last executing test programs: 5m45.570592185s ago: executing program 1 (id=852): mlockall(0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="0500000000000000711142000000000085100000020000008500000005000000f8ffffff000000009500a50500"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = syz_io_uring_setup(0xfa, &(0x7f00000003c0)={0x0, 0x0, 0x10100, 0x2, 0x3e7}, &(0x7f00000000c0)=0x0, &(0x7f0000000080)=0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SCHED_CORE(0x3e, 0x800000001, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x100008b}, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000140)=0x15) r8 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x1) read$msr(r8, &(0x7f0000019680)=""/102392, 0x18ff8) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000841, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000280)=""/4096, 0x1000, 0x1, 0x0}, &(0x7f0000002280)=0x40) bpf$PROG_LOAD(0x5, 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) io_setup(0x1, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000600)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r6, 0x0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f00000002c0)=""/183, 0xb7}], 0x1}, 0x0, 0x40000103}) sendmmsg(r5, &(0x7f000000d180)=[{{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000001a00)='\"', 0x1}], 0x1}}], 0x1, 0x804) io_uring_enter(r2, 0x46f6, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r0, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f0000001b40), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x47, 0x0}}, 0x10) r9 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_buf(r9, 0x29, 0x6, &(0x7f0000000500)="6dde08417cfd88d638dce49fe8dd16d5469dc0dd04156b1b65dc4cc51d70ac5caf4c1dc800c2e265b44801a32412d284224f7266842674264456932ea7e04381115f7814de70cc5b93e0130d3065be47a028180320369e0d14f7acf29d4c9935e329a917f70e679b1c671f29e8280713eddf1f900d9f938a2a5c976a1fb5798dd9204b5d8f23654afad21ef62451dd616910f48f41a9dc4c5bb90adad1c2b0f15b701b090d41a5a5cf04fa3153930fee5b3ebbeb9c44f94623393335ff9cf0f817de77cd9695c41ba3a79887ce38e197dba4bf7fd0f20279cecbe5b768700346ff819955e383e171128d5536c189dc937b7d36d61fc310d6e77e8af29d076ff73f30615de41031b16726ecd34d9a8b2d4674874f0de514f066376a823fdf4776f90ecbd4eb883e78ed2a15257b54e93d87dfc8a6d07a60ac422ffa58fb34e957c89933e073e3b99339dcf09f85a74445fa3967efbff99d4db1fce883d55208989875fd12bb41620bb56935c0148fd7c710e5749c5c54ea01c5d1f01ab8c895d4f586ca71a93b82da2c0771625995429c5f5c6e45515552a7ad238825f4de64edea5c552ecbaab6716d078b7ccc5aca12d37d145faa98f6e750367629cdd1438c5323b277080dd88e0efd69e2281c94a9a29d6bed7d4952aa7ca906d6bb73e84cd75c194b0b314f99c6f0cfb71d4dadc2cb459c54928a0f42ecf0fa568b15e487a77d32f7382094df7b1bad5166a3e1898857e9c433a1e7af80463eeba4c56c0ef7f3300a8504ec26a2dd2b7a54e87e0785188bcc4c3f060cdf4288d09c18090d922b4bb330e2ee026813780f1df726f9261b74b8d02cce45756a87610d8476b223037be4ec47d0d529959cd160ec274f3659530127275dc7e8022f5230c1eb86142ead755f3eb99e49c674152d8b4db72367ec4f971e62c631bf3519429d1753fcd8704cb61db0e588c131b88ab3250416036075656ab8ca681afa29c9658fad3c7d940c6e1133124f70605e51d5e4316b73b3c0179b9803eaa6678997a2aa6ec9eefafa10e3934c7d9a9f2b2798d4525ccbeb5af4e77eab52d0caa179ce3f0832e64faa96382fde47e7224eea9a0440c66369ce3c3266b819af51acee569bf86800258059f7bc8a5619cd0c23855d48b3b77300fd877dbaf1879594eb582f7e881f6d6f502eb1189a3578495a78ab858bc8016a7640b9d680f30616168cee662a877858c901dd366c613dd5fb98b1bd26ab5388ca0138360d9417dcb0a762205d012e3e8a669f4af2fe27aaa71aff7366dcd47defc0ebfcce431f6f4917e2165157475f3351b19ba2215fbac087e2118d63c72f46536b61e27144070b934bbe7a13161bb7c7766d349dda0fb8a02da092b01af1605912f8e4408a1827e6a9dab736e45dfb9975c40a5c09c01ed93f0aca38334c4f628b417005c094098b86bfafb1f9b705aa59ebb3de4d97fb44e112854745f9428c208015bd10ef1f2e27586378db71dc14c075b582917ac982003e96d3eda3c9aca239335def887f0cd234a5cc027f324d2143aac13fb3e2981afac3247400f95f719d09958c045f3e005303bdc03a8a0b2034f12e456cb9f81677be144bacfab0b05e7caa4de29b68a7a9b056b5d88cb627da13390e6cc52eaee839e9ce7b7e90727f8d7acfc4c3b127919eb28f0460dec2541046533c676f110832c510188b019726052a826d3f373906150947b477172994f77e42a5f433e28118cd153d43148f5e6f63f00bd0a42741ce4025792f1af85cbf5855b8a4759ecc41a4857c7b5d60a68440754b5d362d3be23a84ea6aff481302a2be4b472f909dc30f275e22bd75c105ad0716fc8bf21d8f1a54b40a769f6ff0751c62c4045f92cb1738f20d7518ab1c1c0c281c74f1ca2d90cdfe865df920d3d3891721545f2eff9026f666b0f873147562b98121a14de112ce0a39293eb8852be3769f647fc6b76c8cfc6cf1c339e343da34c355f17e77e394a5a4b63a077749b67168f8b15a602457b25f0a701962a9cdfac4f4ac3708a7581ea930a80db505c4293d6f36b35aa01c064519b44347165d6ac955d63b90ab1ed9196937038843007e05f0f460b1689111b5af4d36290e5af24c57543f82460b9fa3e25f815d970e9825d0188e1da2bd15391b16c6a0dec89ed0868cef248904b8cd2df803c8e4fb36d34048bb9eaa6acb3dd5612a8446a9cade92ee0ab0d92bde26982aaa5fe0bdc0b7292b85ceaa0bb40d1d6e83af7b8e44496ddf16c8af74348c8339220825dd2a025b7ebb0261dc1c61129e6a25936793a3a8140ee0f9482ca1c09cac52610c5efd62332795260c119759a95475951a03a5c6bce23e93de69112d6778bc75bda4b6c394875265875e5246f06e6567d2367d3a2d562762a38aff804e1bdaa15caf92deef705c7da8527e1acdb2a2410a24673dc339711bdaa712664ea6718c831663e0cc944fdc571889cac7b3aed5269ce7ad99a5b766401ec8dd8a6170387b2020fb408d2851c18a2f1662ecfc2c5bd2494d61b640ada71df3fc6f260df41b2f0ee18fbeb534a190ba6554fe2e4a513a6e0c465dc4e65fe1e2666a58a8c7eb9efdc01306d7c5176ef3b5f79a0d50eb8d64df6bfac5f4233bcf057a2ddc053332b9e83a20bb4e2cf091ed2abe637d703b60309761f5874b461ca925a00ce4deaec33345d71e08586ae91681a25a5a7809e9ef80c341e9db178737c99ac991f8df08045888fa7786ecde29d88395c89eda18a88ec1171f630dbb4b66c342ef7ef48bdd692de74e580a3af8f462913d5addd1332cd0832a88e17cbcd252dd86b8a989e7037aa6fe184798d6a032e94cc0476c545f4378e482fbcfc4d23ffd64468e949808f9c90f19a02839f6ed0a3e323f14cd334834816f6abad82317f2c05598418000bc575cb4ec37a73fb73d6a5ee585e41c1f69d40dbbfaf269dd422ec9562b626df7c556f81591309d936603b938f55100964ce365ba51523654311ce8115e7c6d899c83095d56e6cc1a0ca5a304b945d75faabf07fa1e8af0f2a25eb4437ba9eb350b6053881b7dd3aae7b6aebd41b13ef5b049e67e0314c0e082171a303315744e6d4d9ee834f6ba791558d5414de71b21386fac126f184ce0a873f3a03597639023f43cc41f5ab68c57a982229c9feb4a262f7af9cad7a547c49d9b5840055ac1f78f3c1f3b251048e8f88a5d6f45ca420d84672a74004f5ca7a6f0770b00dbb1a8ff42d442bf3337a6d09bc4c8c2ee2f5c6c9919217654d18e67edc41e043e8fc5ddd4ed85888ac659fce5bdd505ba71d83104c752854db144c181c1c551796cfcc0ec9785c1a617b368cab004c408255e0674c0f21c920dcbe223da3435df29e70d6e94d1b33e33818cee325ebf33ad3743a1fc5ac60cd90e27d5b2e549038d934b4fc15f72891e3cf3982250c106b01c6a4135ef85d57b71d355ac7e55b715bbc7b7da33fbaece316ea57f0f9e0f3a4291886deeae24977e498b8f298808d66f645f3d0099d7af5e19ae54d1ccf859186e3b586d45fbc37136584555e1760a527e9a63104b7900a13da68547c0c99caad2a6c35604c0dad9e1d89262c8cec4ba947146534d83e4254580091f99c2f3d00c0dfe20a983752624c426a132efd67db477d41216d9e50ee945bff84ad5c1ba4dbe50aa57db684d12a66ea4d97f616ff0799d9df2b737fd0508ed162495f2507ebcbc5b5701a37cfaf65f480cbed13478a69df9e8099c4bfd2138a7677e14ab5778286cf5cb31f4d7252fb35f7c8b0aeb30d8a4997e4a436d0c5a9601696d61a10649b4c84fcb4d064ac385beb9cb07147fd3668c193c7f2b0b4afd7fec04f92082092c6a50dfea1a7f03fc7c27acbd4befdf53bac9303c224d45d401e7b295765e7ec8f18b7a0e135d29fdbd0204b96bf757d641f0e27920f49af794d7275339fd9e77d12cfb17bb6dd99abc0f37e948bbdbba117ed533af22257a7dea063366a6e05fa02d2c5718e6b6a0832ae5e80dd12d58d636db1ea94760c68d7c1605f7ae41abb75d9d83aa4185c4520bcc51f66dfa76bba0c460d77016b46f1c8de6d71aed9dec4f5fdeee7d13edf2d53ef19252fe7c8e8fa77418bebf22373b1b3ecd92c7134dba980439c2403ce5f644f17f45fdb0f7bb252ed995fa346ed054bd0eb2835df24bc20bc42fd2ac106e652e4e388c0b5ae0023318b64e888de318d17cd472eff89ae41ea2054080dca8d41267b553bd6b9ed16cd94cdec330295eef5e4849a66094d75811d4328ed88e7afee538bdf05210c86ea635aeeb036e1e6efaa1e7ddabbc62b6cfcc72efaea992ef0b133099269f5d6abd3b7c77a9f651c872b6a98adea8fc1fbe3e4cad83535a6a93a4a77936508c45066db88399dc425423653f735499a71277ef9d423d97cf94a05bbe8c25b7feda292f89468defb69ff8bac4ff369579a5386ad2df8233d621571e6e3a20d175a55ff89dadafe6a64bff9173a80003b6cc383f60f1110db9d0b5a2a4deec33c88149f8ba8a12a7b192b0d0ef558c5f0937d4483ad4b4cf404536ab4f76152948c714b245f64202bee3ea0b94e40cfe5dfd2977ff5b475f17917819cd5bf895e5e240dbaca8fef0542b8a8f2149889c92a89109003d40bb33492036ede324abd845646c6b34f746f01c052fed86401d5dceb86aba6ca5cf7532eecd0773f6e83c8dc219caf1dbb3a3b37114409be9068a77eac137f89e56b39db8510964530ee51f6d04134e9436e9d1c9116d9805b15e9fa22f6a75869d95ad4b7a3c80633713c70611e6311964eb08913fd38fb920cfba4702ca4556c4d8fe5ad374d57d0cc928c85ee44fc989673cc8377d0e684d298e8b169920d795ceb31c2dea49dedb2260139905ee6e2713b17ef74d5c3b8ab672c3cfbc0d96def8a7ffaa46abf550c0e0a7eafca9f042b5185f23493cc674083745279f38cc80f45136e9872273b37275bbe9993696629ee523402d1b1590991fa48018929f42e1d47088401905adca6b3e8c3e6e0e957842fca494df2ee6b69d7437197ba25d743e54923b48674351768407f24850bda1", 0xe00) 5m44.346392858s ago: executing program 1 (id=854): mkdir(&(0x7f0000005740)='./file0\x00', 0x3b) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000580)='tracefs\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) lseek(r0, 0xfffffffffffffffd, 0x0) 5m43.397254895s ago: executing program 1 (id=855): r0 = syz_usb_connect(0x0, 0x24, &(0x7f00000007c0)=ANY=[@ANYBLOB="12010000ed3ec908cd0cb300ea2d010203010902120001000000000904"], 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0xb0}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r3, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_open_dev$cec(&(0x7f0000000100), 0x0, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000000), 0x0, 0x0) ioctl$CEC_ADAP_S_LOG_ADDRS(r4, 0xc05c6104, &(0x7f0000000340)={"6d71f879", 0x5, 0x0, 0x0, 0x0, 