last executing test programs: 26.233290226s ago: executing program 2 (id=2961): r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e1d, 0x1, @mcast1, 0x7}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000000)=0x28, 0x4) sendmmsg$inet6(r0, &(0x7f0000001ec0)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="b3ab706204ee39c9dae21a1718ee351ebc92d2f0d482a863ae5c0b4d768ffe745af2c53a083d9b761b", 0xffe3}], 0x1}}], 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$unix(0x1, 0x2, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)={0x38, r3, 0x1, 0x70bd28, 0x25dfdbfd, {{}, {@void, @val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFNAME={0x14, 0x4, 'syzkaller0\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0xa}]}, 0x38}, 0x1, 0x0, 0x0, 0x91}, 0x24044884) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYRESDEC, @ANYRESDEC=0x0, @ANYRESHEX=r0, @ANYRES64=r0, @ANYRES16=r0, @ANYRES32=r0, @ANYRES16=r0, @ANYRES8=r0], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x20}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r5, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffd, 0x8, 0x0, 0x0}}, 0x10) 26.197029216s ago: executing program 2 (id=2963): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000002080)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x1, 0x7) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) prlimit64(0x0, 0xe, &(0x7f0000000200)={0x8, 0x8a}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x3) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100), 0x802, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r3, 0xc06855c8, &(0x7f0000000180)={0x10, 0x6d0b, {0x51, 0x400, 0x6, {0x7, 0x15b4}, {0x1a0b, 0x8}, @ramp={0x1, 0x90, {0x2, 0x3, 0x205, 0x400}}}, {0x52, 0x6, 0x850c, {0x3, 0x7}, {0x2, 0xf46d}, @period={0x58, 0x4, 0x1f00, 0x9, 0xb504, {0x6, 0x0, 0x1ff, 0xffff}, 0x0, 0x0}}}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003980)}, &(0x7f0000003ac0)=0x38) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x6d, &(0x7f0000000080), &(0x7f00000000c0)=0x3930) r4 = bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffe63) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='ext4_discard_blocks\x00', r4, 0x0, 0xffffffffffffffff}, 0x18) migrate_pages(0x0, 0x9, &(0x7f0000000340)=0x3, &(0x7f0000000380)=0x102) socket$nl_route(0x10, 0x3, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="020000000400000005000000aa"], 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000200), 0xa7c, r5}, 0x38) socket$can_bcm(0x1d, 0x2, 0x2) 26.141757107s ago: executing program 2 (id=2964): bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x1ffff7d, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x94) r0 = socket$inet6(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x4, &(0x7f00000009c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x2a, 0xa9}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xfffff000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) openat$dma_heap(0xffffffffffffff9c, &(0x7f00000002c0), 0x141000, 0x0) socket$inet6_sctp(0xa, 0x801, 0x84) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a84476080ffe00600050000590000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x40b}], 0x1) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) ioctl$vim2m_VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f00000000c0)={0x1, @pix={0x8d8, 0x5, 0x36315247, 0x6, 0x8000002, 0xb, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x4}}) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) sendto$inet6(r0, &(0x7f00000000c0)="900000001c001f4d154a817393278bff0a80a578020000000104740014000100ac1414bb0542d6401051a2d708f37ac8da1a297e0099c5ac0000c5b068d0bf46d323456536016466fcb78dcaaf6c3efed495a46215be0000760700c0c80cefd28581d158ba86c9d2896c6d3bca2d0000000b0015009e49a6560641263da4de1df32c1739d7fbee9aa241731ae9e0b390", 0x90, 0x0, 0x0, 0x0) 26.100497949s ago: executing program 2 (id=2965): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x94) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5021900000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)={{0x14}, [@NFT_MSG_NEWRULE={0x7c, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_EXPRESSIONS={0x50, 0x4, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, @meta={{0x9}, @val={0x3c, 0x2, 0x0, 0x1, [@NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_META_DREG={0x8}, @NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0x8}, @NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0xd}, @NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0x8}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0x12}, @NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0x22}]}}}]}]}], {0x14}}, 0xa4}, 0x1, 0x0, 0x0, 0x488c4}, 0x400c000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600722, 0x19) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='clear_refs\x00') r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004}, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) write$cgroup_pid(r4, &(0x7f00000001c0), 0x12) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000040)=0x1, 0x12) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbfe, 0x40000}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000340)='kfree\x00', r7}, 0x18) r8 = socket$rds(0x15, 0x5, 0x0) bind$rds(r8, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r8, &(0x7f0000001d00)={&(0x7f00000017c0)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000580)=[@cswp={0x58, 0x114, 0x7, {{0x0, 0xffffffff}, &(0x7f00000001c0)=0x2, 0x0, 0x8, 0x0, 0x8, 0x14b, 0x8, 0x4}}], 0x58}, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='4', 0x1}], 0x1) r9 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r9, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r10 = socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$inet(r10, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x4001, @empty}, 0x10, 0x0}, 0x30006041) close(r10) 26.020201925s ago: executing program 2 (id=2966): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000440)={&(0x7f0000800000/0x800000)=nil, &(0x7f000051f000/0x4000)=nil, 0x800000, 0x1, 0xfe}) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0006}]}) close_range(r0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="58000000020601020000000000000000000000000900020073797a32000000000500010007000000050005000a2700000c00078008001240fffffffa050004000000000011000300686173683a69702c6d61726b"], 0x58}, 0x1, 0x0, 0x0, 0x10}, 0x4000080) syz_emit_ethernet(0x0, 0x0, 0x0) socket$unix(0x1, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f0000008140)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000380)}, {&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000001c80)=""/92, 0x52}, {&(0x7f0000000540)=""/216, 0xd8}], 0x4, &(0x7f0000000680)=""/22, 0x16}, 0x8}, {{0x0, 0x0, &(0x7f0000001840)=[{&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f00000016c0)=""/36, 0x24}, {&(0x7f0000001700)=""/24, 0x18}, {&(0x7f0000001740)=""/181, 0xb5}, {&(0x7f0000001800)}], 0x5}, 0xcb}, {{0x0, 0x0, &(0x7f0000003b00)=[{&(0x7f00000018c0)=""/202, 0xca}, {&(0x7f0000008380)=""/4106, 0x100a}, {&(0x7f00000029c0)=""/30, 0x1e}, {&(0x7f0000002a00)=""/240, 0xf0}, {&(0x7f0000002b00)=""/4096, 0x1000}], 0x5, &(0x7f0000003b80)=""/4096, 0x1000}, 0xb7}, {{&(0x7f0000004b80)=@phonet, 0xfffffffffffffe8c, &(0x7f0000001800)=[{&(0x7f0000001ac0)=""/167, 0xa7}, {&(0x7f0000004cc0)=""/12, 0xc}, {&(0x7f0000004d00)=""/92, 0x5c}], 0x3, &(0x7f0000004dc0)=""/16, 0x1a}}, {{&(0x7f0000004e00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000005140)=[{&(0x7f0000004e80)=""/120, 0x78}, {&(0x7f0000004f00)=""/71, 0x47}, {&(0x7f0000004f80)=""/208, 0xd0}, {&(0x7f0000005080)=""/190, 0xbe}], 0x4, &(0x7f0000005180)=""/106, 0x6a}, 0x10}, {{&(0x7f0000005200)=@qipcrtr, 0x80, &(0x7f0000000380)=[{&(0x7f0000005280)=""/170, 0xaa}, {&(0x7f00000019c0)=""/112, 0x70}, {&(0x7f0000001a40)=""/83, 0x53}], 0x3, &(0x7f0000005380)=""/121, 0x7b}, 0x1}, {{&(0x7f0000005400)=@nl=@proc, 0x80, &(0x7f0000005780)=[{&(0x7f0000005480)=""/79, 0x4f}, {&(0x7f0000005500)=""/251, 0xfb}, {&(0x7f0000001b80)=""/223, 0xdf}, {&(0x7f0000005700)=""/116, 0x74}], 0x4, &(0x7f00000057c0)=""/4096, 0x1000}, 0x8}, {{&(0x7f00000004c0)=@rc, 0x80, &(0x7f0000007c80)=[{&(0x7f0000006840)}, {&(0x7f0000006880)=""/192, 0xc0}, {&(0x7f0000006940)=""/3, 0x3}, {&(0x7f0000006980)=""/17, 0x11}, {&(0x7f00000069c0)=""/102, 0x66}, {&(0x7f0000006a40)=""/250, 0xfa}, {&(0x7f0000006b40)=""/77, 0xffffffffffffff03}, {&(0x7f0000006bc0)=""/4084, 0xff4}, {&(0x7f0000007bc0)=""/159, 0x9f}], 0x9, &(0x7f0000007d40)=""/121, 0x79}, 0x2}, {{&(0x7f0000007dc0)=@ieee802154, 0x80, &(0x7f0000008080), 0x4, &(0x7f00000080c0)=""/66, 0x4f}, 0xe}], 0x9, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000000)='tmpfs\x00', 0x2, &(0x7f0000000300)='usrquota') chdir(&(0x7f0000000180)='./file1\x00') fchown(0xffffffffffffffff, 0xee01, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) chdir(0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='net_prio.prioidx\x00', 0x275a, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) quotactl_fd$Q_GETQUOTA(r5, 0xffffffff80000700, 0x0, &(0x7f0000000080)) 26.002465079s ago: executing program 2 (id=2968): madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) r0 = userfaultfd(0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000180)={0xaa, 0x280}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x2}) ioctl$UFFDIO_WRITEPROTECT(r0, 0xc018aa06, &(0x7f00000000c0)={{&(0x7f000040a000/0x800000)=nil, 0x800000}, 0x1}) socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3) r1 = socket(0x2a, 0x2, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0xb) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000440)=@abs={0x0, 0x0, 0x4e22}, 0x49) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000075c0)=[{{&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000004c0)=""/78, 0x4e}, {&(0x7f0000000540)=""/136, 0x88}, {&(0x7f0000000600)=""/186, 0xba}, {&(0x7f00000014c0)=""/4096, 0x1000}], 0x4}, 0x3}, {{&(0x7f00000006c0)=@isdn, 0x80, &(0x7f0000000240)=[{&(0x7f0000000740)=""/235, 0xeb}, {&(0x7f0000000840)=""/112, 0x70}, {&(0x7f00000001c0)=""/64, 0x40}], 0x3, &(0x7f00000008c0)=""/223, 0xdf}, 0x5}, {{&(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/163, 0xa3}, {&(0x7f0000000b00)=""/244, 0xf4}, {&(0x7f0000007840)=""/120, 0x78}, {&(0x7f0000000300)=""/8, 0x8}], 0x4, &(0x7f0000000cc0)=""/199, 0xc7}, 0x7fff}, {{&(0x7f0000000dc0)=@un=@abs, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/237, 0xed}], 0x1, &(0x7f0000000f80)=""/194, 0xc2}, 0x6}, {{&(0x7f0000001080)=@l2tp6={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @local}}, 0x80, &(0x7f0000002580)=[{&(0x7f0000001100)=""/116, 0x74}, {&(0x7f0000001180)=""/219, 0xdb}, {&(0x7f0000001280)=""/29, 0x1d}, {&(0x7f00000012c0)=""/54, 0x36}, {&(0x7f0000001300)=""/177, 0xb1}, {&(0x7f00000013c0)=""/78, 0x4e}, {&(0x7f00000024c0)=""/187, 0xbb}], 0x7, &(0x7f0000002600)=""/4096, 0x1000}, 0x7ff}, {{&(0x7f0000003600)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, &(0x7f0000003680)=[{&(0x7f0000001440)=""/62, 0x3e}], 0x1}, 0x5}, {{&(0x7f00000036c0)=@sco, 0x80, &(0x7f0000003980)=[{&(0x7f0000003740)=""/162, 0xa2}, {&(0x7f0000003800)=""/43, 0x2b}, {&(0x7f0000003840)=""/185, 0xb9}, {&(0x7f0000003900)=""/70, 0x46}], 0x4, &(0x7f00000039c0)=""/84, 0x54}, 0xffffffff}, {{&(0x7f0000003a40)=@l2tp6={0xa, 0x0, 0x0, @private1}, 0x80, &(0x7f0000003bc0)=[{&(0x7f0000003ac0)=""/56, 0x38}, {&(0x7f0000003b00)=""/89, 0x59}, {&(0x7f0000003b80)=""/51, 0x33}], 0x3, &(0x7f0000003c00)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000004c00)=@nfc_llcp, 0x80, &(0x7f0000005e00)=[{&(0x7f0000004c80)=""/3, 0x3}, {&(0x7f0000004cc0)=""/4096, 0x1000}, {&(0x7f0000005cc0)}, {&(0x7f0000005d00)=""/63, 0x3f}, {&(0x7f0000005d40)=""/121, 0x79}, {&(0x7f0000005dc0)=""/37, 0x25}], 0x6, &(0x7f0000005e80)=""/29, 0x1d}, 0x2b}, {{&(0x7f0000005ec0)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f0000007500)=[{&(0x7f0000005f40)=""/6, 0x6}, {&(0x7f0000005f80)=""/152, 0x98}, {&(0x7f0000006040)=""/167, 0xa7}, {&(0x7f0000006100)=""/82, 0x52}, {&(0x7f0000006180)=""/103, 0x67}, {&(0x7f0000006200)=""/4096, 0x1000}, {&(0x7f0000007200)=""/110, 0x6e}, {&(0x7f0000007280)=""/179, 0xb3}, {&(0x7f0000007340)=""/233, 0xe9}, {&(0x7f0000007440)=""/185, 0xb9}], 0xa}, 0x8}], 0xa, 0x10000, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_usb_connect(0x5, 0x2b, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x3, 0x80000, 0x0) r5 = syz_io_uring_setup(0x49a, &(0x7f00000000c0)={0x0, 0x79af, 0x3180, 0x8000, 0x40024e}, &(0x7f0000000340)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r6, r7, &(0x7f00000002c0)=@IORING_OP_MSG_RING={0x28, 0x40, 0x0, r5, 0x0, 0x0, 0x0, 0x2}) io_uring_enter(r5, 0x627, 0x4c1, 0x43, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {0x0, 0x8}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x24000000) socket$netlink(0x10, 0x3, 0x0) 12.96746965s ago: executing program 4 (id=3027): socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000a40), 0x5d, 0x4000000) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x60, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) syz_usb_connect(0x5, 0x0, 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0x1, 0x2}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f0000000080)) syz_usb_connect$cdc_ecm(0x6, 0x5a, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) r5 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="440000001300290a000000000000000007000000", @ANYRES32=r4, @ANYBLOB="00000000000000001c001a800800028008000200080000003e120000080002001040e5"], 0x44}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = socket(0x10, 0x1, 0x0) sendmsg$nl_generic(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="280000001200010a27bd7000fdffffff800000001400a800fe80000000000000000000000000ffffad8b19fc299aa4ec222d5ad3651a326a175b2e1ba82e1675d3d0e3b5b008c0570400b4ebf31a585fd14b29242bc92047080de64c5f16d40f5f76c60bf39bdc84eebeaae7f8f1dfbfac48db129321e15c58330d9ad91f2a7cddd8722a32da62c6a3f777558612d20d4f2eb60e345aa09e8fe7b2d6836594b25f2bb7d8a84e6cccee637f5038c90b3a4887c38a7d55000000"], 0x28}, 0x1, 0x0, 0x0, 0x4000050}, 0x0) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) sendmsg$802154_dgram(r6, &(0x7f0000000280)={&(0x7f0000000140)={0x24, @long={0x3, 0x3, {0xaaaaaaaaaaaa0102}}}, 0x14, &(0x7f0000000240)={&(0x7f0000000440)="e2194c6d8dc565fbdf4f14777afb0200c6cd7c0a493634c42f594040add9d65e62d06a66520e34bfcfdcb95511c08ef235bd70672037988000be3d53c528915f7d1aa78ed9b9324e51cc8bf625c90bc51c8c92847ab97adf14f290568f9d306cf815ce1a565f18fc5912f99edbdb1c4111db413187514c58f850b20aeddebbdd182e941c1754c02397090e0ae9224592c8ca179a8fe921855b2e72606cb486dc574b9c9a7a769f07832c6ca6e65de8e6dd81c615ca9feca16e9411d839a00d64d7eb8b00cd0333fab93a2698d5598e2f289217845be510a79c4905f514e5f64238a2", 0xe2}, 0x1, 0x0, 0x0, 0x40044}, 0x4805) ioctl$KVM_CREATE_IRQCHIP(r8, 0xae60) ioctl$KVM_CREATE_PIT2(r8, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_GET_PIT2(r8, 0x8070ae9f, &(0x7f00000003c0)) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@getchain={0x24, 0x11, 0x1, 0x2000000, 0x2000000, {0x0, 0x0, 0x0, r4, {}, {0xa1ff}, {0xfff3}}}, 0x24}}, 0x0) openat$rfkill(0xffffff9c, 0x0, 0x60041, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) 9.807355755s ago: executing program 0 (id=3030): r0 = syz_open_dev$loop(&(0x7f0000000000), 0x3, 0x88582) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuset.effective_cpus\x00', 0x275a, 0x0) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x4000, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f00000000c0)={0x2, 0x80}, 0x2) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000, 0x4, &(0x7f0000ffc000/0x2000)=nil) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f00000005c0)={r1, 0x800, {0x2a00, 0x80010000, 0x0, 0x5, 0x1, 0x0, 0x0, 0x25, 0xc, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd6447a4a2e00d9683dda1af1ea09de2b7fb0a0100000000000000000300000000000a000029bf00", "2809e8dbe108598927875397bab22d0000b420a9c81f40f05f819e01177d3d458dac00000000000000000000003b00000000000000000200", "90be8b1c5512406c7f00", [0x4, 0x40000000000000]}}) r3 = syz_open_dev$loop(&(0x7f00000001c0), 0x5, 0x8c082) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f00000017c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_KEY(r5, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000001840)={&(0x7f0000001800)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="8500000000000000ecff0000000000000000", @ANYRES32=r6, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x8801}, 0x4000000) ioctl$LOOP_CONFIGURE(r3, 0x4c0a, &(0x7f0000000900)={0xffffffffffffffff, 0x200, {0x2a12, 0x80010000, 0x0, 0x2, 0x4, 0x0, 0x0, 0x3, 0x1c, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd64c6a4b4e00d9603dda1af1ea80000000000000000000000deff00000000000000000000000014a2648f00", "2809e8dbe108038948224ad54afac11d875397bdb22d0000b420a1a93c7540f4767f9e01177d3dd40600000061ac00", "00000000000000080000e9ccf7b45ca88cd34028161db2214e00", [0xc00, 0x3]}}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18010000120000000000000000000000850000006d000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x242}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000280)='contention_end\x00', r7}, 0x18) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r8, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xfffffffc, @remote, 0x9}], 0x1c) recvmsg(r8, 0x0, 0x40000102) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r10, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0}}, 0x0) r11 = accept4$packet(r1, &(0x7f0000000440), &(0x7f0000000480)=0x14, 0x800) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xfe07) sendmsg$nl_route(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r12, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r13 = socket$nl_route(0x10, 0x3, 0x0) r14 = socket(0x1, 0x803, 0x0) getsockname$packet(r14, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r13, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c0000001000030425bd70000000000000000000", @ANYRES32=0x0, @ANYBLOB="0005000000000000140012800900010076657468000000000400028008000a00", @ANYRES32=r15, @ANYBLOB="d7c7c5d620a9534193f181d251efbcd0cafa3fd8aeea53995430d5eed2a0c6dab16a0dcd8db5cf482712e566bdc59acca6a9d81f58d17371bcf517262c6dfb68c65140b228ea8dfe2d2fa8b45b091bfd8868761be791b7c9e0de4536afce169604f2660c494e43689d1c77de40f27d10e64bba61b08a370ab833ee5eb5d472083e1f72640d1f617ce1a3c9a9086b0284e6f928ff943f1b0530c8564eba3a5b07040cf5f5aa1afae2320e63d82a0b61bc04ccba921120587f2316ea6dfcbbff619093d4d47328b0f6c48971ae3a8cdf56a1067b04f50a2e7623c8fdfc085fe1aa6b32"], 0x3c}, 0x1, 0x0, 0x0, 0x4000091}, 0x8000) sendmsg$nl_route(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="3c000000100003040000010000000000008a819a175604a4b3d9000000", @ANYRES32=r12, @ANYBLOB="46060900000000001c00128009000100626f6e64000000000c00028008000b00", @ANYRES32=r15, @ANYBLOB], 0x3c}, 0x1, 0x0, 0x0, 0x690}, 0x20048040) ioctl$LOOP_SET_DIRECT_IO(r3, 0x4c08, 0x6) 9.806824129s ago: executing program 1 (id=3031): r0 = syz_io_uring_setup(0x38, &(0x7f0000000140)={0x0, 0x57d0, 0x13500}, &(0x7f0000000240), &(0x7f0000000480)) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x21, &(0x7f0000000440), 0x1) 9.804259819s ago: executing program 3 (id=3032): r0 = syz_usb_connect(0x1, 0x2d, &(0x7f00000005c0)=ANY=[@ANYBLOB="1201000005d0d3087d07aa04d85b0102030109021b000f000000000904000001dbcc7a000905", @ANYRES32=0xffffffffffffffff], 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) shmget$private(0x0, 0x13000, 0x1, &(0x7f0000feb000/0x13000)=nil) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0xf0) ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES8=r1, @ANYRESOCT=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$ptp0(0xffffffffffffff9c, 0x0, 0x8000, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) setrlimit(0x6, 0x0) syz_open_dev$MSR(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x2100, 0x0, 0x0, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x3e5c80, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r3 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r3, &(0x7f0000019680)=""/102392, 0x18ff8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x9) r4 = open$dir(0x0, 0x0, 0x8) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r4, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a30000000004c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021100011800c000100636f756e746572009c0000000c0a01010000000000000000070000000900020073797a31000000000900010073797a3000000000700003806c00008008000340000000026000"], 0x130}, 0x1, 0x0, 0x0, 0x8000}, 0x8880) ioctl$sock_ax25_SIOCDELRT(r2, 0x890c, 0x0) mbind(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x5, &(0x7f00000001c0)=0x5, 0x7c, 0x2) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) 8.0701259s ago: executing program 0 (id=3033): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x18, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00', r0}, 0x10) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000a00)='.