common_startup_64+0x13e/0x148 [ 572.169884][ T7159] [ 572.169884][ T7159] to a HARDIRQ-irq-unsafe lock: [ 572.176868][ T7159] (disc_data_lock#2){.+.+}-{3:3} [ 572.176892][ T7159] [ 572.176892][ T7159] ... which became HARDIRQ-irq-unsafe at: [ 572.189798][ T7159] ... [ 572.189803][ T7159] lock_acquire+0x179/0x350 [ 572.196938][ T7159] _raw_read_lock+0x5f/0x70 [ 572.201509][ T7159] sp_get+0x18/0xf0 [ 572.205384][ T7159] sixpack_receive_buf+0x59/0x1c90 [ 572.210559][ T7159] tty_ioctl+0x580/0x1640 [ 572.214950][ T7159] __x64_sys_ioctl+0x18b/0x210 [ 572.219788][ T7159] do_syscall_64+0xcd/0x4c0 [ 572.224353][ T7159] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 572.230313][ T7159] [ 572.230313][ T7159] other info that might help us debug this: [ 572.230313][ T7159] [ 572.240529][ T7159] Possible interrupt unsafe locking scenario: [ 572.240529][ T7159] [ 572.248822][ T7159] CPU0 CPU1 [ 572.254162][ T7159] ---- ---- [ 572.259496][ T7159] lock(disc_data_lock#2); [ 572.263986][ T7159] local_irq_disable(); [ 572.270725][ T7159] lock(&port_lock_key); [ 572.277555][ T7159] lock(disc_data_lock#2); [ 572.284566][ T7159] [ 572.287992][ T7159] lock(&port_lock_key); [ 572.292485][ T7159] [ 572.292485][ T7159] *** DEADLOCK *** [ 572.292485][ T7159] [ 572.300600][ T7159] 6 locks held by kworker/u8:18/7159: [ 572.305938][ T7159] #0: ffff88801b881148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x12a2/0x1b70 [ 572.317040][ T7159] #1: ffffc900043bfd10 ((work_completion)(&buf->work)){+.+.}-{0:0}, at: process_one_work+0x929/0x1b70 [ 572.328056][ T7159] #2: ffff888025ce8ca0 (&buf->lock){+.+.}-{4:4}, at: flush_to_ldisc+0x34/0x780 [ 572.337092][ T7159] #3: ffff888022ea30a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref+0x1c/0x80 [ 572.346366][ T7159] #4: ffffffff9b087e38 (&port_lock_key){-.-.}-{3:3}, at: uart_write+0x13b/0xb30 [ 572.355520][ T7159] #5: ffff888022ea30a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref+0x1c/0x80 [ 572.364816][ T7159] [ 572.364816][ T7159] the dependencies between HARDIRQ-irq-safe lock and the holding lock: [ 572.375191][ T7159] -> (&port_lock_key){-.-.}-{3:3} { [ 572.380372][ T7159] IN-HARDIRQ-W at: [ 572.384323][ T7159] lock_acquire+0x179/0x350 [ 572.390453][ T7159] _raw_spin_lock_irqsave+0x3a/0x60 [ 572.397280][ T7159] serial8250_handle_irq+0x95/0xcb0 [ 572.404110][ T7159] serial8250_default_handle_irq+0x9a/0x210 [ 572.411629][ T7159] serial8250_interrupt+0x103/0x210 [ 572.418445][ T7159] __handle_irq_event_percpu+0x229/0x7d0 [ 572.425697][ T7159] handle_irq_event+0xab/0x1e0 [ 572.432087][ T7159] handle_edge_irq+0x28e/0xab0 [ 572.438477][ T7159] __common_interrupt+0xdf/0x250 [ 572.445034][ T7159] common_interrupt+0xba/0xe0 [ 572.451340][ T7159] asm_common_interrupt+0x26/0x40 [ 572.457992][ T7159] pv_native_safe_halt+0xf/0x20 [ 572.464473][ T7159] default_idle+0x13/0x20 [ 572.470425][ T7159] default_idle_call+0x6d/0xb0 [ 572.476811][ T7159] do_idle+0x391/0x510 [ 572.482504][ T7159] cpu_startup_entry+0x4f/0x60 [ 572.488896][ T7159] start_secondary+0x21d/0x2b0 [ 572.495285][ T7159] common_startup_64+0x13e/0x148 [ 572.501843][ T7159] IN-SOFTIRQ-W at: [ 572.505792][ T7159] lock_acquire+0x179/0x350 [ 572.511921][ T7159] _raw_spin_lock_irqsave+0x3a/0x60 [ 572.518742][ T7159] serial8250_handle_irq+0x95/0xcb0 [ 572.525574][ T7159] serial8250_default_handle_irq+0x9a/0x210 [ 572.533083][ T7159] serial8250_interrupt+0x103/0x210 [ 572.539903][ T7159] __handle_irq_event_percpu+0x229/0x7d0 [ 572.547163][ T7159] handle_irq_event+0xab/0x1e0 [ 572.553566][ T7159] handle_edge_irq+0x28e/0xab0 [ 572.559948][ T7159] __common_interrupt+0xdf/0x250 [ 572.566507][ T7159] common_interrupt+0x61/0xe0 [ 572.572801][ T7159] asm_common_interrupt+0x26/0x40 [ 572.579443][ T7159] stack_depot_save_flags+0x180/0xa40 [ 572.586435][ T7159] save_stack+0x16d/0x1f0 [ 572.592392][ T7159] __reset_page_owner+0x84/0x1a0 [ 572.598952][ T7159] __free_frozen_pages+0x7fe/0x1180 [ 572.605769][ T7159] tlb_remove_table_rcu+0x116/0x1a0 [ 572.612594][ T7159] rcu_core+0x799/0x14e0 [ 572.618462][ T7159] handle_softirqs+0x216/0x8e0 [ 572.624846][ T7159] __irq_exit_rcu+0x109/0x170 [ 572.631143][ T7159] irq_exit_rcu+0x9/0x30 [ 572.637017][ T7159] sysvec_apic_timer_interrupt+0xa4/0xc0 [ 572.644287][ T7159] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 572.651887][ T7159] vprintk_emit+0x567/0x6d0 [ 572.658010][ T7159] _printk+0xc7/0x100 [ 572.663609][ T7159] kauditd_hold_skb+0x205/0x250 [ 572.670085][ T7159] kauditd_send_queue+0x239/0x290 [ 572.676731][ T7159] kauditd_thread+0x623/0xa70 [ 572.683031][ T7159] kthread+0x3c2/0x780 [ 572.688718][ T7159] ret_from_fork+0x5d4/0x6f0 [ 572.694931][ T7159] ret_from_fork_asm+0x1a/0x30 [ 572.701315][ T7159] INITIAL USE at: [ 572.705190][ T7159] lock_acquire+0x179/0x350 [ 572.711253][ T7159] _raw_spin_lock_irqsave+0x3a/0x60 [ 572.717997][ T7159] serial8250_do_set_termios+0x310/0x1710 [ 572.725279][ T7159] serial8250_set_termios+0x6e/0x80 [ 572.732020][ T7159] uart_set_options+0x31a/0x5f0 [ 572.738406][ T7159] serial8250_console_setup+0x189/0x450 [ 572.745484][ T7159] univ8250_console_setup+0x1eb/0x2e0 [ 572.752390][ T7159] try_enable_preferred_console+0x2fd/0x530 [ 572.759821][ T7159] register_console+0x3ab/0x11b0 [ 572.766304][ T7159] univ8250_console_init+0x5f/0x90 [ 572.772966][ T7159] console_init+0x14f/0x680 [ 572.779013][ T7159] start_kernel+0x29f/0x4d0 [ 572.785067][ T7159] x86_64_start_reservations+0x18/0x30 [ 572.792075][ T7159] x86_64_start_kernel+0x130/0x190 [ 572.798732][ T7159] common_startup_64+0x13e/0x148 [ 572.805218][ T7159] } [ 572.807691][ T7159] ... key at: [] port_lock_key+0x0/0x40 [ 572.815311][ T7159] [ 572.815311][ T7159] the dependencies between the lock to be acquired [ 572.815317][ T7159] and HARDIRQ-irq-unsafe lock: [ 572.828783][ T7159] -> (disc_data_lock#2){.+.+}-{3:3} { [ 572.834145][ T7159] HARDIRQ-ON-R at: [ 572.838107][ T7159] lock_acquire+0x179/0x350 [ 572.844245][ T7159] _raw_read_lock+0x5f/0x70 [ 572.850375][ T7159] sp_get+0x18/0xf0 [ 572.855829][ T7159] sixpack_receive_buf+0x59/0x1c90 [ 572.862571][ T7159] tty_ioctl+0x580/0x1640 [ 572.868531][ T7159] __x64_sys_ioctl+0x18b/0x210 [ 572.874924][ T7159] do_syscall_64+0xcd/0x4c0 [ 572.881067][ T7159] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 572.888596][ T7159] SOFTIRQ-ON-R at: [ 572.892548][ T7159] lock_acquire+0x179/0x350 [ 572.898683][ T7159] _raw_read_lock+0x5f/0x70 [ 572.904806][ T7159] sp_get+0x18/0xf0 [ 572.910234][ T7159] sixpack_receive_buf+0x59/0x1c90 [ 572.916965][ T7159] tty_ioctl+0x580/0x1640 [ 572.922914][ T7159] __x64_sys_ioctl+0x18b/0x210 [ 572.929295][ T7159] do_syscall_64+0xcd/0x4c0 [ 572.935429][ T7159] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 572.942941][ T7159] INITIAL USE at: [ 572.946809][ T7159] lock_acquire+0x179/0x350 [ 572.952847][ T7159] _raw_write_lock_irq+0x36/0x50 [ 