0x0, "244a18d1c4e6469a005caf0c0ff58a", "cf4a06d8", "bf513d1d", "136712b9", ["27e203a56a36ac4f0b8b8c4f", "5e10229555954b0f02cd1469", "cb0e83d3a15978155c384d00", "79f56ca74227234da829edb7"]}) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, &(0x7f0000000040)={0x1c, &(0x7f0000000000)=ANY=[], 0x0, 0x0}) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f00000003c0)={0x44, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=@base={0x7, 0x4, 0x8, 0xfffffff3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) syz_usb_connect(0x2, 0x2d, &(0x7f0000000180)=ANY=[@ANYBLOB="1201fb0019030320d812010079de01ec020109021b0001000003000904000001785ecc00090585020004"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) 5m39.892378692s ago: executing program 1 (id=864): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x4000, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x14) move_mount(r0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x240) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000980)={{0x5, 0x10, 0x1, 0x0, 0x0, {0x2}}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000091) 5m37.927714793s ago: executing program 1 (id=866): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) getrlimit(0xf, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x1) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.mem_exclusive\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x400000bce) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) syz_init_net_socket$ax25(0x3, 0x5, 0xc4) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$key(0xf, 0x3, 0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0xc, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, 0x0, &(0x7f0000000280), 0x84, r3}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000380)={r3, &(0x7f0000000240), &(0x7f00000004c0)=""/200}, 0x20) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000009c0)=@bridge_dellink={0x3c, 0x13, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r5}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET={0x18, 0x5, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0x2}, {0x8, 0x1}]}}]}]}, 0x3c}}, 0x0) sendmsg$key(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x2, 0x10, 0x9, 0x2, 0xa, 0x0, 0x70bd2b, 0x25dfdbfd, [@sadb_x_policy={0x8, 0x12, 0x4, 0x4, 0x0, 0x0, 0x80000000, {0x6, 0x32, 0x4, 0x4, 0x0, 0x3, 0x0, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @in=@empty}}]}, 0x50}}, 0x2000c800) syz_emit_vhci(&(0x7f00000009c0)=@HCI_EVENT_PKT={0x4, @hci_ev_sync_conn_complete={{0x2c, 0x11}, {0xf8, 0xc9, @none, 0x2, 0xa, 0x6, 0x5, 0x74, 0x2}}}, 0x14) bind$alg(r1, &(0x7f0000002140)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(michael_mic-generic,xchacha20-generic)\x00'}, 0x58) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x68}}, 0x0) r7 = userfaultfd(0x0) ioctl$UFFDIO_API(r7, 0xc018aa3f, &(0x7f00000000c0)) epoll_create(0xc) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x30}}, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000840)={0x2, 0x4e24, @loopback}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x800000000f, &(0x7f0000000080)=0x7, 0x4) 5m37.421173214s ago: executing program 1 (id=869): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) r0 = getpid() sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)={0x34, 0x0, 0x421, 0x70bd2b, 0x25dfdc00, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x1d}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x2a}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x1d}]}, 0x34}, 0x1, 0x0, 0x0, 0x60000080}, 0x4a884) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0}, 0x4000001) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x3) syz_clone(0x0, 0x0, 0xfffffe11, 0x0, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000bce) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) io_uring_register$IORING_REGISTER_FILES_UPDATE2(0xffffffffffffffff, 0xe, &(0x7f0000000400)={0xcd9, 0x0, &(0x7f0000000040)=[{&(0x7f0000000440)=""/207, 0xcf}, {&(0x7f0000000240)=""/70, 0x46}, {&(0x7f0000000540)=""/63, 0x3f}], &(0x7f0000000440), 0x3}, 0x20) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000e40)='net/mcfilter6\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f00000003c0)=@generic={0x1, 0x1, 0xf33}) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="020101090800000000170006ffffff00030006001000000002000000e0000009f9ff0f0005000000030005007217"], 0x40}}, 0x0) sendmsg$key(r4, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x9, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0xe, @in={0x2, 0x0, @rand_addr=0x64010100}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x89, 0x1}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) lseek(0xffffffffffffffff, 0xfffffffc, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), r1) socket$packet(0x11, 0x3, 0x300) r5 = openat$dir(0xffffffffffffff9c, 0x0, 0x21c0, 0xc) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d40)={0x3, 0xc, &(0x7f0000000a80)=ANY=[@ANYBLOB="18020000080004000000000002000000850000009700000018010000646c6c25001af8ff00000000bfa1000000000900000000000000ffffb702000008000000b70300000000000085000000710000009500"/96], &(0x7f0000000600)='GPL\x00', 0x7, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r6, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xa5bc, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r7 = fanotify_init(0x200, 0x101000) fanotify_mark(r7, 0x201, 0x4800003e, r5, 0x0) unlink(&(0x7f00000000c0)='./file0\x00') dup2(r7, r5) 5m37.343757937s ago: executing program 32 (id=869): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) r0 = getpid() sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)={0x34, 0x0, 0x421, 0x70bd2b, 0x25dfdc00, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x1d}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x2a}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x1d}]}, 0x34}, 0x1, 0x0, 0x0, 0x60000080}, 0x4a884) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0}, 0x4000001) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x3) syz_clone(0x0, 0x0, 0xfffffe11, 0x0, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000bce) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) io_uring_register$IORING_REGISTER_FILES_UPDATE2(0xffffffffffffffff, 0xe, &(0x7f0000000400)={0xcd9, 0x0, &(0x7f0000000040)=[{&(0x7f0000000440)=""/207, 0xcf}, {&(0x7f0000000240)=""/70, 0x46}, {&(0x7f0000000540)=""/63, 0x3f}], &(0x7f0000000440), 0x3}, 0x20) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000e40)='net/mcfilter6\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f00000003c0)=@generic={0x1, 0x1, 0xf33}) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="020101090800000000170006ffffff00030006001000000002000000e0000009f9ff0f0005000000030005007217"], 0x40}}, 0x0) sendmsg$key(r4, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x9, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0xe, @in={0x2, 0x0, @rand_addr=0x64010100}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x89, 0x1}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) lseek(0xffffffffffffffff, 0xfffffffc, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), r1) socket$packet(0x11, 0x3, 0x300) r5 = openat$dir(0xffffffffffffff9c, 0x0, 0x21c0, 0xc) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d40)={0x3, 0xc, &(0x7f0000000a80)=ANY=[@ANYBLOB="18020000080004000000000002000000850000009700000018010000646c6c25001af8ff00000000bfa1000000000900000000000000ffffb702000008000000b70300000000000085000000710000009500"/96], &(0x7f0000000600)='GPL\x00', 0x7, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r6, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xa5bc, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r7 = fanotify_init(0x200, 0x101000) fanotify_mark(r7, 0x201, 0x4800003e, r5, 0x0) unlink(&(0x7f00000000c0)='./file0\x00') dup2(r7, r5) 14.245924749s ago: executing program 0 (id=1964): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_disconnect(0xffffffffffffffff) socket(0x2b, 0x2, 0x1) syz_open_procfs(0x0, &(0x7f0000000280)='net/xfrm_stat\x00') prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r4 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r4, &(0x7f0000019680)=""/102392, 0x18ff8) syz_genetlink_get_family_id$devlink(&(0x7f0000001840), 0xffffffffffffffff) move_pages(r1, 0x2, &(0x7f00000000c0)=[&(0x7f0000097000/0x2000)=nil, &(0x7f0000029000/0x2000)=nil], &(0x7f0000000100)=[0xfffffff7, 0x2], &(0x7f0000000180)=[0x0, 0x0, 0x0], 0x0) 12.919709171s ago: executing program 4 (id=1972): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000280)=0xae, &(0x7f0000000340)=0x4) (fail_nth: 2) 12.764639336s ago: executing program 4 (id=1975): r0 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_SET(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000200)={0x34, r0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_CHANNELS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}]}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x3}]}, 0x34}}, 0x0) 12.244072585s ago: executing program 4 (id=1976): r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, 0x0, 0x0) mkdir(0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r3 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r3, &(0x7f0000019680)=""/102392, 0x18ff8) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) r4 = eventfd(0x4) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000003000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f00000000c0)={0x24, 0x0, 0x0, &(0x7f0000000040), 