\x00', &(0x7f0000000080)='hpfs\x00', 0x18800, 0x0) (fail_nth: 1) 8.069354919s ago: executing program 1 (id=3034): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$nl_route(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f00000000c0)={0x1, 'pim6reg0\x00', {}, 0xe388}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000600)=@newtfilter={0x35c, 0x2c, 0xd2b, 0x70bd2b, 0x35dfdbfe, {0x0, 0x0, 0x0, r4, {0xf}, {0x0, 0xfff3}, {0x7, 0x8}}, [@filter_kind_options=@f_u32={{0x8}, {0x330, 0x2, [@TCA_U32_SEL={0x204, 0x5, {0x9, 0x7f, 0x3, 0x200, 0x9, 0xffff, 0x3, 0x8, [{0x6, 0x400000, 0x0, 0x2}, {0x1a8f, 0x9, 0xfffff801, 0x7}, {0x7, 0x6, 0x5, 0x400}, {0x73, 0x1400, 0x57e76c05, 0x7fff}, {0x7, 0x5, 0x0, 0x81}, {0x7f, 0x1, 0x1, 0x4}, {0x7fffffff, 0xffff, 0x9, 0x7}, {0x2, 0x8, 0x1}, {0x7, 0x1, 0xff, 0x6}, {0x401, 0xffffffff, 0x7, 0x7}, {0x6, 0x8, 0x1, 0x9}, {0x7, 0x4, 0x2, 0x4}, {0x4, 0x5b61, 0x0, 0xe37}, {0x1, 0x6, 0x6, 0x3ff}, {0x7, 0x1, 0x401, 0x9}, {0x4, 0x806, 0x5, 0x8}, {0xffeffffb, 0xd, 0x7f, 0x7f}, {0xc0000000, 0x81, 0x80000000, 0x8}, {0x80000001, 0x7, 0x6, 0xe0}, {0x0, 0x9, 0x4, 0xb76}, {0x0, 0x8, 0x4, 0x36c2}, {0x6, 0xc63, 0xb, 0x207}, {0x1, 0x5, 0x5, 0x4}, {0x7, 0x202, 0x8, 0x400}, {0x0, 0x9, 0x8, 0xa}, {0x7fffffff, 0x54, 0xd6fa, 0xb}, {0xd, 0x6, 0x2, 0x8}, {0x8, 0xffffffff, 0x80, 0x200}, {0x7, 0xdefb, 0x6, 0x401}, {0x400, 0xffff, 0xffff, 0x1}, {0x2, 0x8, 0x800, 0x5}]}}, @TCA_U32_INDEV={0x14, 0x8, 'vxcan1\x00'}, @TCA_U32_SEL={0x114, 0x5, {0x8, 0x9, 0x6, 0x10da, 0xa760, 0x0, 0x10, 0x100, [{0x7, 0x3ff, 0x3, 0x4}, {0x2, 0xffffffff, 0x69c, 0x4000000}, {0x1, 0x1, 0x9, 0x8}, {0x6, 0x7fff, 0x9, 0x6}, {0x3, 0xde5, 0x1, 0xbd}, {0x3, 0x80, 0x1, 0x6}, {0x7, 0x7fff, 0x0, 0x40}, {0x8, 0x80000000, 0xfffffffa, 0x51}, {0x49f, 0x7, 0x81, 0xb}, {0x5, 0x9, 0x2}, {0x1000, 0x2, 0x264, 0x9}, {0x3ff, 0x80000001, 0x3, 0xa6d}, {0x2, 0x4e, 0x5a2, 0xa2fa}, {0x7, 0x2, 0x6, 0x7}, {0x7fff, 0x5, 0x401, 0xc42b}, {0xc, 0x8000, 0xfffffffb}]}}]}}]}, 0x35c}}, 0x24040094) syz_open_dev$radio(&(0x7f0000000000), 0xffffffffffffffff, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x101300, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) r6 = syz_open_dev$dri(&(0x7f0000000440), 0x1, 0x48240) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r6, 0x4010640d, &(0x7f0000000000)={0x3, 0x2}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r6, 0xc01064b5, &(0x7f0000000040)={&(0x7f0000000100)=[0x0], 0x1}) ioctl$DRM_IOCTL_MODE_ATOMIC(r6, 0xc03864bc, &(0x7f0000000180)={0x1, 0x1, &(0x7f00000000c0)=[r7], &(0x7f0000000080)=[0x2], &(0x7f0000000200), &(0x7f00000001c0), 0x0, 0x1}) 8.064117821s ago: executing program 3 (id=3035): r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$netlink(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000680)=ANY=[@ANYBLOB="e0000000130001002b", @ANYRESHEX=r0, @ANYRES64=r0, @ANYRES64=r0, @ANYBLOB="04000b0004000180bcb493de0bb58fd75bdc5e7c53ed39d06fd043db86af6933d71e30cab89da1cd72deb5178a8576e69b2ff911b2fc9aec9a3e2c48ddc884448fd51602af338a3185dcc3b9743391b1e5189f75c863271e1bf36c11da94a91a9711f9fd7b5144ea0447d4700e4798a7"], 0xe0}], 0x1000000000000155, 0x0, 0x0, 0x200080a5}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getpid() syz_pidfd_open(0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r4}, 0x18) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000180)={0x7a2a, 0x9, 0x5a}, 0x8) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000340)=@in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000640)='\f', 0x1}], 0x1, 0x0, 0x0, 0x2804c044}, 0x0) shutdown(0xffffffffffffffff, 0x1) syz_open_dev$sg(0x0, 0x0, 0x0) mount$bind(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) r5 = socket(0x10, 0x2, 0x0) recvmmsg(r5, &(0x7f0000005cc0)=[{{0x0, 0x0, 0x0}, 0x5}, {{0x0, 0x0, &(0x7f0000001880)}, 0x80000001}], 0x2, 0x2, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a031700000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000240)={'macsec0\x00', 0x1}) sendmsg$NFT_BATCH(r2, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000001000010000000000000000000100000a30000000030a010400000000000000000a0000080900010073797a310000000008000b40000000008818d579fffffffd140000001100010000000000000000000100000a"], 0x58}, 0x1, 0x0, 0x0, 0x4044050}, 0x40) 8.06211606s ago: executing program 4 (id=3036): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x7) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffa}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) set_mempolicy(0x3, 0x0, 0x80000000) mlockall(0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000004440)=ANY=[@ANYBLOB="0900000004000000040000000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r3, @ANYBLOB="0200000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0xffc, r4, 0x4}, 0x38) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f0000000f00)=[{{&(0x7f0000000180)=@hci, 0x80, &(0x7f0000000280)=[{&(0x7f0000001000)=""/18, 0x12}, {&(0x7f00000004c0)=""/218, 0xda}, {&(0x7f00000005c0)=""/244, 0xf4}], 0x3, &(0x7f00000006c0)=""/158, 0x9e}, 0x7}, {{&(0x7f0000000780)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)=""/10, 0xa}], 0x10000000000000ad, &(0x7f0000000800)=""/238, 0xee}, 0x5}, {{&(0x7f0000000900)=@ax25={{0x3, @null}, [@rose, @remote, @rose, @bcast, @netrom, @remote, @remote, @null]}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000400)=""/64, 0x40}, {&(0x7f0000000980)=""/204, 0xcc}, {&(0x7f0000000a80)=""/9, 0x9}], 0x3}, 0x7}, {{&(0x7f0000000b00)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000b80)=""/185, 0xb9}, {&(0x7f0000000c40)=""/155, 0x9b}, {&(0x7f0000000d00)=""/222, 0xde}], 0x3, &(0x7f0000000e40)=""/159, 0x9f}, 0x3}], 0x4, 0x5366251808a522e3, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/power/pm_print_times', 0x101a02, 0x0) copy_file_range(r5, &(0x7f0000000000)=0x8, r5, 0x0, 0x4, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r6 = syz_open_procfs(0x0, 0x0) preadv(r6, 0x0, 0x0, 0x5d, 0x40000003) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000080)={{r6}, 0xe1f2, 0xfffffffffffffffd, 0x9}) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="140000003e00270926bd7000fbdbdf250a0000"], 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x2400c014) r8 = syz_usb_connect$hid(0x2, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1e7d, 0x2dbe, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0xfc, 0x1, {0x22, 0x7}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r8, 0x0, 0x0) syz_usb_control_io$hid(r8, &(0x7f0000000480)={0x24, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x22, 0x7, {[@main=@item_012={0x1, 0x0, 0xb, '.'}, @global=@item_4={0x3, 0x1, 0x6, "05f11032"}]}}, 0x0}, 0x0) 6.186028908s ago: executing program 0 (id=3037): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000002080)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x1, 0x7) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) prlimit64(0x0, 0xe, &(0x7f0000000200)={0x8, 0x8a}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x3) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100), 0x802, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r4, 0xc06855c8, &(0x7f0000000180)={0x10, 0x6d0b, {0x51, 0x400, 0x6, {0x7, 0x15b4}, {0x1a0b, 0x8}, @ramp={0x1, 0x90, {0x2, 0x3, 0x205, 0x400}}}, {0x52, 0x6, 0x850c, {0x3, 0x7}, {0x2, 0xf46d}, @period={0x58, 0x4, 0x1f00, 0x9, 0xb504, {0x6, 0x0, 0x1ff, 0xffff}, 0x0, 0x0}}}) setresuid(0xee01, r1, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x6d, &(0x7f0000000080), &(0x7f00000000c0)=0x3930) r5 = bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffe63) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='ext4_discard_blocks\x00', r5, 0x0, 0xffffffffffffffff}, 0x18) migrate_pages(0x0, 0x9, &(0x7f0000000340)=0x3, &(0x7f0000000380)=0x102) socket$nl_route(0x10, 0x3, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="020000000400000005000000aa"], 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000200), 0xa7c, r6}, 0x38) socket$can_bcm(0x1d, 0x2, 0x2) 6.185541055s ago: executing program 1 (id=3038): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY(r0, 0x5000940f, &(0x7f0000000400)={{r0}, "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"}) r1 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x29, &(0x7f0000000080)=0x6, 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x5f0f, 0x4) write$binfmt_script(r1, &(0x7f00000000c0), 0x28) recvmmsg(r1, &(0x7f00000013c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40002000, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "0de2e5", "5c32ede7524fccb56932889925b7ac4daa295943484473d9a27a46db7df45fbb5ce23cd67e59bb5c7368d1c2c6abcd475902a3cc922d8f7a3b651f239896814ce714bc7a3515aadef75660d897a23d6a09ca6ed6c7977591f5fd764bc21e3228948a59a0e71df31044df59f1439443aebe7c0bd97ff708c01674de5689e952d75948cedd101ddb493543503ac186c8bb415037f03935b73997afc6329a674901323dd5075940d957f4182c7f591c7bb12a84bae1125d65088f0ebb768ad09d4d5e0e6abce4cb687f20c4ba6f249c0018020a297d48a466ce11ac4f0d4186441321e547bd18b73185d8739a2fa621a0173aaab70baa8004d8f088962b0dd86dcb"}}, 0x110) 6.17335982s ago: executing program 3 (id=3039): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_emit_ethernet(0x87, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffd2a9dc6da626c0e21677ffaaaaaaaaaa2b86dd6700000100513afffe880000000000000000000000000201ff02000000000000000000000000000189009078000000002001000000000000000000000001fe800000000000000000000000000038220560aeb59d3fb13258c6f29dd7eed9c5aaa04a18f74d2a89000000000000"], 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x0, 0x8, 0x8001, 0x0, 0x9, 0xfffffffffffffffc, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) r2 = mq_open(&(0x7f0000000000)='e_1\x00', 0x8c2, 0x2a0, &(0x7f0000000080)={0x8000000040000000, 0x4, 0x4, 0x9}) mq_timedsend(r2, 0x0, 0x0, 0x5, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000000c0)={0x18}) mq_timedreceive(r2, &(0x7f0000000140)=""/154, 0x9a, 0x0, &(0x7f0000000040)={0x77359400}) creat(&(0x7f00000001c0)='./file0\x00', 0x16c) r4 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x1) ioctl$TCSETA(r4, 0x8925, &(0x7f0000000100)={0x2, 0x0, 0x1, 0x0, 0x13, "31f40000f7ece2f4"}) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_ZERO(r5, 0x0, 0x48f, &(0x7f0000000740)={0x11, @multicast2, 0x4e24, 0x4, 'wrr\x00', 0x39, 0x7ff, 0x22}, 0x2c) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000240), 0x0, 0x0) r6 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder1\x00', 0x1802, 0x0) r7 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1) write$UHID_CREATE2(r7, &(0x7f00000007c0)=ANY=[@ANYBLOB="0b00000073797a31000000dfff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000037b35f0a000089b4c45a10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001"], 0x119) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xf, 0x8031, r7, 0x1000) syz_open_dev$hidraw(&(0x7f00000004c0), 0x0, 0x14a042) read(r1, 0x0, 0x0) add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) close_range(r6, 0xffffffffffffffff, 0x0) 6.171046362s ago: executing program 4 (id=3040): r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF_DMABUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000080)={0x7, 0x2, 0x4, 0x70000, 0x2, {r1, r2/1000+10000}, {0x7, 0x0, 0x3, 0x40, 0xa, 0x2, "8782fbe8"}, 0x5, 0x4, {0xffffffffffffffff}, 0xfff, 0x0, 0xffffffffffffffff}) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000180)=@multiplanar_fd={0x8000, 0x3, 0x4, 0x8, 0x2, {0x77359400}, {0x3, 0x0, 0x9, 0x2, 0x7a, 0x6, "66a86502"}, 0xc5, 0x4, {&(0x7f0000000100)=[{0x4, 0xbf28, {r3}, 0x8001}, {0x8, 0x8000, {}, 0x7e7c}]}, 0x8, 0x0, 0xffffffffffffffff}) r7 = syz_open_dev$audion(&(0x7f0000000200), 0xf, 0x2800) write$FUSE_INIT(r7, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x2b, 0x2, 0x4800408, 0x4, 0x7, 0x0, 0x7b, 0x0, 0x0, 0x100, 0x4395}}, 0x50) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000300)=@userptr={0x7, 0x2, 0x4, 0x40, 0x5, {0x0, 0xea60}, {0x2, 0x8, 0x7a, 0x2, 0x10, 0x3, "cda1c3af"}, 0x31, 0x2, {&(0x7f00000002c0)}, 0x7, 0x0, r4}) statx(r7, &(0x7f0000000400)='./file0\x00', 0x1000, 0x100, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r4, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), 0x200001, &(0x7f00000005c0)={{'fd', 0x3d, r7}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r8}, 0x2c, {'group_id', 0x3d, r9}, 0x2c, {[{@allow_other}, {@allow_other}, {@default_permissions}]}}) ioctl$VIDIOC_TRY_ENCODER_CMD(r7, 0xc028564e, &(0x7f0000000680)={0x2, 0x1, [0xe7ce, 0x2, 0x7f, 0x9668, 0x5, 0x5, 0xbbf, 0x51]}) getsockopt$PNPIPE_IFINDEX(r7, 0x113, 0x2, &(0x7f00000006c0)=0x0, &(0x7f0000000700)=0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@bloom_filter={0x1e, 0x7f, 0x8, 0x1, 0x1040, r7, 0xfffeffff, '\x00', r10, r7, 0x0, 0x1, 0x4, 0xf}, 0x50) openat$dsp1(0xffffffffffffff9c, &(0x7f00000007c0), 0x4881, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r7, 0x1, &(0x7f0000000800)={0x4, r0}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000000840)) r11 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_START(r11, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x14, 0x0, 0x8, 0x70bd25, 0x25dfdbfd, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x20040804) writev(0xffffffffffffffff, &(0x7f0000001e80)=[{&(0x7f0000000b40)="e2207bf5fa1fce666e8bb6e0629b587ea14e35e8614975871df15e37788a32f24e9350e8360fd90169a0e5955a23d46bd1aa6df913db809cda92f49312fd72eb66b9fc6c7be4a21969e1c25b37f8ce79d40cd4e9", 0x54}, {&(0x7f0000000bc0)="8c11000b54f78dec546a26ce13effac1d8fdbf4859a1bd5f9a7a4864eb530eca3289a343cc844924cfd3cfa7170acacc5b93f1f0f3cf5b16d3bb2788eab44f3ba0ed13b219341075018fe5a6854546a30ddb2211a9e2016bec19d4d78fa38ffe657f9fad4426edd5a148e787116c6e6787d3935bb017362d81ff2248a02b4dfb400fd477825c439cc2075062fd454a57f6039f9b826c2b7cb7190d19ce109c", 0x9f}, {&(0x7f0000000c80)="1b4c3050c87c8ba7997ef6fefed53e1e44cec359fa9aed9a287138b5a837c2811f084ecb526335dbce244d46fc32499d1d92e3725da04304efa3b6c9747465a30d780404c6d1337c5d1c4ac2dc535601fcfd320eccd493684aa9839d26b74c77f2b36acda4f8312450caafc6bc3643b75a6d149c647d23667ea52256", 0x7c}, {&(0x7f0000000d00)="b83135cb0f5374612ea3bb243d7f808145c41b0b7506862c334abdfe", 0x1c}, {&(0x7f0000000d40)="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", 0x1000}, {&(0x7f0000001d40)="4fc4ebea115c1e28298bf31b24d0cc44a5622b3cbd7fb03d482201d96227ac42907e200be80a8909f60c15383e0d2140122da42f3859c6e9ddc277bbe396fbe0735e5c65ca9b4331dbcfdbaeca037169c389abff4a5e", 0x56}, {&(0x7f0000001dc0)="b3392a62997f0811e6cc5d8ccc1f771522de2a89a40f80a06064f87899d7384f2ed434437512875e498891bfe406cf45b4c3076541a587713781b7becc28c0900fc0a87d876ec9af6b4b7d38e3c46c6cab8970a1ca495de4f2283d3732d2c988548875fd7a6597eece1dd25784461acc9a2b89c95e7b15aef719f4814724bee1fb6681b0db474f7f260b5e27613e3268dae36e3e5d3bc440be72fa4abeb844bfe764c1da37be", 0xa6}], 0x7) pwritev(r5, &(0x7f0000002200)=[{&(0x7f0000001f00)="d5eeb3090be1ca251329ac82f063844a0b1ae701ae6c12298cab4c986aa8eb4a726535e34c21d6e77119c2bdeacb703e48e74931157914148e653c69a26dcd4dea6a1f3b177e65420d3a4f0f2312de745d98c7acf541afe3ae183e40fc7a7656668d0aabf1e17b", 0x67}, {&(0x7f0000001f80)="5ca693feda1074ade29df39baa9e6ddbf497e433cfcd336f6bb32cc9cc41a2022ebdf3fb17a81e458548a9196a3bdacb5f325d3907a32e00c85859cabc688f75cc0aa292f4c8e7b231bfc93a908b7505422ae3efadaae4", 0x57}, {&(0x7f0000002000)="574c2e772f605092132b573e3bf865cb4e05752796ab82e4a2235da5be99fc42d1a8cc16666a52460f7250fbcc3b2d03c6771e6a94fec1e1ea49820e00d5f7bc44765484833598a62b3fb363826f51f0ba77d956118b694f880841055b9e9b804c8b76b2db70ec16c23f6936f293faee4ac844975a40165bea4fdfe5514c129f09ea0eedfb617692b96758b85f46894764a2728166dd0794b5853d1a31dc4805f418428846d5c580d07b9a813f701713a1fdf6b4970d799cb8c1a30a48ce74cc7bb613668203d6d40b428f3597cfb29c8ffca57b0ca67497807da617f27d0e9fef5c53959d744a68444405652ffb203f6d7ca8e7f134844caa", 0xf9}, {&(0x7f0000002100)="408189690ff70ec4cfea18ca882d783f69c9da7f3e0c0f35dc7006d8034aad0ffc0720265c5dc61ea51d194b930d6fdadea25d68af7c313cb830b4af2a019a8d32ff0ef78b1a0093680f6459cfb9675465841c1289dfa1de4de2b1ae542258a7e4ca9410d2b6de5b06ecd3b8ceaf14a02cbcdccde9276fe5f138abb05781b26480b04b3fae322c067291fe8f8117b3fab79851d650600b2eeef32dba27face2da7125094282ec886ab1360f8f83ad0483418def7720741cf33926d2f28bcc60de67453633577e567cd5aca63682900ebf192ff89458fcaa1cbbe6d7841d8907aa0b70bc91bf53fb2b65bb597", 0xec}], 0x4, 0x7fff, 0x8) syz_genetlink_get_family_id$ieee802154(&(0x7f0000002240), 0xffffffffffffffff) syz_open_dev$sndpcmp(&(0x7f0000002280), 0x6, 0x208040) r12 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000022c0), 0x90000, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000002300), r12) syz_open_dev$evdev(&(0x7f0000002340), 0x80000000, 0x402000) socket(0x15, 0x0, 0x2) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000002380), 0x400000) ioctl$IOCTL_GET_NCIDEV_IDX(r7, 0x0, &(0x7f0000002400)=0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r12, 0x0, &(0x7f0000002440)=0x0) sendmsg$NFC_CMD_DEV_UP(r11, &(0x7f0000002500)={&(0x7f00000023c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000024c0)={&(0x7f0000002480)={0x2c, 0x0, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r13}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r14}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000940}, 0x0) 4.235523909s ago: executing program 0 (id=3041): r0 = syz_open_dev$vim2m(&(0x7f0000000440), 0x8, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405668, &(0x7f0000000300)={0x2, 0x200004, 0x2, 0x101480}) 4.22532838s ago: executing program 1 (id=3042): r0 = syz_init_net_socket$bt_hidp(0x1f, 0x3, 0x6) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x7ff}, 0xe) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000340)={r1, r1, 0xc, 0x2, &(0x7f00000009c0)="1600", 0x9, 0x1, 0x10cf, 0x5505, 0x8b, 0x1, 0x0, 'syz0\x00'}) timer_create(0x0, &(0x7f0000000240)={0x0, 0x21, 0x2}, &(0x7f0000000280)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r2, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) r3 = getpgid(0x0) r4 = syz_open_procfs(r3, &(0x7f0000000180)='map_files\x00') r5 = fanotify_init(0x4, 0x1000) fanotify_mark(r5, 0x1, 0x40001019, r4, 0x0) 4.223709231s ago: executing program 3 (id=3043): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0xac, 0x24, 0xf0b, 0x70bd2b, 0x25dfdbfb, {0x0, 0x0, 0x12, r2, {}, {0xffff, 0xffff}, {0x2}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x7c, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], 0x0, [0x5, 0x4, 0x22, 0x1, 0x8, 0x0, 0x6, 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd]}}, @TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x9, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x9}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x0, 0x3, 0x3}]}]}, @TCA_TAPRIO_ATTR_SCHED_CLOCKID={0x8, 0x5, 0x7}]}}]}, 0xac}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=@setlink={0x28, 0x13, 0x10, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, 0x605, 0x20000}, [@IFLA_LINK_NETNSID={0x8, 0x25, 0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x24000084}, 0x40014) 4.223187718s ago: executing program 4 (id=3044): prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x400000000000041, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@ipv6_newnexthop={0x38, 0x68, 0x4, 0x3, 0x25dfdbfd}, 0x38}, 0x1, 0x0, 0x0, 0x4008081}, 0x20000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) mount$tmpfs(0x0, &(0x7f0000000540)='./cgroup\x00', &(0x7f0000000580), 0x0, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'default', '=relative', @void}}}]}) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000280)={0x1, 0x0, [{0xe000, 0xa8, &(0x7f0000000140)=""/168}]}) mount(0x0, 0x0, 0x0, 0x1214040, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000002f40)=""/4098, 0x1002) ioctl$FBIO_WAITFORVSYNC(0xffffffffffffffff, 0x40044620, 0x0) r1 = socket$inet6(0xa, 0x1, 0x84) setsockopt$inet6_int(r1, 0x29, 0x1a, &(0x7f0000000080)=0x2, 0x4) sendto$inet6(r1, &(0x7f00000002c0)="17", 0x1, 0x804, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r1, 0x84, 0x6d, &(0x7f0000000e40)=""/4062, &(0x7f0000000040)=0xfde) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0xaf01, 0x0) r3 = eventfd(0xc) r4 = syz_usb_connect$hid(0x4, 0x36, &(0x7f0000000e00)=ANY=[@ANYBLOB="1201020000000040ac054d02000000eaff0009022400010010100509040000010300010009218100ff"], 0x0) syz_usb_control_io$hid(r4, 0x0, 0x0) syz_usb_control_io$hid(r4, &(0x7f00000000c0)={0x24, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x22, 0x9, {[@main=@item_012={0x0, 0x0, 0xa}, @local=@item_012={0x2, 0x2, 0x5, "e6af"}, @global=@item_4={0x3, 0x1, 0x0, "3463299e"}]}}, 0x0}, 