572.959319][ T7159] sixpack_close+0x1e/0x2f0 [ 572.965357][ T7159] tty_ldisc_close+0x114/0x1a0 [ 572.971656][ T7159] tty_ldisc_kill+0x8e/0x150 [ 572.977778][ T7159] tty_ldisc_release+0x210/0x2e0 [ 572.984250][ T7159] tty_release_struct+0x23/0xe0 [ 572.990644][ T7159] tty_release+0xe2d/0x1430 [ 572.996682][ T7159] __fput+0x402/0xb70 [ 573.002193][ T7159] task_work_run+0x150/0x240 [ 573.008313][ T7159] exit_to_user_mode_loop+0xeb/0x110 [ 573.015134][ T7159] do_syscall_64+0x3f6/0x4c0 [ 573.021275][ T7159] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 573.028707][ T7159] INITIAL READ USE at: [ 573.033004][ T7159] lock_acquire+0x179/0x350 [ 573.039477][ T7159] _raw_read_lock+0x5f/0x70 [ 573.045949][ T7159] sp_get+0x18/0xf0 [ 573.051725][ T7159] sixpack_receive_buf+0x59/0x1c90 [ 573.058805][ T7159] tty_ioctl+0x580/0x1640 [ 573.065106][ T7159] __x64_sys_ioctl+0x18b/0x210 [ 573.071835][ T7159] do_syscall_64+0xcd/0x4c0 [ 573.078307][ T7159] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 573.086165][ T7159] } [ 573.088632][ T7159] ... key at: [] disc_data_lock+0x18/0xfe0 [ 573.096495][ T7159] ... acquired at: [ 573.100267][ T7159] lock_acquire+0x179/0x350 [ 573.104916][ T7159] _raw_read_lock+0x5f/0x70 [ 573.109573][ T7159] sp_get+0x18/0xf0 [ 573.113525][ T7159] sixpack_write_wakeup+0x20/0x390 [ 573.118790][ T7159] tty_wakeup+0xe8/0x120 [ 573.123176][ T7159] tty_port_default_wakeup+0x2a/0x40 [ 573.128609][ T7159] serial8250_tx_chars+0x68e/0x860 [ 573.133868][ T7159] __start_tx+0x3e9/0x4a0 [ 573.138344][ T7159] serial8250_start_tx+0x368/0x530 [ 573.143601][ T7159] __uart_start+0x292/0x4c0 [ 573.148247][ T7159] uart_write+0x218/0xb30 [ 573.152723][ T7159] sixpack_receive_buf+0x3d3/0x1c90 [ 573.158065][ T7159] tty_ldisc_receive_buf+0x15a/0x1a0 [ 573.163502][ T7159] tty_port_default_receive_buf+0x70/0xb0 [ 573.169368][ T7159] flush_to_ldisc+0x26b/0x780 [ 573.174189][ T7159] process_one_work+0x9cc/0x1b70 [ 573.179270][ T7159] worker_thread+0x6c8/0xf10 [ 573.184005][ T7159] kthread+0x3c2/0x780 [ 573.188216][ T7159] ret_from_fork+0x5d4/0x6f0 [ 573.192959][ T7159] ret_from_fork_asm+0x1a/0x30 [ 573.197866][ T7159] [ 573.200162][ T7159] [ 573.200162][ T7159] stack backtrace: [ 573.206023][ T7159] CPU: 1 UID: 0 PID: 7159 Comm: kworker/u8:18 Not tainted 6.16.0-rc2-syzkaller-00378-gb67ec639010f #0 PREEMPT(full) [ 573.206037][ T7159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 573.206045][ T7159] Workqueue: events_unbound flush_to_ldisc [ 573.206059][ T7159] Call Trace: [ 573.206065][ T7159] [ 573.206070][ T7159] dump_stack_lvl+0x116/0x1f0 [ 573.206086][ T7159] check_irq_usage+0x7dc/0x920 [ 573.206104][ T7159] ? check_path.constprop.0+0x24/0x50 [ 573.206119][ T7159] ? __lock_acquire+0x1285/0x1c90 [ 573.206134][ T7159] __lock_acquire+0x1285/0x1c90 [ 573.206150][ T7159] ? lock_acquire+0x179/0x350 [ 573.206170][ T7159] lock_acquire+0x179/0x350 [ 573.206185][ T7159] ? sp_get+0x18/0xf0 [ 573.206198][ T7159] ? ldsem_down_read_trylock+0x11a/0x180 [ 573.206207][ T7159] ? ldsem_down_read_trylock+0x120/0x180 [ 573.206216][ T7159] ? __pfx_sixpack_write_wakeup+0x10/0x10 [ 573.206231][ T7159] _raw_read_lock+0x5f/0x70 [ 573.206243][ T7159] ? sp_get+0x18/0xf0 [ 573.206254][ T7159] sp_get+0x18/0xf0 [ 573.206267][ T7159] ? __pfx_sixpack_write_wakeup+0x10/0x10 [ 573.206280][ T7159] sixpack_write_wakeup+0x20/0x390 [ 573.206294][ T7159] ? __pfx_sixpack_write_wakeup+0x10/0x10 [ 573.206308][ T7159] tty_wakeup+0xe8/0x120 [ 573.206319][ T7159] tty_port_default_wakeup+0x2a/0x40 [ 573.206335][ T7159] serial8250_tx_chars+0x68e/0x860 [ 573.206352][ T7159] __start_tx+0x3e9/0x4a0 [ 573.206367][ T7159] serial8250_start_tx+0x368/0x530 [ 573.206383][ T7159] __uart_start+0x292/0x4c0 [ 573.206394][ T7159] uart_write+0x218/0xb30 [ 573.206409][ T7159] sixpack_receive_buf+0x3d3/0x1c90 [ 573.206423][ T7159] ? ldsem_down_read_trylock+0x120/0x180 [ 573.206433][ T7159] ? __pfx_ldsem_down_read_trylock+0x10/0x10 [ 573.206443][ T7159] ? __pfx_sixpack_receive_buf+0x10/0x10 [ 573.206457][ T7159] tty_ldisc_receive_buf+0x15a/0x1a0 [ 573.206471][ T7159] tty_port_default_receive_buf+0x70/0xb0 [ 573.206486][ T7159] flush_to_ldisc+0x26b/0x780 [ 573.206500][ T7159] ? rcu_is_watching+0x12/0xc0 [ 573.206513][ T7159] process_one_work+0x9cc/0x1b70 [ 573.206525][ T7159] ? __pfx_process_one_work+0x10/0x10 [ 573.206537][ T7159] ? assign_work+0x1a0/0x250 [ 573.206553][ T7159] worker_thread+0x6c8/0xf10 [ 573.206565][ T7159] ? __pfx_worker_thread+0x10/0x10 [ 573.206575][ T7159] kthread+0x3c2/0x780 [ 573.206583][ T7159] ? __pfx_kthread+0x10/0x10 [ 573.206592][ T7159] ? rcu_is_watching+0x12/0xc0 [ 573.206604][ T7159] ? __pfx_kthread+0x10/0x10 [ 573.206612][ T7159] ret_from_fork+0x5d4/0x6f0 [ 573.206626][ T7159] ? __pfx_kthread+0x10/0x10 [ 573.206635][ T7159] ret_from_fork_asm+0x1a/0x30 [ 573.206647][ T7159] [ 576.331887][ T30] kauditd_printk_skb: 28310 callbacks suppressed [ 576.331901][ T30] audit: type=1400 audit(1750657567.504:149079): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 576.347102][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 576.361115][ T30] audit: type=1400 audit(1750657567.514:149080): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 576.366303][ T5480] audit: audit_lost=7807 audit_rate_limit=0 audit_backlog_limit=64 [ 576.388445][ T30] audit: type=1400 audit(1750657567.514:149081): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 576.395690][ T5480] audit: backlog limit exceeded [ 576.422051][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 576.424232][ T30] audit: type=1400 audit(1750657567.514:149082): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 576.428611][ T5480] audit: audit_lost=7808 audit_rate_limit=0 audit_backlog_limit=64 [ 576.450766][ T30] audit: type=1400 audit(1750657567.514:149083): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 581.342351][ T30] kauditd_printk_skb: 53571 callbacks suppressed [ 581.342365][ T30] audit: type=1400 audit(1750657572.524:196249): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 581.348021][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 581.349050][ T30] audit: type=1400 audit(1750657572.524:196250): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 581.370078][ T5480] audit: audit_lost=9944 audit_rate_limit=0 audit_backlog_limit=64 [ 581.377507][ T30] audit: type=1400 audit(1750657572.524:196251): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 581.397943][ T5480] audit: backlog limit exceeded [ 581.432178][ T30] audit: type=1400 audit(1750657572.524:196252): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 581.432524][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 581.453477][ T30] audit: type=1400 audit(1750657572.524:196253): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 581.460050][ T5480] audit: audit_lost=9945 audit_rate_limit=0 audit_backlog_limit=64