0x0}, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b4050000200080006110600000000000c60000000000000095000000000000009f33ef60916e6e893f1eeb0be20000d072f5b89c3043c47c896ce0bc8731fa595b6b4d45ef26dcca5582054d54d53cd2b6db714e4b94bdae214fa68a0557eb3c5ca683a4b6fc89398f2b9000f224891060017c4700de60beac671e8e8fdecb03588aa6007e71f871ab5c2ff88afc6002084e5b52710aeee835cf0d78e45f70983826fb8579c1fb47d2c5553d2ccb5fc5b51fe6b174ebd9907dcff414ed55b0d18a93ee341ab59016f81860324b800300000000000092d9c5fe34ccb80a61ffcb3363073fd8962823ee45f5d7394e9510f4a801efdf008499d7aca1afac6c702cfabe8a9c55c8dafcdb110036e14c1035cafdfef6a358cbfadb3579a285580a3c080d4e0a48d7bdc38a0437c8c1b3aa408a"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x12, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@map=r8, r7, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a80)={r8, &(0x7f0000000940), &(0x7f0000000a40)=@tcp6=r6}, 0x20) recvmmsg(r6, &(0x7f0000003680)=[{{0x0, 0x0, 0x0}}], 0x1, 0xf2ff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63, 0x0, &(0x7f00000000c0)='\x00', 0x0, 0x2}, 0x48) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000040)={0x1, r4}) read$eventfd(r4, &(0x7f0000000080), 0x8) sendmsg$kcm(r0, &(0x7f0000000080)={&(0x7f0000000000)=@hci={0x1f, 0xdd86, 0x2}, 0x80, &(0x7f0000000600)}, 0x0) 12.192775757s ago: executing program 5 (id=1977): mkdir(&(0x7f0000000440)='./file1\x00', 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r0}, 0x18) r1 = socket$tipc(0x1e, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002080)='net/bnep\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bind$unix(r6, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0) ioctl$SG_BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000340)={'\x00', 0x4, 0x1, 0x8, 0x40, 0x9, r2}) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1/file3\x00', 0x0) r7 = landlock_create_ruleset(&(0x7f0000000200)={0x65d5}, 0x10, 0x0) landlock_restrict_self(r7, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000180)='./file1/file3\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2) mount$overlay(0x0, 0x0, &(0x7f0000000080), 0x400, 0x0) semget$private(0x0, 0x4, 0x801) mount(0x0, &(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, &(0x7f0000000300)='usrquota') chdir(&(0x7f0000000080)='./file1\x00') r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000002e00)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000696c6c2500000000002120207b1a00fe00000000bfa10000000000000701000078ffffffb702000008000000b70300000000000085000000c700000095"], &(0x7f0000000040)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) quotactl_fd$Q_SETQUOTA(r8, 0xffffffff80000800, 0x0, &(0x7f0000000480)={0x0, 0x9, 0x7, 0x8000000000000001, 0xfffffffffffffffc, 0x0, 0x8a, 0x8001, 0xffff}) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f00000000c0), &(0x7f00000002c0)=0x4) 5.171542939s ago: executing program 0 (id=1979): r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) (async) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CAP_X2APIC_API(r2, 0x4068aea3, &(0x7f0000000180)={0x81, 0x0, 0x1}) fcntl$dupfd(r0, 0x0, r0) (async) r3 = fcntl$dupfd(r0, 0x0, r0) write$sndseq(r3, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x0, @tick=0x2f, {}, {}, @raw32}, {0x0, 0x2, 0x0, 0x0, @time={0x0, 0xfffefffd}, {0x20}, {}, @result={0x3, 0xfd}}, {0x5c, 0xb, 0x2, 0xa5, @tick=0x80, {0x61, 0xc}, {0xff, 0x8}, @control={0x9, 0x6, 0x6}}, {0x3, 0x4, 0xc, 0xfc, @time={0x7}, {0x8c, 0x7f}, {0xb, 0x8}, @note={0x10, 0x80, 0x9, 0x2, 0x3}}], 0x70) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r6 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000400)) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)={0x28, r5, 0x3196aee33d918dfd, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r7}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local}]}, 0x28}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) (async) r9 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) r10 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) dup3(r3, r3, 0x80000) (async) dup3(r3, r3, 0x80000) io_setup(0x801, &(0x7f0000000040)=0x0) bind$inet(r3, &(0x7f0000000200)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) r12 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup(r12) ioctl$FIONCLEX(r12, 0x5450) io_submit(r11, 0x1, &(0x7f0000000340)=[&(0x7f0000004280)={0x0, 0x0, 0x0, 0x5, 0x0, r9, 0x0}]) (async) io_submit(r11, 0x1, &(0x7f0000000340)=[&(0x7f0000004280)={0x0, 0x0, 0x0, 0x5, 0x0, r9, 0x0}]) ioctl$BINDER_WRITE_READ(r10, 0xc0306201, &(0x7f00000001c0)={0x4c, 0x0, &(0x7f0000000540)=[@transaction_sg={0x40486311, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) r13 = syz_open_dev$dri(&(0x7f0000000240), 0xfffffffffffffff7, 0x4001) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(r3, 0xc01064c2, &(0x7f0000000280)={0x0, 0x0, r3}) ioctl$DRM_IOCTL_SYNCOBJ_SIGNAL(r13, 0xc01064c5, &(0x7f0000000300)={&(0x7f00000002c0)=[r14], 0x1}) (async) ioctl$DRM_IOCTL_SYNCOBJ_SIGNAL(r13, 0xc01064c5, &(0x7f0000000300)={&(0x7f00000002c0)=[r14], 0x1}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x3c, 0x24, 0x100, 0x0, 0x65dfdbfb, {0x0, 0x0, 0x0, 0x0, {0xffff}, {0xffff, 0xfff1}}, [@qdisc_kind_options=@q_fq_pie={{0xb}, {0xc, 0x8002, [@TCA_FQ_PIE_LIMIT={0x8, 0x1, 0x6}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x10) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x3c, 0x24, 0x100, 0x0, 0x65dfdbfb, {0x0, 0x0, 0x0, 0x0, {0xffff}, {0xffff, 0xfff1}}, [@qdisc_kind_options=@q_fq_pie={{0xb}, {0xc, 0x8002, [@TCA_FQ_PIE_LIMIT={0x8, 0x1, 0x6}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x10) sendmsg$nl_route(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="500000001000010425bbe5ad600027842cf52300", @ANYRES32=0x0, @ANYBLOB="0000000000008000280012800a00010076786c616e00"], 0x50}}, 0x4008840) 5.158949065s ago: executing program 4 (id=1980): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket(0x10, 0x400000000080803, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000480)=@ethtool_ringparam={0x4, 0x0, 0x5, 0x0, 0x8fc3, 0x1, 0x20000, 0x0, 0xf}}) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000600)={@map=r4, 0x2e, 0x1, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0x4, &(0x7f0000000340)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) write$bt_hci(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="4300000002"], 0x8) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="88000000000101040000000000000000020000002c00018014000180080001007f00000108000200e00000020c000280050001000000000006000340000300002400028014000180080001000000000008000200ac1414bb0c000280050001000000000008000740000000001c000f8008000140000000000800034000000000080002"], 0x88}}, 0x0) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$KVM_SET_DEVICE_ATTR_vm(r4, 0x4018aee1, &(0x7f00000001c0)=@attr_other={0x0, 0x8b69, 0x8, &(0x7f00000000c0)=0x3ff}) syz_usb_connect(0x0, 0x24, &(0x7f00000003c0)={{0x12, 0x1, 0x251, 0x8f, 0x56, 0x1c, 0x40, 0x923, 0x10f, 0xb0fa, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x1, 0x1, 0x0, 0x6, [{{0x9, 0x4, 0x14, 0x2, 0x0, 0xce, 0xda, 0x6c, 0x6}}]}}]}}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0}) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, 0x0, 0x5a) 4.264429329s ago: executing program 5 (id=1982): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) select(0xff42, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x700}, 0x0, &(0x7f0000000100), &(0x7f0000000140)={0x77359400}) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000bce) socketpair$unix(0x1, 0x2, 0x0, 0x0) syz_usb_disconnect(0xffffffffffffffff) r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000340)=[{0x0, 0x2, {0x2, 0xf0, 0x2}, {0x1, 0xff, 0x4}, 0x1, 0x1}], 0x20) mbind(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2, &(0x7f0000000300)=0x2, 0x1ff, 0x3) socketpair$unix(0x1, 0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x1) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) openat$nullb(0xffffffffffffff9c, 0x0, 0x16b802, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') read$FUSE(r3, &(0x7f0000003480)={0x2020}, 0x2020) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f00000002c0)=[{r5}], 0x1, 0x83a4) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r6, 0x0) fcntl$setpipe(r5, 0x407, 0x0) read$char_usb(r4, &(0x7f0000000100)=""/124, 0x7c) write$char_usb(r5, &(0x7f0000000440), 0x0) 4.248905336s ago: executing program 2 (id=1983): r0 = socket$rxrpc(0x21, 0x2, 0xa) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async, rerun: 32) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (rerun: 32) r2 = openat$cgroup_int(r1, &(0x7f0000000200)='hugetlb.1GB.rsvd.max_usage_in_bytes\x00', 0x2, 0x0) r3 = openat$sequencer(0xffffff9c, &(0x7f0000004700), 0x0, 0x0) (async) r4 = socket$caif_stream(0x25, 0x1, 0x4) close_range(r3, r4, 0x0) (async) sendfile(r0, r2, 0x0, 0x9c) 4.057042612s ago: executing program 2 (id=1984): r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f00000000c0)={0x1d, r1, 0x0, {0x0, 0xf0}}, 0x18) socket$can_j1939(0x1d, 0x2, 0x7) r2 = syz_open_dev$media(&(0x7f0000000040), 0xff, 0x72002) writev(r2, &(0x7f0000002800)=[{&(0x7f0000000140)="3fba3d96c8f7be54e89f121e49d4e19ead3f3fc98d231011bc4854000000003913294a17c016dcf47c3566bba15e3f959b2495ead7d0210cfdabaf8401b201158f1ffb7e0031547e0bc7cc90424f0824a28ec7b122d516090000005f2be3d7ab4463247b7ada6b8e0000000000000000", 0x70}], 0x1) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffe}}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r4 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r4, &(0x7f0000019680)=""/102392, 0x18ff8) sched_setaffinity(0x0, 0xfffffef7, &(0x7f0000000740)=0x410000002) socket$key(0xf, 0x3, 0x2) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000032000107fcffffff0000000006"], 0x14}}, 0x0) 4.022770028s ago: executing program 3 (id=1985): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000480)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x6a) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000480)='cgroup.procs\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000480)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000001c0), 0x12) readv(r3, &(0x7f0000000440)=[{&(0x7f0000000280)=""/153, 0x99}], 0x1) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000040)={0x0, @adiantum, 0x0, @desc4}) getsockopt$bt_BT_FLUSHABLE(r6, 0x112, 0x8, &(0x7f0000000280)=0xae, &(0x7f0000000340)=0x4) 3.564696027s ago: executing program 0 (id=1986): r0 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_SET(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000200)={0x34, r0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_CHANNELS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}]}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x3}]}, 0x34}}, 0x0) 3.100104232s ago: executing program 2 (id=1987): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000300)=0x7) syz_emit_vhci(&(0x7f0000000480)=ANY=[], 0x7) sched_setscheduler(0x0, 0x5, &(0x7f0000000340)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) fchdir(0xffffffffffffffff) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setaffinity(0x0, 0x51, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap$KVM_VCPU(&(0x7f0000ffb000/0x2000)=nil, 0x930, 0x1000002, 0x4018831, 0xffffffffffffffff, 0x0) userfaultfd(0x80801) r3 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r3, &(0x7f0000000800)={0x18, 0x2, {0xfeff, @loopback}}, 0x1e) connect$pptp(r3, &(0x7f0000000300)={0x18, 0x2, {0x0, @multicast1}}, 0x1e) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) r5 = socket(0x27, 0x2, 0x10000000000002) sendmmsg(r5, &(0x7f0000000080)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001780)=ANY=[@ANYBLOB="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"], 0x118, 0xe000}, 0x5}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)}}], 0x2, 0xc800) recvmsg$kcm(r5, &(0x7f0000000100)={&(0x7f0000000180)=@isdn, 0x80, &(0x7f0000001680)=[{&(0x7f0000000000)=""/49, 0x31}, {&(0x7f0000000240)=""/146, 0x92}, {&(0x7f0000000380)=""/73, 0x49}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000400)=""/175, 0xaf}], 0x5, &(0x7f0000001700)=""/83, 0x53}, 0x82) 3.099251991s ago: executing program 3 (id=1988): openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01060000000000000000010000000900010073797a300000000040000000030a05000000000000000000010000000900030073797a32000000000900010073797a300000000014000480080002405899a47b08000140000000ff0f0000000000000400000000000000000100000008000b40000000000900010073797a30000000000400048014000000110001000000000000243bb2a231ef04"], 0xb4}}, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x100008b}, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{}, {0x77359400}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x400000bce) mprotect(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x3000016) syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) rt_sigqueueinfo(0x0, 0x38, &(0x7f0000000140)={0x7, 0x9, 0x6}) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x1) socket$inet6_udp(0xa, 0x2, 0x0) io_uring_register$IORING_REGISTER_PBUF_RING(0xffffffffffffffff, 0x16, &(0x7f0000000380)={&(0x7f0000001000)}, 0x1) io_uring_enter(0xffffffffffffffff, 0x27e2, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x2a, 0x2, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg$inet(r2, &(0x7f0000000a80)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2a947354495ee7d43ad76e0880fbf78e993afbfe90a44de4a12b00484f9f2646cfa901000000b654933bef6ff86be62063eb6a5fd31740d1e8f03b4f94a035855eb2ba64592b85d3a386f199f74474d80039b40f676e4cc9643ce9e8bdb12910ad632ba38746b2a3d52863a530c334df95850ccf3353910df7bfc340c2c5cd0bbe149921557eef18dc7a6820b3e68ef1385ebe3453e0f054f40fdb4759f95e30390fbdd488d081beacbf4d90a221de4b2b5942b738866c999dbf7b48b1970b", 0xbf}, {&(0x7f0000000200)="b350d8a459dc6b65dfaa287643d5b1027adfe9647a77c6f4f115dc6063f7e73a82768ebea104788e997d0d02a5440e124bdf947c3bdf64940eeaacdf8f7fbabfe6303126baeb8979bfdb39fe549c3b2c5d23dbd3944c7992e1c77a13dc4d56603512391ef40b3ebfa64d4008ef85c5", 0x6f}, {&(0x7f00000002c0)="3cd723b82355ed9f78cda5c2bf7ee6b9e733a0427ae2272c0729a2e9e28b2beae4b862c9ac320d4151dcd3cae35dd3985b6e2d0687f94a8757bb22c4b8c226adc39db9d2d78cb80d28e4c482c5fac2bd579aecaee505da13b3b5b81c7b10cf2fe27b946272df15372e8b92030feed43d801703f0e2e294744679b7e47f8192f8e25a8f34056543a8c620", 0x8a}], 0x3}}, {{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000b00)="4ef9147973bd0daa097ce373d9ebdc8ca4d7c269fd822c94cb42e885278e40ea11080ed01fca0b86d564d9cc7082dd4ad30734f9c0bb43d6394edc1cc3d6e50febd1ed302ad1f3c05203fdbe6608cbe4614bde9f88e811633ee37d751eaf0a9770c974b149666896f645dee19eac07495a87a39e90138b5a23dc5c6fb8543c4b4a56b104d3a6", 0x86}], 0x1}}], 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000600)=0xdfa, 0x4) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[], 0x420) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000005c0)=@newqdisc={0x24, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0x0, 0xf}}}, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) 2.981059508s ago: executing program 0 (id=1989): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a000020095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) select(0xff42, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x700}, 0x0, &(0x7f0000000100), &(0x7f0000000140)={0x77359400}) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000bce) prlimit64(0x0, 0xe, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) syz_usb_disconnect(0xffffffffffffffff) r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000340)=[{0x0, 0x2, {0x2, 0xf0, 0x2}, {0x1, 0xff, 0x4}, 0x1, 0x1}], 0x20) mbind(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2, 0x0, 0x1ff, 0x3) socketpair$unix(0x1, 0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x1) r2 = syz_open_dev$MSR(0x0, 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) openat$nullb(0xffffffffffffff9c, 0x0, 0x16b802, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') read$FUSE(r3, &(0x7f0000003480)={0x2020}, 0x2020) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f00000002c0)=[{r5}], 0x1, 0x83a4) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r6, 0x0) read$char_usb(r4, &(0x7f0000000100)=""/124, 0x7c) write$char_usb(r5, &(0x7f0000000440)="93", 0x1) 2.475226779s ago: executing program 5 (id=1990): r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) move_pages(r0, 0x2, &(0x7f00000000c0)=[&(0x7f0000097000/0x2000)=nil, &(0x7f0000029000/0x2000)=nil], &(0x7f0000000100)=[0xfffffff7, 0x2], &(0x7f0000000180)=[0x0, 0x0, 0x0], 0x0) 2.397775768s ago: executing program 5 (id=1991): futex(0x0, 0xb, 0x0, 0x0, 0x0, 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000bce) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x140, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) getrusage(0x0, &(0x7f0000000700)) ioctl$GIO_UNIMAP(r1, 0x4b66, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x7) ioctl$TCSETA(0xffffffffffffffff, 0x8924, 0x0) migrate_pages(0x0, 0x8, &(0x7f0000000140)=0x3, 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="4000000012000501"], 0x40}}, 0x0) 1.939962999s ago: executing program 3 (id=1992): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x12, 0x4, &(0x7f0000000080)=@framed={{}, [@ldst={0x2, 0x0, 0x3, 0x1, 0x0, 0x28}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = syz_open_dev$video(&(0x7f0000000040), 0x5968, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000000)={0x5, {0x3, 0xf, 0x47, 0x7fff}, {0xe, 0x1, 0x3, 0x6}, {0x7, 0x5}}) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@delneigh={0x28, 0x1d, 0x1, 0x70bd27, 0x25dfdbfc, {0x2, 0x0, 0x0, r3, 0x2, 0xc4ba717e2e5daad0, 0x7}, [@NDA_DST_MAC={0xa}]}, 0x28}, 0x1, 0x0, 0x0, 0x20040100}, 0x800) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r5, 0x0) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000580)={0x1, 0x9, 0x5, 0x84800}) syz_emit_ethernet(0x4a, &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5010000090780000"], 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) fremovexattr(r6, &(0x7f0000000000)=@known='system.posix_acl_access\x00') setsockopt$inet6_dccp_buf(r6, 0x21, 0xe, &(0x7f0000000480)="4393f01a16ad1a468e1f950c1f77cab18f62f07c5b40cb460984ea9192dbf5e5074d6f2d3961f899221fa802e818a1247fdf468e81312deb7838058f741f00a6e2f75a4a42fd92ad95eef1ce0baf13ceec44daceeb509fb8dd34a56fd67ff78c21ec96d428994f57204ee51bc670ea7cc979ae96f26675be453d656c0a5c644367321c2d16235c1bd25ce344ca38a8716fcf5f1eb12c4cdf0f4e3efc6bb59a26acf9cbcfc7eb5348eb61e7db24cc14287bd042dc7014e79ae8516c65d11db9bbd0906cc28e2e378bf40d01c227fb08515426a77ef52cf2", 0xd7) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000240)={'erspan0\x00', &(0x7f0000000180)={'gretap0\x00', 0x0, 0x80, 0x8, 0xffffffff, 0x0, {{0x1c, 0x4, 0x1, 0x2, 0x70, 0x64, 0x0, 0x2, 0x4, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}, {[@timestamp={0x44, 0x8, 0xa8, 0x0, 0x0, [0x8]}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0xb, 0x67, [@multicast2, @broadcast]}, @end, @rr={0x7, 0xb, 0x28, [@loopback, @dev={0xac, 0x14, 0x14, 0x41}]}, @generic={0x44, 0x7, "d56e5344a4"}, @timestamp_addr={0x44, 0x24, 0x9f, 0x1, 0x1, [{@dev={0xac, 0x14, 0x14, 0x38}, 0x7}, {@rand_addr=0x64010101, 0x6}, {@dev={0xac, 0x14, 0x14, 0x28}, 0x2}, {@remote, 0x3}]}, @ssrr={0x89, 0xb, 0xc0, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x34}]}]}}}}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={@local, @dev={0xfe, 0x80, '\x00', 0x3b}, @private2, 0x6, 0x9, 0x81, 0x80, 0x3, 0x40, r7}) 1.921834947s ago: executing program 5 (id=1993): r0 = socket$inet6(0xa, 0x3, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000080)=ANY=[], 