0x0) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000240)=r3) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) close_range(r5, 0xffffffffffffffff, 0x0) 2.187746391s ago: executing program 0 (id=3045): r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000300)={0x0, 0x4}, 0x8) sendto$inet6(r0, &(0x7f0000001300)="92", 0x1, 0x10, &(0x7f0000000240)={0xa, 0x4e1c, 0xfffffffc, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={0x0, 0x0, 0x4}, 0x8) unlinkat$binderfs_device(0xffffff9c, &(0x7f00000000c0)='./binderfs/binder1\x00') 2.18514408s ago: executing program 1 (id=3046): r0 = socket(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000007c0)="7800000018002507b9199b02ffff48000203be04020406050a02040c5c000900580006080a0000000d0085a168d0bf46d32345653600648d270015000a00000849935ade4a460c89b6ec0cff3959547f509058ba86c902007a00004a32000407160016000a0000000000e000e218d1dd3b6ed538f2523250", 0x78, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="4f9e222fb227d0807a05bb13ce84d6fa86cde4c9ae7dd25c844a63bb8d25cf123a2f066f35ec87424c7581ac52e06dabfa0e6bebea9f478118da08ca33937b6cb5cc7dc40fe73165", 0xffffffffffffff72, 0x4010, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) setrlimit(0x6, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) syz_clone(0x2180, 0x0, 0xe4, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0xc2882, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) fadvise64(0xffffffffffffffff, 0x18, 0x0, 0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000d00), 0xffffffffffffffff) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000ec0)={0x14, r4, 0x719, 0x70bd2b, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x880) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x840, 0x43) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', 0x0, 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',group_', @ANYRESDEC=0x0]) read$FUSE(r5, &(0x7f00000021c0)={0x2020}, 0x2020) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x8, 0x20132, 0xffffffffffffffff, 0xb2993000) r6 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r6) wait4(r6, 0x0, 0x8, 0x0) close(r5) setresuid(0xffffffffffffffff, 0xee00, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x3000)=nil, 0x7fffffffffffffff, 0x15) 2.177367114s ago: executing program 3 (id=3047): r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r0, 0x80089419, &(0x7f0000000100)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) io_setup(0x8, &(0x7f0000004200)=0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') io_submit(r1, 0x1, &(0x7f0000004540)=[&(0x7f0000004280)={0xf5, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) r3 = socket(0x8, 0x5, 0x1) syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), r3) getsockname$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f0000003e00)=[{{&(0x7f0000000280)=@rc={0x1f, @none}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000300)=""/3, 0x3}, 0x5}, {{&(0x7f0000000340)=@isdn, 0x80, &(0x7f0000001600)=[{&(0x7f00000003c0)=""/27, 0x1b}, {&(0x7f0000000400)=""/174, 0xae}, {&(0x7f00000004c0)=""/193, 0xc1}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/40, 0x28}], 0x5, &(0x7f0000003240)=""/148, 0x94}, 0x3fffe}, {{&(0x7f0000001740)=@ax25={{0x3, @rose}, [@default, @remote, @default, @null, @netrom, @default, @null]}, 0x80, &(0x7f0000001840)=[{&(0x7f00000017c0)=""/99, 0x63}], 0x1, &(0x7f0000001880)=""/60, 0x3c}, 0xdd}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f00000018c0)=""/4092, 0xffc}, {&(0x7f00000028c0)=""/30, 0x1e}, {&(0x7f0000002900)=""/156, 0x9c}, {&(0x7f0000003380)=""/89, 0x59}], 0x4, &(0x7f0000002a80)=""/231, 0xe7}, 0x6}, {{&(0x7f0000002b80)=@nfc_llcp, 0x80, &(0x7f0000002d00)=[{&(0x7f00000016c0)=""/19, 0x13}, {&(0x7f0000002c40)=""/168, 0xa8}], 0x2, &(0x7f0000002d40)=""/252, 0xfc}, 0x7}, {{&(0x7f0000002e40)=@x25={0x9, @remote}, 0x80, &(0x7f0000003080)=[{&(0x7f0000002ec0)=""/182, 0xb6}, {&(0x7f0000002f80)=""/243, 0xf3}], 0x2, &(0x7f00000030c0)=""/78, 0x4e}, 0x7}, {{&(0x7f0000004080)=@rc={0x1f, @none}, 0x80, &(0x7f0000003400), 0x0, &(0x7f0000003440)=""/11, 0xb}, 0x5}, {{&(0x7f0000003300)=@x25={0x9, @remote}, 0x80, &(0x7f00000037c0), 0x0, &(0x7f0000003800)=""/221, 0xdd}}, {{0x0, 0x0, &(0x7f0000003bc0)=[{&(0x7f0000003900)=""/233, 0xe9}, {&(0x7f0000003a00)=""/98, 0x62}, {&(0x7f0000003a80)=""/2, 0x2}, {&(0x7f0000003140)=""/225, 0xe1}], 0x4}}, {{&(0x7f0000003c00)=@rc={0x1f, @fixed}, 0x80, &(0x7f0000003d80)=[{&(0x7f0000003c80)=""/134, 0x86}, {&(0x7f0000003d40)}], 0x2, &(0x7f0000001680)=""/12, 0xc}, 0x5}], 0xa, 0x1, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x2e00, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) ioctl$KVM_RUN(r9, 0xae80, 0x0) r10 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x2) ioctl$KVM_SET_CPUID(r10, 0x4008ae8a, &(0x7f0000000000)={0x1, 0x0, [{0x0, 0x9, 0x68747541, 0x7, 0x7}]}) 2.176908185s ago: executing program 4 (id=3048): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$nl_route(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f00000000c0)={0x1, 'pim6reg0\x00', {}, 0xe388}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000600)=@newtfilter={0x35c, 0x2c, 0xd2b, 0x70bd2b, 0x35dfdbfe, {0x0, 0x0, 0x0, r4, {0xf}, {0x0, 0xfff3}, {0x7, 0x8}}, [@filter_kind_options=@f_u32={{0x8}, {0x330, 0x2, [@TCA_U32_SEL={0x204, 0x5, {0x9, 0x7f, 0x3, 0x200, 0x9, 0xffff, 0x3, 0x8, [{0x6, 0x400000, 0x0, 0x2}, {0x1a8f, 0x9, 0xfffff801, 0x7}, {0x7, 0x6, 0x5, 0x400}, {0x73, 0x1400, 0x57e76c05, 0x7fff}, {0x7, 0x5, 0x0, 0x81}, {0x7f, 0x1, 0x1, 0x4}, {0x7fffffff, 0xffff, 0x9, 0x7}, {0x2, 0x8, 0x1}, {0x7, 0x1, 0xff, 0x6}, {0x401, 0xffffffff, 0x7, 0x7}, {0x6, 0x8, 0x1, 0x9}, {0x7, 0x4, 0x2, 0x4}, {0x4, 0x5b61, 0x0, 0xe37}, {0x1, 0x6, 0x6, 0x3ff}, {0x7, 0x1, 0x401, 0x9}, {0x4, 0x806, 0x5, 0x8}, {0xffeffffb, 0xd, 0x7f, 0x7f}, {0xc0000000, 0x81, 0x80000000, 0x8}, {0x80000001, 0x7, 0x6, 0xe0}, {0x0, 0x9, 0x4, 0xb76}, {0x0, 0x8, 0x4, 0x36c2}, {0x6, 0xc63, 0xb, 0x207}, {0x1, 0x5, 0x5, 0x4}, {0x7, 0x202, 0x8, 0x400}, {0x0, 0x9, 0x8, 0xa}, {0x7fffffff, 0x54, 0xd6fa, 0xb}, {0xd, 0x6, 0x2, 0x8}, {0x8, 0xffffffff, 0x80, 0x200}, {0x7, 0xdefb, 0x6, 0x401}, {0x400, 0xffff, 0xffff, 0x1}, {0x2, 0x8, 0x800, 0x5}]}}, @TCA_U32_INDEV={0x14, 0x8, 'vxcan1\x00'}, @TCA_U32_SEL={0x114, 0x5, {0x8, 0x9, 0x6, 0x10da, 0xa760, 0x0, 0x10, 0x100, [{0x7, 0x3ff, 0x3, 0x4}, {0x2, 0xffffffff, 0x69c, 0x4000000}, {0x1, 0x1, 0x9, 0x8}, {0x6, 0x7fff, 0x9, 0x6}, {0x3, 0xde5, 0x1, 0xbd}, {0x3, 0x80, 0x1, 0x6}, {0x7, 0x7fff, 0x0, 0x40}, {0x8, 0x80000000, 0xfffffffa, 0x51}, {0x49f, 0x7, 0x81, 0xb}, {0x5, 0x9, 0x2}, {0x1000, 0x2, 0x264, 0x9}, {0x3ff, 0x80000001, 0x3, 0xa6d}, {0x2, 0x4e, 0x5a2, 0xa2fa}, {0x7, 0x2, 0x6, 0x7}, {0x7fff, 0x5, 0x401, 0xc42b}, {0xc, 0x8000, 0xfffffffb}]}}]}}]}, 0x35c}}, 0x24040094) syz_open_dev$radio(&(0x7f0000000000), 0xffffffffffffffff, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x101300, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) r6 = syz_open_dev$dri(&(0x7f0000000440), 0x1, 0x48240) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r6, 0x4010640d, &(0x7f0000000000)={0x3, 0x2}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r6, 0xc01064b5, &(0x7f0000000040)={&(0x7f0000000100)=[0x0], 0x1}) ioctl$DRM_IOCTL_MODE_ATOMIC(r6, 0xc03864bc, &(0x7f0000000180)={0x1, 0x1, &(0x7f00000000c0)=[r7], &(0x7f0000000080)=[0x2], &(0x7f0000000200), &(0x7f00000001c0), 0x0, 0x1}) 7.943279ms ago: executing program 0 (id=3049): r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$netlink(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000680)=ANY=[@ANYBLOB="e0000000130001002b", @ANYRESHEX=r0, @ANYRES64=r0, @ANYRES64=r0, @ANYBLOB="04000b0004000180bcb493de0bb58fd75bdc5e7c53ed39d06fd043db86af6933d71e30cab89da1cd72deb5178a8576e69b2ff911b2fc9aec9a3e2c48ddc884448fd51602af338a3185dcc3b9743391b1e5189f75c863271e1bf36c11da94a91a9711f9fd7b5144ea0447d4700e4798a7"], 0xe0}], 0x1000000000000155, 0x0, 0x0, 0x200080a5}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getpid() syz_pidfd_open(0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x94) r4 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000180)={0x7a2a, 0x9, 0x5a}, 0x8) sendmsg$inet_sctp(r4, &(0x7f0000000700)={&(0x7f0000000340)=@in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000640)='\f', 0x1}], 0x1, 0x0, 0x0, 0x2804c044}, 0x0) shutdown(r4, 0x1) syz_open_dev$sg(0x0, 0x0, 0x0) mount$bind(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) r5 = socket(0x10, 0x2, 0x0) recvmmsg(r5, &(0x7f0000005cc0)=[{{0x0, 0x0, 0x0}, 0x5}, {{0x0, 0x0, &(0x7f0000001880)}, 0x80000001}], 0x2, 0x2, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a031700000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000240)={'macsec0\x00', 0x1}) sendmsg$NFT_BATCH(r2, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000001000010000000000000000000100000a30000000030a010400000000000000000a0000080900010073797a310000000008000b40000000008818d579fffffffd140000001100010000000000000000000100000a"], 0x58}, 0x1, 0x0, 0x0, 0x4044050}, 0x40) 4.768461ms ago: executing program 1 (id=3050): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x20a00, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r7 = socket(0x10, 0x803, 0x0) r8 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r7, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2b, 0xffffffff, {0x0, 0x0, 0x0, r9, {0x0, 0x7}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@newtfilter={0x3c, 0x2c, 0xd27, 0x30bd29, 0x2, {0x0, 0x0, 0x0, r6, {0x0, 0x6}, {}, {0x9, 0x4}}, [@filter_kind_options=@f_flower={{0xb}, {0xc, 0x2, [@TCA_FLOWER_FLAGS={0x8, 0x16, 0x10}]}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000400)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x70bd2e, 0x0, {0x0, 0x0, 0x0, r6, {0x0, 0x2}, {0xffff, 0xffff}, {0x2}}, [@qdisc_kind_options=@q_cbs={{0x8}, {0x1c, 0x2, @TCA_CBS_PARMS={0x18, 0x1, {0x0, '\x00', 0xe8b, 0x93, 0x1, 0x3}}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) syz_open_dev$vim2m(0x0, 0x2, 0x2) r10 = getpgrp(0x0) sched_setaffinity(r10, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r11 = syz_clone(0x8000, 0x0, 0xfffffffffffffe7e, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, r11, 0x1, 0x0) r12 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r12, &(0x7f0000019680)=""/102392, 0x18ff8) r13 = syz_io_uring_setup(0x117, &(0x7f0000000100)={0x0, 0x0, 0x80, 0x2000000, 0x3a6}, &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r14, 0x4, &(0x7f0000000080)=0xfffffc00, 0x0, 0x4) syz_io_uring_submit(r14, r15, &(0x7f00000000c0)=@IORING_OP_SENDMSG={0x9, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40000, 0x1}) io_uring_enter(r13, 0x47f6, 0x80ffff, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f00000c6000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, 0x0}], 0xaaaaaaaaaaaaac3, 0x38, 0x0, 0x0) 2.7406ms ago: executing program 3 (id=3051): r0 = socket$inet6(0xa, 0x2, 0x3a) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x2000) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="0035301555a2b6556900000000000080010400"/32]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x1b) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000280)={'#! ', './file0', [{0x20, '/dev/infiniband/rdma_cm\x00'}, {0x20, 'GPL\x00'}, {0x20, ']{:/(('}]}, 0x30) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x28011, r5, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000a0b000/0x4000)=nil, 0x4000, 0x5, 0x10010, r5, 0x10000000) cachestat(r5, &(0x7f0000000040), &(0x7f000009de80), 0x0) syz_kvm_setup_cpu$x86(r4, r5, &(0x7f00003a1000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000380)="67f367f22e0f0014a59a590000440f01c5c74424002f000000c544240234deda3eff1c24d433a3a303b50f42a507410f08c4627d35a500900000b94d0600000f32b9ff020000b800300000ba000000000f30", 0xffffffffffffffe0}], 0x1, 0x49, 0x0, 0xfffffe5f) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYRES16=r0], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r6}, 0x18) r7 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r7, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r7, &(0x7f00000009c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) writev(r7, &(0x7f0000000200)=[{&(0x7f00000000c0)='X', 0x8030000}], 0x1) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="1c0000001a009b8a140000003b9b301f00"/28, 0x1c) r8 = getpid() sched_setscheduler(r8, 0x2, &(0x7f0000000200)=0x7) ptrace$getenv(0x4201, r8, 0x8, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002ec0), 0x0, 0x2, 0x0) 0s ago: executing program 4 (id=3052): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) unshare(0x8000000) semget$private(0x0, 0x4000, 0x0) fanotify_init(0x0, 0x400) r2 = socket(0x1, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd824498949714ffaac8a6f670600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb5447000001000000008f2b9000f22425e4097ed62cbc891061017cfa6fa26fa7088c60897d4a6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b52710aeee835cf0d0000000098b51fe6b1b8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3540546bf636e3d6e700e5bc6d3fd0500000022eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe326c2ed0a432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1b172191d359645fae2d074ea5724ab77ea04fe507938b1213cdd4a92860e59808689382734d24b3123dd40c6d612c8a19948cd257748b1e7324adddbe61d51013f7d6b313c6df7b7b29678d70fc94dcc3e99e2472e78968ed94e7a54988656e8fff6b1d9b9993c71edd5cc10a2bea8d94d751b77fa7c48c712af35a9ffe670e8fa451942f48741119496bc30137e1202aed6bb5cd5c2d0256d049e4a335e2ea5545e5624be2391c37c0a2ae3bbb5b58778b85424bcdb84358359b2cb2782fc0e82f17b12d641ce6a72ab0ac794f878140897703bebe4420115d26675f27598841965fa91088252"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000000180), &(0x7f00000000c0)=@tcp6=r2}, 0x20) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r4, 0x560b, 0x0) ioctl$TCSETS(r4, 0x5402, &(0x7f0000000100)={0x1, 0x8, 0x6, 0x80, 0x9, "efa25ba54a99c5ea267ff8beae91ff741dab5d"}) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000001680)=[{{&(0x7f0000000380)=@file={0x1, './file0\x00'}, 0x6e, 0x0}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000d40), 0x2, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000180)={'veth1\x00', &(0x7f0000000200)=@ethtool_per_queue_op={0x4b, 0xf, [0x1, 0x1, 0x7fff, 0x1, 0x4, 0x8, 0xa4, 0x3, 0x3, 0xb69, 0xc1, 0x4, 0x1, 0x20000003, 0x40000008, 0x20101, 0x80000000, 0x9, 0x3, 0xa, 0x1, 0xfffffffd, 0x2, 0x6, 0x9, 0x2, 0x4, 0x5, 0x66c, 0x200, 0x3, 0x0, 0xe, 0x5, 0x100, 0x3, 0x1c00, 0xb, 0x7, 0xbed4, 0x8, 0x8000100, 0x3, 0x800, 0x11003, 0x8, 0x7, 0xfffffffc, 0x4, 0x1, 0x7b, 0x3ff, 0xa, 0xfffffffb, 0xf, 0x9, 0xd7, 0x1fa4860a, 0x7, 0xaa, 0xfff, 0x2, 0x180000, 0x7, 0x8b, 0x7, 0x2af, 0xf5, 0xffffffff, 0x2, 0x6, 0x9, 0x4, 0x7, 0x9, 0x1, 0x4, 0x0, 0x8, 0x752, 0x5, 0x6, 0x0, 0x10001, 0x2, 0xfffffffd, 0x6, 0x8, 0x8, 0x8, 0xffffffff, 0x5, 0x2, 0x80, 0xc, 0x5, 0x0, 0x81, 0x2000b, 0x5, 0x400, 0x6, 0x22, 0x8, 0x4, 0xd9a, 0x800809, 0x0, 0x3ff, 0x4, 0x2, 0x5, 0x8, 0xffffffff, 0x80000001, 0xb57, 0x0, 0x3, 0x4, 0x49b1, 0x401, 0x8, 0xd0a, 0x401, 0x1, 0x200, 0xc5d, 0x2]}}) poll(&(0x7f0000000000), 0x20000000000000b5, 0x9) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000740)) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x2, 0xe, &(0x7f0000000200)=ANY=[@ANYRES64=0x0], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1f, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000000c0), 0x10}, 0x94) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) pread64(r5, 0x0, 0x0, 0x4eb) kernel console output (not intermixed with test programs): rface number 0 [ 644.125036][ T5815] usb 4-1: New USB device found, idVendor=046d, idProduct=08c3, bcdDevice=6b.16 [ 644.138785][ T5815] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 644.147050][ T5815] usb 4-1: Product: syz [ 644.177033][ T5815] usb 4-1: Manufacturer: syz [ 644.221183][ T5815] usb 4-1: SerialNumber: syz [ 644.281266][ T5815] usb 4-1: config 0 descriptor?? [ 644.448608][T13584] x_tables: duplicate entry at hook 2 [ 644.471268][T13584] netlink: 428 bytes leftover after parsing attributes in process `syz.1.1801'. [ 644.500104][T13584] netlink: 32 bytes leftover after parsing attributes in process `syz.1.1801'. [ 644.570411][ T5815] uvcvideo 4-1:0.31: Found UVC 0.04 device syz (046d:08c3) [ 644.600851][ T5815] uvcvideo 4-1:0.31: No valid video chain found. [ 644.682185][ T30] audit: type=1400 audit(1767421222.151:1018): avc: denied { read append } for pid=13596 comm="syz.1.1805" name="fb0" dev="devtmpfs" ino=629 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 644.825080][T13598] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1804'. [ 644.845214][T13598] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1804'. [ 645.268730][ T30] audit: type=1400 audit(1767421222.151:1019): avc: denied { open } for pid=13596 comm="syz.1.1805" path="/dev/fb0" dev="devtmpfs" ino=629 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 645.336401][T13572] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=59668 sclass=netlink_route_socket pid=13572 comm=syz.3.1797 [ 645.375821][ T30] audit: type=1400 audit(1767421222.411:1020): avc: denied { map } for pid=13596 comm="syz.1.1805" path="/dev/fb0" dev="devtmpfs" ino=629 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 645.407739][ T30] audit: type=1400 audit(1767421222.411:1021): avc: denied { write execute } for pid=13596 comm="syz.1.1805" path="/dev/fb0" dev="devtmpfs" ino=629 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 645.465556][T13605] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=59668 sclass=netlink_route_socket pid=13605 comm=syz.3.1797 [ 645.552458][T13609] tmpfs: Unknown parameter 'n' [ 645.820003][T13616] netlink: 'syz.4.1809': attribute type 1 has an invalid length. [ 645.865061][T13611] x_tables: duplicate underflow at hook 2 [ 645.873141][T13619] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1809'. [ 645.893831][T13616] 8021q: adding VLAN 0 to HW filter on device bond1 [ 645.942208][T13618] netlink: 428 bytes leftover after parsing attributes in process `syz.1.1808'. [ 646.040441][T13616] mac80211_hwsim hwsim59 wlan0: entered promiscuous mode [ 646.209505][T13616] bond1: (slave wlan0): Enslaving as an active interface with a down link [ 646.821014][ T5922] usb 4-1: USB disconnect, device number 48 [ 646.839040][T13626] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 646.906335][T13626] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 648.232487][T13643] netlink: 96 bytes leftover after parsing attributes in process `syz.4.1815'. [ 648.639187][T13642] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1817'. [ 649.376698][T13661] Device name cannot be null; rc = [-22] [ 650.077133][T13666] overlayfs: failed to clone upperpath [ 650.090597][ T30] audit: type=1400 audit(1767421227.561:1022): avc: denied { watch } for pid=13664 comm="syz.2.1822" path="/333/bus/file1" dev="tmpfs" ino=1771 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 650.122699][ T30] audit: type=1400 audit(1767421227.561:1023): avc: denied { watch_sb watch_reads } for pid=13664 comm="syz.2.1822" path="/333/bus/file1" dev="tmpfs" ino=1771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 650.590155][T13675] tmpfs: Bad value for 'mpol' [ 651.517472][T13684] netlink: 'syz.2.1827': attribute type 1 has an invalid length. [ 651.528110][T13684] netlink: 2088 bytes leftover after parsing attributes in process `syz.2.1827'. [ 652.121311][T13686] syzkaller0: entered promiscuous mode [ 652.141312][T13686] syzkaller0: entered allmulticast mode [ 652.214114][ T30] audit: type=1400 audit(1767421229.681:1024): avc: denied { bind } for pid=13687 comm="syz.0.1828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 652.273288][ T30] audit: type=1400 audit(1767421229.681:1025): avc: denied { write } for pid=13687 comm="syz.0.1828" name="card1" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 652.460264][ T30] audit: type=1400 audit(1767421229.931:1026): avc: denied { read } for pid=13698 comm="syz.1.1832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 653.581413][T13707] Device name cannot be null; rc = [-22] [ 654.946833][ T30] audit: type=1400 audit(1767421232.411:1027): avc: denied { read } for pid=13723 comm="syz.1.1840" name="nvram" dev="devtmpfs" ino=623 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 [ 654.975675][ T30] audit: type=1400 audit(1767421232.411:1028): avc: denied { open } for pid=13723 comm="syz.1.1840" path="/dev/nvram" dev="devtmpfs" ino=623 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 [ 656.511703][T13736] tmpfs: Unknown parameter 'nr_blo' [ 658.205863][T13750] netlink: 128 bytes leftover after parsing attributes in process `syz.2.1848'. [ 658.218866][T13750] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 658.830175][ T5879] usb 5-1: new high-speed USB device number 53 using dummy_hcd [ 659.281780][ T5879] usb 5-1: config 27 interface 0 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7 [ 659.299258][ T5879] usb 5-1: config 27 interface 0 altsetting 0 bulk endpoint 0xB has invalid maxpacket 47 [ 659.304437][T13780] netlink: 'syz.2.1855': attribute type 1 has an invalid length. [ 659.309487][T13779] tmpfs: Unknown parameter 'nr_blo' [ 659.337363][ T5879] usb 5-1: New USB device found, idVendor=0582, idProduct=0014, bcdDevice=bb.9d [ 659.357587][ T5879] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 659.426961][T13765] raw-gadget.1 gadget.4: fail, usb_ep_enable returned -22 [ 659.440693][T13782] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 659.453614][T13780] sctp: [Deprecated]: syz.2.1855 (pid 13780) Use of struct sctp_assoc_value in delayed_ack socket option. [ 659.453614][T13780] Use struct sctp_sack_info instead [ 659.458183][T13782] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 659.666000][ T5879] usb 5-1: Quirk or no altset; falling back to MIDI 1.0 [ 659.943052][T11517] usb 5-1: USB disconnect, device number 53 [ 660.694371][T13808] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 660.709836][T13808] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 660.929910][T13816] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1867'. [ 661.189121][T13822] netlink: 96 bytes leftover after parsing attributes in process `syz.1.1866'. [ 661.200269][ T5879] usb 1-1: new high-speed USB device number 41 using dummy_hcd [ 661.708746][ T5879] usb 1-1: Using ep0 maxpacket: 16 [ 661.758020][ T5879] usb 1-1: New USB device found, idVendor=05d1, idProduct=2001, bcdDevice= 9.00 [ 662.236075][ T5879] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 662.264725][ T5879] usb 1-1: Product: syz [ 662.278852][ T5879] usb 1-1: Manufacturer: syz [ 662.283588][ T5879] usb 1-1: SerialNumber: syz [ 662.291604][ T5879] usb 1-1: config 0 descriptor?? [ 662.304964][ T5879] ftdi_sio 1-1:0.0: FTDI USB Serial Device converter detected [ 662.319954][ T5879] usb 1-1: Detected FT232H [ 662.511259][ T5879] ftdi_sio ttyUSB0: Unable to read latency timer: -32 [ 662.738508][T13839] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1870'. [ 662.749099][T13839] bridge_slave_1: left allmulticast mode [ 662.755588][T13839] bridge_slave_1: left promiscuous mode [ 662.871839][T13839] bridge0: port 2(bridge_slave_1) entered disabled state [ 662.895937][T13839] bridge_slave_0: left allmulticast mode [ 662.908304][T13839] bridge_slave_0: left promiscuous mode [ 662.919913][T13839] bridge0: port 1(bridge_slave_0) entered disabled state [ 663.255245][T13816] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1867'. [ 663.364804][ T5879] usb 1-1: FTDI USB Serial Device converter now attached to ttyUSB0 [ 663.492495][T11517] usb 1-1: USB disconnect, device number 41 [ 663.525142][T11517] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 663.550339][T11517] ftdi_sio 1-1:0.0: device disconnected [ 663.913523][T13858] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1875'. [ 663.941467][T13858] bridge_slave_1: left allmulticast mode [ 663.954232][T13858] bridge_slave_1: left promiscuous mode [ 663.972005][T13858] bridge0: port 2(bridge_slave_1) entered disabled state [ 663.998235][T13858] bridge_slave_0: left allmulticast mode [ 664.010048][T13858] bridge_slave_0: left promiscuous mode [ 664.024404][T13858] bridge0: port 1(bridge_slave_0) entered disabled state [ 664.115913][T13866] netlink: 172 bytes leftover after parsing attributes in process `syz.0.1877'. [ 664.748381][T13882] netlink: 148 bytes leftover after parsing attributes in process `syz.2.1881'. [ 664.808802][ T30] audit: type=1400 audit(1767421242.241:1029): avc: denied { ioctl } for pid=13881 comm="syz.3.1882" path="socket:[56451]" dev="sockfs" ino=56451 ioctlcmd=0x660b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 665.619353][ T30] audit: type=1400 audit(1767421242.271:1030): avc: denied { getopt } for pid=13877 comm="syz.2.1881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 666.940345][T13906] netlink: 24 bytes leftover after parsing attributes in process `syz.2.1889'. [ 666.976605][T13906] autofs: Unknown parameter '' [ 667.003070][T13911] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 667.014318][T13911] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 667.318841][ T5922] usb 4-1: new high-speed USB device number 49 using dummy_hcd [ 667.521482][ T5922] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 667.545521][ T5922] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 667.556142][T13927] FAULT_INJECTION: forcing a failure. [ 667.556142][T13927] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 667.569469][ T5922] usb 4-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 667.578762][T13927] CPU: 0 UID: 0 PID: 13927 Comm: syz.0.1898 Tainted: G L syzkaller #0 PREEMPT(full) [ 667.578791][T13927] Tainted: [L]=SOFTLOCKUP [ 667.578796][T13927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 667.578804][T13927] Call Trace: [ 667.578810][T13927] [ 667.578817][T13927] dump_stack_lvl+0x16c/0x1f0 [ 667.578842][T13927] should_fail_ex+0x512/0x640 [ 667.578867][T13927] _copy_from_user+0x2e/0xd0 [ 667.578889][T13927] memdup_user+0x6b/0xe0 [ 667.578906][T13927] strndup_user+0x78/0xe0 [ 667.578920][T13927] __x64_sys_mount+0x136/0x310 [ 667.578935][T13927] ? __pfx___x64_sys_mount+0x10/0x10 [ 667.578955][T13927] do_syscall_64+0xcd/0xf80 [ 667.578975][T13927] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 667.578990][T13927] RIP: 0033:0x7f7f2438f749 [ 667.579003][T13927] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 667.579017][T13927] RSP: 002b:00007f7f252e2038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 667.579032][T13927] RAX: ffffffffffffffda RBX: 00007f7f245e5fa0 RCX: 00007f7f2438f749 [ 667.579041][T13927] RDX: 0000200000000040 RSI: 0000200000000000 RDI: 0000000000000000 [ 667.579049][T13927] RBP: 00007f7f252e2090 R08: 0000200000000340 R09: 0000000000000000 [ 667.579058][T13927] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 667.579066][T13927] R13: 00007f7f245e6038 R14: 00007f7f245e5fa0 R15: 00007ffc6dccad98 [ 667.579086][T13927] [ 667.685612][T13932] tipc: Enabling of bearer rejected, failed to enable media [ 667.731071][ T5922] usb 4-1: New USB device found, idVendor=20d6, idProduct=cb17, bcdDevice= 0.00 [ 667.731099][ T5922] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 667.733673][ T5922] usb 4-1: config 0 descriptor?? [ 667.838186][T13933] tipc: Enabling of bearer rejected, failed to enable media [ 668.409516][T13948] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1903'. [ 668.426367][ T5922] hid-udraw 0003:20D6:CB17.0017: unknown main item tag 0x0 [ 668.464165][ T5922] input: THQ uDraw Game Tablet for PS3 Joypad as /devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.0/0003:20D6:CB17.0017/input/input23 [ 668.613648][ T30] audit: type=1400 audit(1767421246.081:1031): avc: denied { read write } for pid=13914 comm="syz.3.1893" name="mice" dev="devtmpfs" ino=916 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 668.652419][ T5922] input: THQ uDraw Game Tablet for PS3 Touchpad as /devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.0/0003:20D6:CB17.0017/input/input24 [ 668.670654][ T5879] usb 1-1: new high-speed USB device number 42 using dummy_hcd [ 668.732094][ T30] audit: type=1400 audit(1767421246.111:1032): avc: denied { open } for pid=13914 comm="syz.3.1893" path="/dev/input/mice" dev="devtmpfs" ino=916 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 668.776590][ T5922] input: THQ uDraw Game Tablet for PS3 Pen as /devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.0/0003:20D6:CB17.0017/input/input25 [ 668.910130][ T5879] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 668.942219][ T5922] input: THQ uDraw Game Tablet for PS3 Accelerometer as /devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.0/0003:20D6:CB17.0017/input/input26 [ 668.962360][ T5879] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 669.018806][ T5879] usb 1-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 669.122181][ T5879] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 669.169728][ T5879] usb 1-1: config 0 descriptor?? [ 669.230322][T13956] Device name cannot be null; rc = [-22] [ 669.694528][ T5922] hid-udraw 0003:20D6:CB17.0017: hidraw0: USB HID v0.00 Device [HID 20d6:cb17] on usb-dummy_hcd.3-1/input0 [ 669.773153][ T5922] usb 4-1: USB disconnect, device number 49 [ 669.858376][T13959] fido_id[13959]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.3/usb4/4-1/report_descriptor': No such file or directory [ 670.187218][ T30] audit: type=1400 audit(1767421247.651:1033): avc: denied { read open } for pid=13964 comm="syz.4.1909" path="/" dev="configfs" ino=1233 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 670.222162][ T5879] keytouch 0003:0926:3333.0018: fixing up Keytouch IEC report descriptor [ 670.298854][ T5879] input: HID 0926:3333 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/0003:0926:3333.0018/input/input27 [ 670.992910][ T5815] usb 5-1: new high-speed USB device number 54 using dummy_hcd [ 672.602374][ T5815] usb 5-1: New USB device found, idVendor=2c42, idProduct=1602, bcdDevice=da.64 [ 672.683924][ T5815] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 672.705277][ T5815] usb 5-1: Product: syz [ 672.712391][ T5879] keytouch 0003:0926:3333.0018: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.0-1/input0 [ 672.733426][ T5815] usb 5-1: Manufacturer: syz [ 672.761477][ T5815] usb 5-1: SerialNumber: syz [ 672.783940][ T5879] usb 1-1: USB disconnect, device number 42 [ 672.810874][ T5815] usb 5-1: config 0 descriptor?? [ 672.848003][ T5815] hub 5-1:0.0: bad descriptor, ignoring hub [ 672.874425][ T5815] hub 5-1:0.0: probe with driver hub failed with error -5 [ 672.877467][T13985] fido_id[13985]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.0/usb1/1-1/report_descriptor': No such file or directory [ 672.917361][ T5815] f81232 5-1:0.0: f81534a converter detected [ 672.948444][T13989] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1915'. [ 672.964704][T13989] veth0_macvtap: left promiscuous mode [ 673.049837][ T5815] f81534a ttyUSB0: f81232_set_register failed status: -71 [ 673.072893][ T5815] f81534a ttyUSB0: probe with driver f81534a failed with error -5 [ 673.116609][ T5815] usb 5-1: USB disconnect, device number 54 [ 673.156219][ T5815] f81232 5-1:0.0: device disconnected [ 673.229803][ T5879] usb 1-1: new high-speed USB device number 43 using dummy_hcd [ 673.246601][ T30] audit: type=1400 audit(1767421250.711:1034): avc: denied { read write } for pid=13997 comm="syz.4.1917" name="cachefiles" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cachefiles_device_t tclass=chr_file permissive=1 [ 673.276566][ T30] audit: type=1400 audit(1767421250.711:1035): avc: denied { open } for pid=13997 comm="syz.4.1917" path="/dev/cachefiles" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cachefiles_device_t tclass=chr_file permissive=1 [ 673.638726][ T5879] usb 1-1: Using ep0 maxpacket: 16 [ 674.136823][ T5879] usb 1-1: New USB device found, idVendor=0db0, idProduct=5581, bcdDevice=f9.22 [ 674.148969][ T5879] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 674.158749][ T5879] usb 1-1: Product: syz [ 674.162992][ T5879] usb 1-1: Manufacturer: syz [ 674.167637][ T5879] usb 1-1: SerialNumber: syz [ 674.770006][ T5879] usb 1-1: dvb_usb_v2: found a 'MSI Mega Sky 55801 DVB-T USB2.0' in warm state [ 674.818612][ T5879] usb 1-1: dvb_usb_v2: will pass the complete MPEG2 transport stream to the software demuxer [ 674.859017][ T5879] dvbdev: DVB: registering new adapter (MSI Mega Sky 55801 DVB-T USB2.0) [ 674.889007][ T5879] usb 1-1: media controller created [ 674.945341][ T5879] dvbdev: dvb_create_media_entity: media entity 'dvb-demux' registered. [ 674.973872][ T30] audit: type=1400 audit(1767421252.431:1036): avc: denied { write } for pid=14017 comm="syz.4.1922" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 675.104029][ T5879] zl10353_read_register: readreg error (reg=127, ret==-71) [ 675.262877][ T5879] dvb_usb_gl861 1-1:157.0: probe with driver dvb_usb_gl861 failed with error -5 [ 675.275980][ T5879] usb 1-1: USB disconnect, device number 43 [ 675.511943][ T30] audit: type=1400 audit(1767421252.981:1037): avc: denied { listen } for pid=14021 comm="syz.0.1924" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 675.976840][ T30] audit: type=1400 audit(1767421253.091:1038): avc: denied { accept } for pid=14021 comm="syz.0.1924" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 676.322846][ T30] audit: type=1400 audit(1767421253.791:1039): avc: denied { read } for pid=14032 comm="syz.0.1927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 676.494791][T14039] vxfs: unable to read disk superblock at 1 [ 676.509083][T14039] vxfs: unable to read disk superblock at 8 [ 676.520912][T14039] vxfs: can't find superblock. [ 676.748756][ T5922] usb 1-1: new high-speed USB device number 44 using dummy_hcd [ 677.078720][ T5922] usb 1-1: Using ep0 maxpacket: 8 [ 677.096448][ T5922] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid maxpacket 56832, setting to 1024 [ 677.135360][ T5922] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 1024 [ 677.170986][ T5922] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 677.213251][ T5922] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 677.271189][ T5922] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1a, bcdDevice=61.23 [ 677.308303][ T5922] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 677.585777][ T5922] usb 1-1: GET_CAPABILITIES returned 0 [ 677.600131][ T5922] usbtmc 1-1:16.0: can't read capabilities [ 677.824495][ C0] usbtmc 1-1:16.0: usbtmc_write_bulk_cb - nonzero write bulk status received: -71 [ 677.855805][T14033] usbtmc 1-1:16.0: Unable to send data, error -71 [ 678.024529][ T30] audit: type=1400 audit(1767421255.481:1040): avc: denied { ioctl } for pid=14059 comm="syz.1.1933" path="socket:[55964]" dev="sockfs" ino=55964 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 678.076557][ T5922] usb 1-1: USB disconnect, device number 44 [ 678.583016][T14080] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1938'. [ 678.670621][T14084] comedi comedi2: comedi_config --init_data is deprecated [ 678.969541][ T30] audit: type=1400 audit(1767421256.441:1041): avc: denied { accept } for pid=14073 comm="syz.1.1938" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 679.103207][ T30] audit: type=1400 audit(1767421256.571:1042): avc: denied { write } for pid=14091 comm="syz.0.1942" name="binder1" dev="binder" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 679.539366][ T5894] usb 5-1: new high-speed USB device number 55 using dummy_hcd [ 679.751418][ T5894] usb 5-1: New USB device found, idVendor=9710, idProduct=7730, bcdDevice=96.33 [ 679.779229][ T5894] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 679.799618][ T5894] usb 5-1: config 0 descriptor?? [ 681.502815][ T5894] usb 5-1: Cannot read MAC address [ 681.503028][ T5894] MOSCHIP usb-ethernet driver 5-1:0.0: probe with driver MOSCHIP usb-ethernet driver failed with error -71 [ 681.527378][ T5894] usb 5-1: USB disconnect, device number 55 [ 682.544590][T14128] Device name cannot be null; rc = [-22] [ 683.087974][T14123] input: syz1 as /devices/virtual/input/input28 [ 683.197038][T14134] IPVS: set_ctl: invalid protocol: 135 172.20.20.170:21 [ 683.217076][T14134] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 683.249830][T14134] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 684.141837][T14134] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 684.150723][T14134] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 684.211995][T14141] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 684.220773][T14141] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 684.288753][T13473] usb 4-1: new full-speed USB device number 50 using dummy_hcd [ 684.527170][T13473] usb 4-1: config 0 interface 0 altsetting 251 endpoint 0x9 has invalid wMaxPacketSize 0 [ 684.553085][T13473] usb 4-1: config 0 interface 0 has no altsetting 0 [ 684.575806][T13473] usb 4-1: New USB device found, idVendor=045e, idProduct=0283, bcdDevice=99.0b [ 684.830144][T13473] usb 4-1: New USB device strings: Mfr=1, Product=228, SerialNumber=2 [ 684.846555][T13473] usb 4-1: Product: syz [ 684.850918][T13473] usb 4-1: Manufacturer: syz [ 684.855583][T13473] usb 4-1: SerialNumber: syz [ 684.940032][T13473] usb 4-1: config 0 descriptor?? [ 684.979677][T13473] usb 4-1: selecting invalid altsetting 0 [ 685.237426][T14151] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1960'. [ 685.429996][ T30] audit: type=1400 audit(1767421262.891:1043): avc: denied { ioctl } for pid=14139 comm="syz.3.1958" path="socket:[56044]" dev="sockfs" ino=56044 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 685.538625][ T1293] ieee802154 phy0 wpan0: encryption failed: -22 [ 685.548902][ T1293] ieee802154 phy1 wpan1: encryption failed: -22 [ 686.084859][T14170] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1964'. [ 686.231290][ T30] audit: type=1400 audit(1767421263.691:1044): avc: denied { read } for pid=14172 comm="syz.1.1966" name="snapshot" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 686.272011][ T30] audit: type=1400 audit(1767421263.701:1045): avc: denied { open } for pid=14172 comm="syz.1.1966" path="/dev/snapshot" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 686.564865][ T30] audit: type=1400 audit(1767421264.031:1046): avc: denied { bind } for pid=14179 comm="syz.1.1970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 687.779649][ T24] usb 4-1: USB disconnect, device number 50 [ 688.065253][T14196] Device name cannot be null; rc = [-22] [ 688.509108][ T30] audit: type=1400 audit(1767421265.981:1047): avc: denied { read } for pid=14198 comm="syz.0.1974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 688.547338][T14201] dlm: Unknown command passed to DLM device : 33 [ 688.547338][T14201] [ 689.962270][T14211] infiniband syz2: set down [ 689.966862][T14211] infiniband syz2: added ipvlan0 [ 690.545735][T14211] RDS/IB: syz2: added [ 690.550006][T14211] smc: adding ib device syz2 with port count 1 [ 690.559207][T14211] smc: ib device syz2 port 1 has pnetid SYZ0 (user defined) [ 693.000605][T14218] syz.4.1977 (14218): drop_caches: 2 [ 693.152429][T14226] kvm: requested 5028 ns i8254 timer period limited to 200000 ns [ 694.396828][T14254] netlink: 'syz.1.1987': attribute type 9 has an invalid length. [ 694.406940][T14254] netlink: 'syz.1.1987': attribute type 11 has an invalid length. [ 694.416827][T14254] netlink: 'syz.1.1987': attribute type 12 has an invalid length. [ 694.435400][T14254] netlink: 210020 bytes leftover after parsing attributes in process `syz.1.1987'. [ 694.446721][ T30] audit: type=1400 audit(1767421271.911:1048): avc: denied { setopt } for pid=14255 comm="syz.3.1986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 695.236518][ T30] audit: type=1400 audit(1767421272.701:1049): avc: denied { create } for pid=14261 comm="syz.1.1989" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 695.284996][ T30] audit: type=1400 audit(1767421272.751:1050): avc: denied { write } for pid=14261 comm="syz.1.1989" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 695.322270][T14268] netlink: 'syz.1.1989': attribute type 1 has an invalid length. [ 695.349718][ T30] audit: type=1400 audit(1767421272.801:1051): avc: denied { mounton } for pid=14261 comm="syz.1.1989" path="/proc/560/cgroup" dev="proc" ino=57410 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 695.400837][T14268] netlink: 288 bytes leftover after parsing attributes in process `syz.1.1989'. [ 695.429533][ T30] audit: type=1400 audit(1767421272.811:1052): avc: denied { remount } for pid=14261 comm="syz.1.1989" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 695.636538][ T30] audit: type=1400 audit(1767421272.971:1053): avc: denied { map } for pid=14261 comm="syz.1.1989" path="/dev/nullb0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 695.776893][ T30] audit: type=1400 audit(1767421272.971:1054): avc: denied { read write execute } for pid=14261 comm="syz.1.1989" path="/dev/nullb0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 695.920884][ T30] audit: type=1400 audit(1767421272.991:1055): avc: denied { execmem } for pid=14273 comm="syz.2.1991" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 696.044483][ T30] audit: type=1400 audit(1767421273.371:1056): avc: denied { prog_load } for pid=14277 comm="syz.2.1992" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 696.098066][ T30] audit: type=1400 audit(1767421273.371:1057): avc: denied { bpf } for pid=14277 comm="syz.2.1992" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 697.630233][T14289] netlink: 96 bytes leftover