0x8) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000040)=0xffffff02, 0x4) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7fbf, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 1.761095279s ago: executing program 2 (id=1994): socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x6) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) modify_ldt$write(0x1, &(0x7f0000000000)={0x9, 0x20000800}, 0x10) syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x3}, @void, {@ipv4={0x800, @tcp={{0xb, 0x4, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@rr={0x7, 0xf, 0x8, [@multicast2, @remote, @multicast2]}, @ssrr={0x89, 0x3, 0xd7}, @timestamp={0x44, 0x4}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r3 = dup(0xffffffffffffffff) write$6lowpan_enable(r3, &(0x7f0000000000)='0', 0xfffffd2c) sendmsg$TIPC_CMD_SET_LINK_TOL(r3, &(0x7f0000019200)={&(0x7f00000190c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000191c0)={&(0x7f0000019140)={0x68, 0x0, 0x300, 0x70bd2b, 0x25dfdbfc, {{}, {}, {0x4c, 0x18, {0x2, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000080}, 0xc000) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@ipv6_newaddrlabel={0x38, 0x48, 0x3, 0x0, 0x0, {}, [@IFAL_LABEL={0x8}, @IFAL_ADDRESS={0x14, 0x1, @loopback}]}, 0x38}}, 0x0) 1.717281987s ago: executing program 5 (id=1995): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) utimes(&(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)={{0x77359400}}) (fail_nth: 1) syz_usb_connect$cdc_ncm(0x4, 0x0, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='nfsd\x00', 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='contention_end\x00', r3}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=@newlink={0x2c, 0x10, 0x801, 0x70bd26, 0x100, {}, [@IFLA_GROUP={0x8}, @IFLA_PORT_SELF={0x4}]}, 0x2c}}, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000640)=@broute={'broute\x00', 0x20, 0x1, 0x170, [], 0x0, 0x0, 0x0}, 0x1e8) r5 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000700)={'vcan0\x00', 0x0}) bind$can_j1939(r5, &(0x7f0000000740)={0x1d, r6, 0x3, {0x2, 0x0, 0x2}, 0xfe}, 0x18) getsockname$packet(r1, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r8 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000400), r0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x38, r8, 0x8, 0x70bd2d, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR_REMOTE={0x1c, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r7}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @loopback}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x2004c004}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="3c0000001000850600000000ff6122314a000800", @ANYRES32=r7, @ANYBLOB="00001000252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x40000) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 1.711540477s ago: executing program 3 (id=1996): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="b4080000000000007311497f000000008510000002000000b7000000000000009500c200000000009500001200000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_RATE_GET(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x34, r0, 0x1, 0x0, 0x0, {0x41}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x18, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='contention_end\x00', r2, 0x0, 0x1}, 0x18) r3 = syz_open_dev$media(&(0x7f0000000100), 0x0, 0x0) r4 = dup2(r3, r3) ioctl$MEDIA_IOC_ENUM_ENTITIES(r4, 0xc1007c01, &(0x7f0000000140)) 1.537937214s ago: executing program 3 (id=1997): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) dup(r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x10, &(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x8, 0xba, &(0x7f0000000140)=""/186, 0x41000, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x6) ioctl$CEC_ADAP_S_LOG_ADDRS(0xffffffffffffffff, 0xc05c6104, &(0x7f0000000500)={"a0453822", 0x0, 0x6, 0x2, 0x0, 0x0, "33793e77df2a87ba315ab8da00", "f9fe8002", "acc28000", "1eb15fbb", ["d8085781ae0cff21223446fe", "51f3d17dc9ed6f291acb3a10", "2ce50f8a285d9500c522afe1", '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00']}) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0xfffffffffffffc33, &(0x7f0000000280)=0x2) r4 = mq_open(&(0x7f0000001140)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xd3\xa7\xd8J\xfd\x94#KT\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\x88N\xb8\xde\xeb)\xcd\xc56m\n\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88|0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc\x02\xea\x91\xe8\xd8\x01YZy\xe6!\x89\x9c\xd1\xa6\x167\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1[\x84\x10aF\x9b\xda\xeb\xc4*\x02q\xb2\x92\x00\x8cv\xac AN\xb9\xaa\xe0\x9d\x97Te\x81\x98L\xfe\x97+u\xd3^\xb1\xf0\xe0\x1f\xbd\a\xbb\xe5\x18\x9ds\x12ha\x00\xeb\x84\x99\xc6\x0f\xf1\xd5LD\xa87\xa0DQ\x8a2\x16!8,\xbc%$\xf1\xf2\xd6\x9cy\xecK\xda\xc5\xdc\xfa\xdd\xf6\b\xc6\xb4\x14\x16\x9c\x7f\x92\x85\xb0\xa2%:\xf0\xf4\x150\x0f\xb4\xa6d\xb4\xe4L\x19W\xd5\x90\xf7l\x1b\xfe\xde\vh\x97=m\x82.\xac\vh\xfe\x84Q}\x838/\x83\xebP\xbe\xd6+:\xceE\\\x95\xd4\xac\x92\x87\xd7\x98\x97\xe3\xec\xad\xd5\xac\x80C\x84R\x88r^g\xbaQ(\x9a>\xe2\xba\xa8=\x17\f04\x8f\x1f\xf2\x88*@v\xe7\xd1\xee\xb3\xc2\x8dT\xda\x81g\xd9\x1a:hzW6s)x\x06\xae\x11\xf2\x1e\xcd\v\xe5L\x19\x96s\xbc\x9e\xf4\x10$\r\xa4\xd8\xa2\xa2\xfcM\xc5R3~$\xc0\xa5n\x9a W\xb1e\xcc<$\xdf\x15\f]\x15\xf5#G\xce\xaf\x88U\xfa\x80\xf24\xf6\xb5\xef\xe2z\xcf\x9eN\x92\xac\x81{\xe6\xbd\xd7\x16\xe6F\xe2\x9e\x91%\x94\v\xb9\xdc\xd6\x87\x8f\xcd\xc1\xb05\x81\x81\xf8\xe9X\xe8Kt9@\xf4\xe1\xa6=\xc9\xe1:p4\nP[f\x1d\xfd\xfa\x839\x8d\x0e\xd1\xf9\xa0\xd2^E\xe5\xedo.\xaa\xf2\xb4\xcdn\x14\f\xcd\x83_yk\xda\xc5\x89\xf0Z\xea\x1d\xbd\xc00\v\xa3\xb3\xbe\xe6\x8b\x18/\xa8\xaaY\xf2\x89\x0f\x9enOOr\x00\xb2\x01\x1f:Z\xb8\xee;\xe3;\x8aPV\xce\xee\xf8[\x16\n\xe6:z\xb8\x1dvk\a{\xc1\x14\xd9+\xdb\t\x11\x90y\xe8\\\xe6\xfc\xca\xb4\xcbC\xd6\xd0\xbeC\xce\xc0L\xdb\xcd\xb3\x907c\xb4\xa6\xce\xdb[\xce\x122N\xa3\xc7Q<\x1a\xa5\xb3)\xc5\x98\x84\x8a\x82\x19\xb0\t\xac\x10\\\x8c\xbe\xcb\raIYe[\xa8\xc4\xac\x0e\xbb\x0f\b^\xdag\xe2\xa9\"\xf5h\'\xcf\xd9\x1b\xef\xe3\xe7y\x82\x1e\xca\x7f\x02 \xcf\x9e\xe0\xd9TM\xb9\n\xa9\xad3\x91\xa5\xe6!\xcd\xa2\xa4\x14\x12\xf9\xbf\xa8b\xcec:\xd7\'\f\f\x957\xc9}\r\xa6\xaa\x0f\xca\x96\xeb', 0x42, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x24, r6, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_START_AP(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x6c, r6, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}, [@beacon=[@NL80211_ATTR_BEACON_TAIL={0x1d, 0xf, [@cf={0x4, 0x6, {0x5, 0x0, 0x4, 0x400}}, @mesh_config={0x71, 0x7, {0x1, 0x0, 0x1, 0x1, 0xffffffffffffffff, 0x37, 0x68}}, @mesh_chsw={0x76, 0x6, {0x7, 0x1, 0x37, 0x7}}]}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8}, @beacon=[@NL80211_ATTR_FTM_RESPONDER={0x18, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_ENABLED={0x4}, @NL80211_FTM_RESP_ATTR_LCI={0x6, 0x2, "1952"}, @NL80211_FTM_RESP_ATTR_CIVICLOC={0x5, 0x3, 'X'}]}]]}, 0x6c}}, 0x0) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r4, 0x0, 0x0, 0x6, 0x0) mq_unlink(&(0x7f0000000000)='eth0\x00') close(r4) socket$inet_tcp(0x2, 0x1, 0x0) r8 = memfd_secret(0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa, 0x11, r8, 0x0) ftruncate(r8, 0x51a9497) 1.380973599s ago: executing program 4 (id=1998): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000070000000900010073797a30000000004c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a3000000000080005400000000d08000640ffffff000800034000000038580000000c0a01010000000000000000070000000900020073797a31000000000900010073797a30000000002c000380280000800800034000000002040002800c000440000010c6f7a0b5ec0c000540"], 0xec}}, 0x8890) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r4 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000200)=@newqdisc={0x98, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r5, {0x0, 0xfff2}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x68, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [0x0, 0x0, 0x0, 0x0, 0x1], 0x0, [0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400], [0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400]}}, @TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME_EXTENSION={0xc, 0x9, 0x4}]}}]}, 0x98}}, 0x0) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0x0, 0x10, 0x18}, 0xc) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x4, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x2, 0x0, @void, @value, @void, @value}, 0x50) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)={0x1b, 0x0, 0x0, 0xf2, 0x0, 0xffffffffffffffff, 0x80000001, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x4, 0x0, @void, @value, @void, @value}, 0x50) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000480)=@o_path={&(0x7f0000000440)='./file0\x00', 0x0, 0x4000, r0}, 0x18) r11 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r12 = dup(r11) write$6lowpan_enable(r12, &(0x7f0000000000)='0', 0xfffffd2c) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000004c0)={0x1, 0xffffffffffffffff}, 0x4) r14 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r14, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r15 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r16 = socket(0x10, 0x3, 0x0) r17 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r17, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r16, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newqdisc={0x3c, 0x24, 0x3fe3aa0262d8c583, 0x0, 0x0, {0x0, 0x0, 0x0, r18, {}, {0xffff, 0xffff}, {0xffe0}}, [@qdisc_kind_options=@q_fq_pie={{0xb}, {0xc, 0x8002, [@TCA_FQ_PIE_ECN_PROB={0x8, 0x9, 0x10}]}}]}, 0x3c}}, 0x20000014) write$cgroup_int(r15, &(0x7f0000000000)=0x416eb135, 