after parsing attributes in process `syz.0.1995'. [ 698.275768][T14293] netlink: 'syz.4.1997': attribute type 12 has an invalid length. [ 698.318751][T14292] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=14292 comm=syz.3.1996 [ 698.369734][T14292] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=14292 comm=syz.3.1996 [ 698.416872][T14293] netlink: 20 bytes leftover after parsing attributes in process `syz.4.1997'. [ 698.427331][T14292] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=14292 comm=syz.3.1996 [ 700.015472][ T30] kauditd_printk_skb: 38 callbacks suppressed [ 700.015489][ T30] audit: type=1400 audit(1767421277.481:1096): avc: denied { ioctl } for pid=14309 comm="syz.3.2002" path="socket:[57181]" dev="sockfs" ino=57181 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 700.170760][ T30] audit: type=1400 audit(1767421277.641:1097): avc: denied { create } for pid=14315 comm="syz.3.2005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 700.255260][T14318] overlayfs: failed to resolve './file0': -2 [ 700.279496][ T30] audit: type=1400 audit(1767421277.681:1098): avc: denied { connect } for pid=14315 comm="syz.3.2005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 700.325747][ T30] audit: type=1400 audit(1767421277.721:1099): avc: denied { mounton } for pid=14317 comm="syz.4.2004" path="/132/bus" dev="tmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 700.378813][ T30] audit: type=1404 audit(1767421277.821:1100): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 700.414843][ T30] audit: type=1400 audit(1767421277.841:1101): avc: denied { create } for pid=14319 comm="syz.0.2006" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 700.597912][ T30] audit: type=1400 audit(1767421277.981:1102): avc: denied { create } for pid=14317 comm="syz.4.2004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 700.649966][ T30] audit: type=1400 audit(1767421277.981:1103): avc: denied { create } for pid=14317 comm="syz.4.2004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 700.708766][ T30] audit: type=1400 audit(1767421277.981:1104): avc: denied { create } for pid=14319 comm="syz.0.2006" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 700.757465][ T30] audit: type=1400 audit(1767421277.981:1105): avc: denied { allowed } for pid=14319 comm="syz.0.2006" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 700.820882][T14330] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 701.358262][T14348] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2012'. [ 701.533419][T14351] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2015'. [ 702.114069][T14366] netlink: 96 bytes leftover after parsing attributes in process `syz.2.2020'. [ 703.277594][T14400] syzkaller0: entered promiscuous mode [ 703.288297][T14400] syzkaller0: entered allmulticast mode [ 705.042033][ T30] kauditd_printk_skb: 174 callbacks suppressed [ 705.042044][ T30] audit: type=1400 audit(1767421282.511:1280): avc: denied { read write } for pid=11410 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 705.127942][ T30] audit: type=1400 audit(1767421282.591:1281): avc: denied { name_bind } for pid=14435 comm="syz.1.2048" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 705.179984][ T30] audit: type=1400 audit(1767421282.621:1282): avc: denied { create } for pid=14435 comm="syz.1.2048" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=0 [ 705.237776][ T30] audit: type=1400 audit(1767421282.621:1283): avc: denied { prog_load } for pid=14435 comm="syz.1.2048" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 705.298992][ T30] audit: type=1400 audit(1767421282.661:1284): avc: denied { create } for pid=14437 comm="syz.2.2049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 705.345693][T14442] audit: audit_backlog=65 > audit_backlog_limit=64 [ 705.356571][T14443] audit: audit_backlog=65 > audit_backlog_limit=64 [ 705.364331][T14442] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 705.372953][ T30] audit: type=1400 audit(1767421282.691:1285): avc: denied { create } for pid=14437 comm="syz.2.2049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 705.408192][T14442] audit: backlog limit exceeded [ 705.608078][T14453] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2053'. [ 705.678623][T14456] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2054'. [ 705.890552][T14459] kAFS: unable to lookup cell '(' [ 705.921863][T14459] kAFS: unable to lookup cell '(,c¾ûL' [ 707.204301][T14482] FAULT_INJECTION: forcing a failure. [ 707.204301][T14482] name failslab, interval 1, probability 0, space 0, times 0 [ 707.217355][T14482] CPU: 0 UID: 0 PID: 14482 Comm: syz.1.2064 Tainted: G L syzkaller #0 PREEMPT(full) [ 707.217377][T14482] Tainted: [L]=SOFTLOCKUP [ 707.217381][T14482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 707.217388][T14482] Call Trace: [ 707.217393][T14482] [ 707.217398][T14482] dump_stack_lvl+0x16c/0x1f0 [ 707.217418][T14482] should_fail_ex+0x512/0x640 [ 707.217439][T14482] should_failslab+0xc2/0x120 [ 707.217456][T14482] __kmalloc_cache_noprof+0x80/0x800 [ 707.217475][T14482] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 707.217492][T14482] ? sel_netport_sid+0x632/0xbc0 [ 707.217508][T14482] ? sel_netport_sid+0x632/0xbc0 [ 707.217520][T14482] sel_netport_sid+0x632/0xbc0 [ 707.217543][T14482] selinux_socket_connect_helper.isra.0+0x354/0x510 [ 707.217568][T14482] ? __pfx_selinux_socket_connect_helper.isra.0+0x10/0x10 [ 707.217591][T14482] ? get_pid_task+0x106/0x250 [ 707.217611][T14482] ? tomoyo_socket_connect_permission+0x14f/0x360 [ 707.217632][T14482] ? __might_fault+0xe3/0x190 [ 707.217650][T14482] ? __might_fault+0x13b/0x190 [ 707.217662][T14482] selinux_socket_connect+0x45/0x80 [ 707.217675][T14482] security_socket_connect+0xc6/0x240 [ 707.217690][T14482] __sys_connect_file+0x8f/0x1a0 [ 707.217709][T14482] __sys_connect+0x13b/0x160 [ 707.217725][T14482] ? __pfx___sys_connect+0x10/0x10 [ 707.217747][T14482] ? __pfx_ksys_write+0x10/0x10 [ 707.217765][T14482] __x64_sys_connect+0x72/0xb0 [ 707.217781][T14482] ? lockdep_hardirqs_on+0x7c/0x110 [ 707.217796][T14482] do_syscall_64+0xcd/0xf80 [ 707.217811][T14482] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 707.217823][T14482] RIP: 0033:0x7f805738f749 [ 707.217834][T14482] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 707.217846][T14482] RSP: 002b:00007f80582e8038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 707.217858][T14482] RAX: ffffffffffffffda RBX: 00007f80575e5fa0 RCX: 00007f805738f749 [ 707.217865][T14482] RDX: 000000000000001c RSI: 0000200000000000 RDI: 0000000000000006 [ 707.217872][T14482] RBP: 00007f80582e8090 R08: 0000000000000000 R09: 0000000000000000 [ 707.217878][T14482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 707.217885][T14482] R13: 00007f80575e6038 R14: 00007f80575e5fa0 R15: 00007fff3bdbb738 [ 707.217901][T14482] [ 708.748641][T14533] gretap0: entered promiscuous mode [ 708.863928][T14538] netlink: 96 bytes leftover after parsing attributes in process `syz.4.2084'. [ 709.899064][T14569] FAULT_INJECTION: forcing a failure. [ 709.899064][T14569] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 709.992223][T14569] CPU: 0 UID: 0 PID: 14569 Comm: syz.3.2096 Tainted: G L syzkaller #0 PREEMPT(full) [ 709.992255][T14569] Tainted: [L]=SOFTLOCKUP [ 709.992261][T14569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 709.992271][T14569] Call Trace: [ 709.992277][T14569] [ 709.992284][T14569] dump_stack_lvl+0x16c/0x1f0 [ 709.992311][T14569] should_fail_ex+0x512/0x640 [ 709.992341][T14569] _copy_to_user+0x32/0xd0 [ 709.992368][T14569] simple_read_from_buffer+0xcb/0x170 [ 709.992393][T14569] proc_fail_nth_read+0x197/0x240 [ 709.992413][T14569] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 709.992433][T14569] ? rw_verify_area+0xcf/0x6c0 [ 709.992455][T14569] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 709.992470][T14569] vfs_read+0x1e4/0xcf0 [ 709.992489][T14569] ? __pfx___mutex_lock+0x10/0x10 [ 709.992511][T14569] ? __pfx_vfs_read+0x10/0x10 [ 709.992556][T14569] ? __fget_files+0x20e/0x3c0 [ 709.992585][T14569] ksys_read+0x12a/0x250 [ 709.992606][T14569] ? __pfx_ksys_read+0x10/0x10 [ 709.992631][T14569] do_syscall_64+0xcd/0xf80 [ 709.992654][T14569] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 709.992672][T14569] RIP: 0033:0x7ffb48f8e15c [ 709.992686][T14569] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 709.992703][T14569] RSP: 002b:00007ffb49d93030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 709.992721][T14569] RAX: ffffffffffffffda RBX: 00007ffb491e5fa0 RCX: 00007ffb48f8e15c [ 709.992732][T14569] RDX: 000000000000000f RSI: 00007ffb49d930a0 RDI: 0000000000000003 [ 709.992742][T14569] RBP: 00007ffb49d93090 R08: 0000000000000000 R09: 0000000000000000 [ 709.992752][T14569] R10: 000000000000002a R11: 0000000000000246 R12: 0000000000000001 [ 709.992762][T14569] R13: 00007ffb491e6038 R14: 00007ffb491e5fa0 R15: 00007ffd6dd02798 [ 709.992786][T14569] [ 710.184319][ T30] kauditd_printk_skb: 267 callbacks suppressed [ 710.184331][ T30] audit: type=1400 audit(1767421287.471:1551): avc: denied { create } for pid=14565 comm="syz.2.2095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 710.282675][ T30] audit: type=1400 audit(1767421287.751:1552): avc: denied { prog_load } for pid=14565 comm="syz.2.2095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 710.302583][T14572] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2095'. [ 710.397062][ T30] audit: type=1400 audit(1767421287.861:1553): avc: denied { read write } for pid=11165 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 710.488830][ T30] audit: type=1400 audit(1767421287.951:1554): avc: denied { create } for pid=14573 comm="syz.3.2099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 710.529960][ T30] audit: type=1400 audit(1767421287.991:1555): avc: denied { read write } for pid=11410 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 710.599081][ T30] audit: type=1400 audit(1767421288.061:1556): avc: denied { read } for pid=14575 comm="syz.1.2100" name="ppp" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=0 [ 710.763481][ T30] audit: type=1400 audit(1767421288.101:1557): avc: denied { read write } for pid=11296 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 710.851625][ T30] audit: type=1400 audit(1767421288.131:1558): avc: denied { read write } for pid=11165 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 710.949735][ T30] audit: type=1400 audit(1767421288.181:1559): avc: denied { read write } for pid=14575 comm="syz.1.2100" name="radio0" dev="devtmpfs" ino=955 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 [ 711.047213][ T30] audit: type=1400 audit(1767421288.181:1560): avc: denied { create } for pid=14575 comm="syz.1.2100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 712.541039][T14607] netlink: 'syz.0.2110': attribute type 10 has an invalid length. [ 712.578971][T14607] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 712.623969][T14612] netlink: 40 bytes leftover after parsing attributes in process `syz.3.2111'. [ 713.412884][T14633] sp0: Synchronizing with TNC [ 713.710521][T14631] [U] è` [ 713.986338][T14647] netlink: 76 bytes leftover after parsing attributes in process `syz.4.2122'. [ 714.600997][T14665] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2127'. [ 715.255850][ T30] kauditd_printk_skb: 149 callbacks suppressed [ 715.255866][ T30] audit: type=1400 audit(1767421292.721:1710): avc: denied { read write } for pid=14669 comm="syz.3.2129" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 715.370886][ T30] audit: type=1400 audit(1767421292.811:1711): avc: denied { create } for pid=14669 comm="syz.3.2129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 715.453970][ T30] audit: type=1400 audit(1767421292.811:1712): avc: denied { read } for pid=14669 comm="syz.3.2129" name="iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 715.945955][ T30] audit: type=1400 audit(1767421293.411:1713): avc: denied { read write } for pid=11165 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 716.040717][ T30] audit: type=1400 audit(1767421293.501:1714): avc: denied { create } for pid=14671 comm="syz.2.2130" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 716.157908][ T30] audit: type=1400 audit(1767421293.501:1715): avc: denied { allowed } for pid=14671 comm="syz.2.2130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 716.297803][ T30] audit: type=1400 audit(1767421293.671:1716): avc: denied { prog_load } for pid=14672 comm="syz.3.2131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 716.405334][ T30] audit: type=1400 audit(1767421293.671:1717): avc: denied { prog_load } for pid=14672 comm="syz.3.2131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 716.516329][ T30] audit: type=1400 audit(1767421293.711:1718): avc: denied { create } for pid=14677 comm="syz.2.2132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 716.623362][ T30] audit: type=1400 audit(1767421293.761:1719): avc: denied { prog_load } for pid=14672 comm="syz.3.2131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 716.944546][T14690] trusted_key: encrypted_key: master key parameter 'trusted:' is invalid [ 718.869876][T14739] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2153'. [ 720.135367][T14768] netdevsim netdevsim2 netdevsim0: entered promiscuous mode [ 720.244375][T14770] xt_bpf: check failed: parse error [ 720.263414][ T30] kauditd_printk_skb: 139 callbacks suppressed [ 720.263429][ T30] audit: type=1400 audit(1767421297.731:1859): avc: denied { read write } for pid=11165 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 720.332947][ T30] audit: type=1400 audit(1767421297.771:1860): avc: denied { create } for pid=14780 comm="syz.3.2167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 720.377465][ T30] audit: type=1400 audit(1767421297.771:1861): avc: denied { read write } for pid=14780 comm="syz.3.2167" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 720.406515][ T30] audit: type=1400 audit(1767421297.791:1862): avc: denied { read write } for pid=11165 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 720.434654][ T30] audit: type=1400 audit(1767421297.821:1863): avc: denied { prog_load } for pid=14782 comm="syz.3.2168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 720.456655][ T30] audit: type=1400 audit(1767421297.831:1864): avc: denied { read write } for pid=11165 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 720.482788][ T30] audit: type=1400 audit(1767421297.871:1865): avc: denied { create } for pid=14776 comm="syz.2.2166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 720.502751][ T30] audit: type=1400 audit(1767421297.871:1866): avc: denied { create } for pid=14776 comm="syz.2.2166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 720.527229][ T30] audit: type=1400 audit(1767421297.871:1867): avc: denied { create } for pid=14776 comm="syz.2.2166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 720.548590][ T30] audit: type=1400 audit(1767421297.871:1868): avc: denied { read write } for pid=14785 comm="syz.3.2169" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 722.525428][T14813] trusted_key: encrypted_key: keyword 'new' not allowed when called from .update method [ 722.986719][T14841] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2185'. [ 723.069037][T14844] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=58394 sclass=netlink_route_socket pid=14844 comm=syz.0.2186 [ 723.736767][T14860] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2194'. [ 724.146352][T14870] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2197'. [ 724.182140][T14870] veth1_macvtap: left promiscuous mode [ 725.269541][ T30] kauditd_printk_skb: 165 callbacks suppressed [ 725.269558][ T30] audit: type=1400 audit(1767421302.741:2034): avc: denied { create } for pid=14896 comm="syz.4.2206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 725.371893][ T30] audit: type=1400 audit(1767421302.801:2035): avc: denied { read } for pid=14896 comm="syz.4.2206" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 725.443586][ T30] audit: type=1400 audit(1767421302.801:2036): avc: denied { create } for pid=14896 comm="syz.4.2206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 725.534110][ T30] audit: type=1400 audit(1767421302.811:2037): avc: denied { prog_load } for pid=14896 comm="syz.4.2206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 725.648108][ T30] audit: type=1400 audit(1767421302.871:2038): avc: denied { read write } for pid=11296 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 725.740788][ T30] audit: type=1400 audit(1767421302.931:2039): avc: denied { read write } for pid=14898 comm="syz.4.2207" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 725.821307][ T30] audit: type=1400 audit(1767421302.951:2040): avc: denied { execmem } for pid=14898 comm="syz.4.2207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 725.821441][T14903] netlink: 96 bytes leftover after parsing attributes in process `syz.2.2208'. [ 725.868826][ T30] audit: type=1400 audit(1767421303.091:2041): avc: denied { read } for pid=14898 comm="syz.4.2207" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 726.008883][ T30] audit: type=1400 audit(1767421303.101:2042): avc: denied { create } for pid=14898 comm="syz.4.2207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 726.031286][ T30] audit: type=1400 audit(1767421303.171:2043): avc: denied { prog_load } for pid=14901 comm="syz.2.2208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 727.274095][T14932] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2213'. [ 727.289609][T14932] netlink: 'syz.1.2213': attribute type 5 has an invalid length. [ 727.357784][T14932] netlink: 48 bytes leftover after parsing attributes in process `syz.1.2213'. [ 727.577965][T14932] geneve3: entered promiscuous mode [ 727.598562][T14932] geneve3: entered allmulticast mode [ 729.805775][T14977] netlink: 20 bytes leftover after parsing attributes in process `syz.2.2231'. [ 730.297692][ T30] kauditd_printk_skb: 114 callbacks suppressed [ 730.297705][ T30] audit: type=1400 audit(1767421307.761:2158): avc: denied { read write } for pid=14978 comm="syz.4.2232" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 730.384451][ T30] audit: type=1400 audit(1767421307.801:2159): avc: denied { mounton } for pid=14978 comm="syz.4.2232" path="/180/file0" dev="tmpfs" ino=967 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 730.458439][ T30] audit: type=1400 audit(1767421307.831:2160): avc: denied { execmem } for pid=14978 comm="syz.4.2232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 730.650087][ T30] audit: type=1400 audit(1767421308.121:2161): avc: denied { prog_load } for pid=14981 comm="syz.2.2233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 730.718793][ T30] audit: type=1400 audit(1767421308.141:2162): avc: denied { create } for pid=14981 comm="syz.2.2233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 730.819441][ T30] audit: type=1400 audit(1767421308.291:2163): avc: denied { create } for pid=14983 comm="syz.0.2235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 730.888799][ T30] audit: type=1400 audit(1767421308.311:2164): avc: denied { write } for pid=14983 comm="syz.0.2235" name="rtc0" dev="devtmpfs" ino=921 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=0 [ 730.943755][ T30] audit: type=1400 audit(1767421308.361:2165): avc: denied { prog_load } for pid=14985 comm="syz.0.2236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 730.998335][ T30] audit: type=1400 audit(1767421308.381:2166): avc: denied { prog_load } for pid=14985 comm="syz.0.2236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 731.040527][ T30] audit: type=1400 audit(1767421308.401:2167): avc: denied { execmem } for pid=14985 comm="syz.0.2236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 732.252329][T15011] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2243'. [ 732.292813][T15011] netlink: 'syz.2.2243': attribute type 5 has an invalid length. [ 732.315521][T15011] netlink: 48 bytes leftover after parsing attributes in process `syz.2.2243'. [ 732.358251][T15011] geneve2: entered promiscuous mode [ 732.387738][T15011] geneve2: entered allmulticast mode [ 732.830408][T15032] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2249'. [ 734.287496][T15061] netlink: 'syz.1.2260': attribute type 4 has an invalid length. [ 734.396806][T15063] netlink: 'syz.1.2260': attribute type 4 has an invalid length. [ 734.789503][T15068] libceph: resolve '0' (ret=-3): failed [ 735.981890][ T30] kauditd_printk_skb: 140 callbacks suppressed [ 735.981905][ T30] audit: type=1400 audit(1767421313.451:2308): avc: denied { read write } for pid=11165 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 736.102005][ T30] audit: type=1400 audit(1767421313.571:2309): avc: denied { allowed } for pid=15082 comm="syz.3.2268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 736.182385][ T30] audit: type=1400 audit(1767421313.651:2310): avc: denied { create } for pid=15084 comm="syz.2.2269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 736.230596][ T30] audit: type=1400 audit(1767421313.701:2311): avc: denied { create } for pid=15084 comm="syz.2.2269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 736.273854][ T30] audit: type=1400 audit(1767421313.721:2312): avc: denied { create } for pid=15084 comm="syz.2.2269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 736.316355][ T30] audit: type=1400 audit(1767421313.781:2313): avc: denied { prog_load } for pid=15084 comm="syz.2.2269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 736.387269][ T30] audit: type=1400 audit(1767421313.851:2314): avc: denied { create } for pid=15087 comm="syz.2.2270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 736.424905][ T30] audit: type=1400 audit(1767421313.881:2315): avc: denied { create } for pid=15087 comm="syz.2.2270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 736.451507][ T30] audit: type=1400 audit(1767421313.881:2316): avc: denied { create } for pid=15087 comm="syz.2.2270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=0 [ 736.504498][ T30] audit: type=1400 audit(1767421313.921:2317): avc: denied { create } for pid=15089 comm="syz.2.2271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 738.120209][T15126] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2284'. [ 738.861376][T15156] netlink: 96 bytes leftover after parsing attributes in process `syz.0.2296'. [ 739.751545][T15169] bridge0: entered allmulticast mode [ 739.792040][T15167] netlink: 'syz.1.2300': attribute type 5 has an invalid length. [ 741.036432][ T30] kauditd_printk_skb: 140 callbacks suppressed [ 741.036443][ T30] audit: type=1400 audit(1767421318.501:2458): avc: denied { read write } for pid=11410 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 741.176860][ T30] audit: type=1400 audit(1767421318.641:2459): avc: denied { prog_load } for pid=15190 comm="syz.1.2309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 741.271457][ T30] audit: type=1400 audit(1767421318.711:2460): avc: denied { map_create } for pid=15190 comm="syz.1.2309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 741.391573][ T30] audit: type=1400 audit(1767421318.711:2461): avc: denied { map_create } for pid=15190 comm="syz.1.2309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 741.458897][ T30] audit: type=1400 audit(1767421318.711:2462): avc: denied { execmem } for pid=15190 comm="syz.1.2309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 741.512346][T15202] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15202 comm=syz.3.2313 [ 741.556041][ T30] audit: type=1400 audit(1767421318.721:2463): avc: denied { execmem } for pid=15190 comm="syz.1.2309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 741.627603][ T30] audit: type=1400 audit(1767421318.731:2464): avc: denied { read } for pid=15190 comm="syz.1.2309" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 741.676295][ T30] audit: type=1400 audit(1767421318.731:2465): avc: denied { allowed } for pid=15190 comm="syz.1.2309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 741.758370][ T30] audit: type=1400 audit(1767421318.781:2466): avc: denied { create } for pid=15191 comm="syz.0.2310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 741.812964][ T30] audit: type=1400 audit(1767421318.781:2467): avc: denied { read write } for pid=15191 comm="syz.0.2310" name="sg0" dev="devtmpfs" ino=773 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=0 [ 741.892374][T15213] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 741.912297][T15213] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 741.974267][T15213] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 741.987555][T15213] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 743.353085][T15240] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2323'. [ 745.305536][T15272] netlink: 'syz.0.2331': attribute type 10 has an invalid length. [ 745.361711][T15272] netlink: 40 bytes leftover after parsing attributes in process `syz.0.2331'. [ 745.458864][T15272] batman_adv: batadv0: Adding interface: virt_wifi0 [ 745.493016][T15272] batman_adv: batadv0: The MTU of interface virt_wifi0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 745.594371][T15272] batman_adv: batadv0: Interface activated: virt_wifi0 [ 746.125875][ T30] kauditd_printk_skb: 145 callbacks suppressed [ 746.125892][ T30] audit: type=1400 audit(1767421323.591:2613): avc: denied { read write } for pid=11410 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 746.275448][ T30] audit: type=1400 audit(1767421323.741:2614): avc: denied { read write } for pid=11296 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 746.423992][ T30] audit: type=1400 audit(1767421323.791:2615): avc: denied { create } for pid=15285 comm="syz.1.2339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 746.540884][ T30] audit: type=1400 audit(1767421323.861:2616): avc: denied { module_request } for pid=15285 comm="syz.1.2339" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 746.635148][T15286] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2339'. [ 746.684654][ T30] audit: type=1400 audit(1767421323.861:2617): avc: denied { sys_module } for pid=15285 comm="syz.1.2339" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 746.785313][ T30] audit: type=1400 audit(1767421323.881:2618): avc: denied { read } for pid=15289 comm="syz.4.2340" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 746.908709][ T30] audit: type=1400 audit(1767421324.061:2619): avc: denied { read write } for pid=11165 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 746.972335][ T1293] ieee802154 phy0 wpan0: encryption failed: -22 [ 746.991381][ T1293] ieee802154 phy1 wpan1: encryption failed: -22 [ 747.090097][ T30] audit: type=1400 audit(1767421324.061:2620): avc: denied { create } for pid=15285 comm="syz.1.2339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 747.188779][ T30] audit: type=1400 audit(1767421324.081:2621): avc: denied { read } for pid=15289 comm="syz.4.2340" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 747.288954][ T30] audit: type=1400 audit(1767421324.101:2622): avc: denied { create } for pid=15285 comm="syz.1.2339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 747.561489][T15308] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2348'. [ 747.864638][T15313] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15313 comm=syz.3.2349 [ 748.434066][T14191] libceph: connect (1)[c::]:6789 error -101 [ 748.460523][T14191] libceph: mon0 (1)[c::]:6789 connect error [ 748.496327][T15329] ceph: No mds server is up or the cluster is laggy [ 749.247508][T15362] FAULT_INJECTION: forcing a failure. [ 749.247508][T15362] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 749.343092][T15362] CPU: 0 UID: 0 PID: 15362 Comm: syz.4.2366 Tainted: G L syzkaller #0 PREEMPT(full) [ 749.343116][T15362] Tainted: [L]=SOFTLOCKUP [ 749.343120][T15362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 749.343126][T15362] Call Trace: [ 749.343130][T15362] [ 749.343135][T15362] dump_stack_lvl+0x16c/0x1f0 [ 749.343153][T15362] should_fail_ex+0x512/0x640 [ 749.343172][T15362] copy_fpstate_to_sigframe+0x827/0xad0 [ 749.343189][T15362] ? do_raw_spin_lock+0x12c/0x2b0 [ 749.343205][T15362] ? __pfx_copy_fpstate_to_sigframe+0x10/0x10 [ 749.343224][T15362] ? irqentry_exit+0x1dd/0x8c0 [ 749.343239][T15362] ? lockdep_hardirqs_on+0x7c/0x110 [ 749.343251][T15362] ? x86_task_fpu+0x5f/0x90 [ 749.343266][T15362] get_sigframe+0x4a8/0x9c0 [ 749.343282][T15362] ? __pfx_get_sigframe+0x10/0x10 [ 749.343295][T15362] ? trace_irq_enable.constprop.0+0x2f/0x110 [ 749.343310][T15362] ? _raw_spin_unlock_irq+0x29/0x50 [ 749.343325][T15362] ? siginfo_layout+0x177/0x290 [ 749.343342][T15362] x64_setup_rt_frame+0x129/0xcf0 [ 749.343359][T15362] ? __pfx_x64_setup_rt_frame+0x10/0x10 [ 749.343374][T15362] ? __mutex_unlock_slowpath+0x161/0x790 [ 749.343390][T15362] arch_do_signal_or_restart+0x5da/0x7e0 [ 749.343404][T15362] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 749.343422][T15362] ? fput+0x70/0xf0 [ 749.343435][T15362] exit_to_user_mode_loop+0x8c/0x540 [ 749.343452][T15362] do_syscall_64+0x4ee/0xf80 [ 749.343467][T15362] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 749.343478][T15362] RIP: 0033:0x7f3a4e58e1ff [ 749.343492][T15362] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 749.343502][T15362] RSP: 002b:00007f3a4f369030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 749.343512][T15362] RAX: 0000000000000001 RBX: 0000000000000004 RCX: 00007f3a4e58e1ff [ 749.343518][T15362] RDX: 0000000000000001 RSI: 00007f3a4f369090 RDI: 0000000000000004 [ 749.343524][T15362] RBP: 00007f3a4f369090 R08: 0000000000000000 R09: 00007f3a4f368df7 [ 749.343531][T15362] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 749.343536][T15362] R13: 00007f3a4e7e6038 R14: 00007f3a4e7e5fa0 R15: 00007ffe73290458 [ 749.343550][T15362] [ 750.503437][T15388] netlink: 96 bytes leftover after parsing attributes in process `syz.4.2377'. [ 751.274787][ T30] kauditd_printk_skb: 221 callbacks suppressed [ 751.274803][ T30] audit: type=1400 audit(1767421328.741:2844): avc: denied { read write } for pid=11296 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 751.362800][ T30] audit: type=1400 audit(1767421328.801:2845): avc: denied { read } for pid=15400 comm="syz.4.2382" dev="nsfs" ino=4026532866 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 751.418822][ T30] audit: type=1400 audit(1767421328.881:2846): avc: denied { read write } for pid=11296 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 751.478750][ T30] audit: type=1400 audit(1767421328.891:2847): avc: denied { mounton } for pid=15402 comm="syz.4.2383" path="/syzcgroup/unified/syz4" dev="cgroup2" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=0 [ 751.566725][ T30] audit: type=1400 audit(1767421329.031:2848): avc: denied { read } for pid=15406 comm="syz.0.2384" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 751.672048][ T30] audit: type=1400 audit(1767421329.031:2849): avc: denied { read write } for pid=11296 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 751.769061][ T30] audit: type=1400 audit(1767421329.111:2850): avc: denied { read write } for pid=15408 comm="syz.4.2385" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 751.882183][ T30] audit: type=1400 audit(1767421329.121:2851): avc: denied { prog_load } for pid=15408 comm="syz.4.2385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 751.914040][ T30] audit: type=1400 audit(1767421329.131:2852): avc: denied { read } for pid=15406 comm="syz.0.2384" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 751.978991][ T30] audit: type=1400 audit(1767421329.131:2853): avc: denied { prog_load } for pid=15406 comm="syz.0.2384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 752.811776][T14191] IPVS: starting estimator thread 0... [ 752.919255][T15452] IPVS: using max 79 ests per chain, 189600 per kthread [ 755.015418][T15496] netlink: 96 bytes leftover after parsing attributes in process `syz.4.2413'. [ 755.950783][T15515] netlink: 24 bytes leftover after parsing attributes in process `syz.4.2423'. [ 755.993851][T15515] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2423'. [ 756.535531][ T30] kauditd_printk_skb: 238 callbacks suppressed [ 756.535542][ T30] audit: type=1400 audit(1767421334.001:3092): avc: denied { read write } for pid=11296 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 756.598228][ T30] audit: type=1400 audit(1767421334.061:3093): avc: denied { read } for pid=15531 comm="syz.4.2430" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 756.626347][ T30] audit: type=1400 audit(1767421334.091:3094): avc: denied { allowed } for pid=15531 comm="syz.4.2430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 756.647111][ T30] audit: type=1400 audit(1767421334.091:3095): avc: denied { prog_load } for pid=15531 comm="syz.4.2430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 756.688348][ T30] audit: type=1400 audit(1767421334.151:3096): avc: denied { read write } for pid=11410 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 756.718284][ T30] audit: type=1400 audit(1767421334.181:3097): avc: denied { read write } for pid=11296 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 756.756551][ T30] audit: type=1400 audit(1767421334.221:3098): avc: denied { read write } for pid=15533 comm="syz.1.2431" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 756.786716][ T30] audit: type=1400 audit(1767421334.221:3099): avc: denied { prog_load } for pid=15533 comm="syz.1.2431" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 756.808470][ T30] audit: type=1326 audit(1767421334.221:3100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15533 comm="syz.1.2431" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f805738f749 code=0x7ffc0000 [ 756.833498][ T30] audit: type=1326 audit(1767421334.221:3101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15533 comm="syz.1.2431" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f805738f749 code=0x7ffc0000 [ 758.650598][ T12] wlan1: Trigger new scan to find an IBSS to join [ 759.400435][T15571] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 759.649255][T15578] netlink: 96 bytes leftover after parsing attributes in process `syz.2.2447'. [ 760.145330][T15599] netlink: 'syz.4.2454': attribute type 12 has an invalid length. [ 761.293635][T15624] netlink: 140 bytes leftover after parsing attributes in process `syz.2.2463'. [ 761.608793][ T6045] wlan1: Trigger new scan to find an IBSS to join [ 761.634212][ T30] kauditd_printk_skb: 241 callbacks suppressed [ 761.634225][ T30] audit: type=1400 audit(1767421339.101:3343): avc: denied { read write } for pid=11165 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 761.747316][ T30] audit: type=1400 audit(1767421339.211:3344): avc: denied { prog_load } for pid=15627 comm="syz.3.2465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 761.802959][ T30] audit: type=1400 audit(1767421339.211:3345): avc: denied { prog_load } for pid=15627 comm="syz.3.2465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 761.843122][T15630] netlink: 96 bytes leftover after parsing attributes in process `syz.3.2465'. [ 761.867605][ T30] audit: type=1400 audit(1767421339.241:3346): avc: denied { prog_load } for pid=15627 comm="syz.3.2465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 761.911521][ T30] audit: type=1400 audit(1767421339.251:3347): avc: denied { prog_load } for pid=15627 comm="syz.3.2465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 761.935124][ T30] audit: type=1400 audit(1767421339.251:3348): avc: denied { execmem } for pid=15627 comm="syz.3.2465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 761.960295][ T30] audit: type=1400 audit(1767421339.311:3349): avc: denied { read } for pid=15627 comm="syz.3.2465" name="card1" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=0 [ 761.984903][ T30] audit: type=1400 audit(1767421339.311:3350): avc: denied { read } for pid=15627 comm="syz.3.2465" name="system" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 762.012269][ T30] audit: type=1400 audit(1767421339.311:3351): avc: denied { create } for pid=15627 comm="syz.3.2465" anonclass=[secretmem] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 762.034989][ T30] audit: type=1400 audit(1767421339.311:3352): avc: denied { create } for pid=15627 comm="syz.3.2465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 762.253730][T15638] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 762.275645][T15638] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 762.305105][T15638] batman_adv: batadv0: Interface deactivated: virt_wifi0 [ 762.412889][ T6113] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 762.435048][ T6113] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 762.473745][ T6113] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 762.483574][ T6113] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 762.636412][T15650] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2471'. [ 764.247185][T15680] netlink: 'syz.2.2481': attribute type 10 has an invalid length. [ 764.525296][T15698] netlink: 'syz.3.2484': attribute type 1 has an invalid length. [ 764.651487][T10811] wlan1: Trigger new scan to find an IBSS to join [ 764.788710][T15698] 8021q: adding VLAN 0 to HW filter on device bond2 [ 765.615291][ T6045] wlan1: Creating new IBSS network, BSSID f2:f6:2f:90:10:75 [ 766.829947][ T30] kauditd_printk_skb: 131 callbacks suppressed [ 766.830006][ T30] audit: type=1400 audit(1767421344.301:3484): avc: denied { read write } for pid=11296 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 766.868534][ T30] audit: type=1400 audit(1767421344.331:3485): avc: denied { create } for pid=15726 comm="syz.4.2496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 766.889865][ T30] audit: type=1400 audit(1767421344.331:3486): avc: denied { read } for pid=15726 comm="syz.4.2496" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 766.913798][T15727] netlink: 32 bytes leftover after parsing attributes in process `syz.4.2496'. [ 766.924300][ T30] audit: type=1400 audit(1767421344.391:3487): avc: denied { read } for pid=15726 comm="syz.4.2496" dev="nsfs" ino=4026532866 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 766.950133][ T30] audit: type=1400 audit(1767421344.421:3488): avc: denied { map_create } for pid=15726 comm="syz.4.2496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 766.993308][ T30] audit: type=1400 audit(1767421344.451:3489): avc: denied { read write } for pid=15726 comm="syz.4.2496" name="nullb0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 767.044623][ T30] audit: type=1400 audit(1767421344.451:3490): avc: denied { create } for pid=15726 comm="syz.4.2496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 767.191733][ T30] audit: type=1400 audit(1767421344.661:3491): avc: denied { read write } for pid=11410 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 767.252483][ T30] audit: type=1400 audit(1767421344.661:3492): avc: denied { prog_load } for pid=15728 comm="syz.2.2497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 767.295762][ T30] audit: type=1400 audit(1767421344.661:3493): avc: denied { create } for pid=15728 comm="syz.2.2497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 767.703784][T15741] netlink: 96 bytes leftover after parsing attributes in process `syz.4.2502'. [ 767.938278][T15747] netlink: 96 bytes leftover after parsing attributes in process `syz.4.2504'. [ 770.518420][ T6113] Bluetooth: hci5: Frame reassembly failed (-84) [ 770.544179][T15801] Bluetooth: hci5: received HCILL_GO_TO_SLEEP_ACK in state 2 [ 770.603862][T15807] netlink: 96 bytes leftover after parsing attributes in process `syz.4.2521'. [ 771.911025][ T30] kauditd_printk_skb: 154 callbacks suppressed [ 771.911037][ T30] audit: type=1400 audit(1767421349.381:3648): avc: denied { read write } for pid=11296 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 772.036999][ T30] audit: type=1400 audit(1767421349.431:3649): avc: denied { read } for pid=15832 comm="syz.1.2530" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 772.185352][ T30] audit: type=1400 audit(1767421349.431:3650): avc: denied { read } for pid=15832 comm="syz.1.2530" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 772.271621][ T30] audit: type=1400 audit(1767421349.451:3651): avc: denied { read write } for pid=11165 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 772.358739][ T30] audit: type=1400 audit(1767421349.491:3652): avc: denied { read } for pid=15834 comm="syz.3.2532" name="video7" dev="devtmpfs" ino=949 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 [ 772.456461][ T30] audit: type=1400 audit(1767421349.541:3653): avc: denied { read write } for pid=11165 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 772.554759][ T30] audit: type=1400 audit(1767421349.571:3654): avc: denied { map_create } for pid=15832 comm="syz.1.2530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 772.585209][ T5825] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 772.591854][ T52] Bluetooth: hci5: command 0x1003 tx timeout [ 772.666009][ T30] audit: type=1400 audit(1767421349.571:3655): avc: denied { read } for pid=15838 comm="syz.3.2533" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 772.791597][ T30] audit: type=1400 audit(1767421349.641:3656): avc: denied { create } for pid=15838 comm="syz.3.2533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 