0x12) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x1b, &(0x7f0000000040)=ANY=[@ANYBLOB="8500000081000000183800000400000000000000000000007756ffff01000000851000000500000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800006f1bcd477b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000850000008200000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000c00180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000030000008500000006000000"], &(0x7f0000000140)='GPL\x00', 0x8, 0x6e, &(0x7f0000000200)=""/110, 0x41100, 0x34, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x2, 0x6, 0x3c}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000500)=[r7, r8, r9, r10, r12, r13, r14, r15, 0xffffffffffffffff], &(0x7f0000000540)=[{0x4, 0x5, 0xd, 0x3}, {0x2, 0x2, 0x7, 0x5}, {0x1, 0x4, 0x0, 0x8}, {0x2, 0x3, 0x3, 0x8}, {0x1, 0x4, 0x3, 0x8}], 0x10, 0x122, @void, @value}, 0x94) 585.680716ms ago: executing program 2 (id=1999): r0 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_SET(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000200)={0x34, r0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_CHANNELS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}]}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x3}]}, 0x34}}, 0x0) 522.016235ms ago: executing program 0 (id=2000): bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1b, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) pipe(0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x6) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0xffffffffffffff2b, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000540)=ANY=[@ANYRES32=0x0], 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000004340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0x1c, r3, 0x331, 0x0, 0x0, {0x8}, [@BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x1c}}, 0x0) add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f0000000640), 0x0, 0xfffffffffffffffd) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4b8, 0x0, 0x940c, 0x3002, 0x0, 0x2c0, 0x3e8, 0x3d8, 0x3d8, 0x3e8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x4001, 0x1, 0x3, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x2, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [0xffffff00, 0xffffffff, 0xffffffff, 0xffffffff], 0x4e21, 0x4e23, 0x4e23, 0x4e20, 0x4, 0x1, 0x4, 0xd, 0x3}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) 469.250998ms ago: executing program 2 (id=2001): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000900)=[@in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x0, 0x0, @loopback}], 0x2c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000500)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x3f8, 0x0, 0x32}, 0x9c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000200)=0x7, 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0xfee4, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='J', 0x3b4}], 0x1) 429.208737ms ago: executing program 4 (id=2002): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_disconnect(0xffffffffffffffff) socket(0x2b, 0x2, 0x1) syz_open_procfs(0x0, &(0x7f0000000280)='net/xfrm_stat\x00') prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r4 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r4, &(0x7f0000019680)=""/102392, 0x18ff8) syz_genetlink_get_family_id$devlink(&(0x7f0000001840), 0xffffffffffffffff) move_pages(r1, 0x2, &(0x7f00000000c0)=[&(0x7f0000097000/0x2000)=nil, &(0x7f0000029000/0x2000)=nil], &(0x7f0000000100)=[0xfffffff7, 0x2], &(0x7f0000000180)=[0x0, 0x0, 0x0], 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_open_dev$vim2m(&(0x7f0000000000), 0x7, 0x2) ioctl$vim2m_VIDIOC_S_FMT(r5, 0xc0d05605, &(0x7f00000005c0)={0x1, @pix_mp={0x3ff, 0xfffffffe, 0x34325241, 0x3, 0x0, [{0x8, 0xf}, {0x8, 0x29f6ebcd}, {0xd, 0x8}, {0x5, 0x8}, {0x2, 0x6f}, {0x0, 0x3}, {0x6, 0x409}, {0x10001, 0x1800000}], 0x0, 0xd, 0x2, 0x3078182a3427730f, 0x1}}) userfaultfd(0x80001) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000440)=0x8, 0x4) 410.54399ms ago: executing program 3 (id=2003): openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01060000000000000000010000000900010073797a300000000040000000030a05000000000000000000010000000900030073797a32000000000900010073797a300000000014000480080002405899a47b08000140000000ff0f0000000000000400000000000000000100000008000b40000000000900010073797a30000000000400048014000000110001000000000000243bb2a231ef04"], 0xb4}}, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x100008b}, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{}, {0x77359400}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x400000bce) mprotect(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x3000016) syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) rt_sigqueueinfo(0x0, 0x38, &(0x7f0000000140)={0x7, 0x9, 0x6}) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x1) socket$inet6_udp(0xa, 0x2, 0x0) io_uring_register$IORING_REGISTER_PBUF_RING(0xffffffffffffffff, 0x16, &(0x7f0000000380)={&(0x7f0000001000)}, 0x1) io_uring_enter(0xffffffffffffffff, 0x27e2, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x2a, 0x2, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg$inet(r2, &(0x7f0000000a80)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2a947354495ee7d43ad76e0880fbf78e993afbfe90a44de4a12b00484f9f2646cfa901000000b654933bef6ff86be62063eb6a5fd31740d1e8f03b4f94a035855eb2ba64592b85d3a386f199f74474d80039b40f676e4cc9643ce9e8bdb12910ad632ba38746b2a3d52863a530c334df95850ccf3353910df7bfc340c2c5cd0bbe149921557eef18dc7a6820b3e68ef1385ebe3453e0f054f40fdb4759f95e30390fbdd488d081beacbf4d90a221de4b2b5942b738866c999dbf7b48b1970b", 0xbf}, {&(0x7f0000000200)="b350d8a459dc6b65dfaa287643d5b1027adfe9647a77c6f4f115dc6063f7e73a82768ebea104788e997d0d02a5440e124bdf947c3bdf64940eeaacdf8f7fbabfe6303126baeb8979bfdb39fe549c3b2c5d23dbd3944c7992e1c77a13dc4d56603512391ef40b3ebfa64d4008ef85c5", 0x6f}, {&(0x7f00000002c0)="3cd723b82355ed9f78cda5c2bf7ee6b9e733a0427ae2272c0729a2e9e28b2beae4b862c9ac320d4151dcd3cae35dd3985b6e2d0687f94a8757bb22c4b8c226adc39db9d2d78cb80d28e4c482c5fac2bd579aecaee505da13b3b5b81c7b10cf2fe27b946272df15372e8b92030feed43d801703f0e2e294744679b7e47f8192f8e25a8f34056543a8c620", 0x8a}], 0x3}}, {{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000b00)="4ef9147973bd0daa097ce373d9ebdc8ca4d7c269fd822c94cb42e885278e40ea11080ed01fca0b86d564d9cc7082dd4ad30734f9c0bb43d6394edc1cc3d6e50febd1ed302ad1f3c05203fdbe6608cbe4614bde9f88e811633ee37d751eaf0a9770c974b149666896f645dee19eac07495a87a39e90138b5a23dc5c6fb8543c4b4a56b104d3a6", 0x86}], 0x1}}], 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000600)=0xdfa, 0x4) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[], 0x420) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000005c0)=@newqdisc={0x24, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0x0, 0xf}}}, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) 0s ago: executing program 0 (id=2004): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000340), 0x0, &(0x7f0000000240)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}]}) chdir(&(0x7f0000000140)='./bus\x00') fchmodat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0xfffffed3) setgroups(0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/resume', 0x149a82, 0x0) write$cgroup_int(r0, &(0x7f00000000c0)=0x1c3, 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000002680)={0x1d, 0x10, &(0x7f0000000380)=@raw=[@tail_call, @ldst={0x3, 0x3, 0x2, 0x3, 0x5, 0xfffffffffffffff8, 0xfffffffffffffff0}, @jmp={0x5, 0x1, 0xd, 0xa, 0x0, 0xffffffffffffffe0, 0x10}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffffc}, @map_fd={0x18, 0xa}, @tail_call], &(0x7f00000004c0)='syzkaller\x00', 0xffff, 0xe4, &(0x7f0000000500)=""/228, 0x100, 0x60, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0, 0x0, &(0x7f0000000600), 0x0, 0x10, 0xbf12, @void, @value}, 0x94) r1 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0xffffffffffffffff, r3) setresuid(r2, r2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) mlock(&(0x7f0000002000/0x2000)=nil, 0x2000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) read$FUSE(r4, &(0x7f0000000640)={0x2020}, 0x2020) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f00000006c0)={'wlan0\x00', &(0x7f0000000880)=@ethtool_stats={0x11}}) io_setup(0x81, &(0x7f0000000180)=0x0) r8 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) io_submit(r7, 0x1, &(0x7f0000001d00)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x0, r8, &(0x7f0000000340)='p', 0x300}]) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="600000000206010200000000000000000000000014000780050014000700000008001240000500000900020073797a3200000000050001000700000011000300686173683a6e65742c6e657400000000050005000a000000050004"], 0x60}}, 0x0) kernel console output (not intermixed with test programs): 2239] netlink: 300 bytes leftover after parsing attributes in process `syz.3.1566'. [ 565.090000][ T5871] usb 6-1: new high-speed USB device number 18 using dummy_hcd [ 565.117973][ T5819] usb 3-1: new high-speed USB device number 51 using dummy_hcd [ 565.128811][ T29] kauditd_printk_skb: 203 callbacks suppressed [ 565.128827][ T29] audit: type=1400 audit(1734298295.469:15793): avc: denied { ioctl } for pid=12233 comm="syz.2.1565" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 565.181494][ T29] audit: type=1400 audit(1734298295.469:15794): avc: denied { ioctl } for pid=12233 comm="syz.2.1565" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 565.220266][ T29] audit: type=1400 audit(1734298295.511:15795): avc: denied { ioctl } for pid=12230 comm="syz.5.1564" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 565.246672][ T29] audit: type=1400 audit(1734298295.564:15796): avc: denied { ioctl } for pid=12233 comm="syz.2.1565" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 565.272880][ T5871] usb 6-1: Using ep0 maxpacket: 32 [ 565.282544][ T5871] usb 6-1: config 1 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 22 [ 565.298697][ T5871] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 565.308254][ T5819] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 565.319387][ T5871] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 565.329997][ T5819] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 565.341075][ T5871] usb 6-1: SerialNumber: syz [ 565.345738][ T29] audit: type=1400 audit(1734298295.564:15797): avc: denied { prog_load } for pid=12242 comm="syz.0.1568" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 565.367655][ T5819] usb 3-1: New USB device found, idVendor=0c70, idProduct=f00e, bcdDevice= 0.00 [ 565.398622][ T5819] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 565.422189][ T29] audit: type=1400 audit(1734298295.564:15798): avc: denied { bpf } for pid=12242 comm="syz.0.1568" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 565.446874][ T29] audit: type=1400 audit(1734298295.637:15799): avc: denied { ioctl } for pid=12230 comm="syz.5.1564" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 565.447655][ T5819] usb 3-1: config 0 descriptor?? [ 565.503209][ T29] audit: type=1400 audit(1734298295.648:15800): avc: denied { ioctl } for pid=12230 comm="syz.5.1564" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 565.532305][ T29] audit: type=1400 audit(1734298295.679:15801): avc: denied { prog_load } for pid=12242 comm="syz.0.1568" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 565.553480][ T29] audit: type=1400 audit(1734298295.732:15803): avc: denied { bpf } for pid=12242 comm="syz.0.1568" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 565.580502][T12234] netlink: 8 bytes leftover after parsing attributes in process `syz.5.1564'. [ 565.609746][ T5871] cdc_acm 6-1:1.0: ttyACM0: USB ACM device [ 565.630000][ T5871] usb 6-1: USB disconnect, device number 18 [ 565.706605][ T5819] aquacomputer_d5next 0003:0C70:F00E.000B: unknown main item tag 0x0 [ 565.730403][ T5819] aquacomputer_d5next 0003:0C70:F00E.000B: hidraw0: USB HID vff.ff Device [HID 0c70:f00e] on usb-dummy_hcd.2-1/input0 [ 565.776853][T12249] netlink: 1280 bytes leftover after parsing attributes in process `syz.4.1570'. [ 565.786167][T12249] openvswitch: netlink: Missing key (keys=40, expected=10000000) [ 565.898081][ T5819] usb 3-1: USB disconnect, device number 51 [ 566.017061][T12253] ip6t_REJECT: TCP_RESET illegal for non-tcp [ 567.377447][T12274] ipt_REJECT: TCP_RESET invalid for non-tcp [ 568.457131][T12294] syzkaller1: entered allmulticast mode [ 569.108942][ T25] usb 4-1: new high-speed USB device number 46 using dummy_hcd [ 569.152497][T12309] bridge1: the hash_elasticity option has been deprecated and is always 16 [ 569.263460][ T25] usb 4-1: Using ep0 maxpacket: 8 [ 569.275549][ T25] usb 4-1: too many configurations: 244, using maximum allowed: 8 [ 569.292135][ T25] usb 4-1: unable to read config index 0 descriptor/start: -61 [ 569.304137][ T25] usb 4-1: can't read configurations, error -61 [ 569.432717][ T25] usb 4-1: new high-speed USB device number 47 using dummy_hcd [ 569.480120][ T5870] usb 3-1: new low-speed USB device number 52 using dummy_hcd [ 569.603945][ T25] usb 4-1: Using ep0 maxpacket: 8 [ 569.738696][ T25] usb 4-1: too many configurations: 244, using maximum allowed: 8 [ 569.794684][ T25] usb 4-1: unable to read config index 0 descriptor/start: -61 [ 569.817354][ T25] usb 4-1: can't read configurations, error -61 [ 569.850100][ T25] usb usb4-port1: attempt power cycle [ 569.904572][ T5870] usb 3-1: unable to get BOS descriptor or descriptor too short [ 569.961662][ T29] kauditd_printk_skb: 272 callbacks suppressed [ 569.961678][ T29] audit: type=1400 audit(1734298300.540:16075): avc: denied { ioctl } for pid=12311 comm="syz.2.1590" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 570.004676][ T29] audit: type=1400 audit(1734298300.582:16076): avc: denied { create } for pid=12317 comm="syz.4.1593" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 570.024672][ T29] audit: type=1400 audit(1734298300.593:16077): avc: denied { ioctl } for pid=12311 comm="syz.2.1590" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 570.052263][ T29] audit: type=1400 audit(1734298300.645:16078): avc: denied { ioctl } for pid=12317 comm="syz.4.1593" path="socket:[35726]" dev="sockfs" ino=35726 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 570.077529][ T29] audit: type=1400 audit(1734298300.645:16079): avc: denied { ioctl } for pid=12311 comm="syz.2.1590" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 570.114808][ T29] audit: type=1400 audit(1734298300.698:16080): avc: denied { read write } for pid=9159 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 570.153412][ T29] audit: type=1400 audit(1734298300.698:16081): avc: denied { open } for pid=9159 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 570.178017][ T29] audit: type=1400 audit(1734298300.698:16082): avc: denied { ioctl } for pid=9159 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=652 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 570.203910][ T29] audit: type=1400 audit(1734298300.740:16083): avc: denied { create } for pid=12319 comm="syz.0.1592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 570.223716][ T29] audit: type=1400 audit(1734298300.740:16084): avc: denied { ioctl } for pid=12319 comm="syz.0.1592" path="socket:[34774]" dev="sockfs" ino=34774 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 570.251509][ T5870] usb 3-1: string descriptor 0 read error: -22 [ 570.257769][ T5870] usb 3-1: New USB device found, idVendor=07ca, idProduct=a868, bcdDevice=ad.c0 [ 570.266937][ T5870] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 570.280660][ T5870] dvb-usb: found a 'AVerMedia AVerTVHD Volar (A868R)' in warm state. [ 570.286772][ T25] usb 4-1: new high-speed USB device number 48 using dummy_hcd [ 570.319549][ T25] usb 4-1: Using ep0 maxpacket: 8 [ 570.325347][ T25] usb 4-1: too many configurations: 244, using maximum allowed: 8 [ 570.338547][ T25] usb 4-1: unable to read config index 0 descriptor/start: -61 [ 570.347700][ T25] usb 4-1: can't read configurations, error -61 [ 570.375264][ T5819] usb 6-1: new high-speed USB device number 19 using dummy_hcd [ 570.497116][ T25] usb 4-1: new high-speed USB device number 49 using dummy_hcd [ 570.518742][ T25] usb 4-1: Using ep0 maxpacket: 8 [ 570.525067][ T25] usb 4-1: too many configurations: 244, using maximum allowed: 8 [ 570.567206][ T25] usb 4-1: unable to read config index 0 descriptor/start: -61 [ 570.602776][T12332] ntfs3(nbd0): try to read out of volume at offset 0x0 [ 570.848062][ T25] usb 4-1: can't read configurations, error -61 [ 570.865689][ T5870] cxusb: set interface failed [ 570.887450][ T5870] dvb-usb: bulk message failed: -22 (1/0) [ 570.906738][ T25] usb usb4-port1: unable to enumerate USB device [ 570.909645][ T5870] dvb-usb: will pass the complete MPEG2 transport stream to the software demuxer. [ 570.927545][ T5819] usb 6-1: config 0 has an invalid interface number: 112 but max is 0 [ 570.928601][ T5870] dvbdev: DVB: registering new adapter (AVerMedia AVerTVHD Volar (A868R)) [ 570.936154][ T5819] usb 6-1: config 0 has no interface number 0 [ 570.945730][ T5870] usb 3-1: media controller created [ 570.967096][ T5819] usb 6-1: config 0 interface 112 has no altsetting 0 [ 570.985050][ T5870] dvbdev: dvb_create_media_entity: media entity 'dvb-demux' registered. [ 571.072087][T12337] syz.0.1597: attempt to access beyond end of device [ 571.072087][T12337] nbd0: rw=0, sector=64, nr_sectors = 2 limit=0 [ 571.085363][T12337] syz.0.1597: attempt to access beyond end of device [ 571.085363][T12337] nbd0: rw=0, sector=512, nr_sectors = 2 limit=0 [ 571.098294][T12337] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 571.107893][T12337] syz.0.1597: attempt to access beyond end of device [ 571.107893][T12337] nbd0: rw=0, sector=1024, nr_sectors = 2 limit=0 [ 571.121170][T12337] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 571.130963][T12337] syz.0.1597: attempt to access beyond end of device [ 571.130963][T12337] nbd0: rw=0, sector=64, nr_sectors = 4 limit=0 [ 571.145472][T12337] syz.0.1597: attempt to access beyond end of device [ 571.145472][T12337] nbd0: rw=0, sector=1024, nr_sectors = 4 limit=0 [ 571.158525][T12337] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 571.168154][T12337] syz.0.1597: attempt to access beyond end of device [ 571.168154][T12337] nbd0: rw=0, sector=2048, nr_sectors = 4 limit=0 [ 571.181137][T12337] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 571.190861][T12337] syz.0.1597: attempt to access beyond end of device [ 571.190861][T12337] nbd0: rw=0, sector=64, nr_sectors = 8 limit=0 [ 571.203782][T12337] syz.0.1597: attempt to access beyond end of device [ 571.203782][T12337] nbd0: rw=0, sector=2048, nr_sectors = 8 limit=0 [ 571.216848][T12337] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 571.226405][T12337] syz.0.1597: attempt to access beyond end of device [ 571.226405][T12337] nbd0: rw=0, sector=4096, nr_sectors = 8 limit=0 [ 571.239387][T12337] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 571.248862][T12337] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) [ 571.265294][ T5819] usb 6-1: New USB device found, idVendor=05ac, idProduct=0231, bcdDevice=e0.0c [ 571.280300][ T5819] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 571.288322][ T5819] usb 6-1: Product: syz [ 571.292633][ T5819] usb 6-1: Manufacturer: syz [ 571.297206][ T5819] usb 