772.865023][ T30] audit: type=1400 audit(1767421349.651:3657): avc: denied { create } for pid=15838 comm="syz.3.2533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 774.600755][T15890] xt_connbytes: Forcing CT accounting to be enabled [ 776.963095][ T30] kauditd_printk_skb: 202 callbacks suppressed [ 776.963112][ T30] audit: type=1400 audit(1767421354.431:3860): avc: denied { read write } for pid=11410 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 777.082260][ T30] audit: type=1400 audit(1767421354.541:3861): avc: denied { read write } for pid=15942 comm="syz.1.2570" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 777.257126][ T30] audit: type=1400 audit(1767421354.721:3862): avc: denied { create } for pid=15944 comm="syz.2.2571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 777.296730][ T52] Bluetooth: hci5: command 0x1003 tx timeout [ 777.297202][ T5825] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 777.326543][ T30] audit: type=1400 audit(1767421354.751:3863): avc: denied { create } for pid=15944 comm="syz.2.2571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 777.349693][ T30] audit: type=1400 audit(1767421354.791:3864): avc: denied { allowed } for pid=15942 comm="syz.1.2570" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 777.443581][ T30] audit: type=1400 audit(1767421354.791:3865): avc: denied { read } for pid=15942 comm="syz.1.2570" name="card1" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=0 [ 777.504327][ T30] audit: type=1400 audit(1767421354.951:3866): avc: denied { read write } for pid=11296 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 777.589424][ T30] audit: type=1400 audit(1767421355.001:3867): avc: denied { execmem } for pid=15946 comm="syz.2.2572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 777.695107][ T30] audit: type=1400 audit(1767421355.001:3868): avc: denied { create } for pid=15946 comm="syz.2.2572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 777.784288][ T30] audit: type=1400 audit(1767421355.011:3869): avc: denied { map_create } for pid=15946 comm="syz.2.2572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 778.739287][T15984] netlink: 96 bytes leftover after parsing attributes in process `syz.2.2586'. [ 779.805547][T15991] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2590'. [ 779.883370][T16011] netlink: 'syz.0.2597': attribute type 4 has an invalid length. [ 780.011717][T16020] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2601'. [ 780.079057][T16022] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2601'. [ 782.012460][ T30] kauditd_printk_skb: 183 callbacks suppressed [ 782.013371][ T30] audit: type=1400 audit(1767421359.481:4053): avc: denied { create } for pid=16055 comm="syz.4.2614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 782.112509][ T30] audit: type=1400 audit(1767421359.561:4054): avc: denied { read write } for pid=16055 comm="syz.4.2614" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 782.201738][ T30] audit: type=1400 audit(1767421359.611:4055): avc: denied { read write } for pid=11410 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 782.298748][ T30] audit: type=1400 audit(1767421359.661:4056): avc: denied { read } for pid=16057 comm="syz.1.2615" dev="nsfs" ino=4026532813 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 782.372535][ T30] audit: type=1400 audit(1767421359.661:4057): avc: denied { create } for pid=16057 comm="syz.1.2615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 782.453110][ T30] audit: type=1400 audit(1767421359.661:4058): avc: denied { create } for pid=16057 comm="syz.1.2615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 782.529229][ T30] audit: type=1400 audit(1767421359.661:4059): avc: denied { create } for pid=16057 comm="syz.1.2615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 782.586495][ T30] audit: type=1400 audit(1767421359.661:4060): avc: denied { read write } for pid=16057 comm="syz.1.2615" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 782.659783][ T30] audit: type=1400 audit(1767421359.661:4061): avc: denied { mounton } for pid=16057 comm="syz.1.2615" path="/285/file0" dev="tmpfs" ino=1533 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 782.689265][ T30] audit: type=1400 audit(1767421360.001:4062): avc: denied { read write } for pid=11410 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 783.344922][T16091] netlink: 96 bytes leftover after parsing attributes in process `syz.3.2625'. [ 783.638439][T16094] xt_l2tp: unknown flags: 17 [ 783.858515][T16100] mkiss: ax0: crc mode is auto. [ 785.069850][T16129] netlink: 96 bytes leftover after parsing attributes in process `syz.4.2640'. [ 786.154653][T16176] netlink: 64 bytes leftover after parsing attributes in process `syz.2.2659'. [ 786.205366][T16179] SET target dimension over the limit! [ 786.629965][T16181] netlink: 'syz.1.2661': attribute type 16 has an invalid length. [ 786.637819][T16181] netlink: 'syz.1.2661': attribute type 2 has an invalid length. [ 786.646450][T16181] netlink: 64086 bytes leftover after parsing attributes in process `syz.1.2661'. [ 787.636283][ T30] kauditd_printk_skb: 284 callbacks suppressed [ 787.636301][ T30] audit: type=1400 audit(1767421365.101:4341): avc: denied { map_create } for pid=16198 comm="syz.2.2668" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 787.718275][ T30] audit: type=1400 audit(1767421365.181:4342): avc: denied { read write } for pid=16201 comm="syz.0.2669" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 787.747236][ T30] audit: type=1400 audit(1767421365.191:4343): avc: denied { read write } for pid=11410 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 787.783260][ T30] audit: type=1400 audit(1767421365.211:4344): avc: denied { read write } for pid=16201 comm="syz.0.2669" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 787.809069][ T30] audit: type=1400 audit(1767421365.211:4345): avc: denied { create } for pid=16204 comm="syz.1.2671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 787.829383][ T30] audit: type=1400 audit(1767421365.251:4346): avc: denied { read write } for pid=11296 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 787.855827][ T30] audit: type=1400 audit(1767421365.281:4347): avc: denied { allowed } for pid=16204 comm="syz.1.2671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 787.875809][ T30] audit: type=1400 audit(1767421365.281:4348): avc: denied { create } for pid=16207 comm="syz.4.2672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 787.898369][ T30] audit: type=1400 audit(1767421365.281:4349): avc: denied { create } for pid=16207 comm="syz.4.2672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 787.920997][ T30] audit: type=1400 audit(1767421365.301:4350): avc: denied { read write } for pid=11296 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 787.933893][T16214] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2675'. [ 788.032853][ T5922] IPVS: starting estimator thread 0... [ 788.118781][T16216] IPVS: using max 54 ests per chain, 129600 per kthread [ 788.284665][ T5922] libceph: connect (1)[c::]:6789 error -101 [ 788.291034][ T5922] libceph: mon0 (1)[c::]:6789 connect error [ 788.384678][T16220] ceph: No mds server is up or the cluster is laggy [ 790.734923][T16280] x_tables: ip_tables: osf match: only valid for protocol 6 [ 791.156208][T16289] netlink: 56 bytes leftover after parsing attributes in process `syz.4.2696'. [ 791.412136][T16296] netlink: 'syz.1.2699': attribute type 15 has an invalid length. [ 791.420254][T16296] netlink: 666 bytes leftover after parsing attributes in process `syz.1.2699'. [ 791.470475][T16296] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2699'. [ 791.645918][T16312] netlink: 96 bytes leftover after parsing attributes in process `syz.0.2703'. [ 792.511538][T16339] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2716'. [ 792.524158][T16339] geneve4: entered promiscuous mode [ 792.539036][T16339] geneve4: entered allmulticast mode [ 792.644434][ T30] kauditd_printk_skb: 185 callbacks suppressed [ 792.644450][ T30] audit: type=1400 audit(1767421370.111:4536): avc: denied { prog_load } for pid=16341 comm="syz.2.2719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 792.676693][ T30] audit: type=1400 audit(1767421370.111:4537): avc: denied { map_create } for pid=16341 comm="syz.2.2719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 792.697057][ T30] audit: type=1400 audit(1767421370.111:4538): avc: denied { prog_load } for pid=16341 comm="syz.2.2719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 792.717898][ T30] audit: type=1400 audit(1767421370.121:4539): avc: denied { read write } for pid=16333 comm="syz.0.2715" name="vhost-vsock" dev="devtmpfs" ino=1275 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=0 [ 792.742720][ T30] audit: type=1400 audit(1767421370.121:4540): avc: denied { create } for pid=16333 comm="syz.0.2715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 792.763530][ T30] audit: type=1400 audit(1767421370.151:4541): avc: denied { create } for pid=16349 comm="syz.3.2721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 792.805586][ T30] audit: type=1400 audit(1767421370.151:4542): avc: denied { read } for pid=16349 comm="syz.3.2721" dev="nsfs" ino=4026533186 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 792.832860][ T30] audit: type=1400 audit(1767421370.151:4543): avc: denied { allowed } for pid=16349 comm="syz.3.2721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 792.852685][ T30] audit: type=1400 audit(1767421370.151:4544): avc: denied { create } for pid=16349 comm="syz.3.2721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 792.884798][ T30] audit: type=1400 audit(1767421370.251:4545): avc: denied { read write } for pid=11165 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 793.098192][T16365] netlink: 96 bytes leftover after parsing attributes in process `syz.4.2725'. [ 795.297795][T16414] netlink: 96 bytes leftover after parsing attributes in process `syz.3.2740'. [ 795.684107][ T6045] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 797.760633][ T30] kauditd_printk_skb: 213 callbacks suppressed [ 797.760648][ T30] audit: type=1400 audit(1767421375.118:4759): avc: denied { create } for pid=16469 comm="syz.0.2764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 797.789214][ T30] audit: type=1400 audit(1767421375.155:4760): avc: denied { read } for pid=16469 comm="syz.0.2764" dev="nsfs" ino=4026532949 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 797.836649][ T30] audit: type=1400 audit(1767421375.192:4761): avc: denied { create } for pid=16471 comm="syz.0.2765" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 797.898890][ T30] audit: type=1400 audit(1767421375.249:4762): avc: denied { read } for pid=16473 comm="syz.0.2766" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 797.958694][ T30] audit: type=1400 audit(1767421375.295:4763): avc: denied { create } for pid=16473 comm="syz.0.2766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 798.020147][ T30] audit: type=1400 audit(1767421375.295:4764): avc: denied { create } for pid=16473 comm="syz.0.2766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 798.073643][ T30] audit: type=1400 audit(1767421375.305:4765): avc: denied { map_create } for pid=16473 comm="syz.0.2766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 798.114617][ T30] audit: type=1400 audit(1767421375.305:4766): avc: denied { prog_load } for pid=16473 comm="syz.0.2766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 798.161068][ T30] audit: type=1400 audit(1767421375.305:4767): avc: denied { module_request } for pid=16473 comm="syz.0.2766" kmod="fs-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 798.207636][ T30] audit: type=1400 audit(1767421375.305:4768): avc: denied { read } for pid=16473 comm="syz.0.2766" dev="nsfs" ino=4026532949 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 801.991838][T16539] vlan0: entered promiscuous mode [ 803.112087][ T30] kauditd_printk_skb: 138 callbacks suppressed [ 803.112104][ T30] audit: type=1400 audit(1767421380.132:4907): avc: denied { read write } for pid=16566 comm="syz.0.2796" name="rdma_cm" dev="devtmpfs" ino=1271 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=0 [ 803.195542][ T30] audit: type=1400 audit(1767421380.179:4908): avc: denied { read write } for pid=11410 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 803.229106][ T30] audit: type=1400 audit(1767421380.188:4909): avc: denied { create } for pid=16566 comm="syz.0.2796" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 803.253147][ T30] audit: type=1400 audit(1767421380.188:4910): avc: denied { map_create } for pid=16566 comm="syz.0.2796" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 803.276558][ T30] audit: type=1400 audit(1767421380.188:4911): avc: denied { map_create } for pid=16566 comm="syz.0.2796" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 803.297983][ T30] audit: type=1400 audit(1767421380.198:4912): avc: denied { prog_load } for pid=16565 comm="syz.3.2794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 803.324085][ T30] audit: type=1400 audit(1767421380.198:4913): avc: denied { execmem } for pid=16565 comm="syz.3.2794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 803.347606][ T30] audit: type=1400 audit(1767421380.263:4914): avc: denied { prog_load } for pid=16570 comm="syz.1.2798" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 803.370572][ T30] audit: type=1400 audit(1767421380.263:4915): avc: denied { execmem } for pid=16570 comm="syz.1.2798" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 803.395659][ T30] audit: type=1400 audit(1767421380.328:4916): avc: denied { read } for pid=16565 comm="syz.3.2794" dev="nsfs" ino=4026533186 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 803.644248][T16585] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 803.659937][T16585] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 803.700952][T16585] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 803.732693][T16585] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 804.528457][T14215] libceph: connect (1)[c::]:6789 error -101 [ 804.546494][T14215] libceph: mon0 (1)[c::]:6789 connect error [ 804.576273][ T43] libceph: connect (1)[c::]:6789 error -101 [ 804.598379][ T43] libceph: mon0 (1)[c::]:6789 connect error [ 804.906149][ T43] libceph: connect (1)[c::]:6789 error -101 [ 804.920425][ T43] libceph: mon0 (1)[c::]:6789 connect error [ 804.929011][T14215] libceph: connect (1)[c::]:6789 error -101 [ 804.941971][T14215] libceph: mon0 (1)[c::]:6789 connect error [ 805.151345][T16627] netlink: 96 bytes leftover after parsing attributes in process `syz.3.2816'. [ 805.276754][T16629] syz.4.2817 (16629): /proc/16628/oom_adj is deprecated, please use /proc/16628/oom_score_adj instead. [ 805.363644][T16615] ceph: No mds server is up or the cluster is laggy [ 805.370730][T16608] ceph: No mds server is up or the cluster is laggy [ 805.493642][ T43] libceph: connect (1)[c::]:6789 error -101 [ 805.514628][ T43] libceph: mon0 (1)[c::]:6789 connect error [ 807.139583][T16668] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2830'. [ 808.465223][ T30] kauditd_printk_skb: 184 callbacks suppressed [ 808.465239][ T30] audit: type=1400 audit(1767421385.137:5101): avc: denied { map_create } for pid=16688 comm="syz.2.2837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 808.506532][ T30] audit: type=1400 audit(1767421385.184:5103): avc: denied { read write } for pid=11410 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 808.547525][ T30] audit: type=1400 audit(1767421385.165:5102): avc: denied { map_create } for pid=16688 comm="syz.2.2837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 808.633804][ T30] audit: type=1400 audit(1767421385.212:5104): avc: denied { read } for pid=16695 comm="syz.3.2838" name="cec3" dev="devtmpfs" ino=963 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 808.669721][ T30] audit: type=1400 audit(1767421385.249:5105): avc: denied { prog_load } for pid=16698 comm="syz.1.2839" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 808.692068][ T30] audit: type=1400 audit(1767421385.249:5106): avc: denied { prog_load } for pid=16698 comm="syz.1.2839" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 808.712074][ T30] audit: type=1400 audit(1767421385.268:5107): avc: denied { read write } for pid=11410 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 808.777975][ T30] audit: type=1400 audit(1767421385.277:5108): avc: denied { read write } for pid=11296 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 808.863243][ T30] audit: type=1400 audit(1767421385.399:5109): avc: denied { mounton } for pid=16701 comm="syz.1.2840" path="/339/file0" dev="tmpfs" ino=1814 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 808.972995][ T30] audit: type=1400 audit(1767421385.418:5110): avc: denied { read } for pid=16703 comm="syz.4.2841" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 809.188141][T16711] netlink: 'syz.4.2843': attribute type 10 has an invalid length. [ 809.259980][ T1293] ieee802154 phy0 wpan0: encryption failed: -22 [ 809.266978][ T1293] ieee802154 phy1 wpan1: encryption failed: -22 [ 809.295087][T16711] 8021q: adding VLAN 0 to HW filter on device bond0 [ 809.390225][T16711] team0: Port device bond0 added [ 809.849994][T16745] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2852'. [ 814.085289][ T30] kauditd_printk_skb: 219 callbacks suppressed [ 814.085305][ T30] audit: type=1400 audit(1767421390.395:5330): avc: denied { read write } for pid=11296 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 814.179401][ T30] audit: type=1400 audit(1767421390.470:5331): avc: denied { prog_load } for pid=16821 comm="syz.4.2880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 814.246151][ T30] audit: type=1400 audit(1767421390.470:5332): avc: denied { prog_load } for pid=16821 comm="syz.4.2880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 814.295713][ T30] audit: type=1400 audit(1767421390.470:5333): avc: denied { prog_load } for pid=16821 comm="syz.4.2880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 814.335883][ T30] audit: type=1400 audit(1767421390.470:5334): avc: denied { prog_load } for pid=16821 comm="syz.4.2880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 814.378341][ T30] audit: type=1400 audit(1767421390.470:5335): avc: denied { prog_load } for pid=16821 comm="syz.4.2880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 814.424394][ T30] audit: type=1400 audit(1767421390.470:5336): avc: denied { prog_load } for pid=16821 comm="syz.4.2880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 814.478826][ T30] audit: type=1400 audit(1767421390.470:5337): avc: denied { prog_load } for pid=16821 comm="syz.4.2880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 814.500739][ T30] audit: type=1400 audit(1767421390.470:5338): avc: denied { prog_load } for pid=16821 comm="syz.4.2880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 814.542822][ T30] audit: type=1400 audit(1767421390.470:5339): avc: denied { prog_load } for pid=16821 comm="syz.4.2880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 814.650425][T16834] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2882'. [ 815.016149][T16839] sch_fq: defrate 4294967295 ignored. [ 815.482719][T16850] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=16850 comm=syz.2.2889 [ 819.433458][ T30] kauditd_printk_skb: 174 callbacks suppressed [ 819.433476][ T30] audit: type=1400 audit(1767421395.400:5514): avc: denied { mounton } for pid=16916 comm="syz.2.2912" path="/583/file0" dev="tmpfs" ino=3104 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 819.492698][ T30] audit: type=1400 audit(1767421395.437:5515): avc: denied { prog_load } for pid=16912 comm="syz.3.2910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 819.539984][ T30] audit: type=1400 audit(1767421395.465:5516): avc: denied { read } for pid=16912 comm="syz.3.2910" name="card1" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=0 [ 819.631514][ T30] audit: type=1400 audit(1767421395.475:5517): avc: denied { mount } for pid=16912 comm="syz.3.2910" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=0 [ 819.712823][ T30] audit: type=1400 audit(1767421395.475:5518): avc: denied { create } for pid=16912 comm="syz.3.2910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 819.790728][ T30] audit: type=1400 audit(1767421395.475:5519): avc: denied { create } for pid=16912 comm="syz.3.2910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 819.858729][ T30] audit: type=1400 audit(1767421395.559:5520): avc: denied { read write } for pid=11410 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 819.935387][ T30] audit: type=1400 audit(1767421395.615:5521): avc: denied { write } for pid=16920 comm="syz.1.2913" name="uinput" dev="devtmpfs" ino=920 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=0 [ 820.007972][ T30] audit: type=1400 audit(1767421395.643:5522): avc: denied { read write } for pid=11410 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 820.088832][ T30] audit: type=1400 audit(1767421395.690:5523): avc: denied { read write } for pid=16922 comm="syz.1.2915" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 821.041138][T16945] netlink: 'syz.0.2922': attribute type 1 has an invalid length. [ 821.101505][T16945] 8021q: adding VLAN 0 to HW filter on device bond1 [ 821.158530][T16949] bond1: (slave veth3): Enslaving as an active interface with a down link [ 821.198936][T16945] vlan2: entered allmulticast mode [ 821.204066][T16945] bond_slave_1: entered allmulticast mode [ 821.232020][T16945] bond1: (slave vlan2): Opening slave failed [ 821.410312][T16953] netlink: 24 bytes leftover after parsing attributes in process `syz.2.2924'. [ 824.849522][ T30] kauditd_printk_skb: 144 callbacks suppressed [ 824.849534][ T30] audit: type=1400 audit(1767421400.461:5668): avc: denied { read write } for pid=11410 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 824.988324][ T30] audit: type=1400 audit(1767421400.545:5669): avc: denied { create } for pid=17011 comm="syz.1.2944" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 825.065511][ T30] audit: type=1400 audit(1767421400.554:5670): avc: denied { execmem } for pid=17011 comm="syz.1.2944" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 825.162900][ T30] audit: type=1400 audit(1767421400.667:5671): avc: denied { mount } for pid=17011 comm="syz.1.2944" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=0 [ 825.255223][ T30] audit: type=1400 audit(1767421400.788:5672): avc: denied { read write } for pid=11165 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 825.428817][ T30] audit: type=1400 audit(1767421400.835:5673): avc: denied { read write } for pid=11296 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 825.561969][ T30] audit: type=1400 audit(1767421400.844:5674): avc: denied { create } for pid=17011 comm="syz.1.2944" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=0 [ 825.675363][ T30] audit: type=1400 audit(1767421400.844:5675): avc: denied { read write } for pid=17011 comm="syz.1.2944" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 825.805717][ T30] audit: type=1400 audit(1767421400.938:5676): avc: denied { create } for pid=17017 comm="syz.4.2946" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 825.898650][T17029] trusted_key: encrypted_key: insufficient parameters specified [ 825.916461][ T30] audit: type=1400 audit(1767421400.947:5677): avc: denied { read } for pid=17016 comm="syz.3.2945" dev="nsfs" ino=4026533211 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 825.983606][T17030] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2949'. [ 828.818219][ T3964] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 829.129491][T17068] netlink: 96 bytes leftover after parsing attributes in process `syz.2.2964'. [ 829.707489][T17092] syzkaller0: entered promiscuous mode [ 829.716568][T17092] syzkaller0: entered allmulticast mode [ 829.724749][T17097] netlink: 96 bytes leftover after parsing attributes in process `syz.3.2975'. [ 829.829444][T17102] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2973'. [ 830.374824][ T30] kauditd_printk_skb: 148 callbacks suppressed [ 830.374836][ T30] audit: type=1400 audit(1767421405.634:5826): avc: denied { read write } for pid=17106 comm="syz.4.2978" name="radio0" dev="devtmpfs" ino=955 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 [ 830.505086][ T30] audit: type=1400 audit(1767421405.672:5827): avc: denied { create } for pid=17106 comm="syz.4.2978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 830.591338][ T30] audit: type=1400 audit(1767421405.672:5828): avc: denied { create } for pid=17106 comm="syz.4.2978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 830.652634][ T30] audit: type=1400 audit(1767421405.672:5829): avc: denied { create } for pid=17106 comm="syz.4.2978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 830.743721][ T30] audit: type=1400 audit(1767421405.672:5830): avc: denied { read } for pid=17106 comm="syz.4.2978" dev="nsfs" ino=4026532866 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 830.794494][ T30] audit: type=1400 audit(1767421405.672:5831): avc: denied { create } for pid=17106 comm="syz.4.2978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 830.855205][ T30] audit: type=1400 audit(1767421405.672:5832): avc: denied { read write } for pid=17106 comm="syz.4.2978" name="card1" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=0 [ 831.030077][ T30] audit: type=1400 audit(1767421406.252:5833): avc: denied { read write } for pid=11410 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 831.094595][ T30] audit: type=1400 audit(1767421406.299:5834): avc: denied { read write } for pid=11165 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 831.168139][ T30] audit: type=1400 audit(1767421406.355:5835): avc: denied { prog_load } for pid=17111 comm="syz.3.2980" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 831.209943][T17115] netlink: 96 bytes leftover after parsing attributes in process `syz.3.2980'. [ 832.378709][T17139] netlink: 'syz.1.2989': attribute type 7 has an invalid length. [ 832.389475][T17139] netlink: 'syz.1.2989': attribute type 8 has an invalid length. [ 833.661919][ T12] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 833.744514][ T12] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 833.827354][ T12] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 833.885831][T17170] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2998'. [ 833.895109][T17170] netlink: 12 bytes leftover after parsing attributes in process `syz.0.2998'. [ 833.909970][T17173] serio: Serial port ptm0 [ 833.933515][ T12] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 834.416081][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 834.425768][ T12] bond0 (unregistering): Released all slaves [ 834.603168][ T12] bond1 (unregistering): Released all slaves [ 835.124712][ T12] hsr_slave_0: left promiscuous mode [ 835.130465][ T12] hsr_slave_1: left promiscuous mode [ 835.152023][ T12] team0: left allmulticast mode [ 835.156977][ T12] team_slave_0: left allmulticast mode [ 835.162438][ T12] team_slave_1: left allmulticast mode [ 835.168407][ T12] team0: left promiscuous mode [ 835.173166][ T12] team_slave_0: left promiscuous mode [ 835.178780][ T12] team_slave_1: left promiscuous mode [ 835.572323][T17199] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3004'. [ 835.582702][ T12] team0 (unregistering): Port device team_slave_1 removed [ 835.650165][ T12] team0 (unregistering): Port device team_slave_0 removed [ 835.942355][ T30] kauditd_printk_skb: 151 callbacks suppressed [ 835.942365][ T30] audit: type=1400 audit(1767421410.845:5987): avc: denied { read write } for pid=11410 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 836.220124][ T30] audit: type=1400 audit(1767421411.098:5988): avc: denied { execmem } for pid=17201 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 836.262767][ T30] audit: type=1400 audit(1767421411.145:5989): avc: denied { prog_load } for pid=17202 comm="syz.1.3008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 836.309758][ T30] audit: type=1400 audit(1767421411.145:5990): avc: denied { read } for pid=17204 comm="syz.4.3010" name="ppp" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=0 [ 836.356361][ T30] audit: type=1400 audit(1767421411.163:5991): avc: denied { prog_load } for pid=17202 comm="syz.1.3008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 836.359694][T17209] netlink: 96 bytes leftover after parsing attributes in process `syz.1.3008'. [ 836.397736][ T30] audit: type=1400 audit(1767421411.163:5992): avc: denied { prog_load } for pid=17202 comm="syz.1.3008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 836.453680][ T30] audit: type=1400 audit(1767421411.163:5993): avc: denied { read } for pid=17206 comm="syz.3.3009" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 836.506584][ T12] IPVS: stop unused estimator thread 0... [ 836.513728][ T30] audit: type=1400 audit(1767421411.173:5994): avc: denied { prog_load } for pid=17206 comm="syz.3.3009" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 836.554853][ T30] audit: type=1400 audit(1767421411.173:5995): avc: denied { execmem } for pid=17202 comm="syz.1.3008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 836.593973][ T30] audit: type=1400 audit(1767421411.182:5996): avc: denied { read write } for pid=11165 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 841.467055][ T30] kauditd_printk_skb: 91 callbacks suppressed [ 841.467071][ T30] audit: type=1400 audit(1767421416.009:6088): avc: denied { read write } for pid=11296 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 841.785952][ T30] audit: type=1400 audit(1767421416.309:6089): avc: denied { read write } for pid=11410 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 841.823212][ T30] audit: type=1400 audit(1767421416.337:6090): avc: denied { read write } for pid=11165 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 842.311310][ T30] audit: type=1400 audit(1767421416.804:6091): avc: denied { execmem } for pid=17253 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 842.333040][ T30] audit: type=1400 audit(1767421416.823:6092): avc: denied { read } for pid=17254 comm="syz.1.3025" dev="nsfs" ino=4026532813 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 842.357266][ T30] audit: type=1400 audit(1767421416.823:6093): avc: denied { read } for pid=17256 comm="syz.3.3026" dev="nsfs" ino=4026533186 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 842.380899][ T30] audit: type=1400 audit(1767421416.870:6094): avc: denied { create } for pid=17256 comm="syz.3.3026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 842.401369][ T30] audit: type=1400 audit(1767421416.870:6095): avc: denied { map_create } for pid=17256 comm="syz.3.3026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 842.421969][ T30] audit: type=1400 audit(1767421416.907:6096): avc: denied { create } for pid=17256 comm="syz.3.3026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 842.455418][ T30] audit: type=1400 audit(1767421416.907:6097): avc: denied { read write } for pid=11410 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 842.554663][T17261] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3027'. [ 843.841448][ T43] IPVS: starting estimator thread 0... [ 843.951754][T17265] IPVS: using max 49 ests per chain, 117600 per kthread [ 845.513006][T17277] netlink: 'syz.0.3030': attribute type 1 has an invalid length. [ 845.557791][T17277] veth5: entered promiscuous mode [ 845.582783][T17277] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3030'. [ 847.206687][ T30] kauditd_printk_skb: 41 callbacks suppressed [ 847.206703][ T30] audit: type=1400 audit(1767421421.370:6139): avc: denied { execmem } for pid=17278 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 847.245520][ T30] audit: type=1400 audit(1767421421.379:6140): avc: denied { prog_load } for pid=17280 comm="syz.0.3033" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 847.265136][ T30] audit: type=1400 audit(1767421421.407:6141): avc: denied { read } for pid=17279 comm="syz.1.3034" name="ppp" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=0 [ 847.289560][ T30] audit: type=1400 audit(1767421421.417:6142): avc: denied { create } for pid=17284 comm="syz.3.3035" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=0 [ 847.313910][ T30] audit: type=1400 audit(1767421421.417:6143): avc: denied { execmem } for pid=17283 comm="syz.4.3036" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 847.316730][T17287] audit: audit_backlog=65 > audit_backlog_limit=64 [ 847.341727][T17286] audit: audit_backlog=65 > audit_backlog_limit=64 [ 847.348229][T17286] audit: audit_lost=5 audit_rate_limit=0 audit_backlog_limit=64 [ 847.352414][T17287] audit: audit_lost=6 audit_rate_limit=0 audit_backlog_limit=64 [ 847.356033][ T30] audit: type=1326 audit(1767421421.417:6144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17283 comm="syz.4.3036" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3a4e58f749 code=0x7ffc0000 [ 853.088793][ T30] kauditd_printk_skb: 126 callbacks suppressed [ 853.088813][ T30] audit: type=1400 audit(1767421426.871:6263): avc: denied { execmem } for pid=17312 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 853.135101][ T30] audit: type=1400 audit(1767421426.889:6264): avc: denied { read } for pid=17313 comm="syz.4.3048" name="ppp" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=0 [ 853.160650][ T30] audit: type=1400 audit(1767421426.927:6265): avc: denied { create } for pid=17318 comm="syz.0.3045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 853.199031][ T30] audit: type=1400 audit(1767421426.946:6266): avc: denied { read write } for pid=17317 comm="syz.3.3047" name="rdma_cm" dev="devtmpfs" ino=1271 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=0 [ 853.225567][ T30] audit: type=1400 audit(1767421426.946:6267): avc: denied { create } for pid=17317 comm="syz.3.3047" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=0 [ 853.269764][ T30] audit: type=1400 audit(1767421426.946:6268): avc: denied { create } for pid=17317 comm="syz.3.3047" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 853.298221][ T30] audit: type=1400 audit(1767421426.946:6269): avc: denied { prog_load } for pid=17317 comm="syz.3.3047" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 853.318853][ T30] audit: type=1400 audit(1767421426.946:6270): avc: denied { execmem } for pid=17317 comm="syz.3.3047" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 853.340773][ T30] audit: type=1400 audit(1767421426.946:6271): avc: denied { read append } for pid=17317 comm="syz.3.3047" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 853.365363][ T30] audit: type=1400 audit(1767421426.983:6272): avc: denied { read write } for pid=17313 comm="syz.4.3048" name="radio0" dev="devtmpfs" ino=955 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 [ 855.570100][ T10] usb 2-1: USB disconnect, device number 37 [ 855.866281][ T12] smc: removing ib device syz1 [ 856.216094][ T5879] syz1: Port: 1 Link DOWN [ 856.601092][ T5989] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 856.629570][ T5989] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 1] type 2 family 0 port 256 - 0 [ 856.858580][ T5989] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 856.869186][ T5989] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 1] type 2 family 0 port 256 - 0 [ 856.942878][ T5989] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 856.954165][ T5989] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 1] type 2 family 0 port 256 - 0 [ 857.029229][ T5989] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 857.056386][ T5989] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 1] type 2 family 0 port 256 - 0 [ 857.241255][ T12] ------------[ cut here ]------------ [ 857.247085][ T12] GID entry ref leak for dev syz1 index 2 ref=1 [ 857.253531][ T12] WARNING: drivers/infiniband/core/cache.c:806 at gid_table_release_one+0x1ad/0x450, CPU#0: kworker/u8:0/12 [ 857.265278][ T12] Modules linked in: [ 857.269422][ T12] CPU: 0 UID: 0 PID: 12 Comm: kworker/u8:0 Tainted: G L syzkaller #0 PREEMPT(full) [ 857.280550][ T12] Tainted: [L]=SOFTLOCKUP [ 857.285507][ T12] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 857.296215][ T12] Workqueue: ib-unreg-wq ib_unregister_work [ 857.302867][ T12] RIP: 0010:gid_table_release_one+0x1b6/0x450 [ 857.309281][ T12] Code: 4c 24 38 48 c1 e8 03 4d 01 fc 48 89 44 24 08 eb 54 48 89 34 24 e8 8a 77 4d f9 48 8d 3d 33 c1 23 08 48 8b 34 24 89 e9 44 89 f2 <67> 48 0f b9 3a e8 70 77 4d f9 48 89 d8 41 83 c6 01 48 c1 e8 03 42 [ 857.329258][ T12] RSP: 0018:ffffc90000117ac8 EFLAGS: 00010293 [ 857.335886][ T12] RAX: 0000000000000000 RBX: ffff888029f43a00 RCX: 0000000000000001 [ 857.344240][ T12] RDX: 0000000000000002 RSI: ffff888035342fc0 RDI: ffffffff90953270 [ 857.352585][ T12] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffed100b5f90a0 [ 857.360785][ T12] R10: ffff88805afc8503 R11: 0000000000002ba1 R12: ffffed10053e875b [ 857.368922][ T12] R13: ffff88807b558000 R14: 0000000000000002 R15: dffffc0000000000 [ 857.377033][ T12] FS: 0000000000000000(0000) GS:ffff8881248f5000(0000) knlGS:0000000000000000 [ 857.386154][ T12] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 857.393190][ T12] CR2: 00007fffe9cb6f94 CR3: 000000000e184000 CR4: 00000000003526f0 [ 857.401667][ T12] Call Trace: [ 857.404930][ T12] [ 857.407843][ T12] ib_device_release+0xef/0x1e0 [ 857.412854][ T12] ? __pfx_ib_device_release+0x10/0x10 [ 857.418453][ T12] device_release+0xa4/0x240 [ 857.423346][ T12] kobject_put+0x1ef/0x6f0 [ 857.427779][ T12] put_device+0x1f/0x30 [ 857.432124][ T12] process_one_work+0x9ba/0x1b20 [ 857.437046][ T12] ? __pfx_process_one_work+0x10/0x10 [ 857.442574][ T12] ? assign_work+0x1a0/0x250 [ 857.447156][ T12] worker_thread+0x6c8/0xf10 [ 857.451890][ T12] ? __pfx_worker_thread+0x10/0x10 [ 857.457164][ T12] kthread+0x3c5/0x780 [ 857.461215][ T12] ? __pfx_kthread+0x10/0x10 [ 857.466086][ T12] ? rcu_is_watching+0x12/0xc0 [ 857.471011][ T12] ? __pfx_kthread+0x10/0x10 [ 857.475742][ T12] ret_from_fork+0x983/0xb10 [ 857.480310][ T12] ? __pfx_ret_from_fork+0x10/0x10 [ 857.485612][ T12] ? __switch_to+0x7af/0x10d0 [ 857.490270][ T12] ? __pfx_kthread+0x10/0x10 [ 857.495138][ T12] ret_from_fork_asm+0x1a/0x30 [ 857.499910][ T12] [ 857.503262][ T12] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 857.510526][ T12] CPU: 0 UID: 0 PID: 12 Comm: kworker/u8:0 Tainted: G L syzkaller #0 PREEMPT(full) [ 857.521360][ T12] Tainted: [L]=SOFTLOCKUP [ 857.525662][ T12] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 857.535711][ T12] Workqueue: ib-unreg-wq ib_unregister_work [ 857.541604][ T12] Call Trace: [ 857.544862][ T12] [ 857.547778][ T12] dump_stack_lvl+0x3d/0x1f0 [ 857.552355][ T12] vpanic+0x640/0x6f0 [ 857.556324][ T12] ? gid_table_release_one+0x1ad/0x450 [ 857.561770][ T12] panic+0xca/0xd0 [ 857.565472][ T12] ? __pfx_panic+0x10/0x10 [ 857.569881][ T12] ? check_panic_on_warn+0x1f/0xb0 [ 857.574976][ T12] check_panic_on_warn+0xab/0xb0 [ 857.579895][ T12] __warn+0x108/0x3c0 [ 857.583863][ T12] __report_bug+0x2a0/0x520 [ 857.588350][ T12] ? gid_table_release_one+0x1ad/0x450 [ 857.593791][ T12] ? __pfx___report_bug+0x10/0x10 [ 857.598809][ T12] report_bug_entry+0xe1/0x290 [ 857.603552][ T12] ? gid_table_release_one+0x1b6/0x450 [ 857.608992][ T12] handle_bug+0x18a/0x260 [ 857.613312][ T12] exc_invalid_op+0x17/0x50 [ 857.617808][ T12] asm_exc_invalid_op+0x1a/0x20 [ 857.622637][ T12] RIP: 0010:gid_table_release_one+0x1b6/0x450 [ 857.628688][ T12] Code: 4c 24 38 48 c1 e8 03 4d 01 fc 48 89 44 24 08 eb 54 48 89 34 24 e8 8a 77 4d f9 48 8d 3d 33 c1 23 08 48 8b 34 24 89 e9 44 89 f2 <67> 48 0f b9 3a e8 70 77 4d f9 48 89 d8 41 83 c6 01 48 c1 e8 03 42 [ 857.648283][ T12] RSP: 0018:ffffc90000117ac8 EFLAGS: 00010293 [ 857.654334][ T12] RAX: 0000000000000000 RBX: ffff888029f43a00 RCX: 0000000000000001 [ 857.662283][ T12] RDX: 0000000000000002 RSI: ffff888035342fc0 RDI: ffffffff90953270 [ 857.670235][ T12] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffed100b5f90a0 [ 857.678186][ T12] R10: ffff88805afc8503 R11: 0000000000002ba1 R12: ffffed10053e875b [ 857.686136][ T12] R13: ffff88807b558000 R14: 0000000000000002 R15: dffffc0000000000 [ 857.694101][ T12] ? gid_table_release_one+0x1a6/0x450 [ 857.699552][ T12] ib_device_release+0xef/0x1e0 [ 857.704403][ T12] ? __pfx_ib_device_release+0x10/0x10 [ 857.709846][ T12] device_release+0xa4/0x240 [ 857.714437][ T12] kobject_put+0x1ef/0x6f0 [ 857.718843][ T12] put_device+0x1f/0x30 [ 857.722981][ T12] process_one_work+0x9ba/0x1b20 [ 857.727911][ T12] ? __pfx_process_one_work+0x10/0x10 [ 857.733274][ T12] ? assign_work+0x1a0/0x250 [ 857.737853][ T12] worker_thread+0x6c8/0xf10 [ 857.742441][ T12] ? __pfx_worker_thread+0x10/0x10 [ 857.747543][ T12] kthread+0x3c5/0x780 [ 857.751595][ T12] ? __pfx_kthread+0x10/0x10 [ 857.756171][ T12] ? rcu_is_watching+0x12/0xc0 [ 857.760914][ T12] ? __pfx_kthread+0x10/0x10 [ 857.765489][ T12] ret_from_fork+0x983/0xb10 [ 857.770061][ T12] ? __pfx_ret_from_fork+0x10/0x10 [ 857.775155][ T12] ? __switch_to+0x7af/0x10d0 [ 857.779815][ T12] ? __pfx_kthread+0x10/0x10 [ 857.784393][ T12] ret_from_fork_asm+0x1a/0x30 [ 857.789158][ T12] [ 857.792431][ T12] Kernel Offset: disabled [ 857.796732][ T12] Rebooting in 86400 seconds..