6-1: SerialNumber: syz [ 571.308836][ T5870] DVB: Unable to find symbol lgdt330x_attach() [ 571.315138][ T5870] dvb-usb: no frontend was attached by 'AVerMedia AVerTVHD Volar (A868R)' [ 571.323329][ T5819] usb 6-1: config 0 descriptor?? [ 571.330309][ T5870] dvb-usb: bulk message failed: -22 (1/0) [ 571.338440][ T5870] dvb-usb: AVerMedia AVerTVHD Volar (A868R) successfully initialized and connected. [ 571.356550][ T5870] usb 3-1: USB disconnect, device number 52 [ 571.395968][ T5870] dvb-usb: AVerMedia AVerTVHD Volar (A868R) successfully deinitialized and disconnected. [ 571.993545][ T5819] input: bcm5974 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.112/input/input21 [ 572.030205][ T5819] usb 6-1: USB disconnect, device number 19 [ 572.046792][ T5177] bcm5974 6-1:0.112: could not read from device [ 573.302663][T12356] llcp: llcp_sock_recvmsg: Recv datagram failed state 4 -107 0 [ 574.606570][ T969] usb 3-1: new high-speed USB device number 53 using dummy_hcd [ 574.756884][ T29] kauditd_printk_skb: 239 callbacks suppressed [ 574.756898][ T29] audit: type=1400 audit(1734298305.580:16324): avc: denied { ioctl } for pid=12358 comm="syz.2.1604" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 574.788098][ C0] vkms_vblank_simulate: vblank timer overrun [ 574.842478][ T29] audit: type=1400 audit(1734298305.622:16325): avc: denied { execmem } for pid=12375 comm="syz.0.1608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 574.861394][ T969] usb 3-1: New USB device found, idVendor=0bed, idProduct=1100, bcdDevice=ec.c3 [ 574.861993][ T29] audit: type=1326 audit(1734298305.632:16326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12370 comm="syz.4.1607" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c91185d19 code=0x7ffc0000 [ 574.878686][ T969] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 574.894493][ T29] audit: type=1326 audit(1734298305.632:16327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12370 comm="syz.4.1607" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c91185d19 code=0x7ffc0000 [ 574.894534][ T29] audit: type=1400 audit(1734298305.632:16328): avc: denied { bpf } for pid=12378 comm="syz.5.1609" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 574.894566][ T29] audit: type=1400 audit(1734298305.632:16329): avc: denied { prog_run } for pid=12378 comm="syz.5.1609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 574.894596][ T29] audit: type=1400 audit(1734298305.632:16330): avc: denied { prog_load } for pid=12378 comm="syz.5.1609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 574.894624][ T29] audit: type=1400 audit(1734298305.632:16331): avc: denied { bpf } for pid=12378 comm="syz.5.1609" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 574.967574][ T969] usb 3-1: config 0 descriptor?? [ 574.986324][ T29] audit: type=1400 audit(1734298305.685:16332): avc: denied { ioctl } for pid=12358 comm="syz.2.1604" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 574.986363][ T29] audit: type=1400 audit(1734298305.706:16333): avc: denied { ioctl } for pid=12358 comm="syz.2.1604" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 575.007008][ C0] vkms_vblank_simulate: vblank timer overrun [ 575.082635][T12386] overlayfs: failed to clone upperpath [ 575.103568][ T969] cp210x 3-1:0.0: cp210x converter detected [ 575.897557][T12392] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1612'. [ 576.150579][ T969] usb 3-1: cp210x converter now attached to ttyUSB0 [ 576.242930][ T969] usb 3-1: USB disconnect, device number 53 [ 576.275664][ T969] cp210x ttyUSB0: cp210x converter now disconnected from ttyUSB0 [ 576.389872][ T969] cp210x 3-1:0.0: device disconnected [ 579.104805][T12424] syzkaller1: entered allmulticast mode [ 579.539169][ T29] kauditd_printk_skb: 170 callbacks suppressed [ 579.539182][ T29] audit: type=1400 audit(1734298310.609:16504): avc: denied { create } for pid=12426 comm="syz.2.1623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 579.687917][ T29] audit: type=1400 audit(1734298310.641:16505): avc: denied { create } for pid=12426 comm="syz.2.1623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 579.708908][ T29] audit: type=1400 audit(1734298310.641:16506): avc: denied { prog_load } for pid=12430 comm="syz.3.1625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 579.728288][ T29] audit: type=1400 audit(1734298310.641:16507): avc: denied { bpf } for pid=12430 comm="syz.3.1625" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 579.750285][ T29] audit: type=1400 audit(1734298310.641:16508): avc: denied { perfmon } for pid=12430 comm="syz.3.1625" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 579.771740][ T29] audit: type=1400 audit(1734298310.641:16509): avc: denied { bpf } for pid=12430 comm="syz.3.1625" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 579.792735][ T29] audit: type=1400 audit(1734298310.641:16510): avc: denied { prog_run } for pid=12430 comm="syz.3.1625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 579.811962][ T29] audit: type=1400 audit(1734298310.714:16511): avc: denied { create } for pid=12430 comm="syz.3.1625" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 579.833850][ T29] audit: type=1400 audit(1734298310.714:16512): avc: denied { ioctl } for pid=12430 comm="syz.3.1625" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=35931 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 579.860256][ T29] audit: type=1400 audit(1734298310.725:16513): avc: denied { create } for pid=12430 comm="syz.3.1625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 579.866247][T12433] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 580.109394][ T5819] usb 4-1: new high-speed USB device number 50 using dummy_hcd [ 580.280980][ T5819] usb 4-1: Using ep0 maxpacket: 8 [ 580.288810][ T5819] usb 4-1: config 16 has an invalid interface number: 91 but max is 0 [ 580.523413][ T5819] usb 4-1: config 16 has no interface number 0 [ 580.642978][ T5819] usb 4-1: config 16 interface 91 has no altsetting 0 [ 580.707523][ T5819] usb 4-1: New USB device found, idVendor=a257, idProduct=2013, bcdDevice=62.4a [ 580.830985][ T5819] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 581.420138][T12432] netlink: 248 bytes leftover after parsing attributes in process `syz.3.1625'. [ 581.429424][T12432] netlink: 24 bytes leftover after parsing attributes in process `syz.3.1625'. [ 583.208786][T12471] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1636'. [ 583.707326][ T5819] usb 4-1: string descriptor 0 read error: -71 [ 583.723825][ T5819] usb 4-1: USB disconnect, device number 50 [ 584.645765][ T29] kauditd_printk_skb: 161 callbacks suppressed [ 584.645785][ T29] audit: type=1400 audit(1734298315.890:16675): avc: denied { create } for pid=12474 comm="syz.2.1638" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 584.673857][ T29] audit: type=1400 audit(1734298315.901:16676): avc: denied { write } for pid=12474 comm="syz.2.1638" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 584.694648][ T29] audit: type=1400 audit(1734298315.901:16677): avc: denied { read } for pid=12474 comm="syz.2.1638" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 584.716683][ T29] audit: type=1400 audit(1734298315.901:16678): avc: denied { execmem } for pid=12474 comm="syz.2.1638" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 584.782458][ T29] audit: type=1400 audit(1734298316.079:16679): avc: denied { read } for pid=5174 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 584.795481][T12482] syzkaller1: entered allmulticast mode [ 584.810317][ T29] audit: type=1400 audit(1734298316.079:16680): avc: denied { search } for pid=5174 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 584.833412][ T29] audit: type=1400 audit(1734298316.079:16681): avc: denied { append } for pid=5174 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 584.910018][ T29] audit: type=1400 audit(1734298316.079:16682): avc: denied { open } for pid=5174 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 584.933247][ T29] audit: type=1400 audit(1734298316.079:16683): avc: denied { getattr } for pid=5174 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 584.956660][ T29] audit: type=1400 audit(1734298316.090:16684): avc: denied { read } for pid=12474 comm="syz.2.1638" dev="nsfs" ino=4026532857 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 585.057538][T12487] netlink: 'syz.4.1643': attribute type 4 has an invalid length. [ 585.096836][T12489] FAULT_INJECTION: forcing a failure. [ 585.096836][T12489] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 585.130419][T12487] netlink: 'syz.4.1643': attribute type 4 has an invalid length. [ 585.157816][T12489] CPU: 0 UID: 0 PID: 12489 Comm: syz.2.1642 Not tainted 6.13.0-rc2-syzkaller-00362-g2d8308bf5b67 #0 [ 585.168608][T12489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 585.178675][T12489] Call Trace: [ 585.181956][T12489] [ 585.184894][T12489] dump_stack_lvl+0x16c/0x1f0 [ 585.189584][T12489] should_fail_ex+0x497/0x5b0 [ 585.194268][T12489] _copy_to_user+0x32/0xd0 [ 585.198693][T12489] simple_read_from_buffer+0xd0/0x160 [ 585.204069][T12489] proc_fail_nth_read+0x198/0x270 [ 585.209095][T12489] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 585.214644][T12489] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 585.220188][T12489] vfs_read+0x1df/0xbe0 [ 585.224339][T12489] ? __fget_files+0x1fc/0x3a0 [ 585.229007][T12489] ? __pfx___mutex_lock+0x10/0x10 [ 585.234034][T12489] ? __pfx_vfs_read+0x10/0x10 [ 585.238709][T12489] ? __fget_files+0x206/0x3a0 [ 585.243386][T12489] ksys_read+0x12b/0x250 [ 585.247621][T12489] ? __pfx_ksys_read+0x10/0x10 [ 585.252380][T12489] do_syscall_64+0xcd/0x250 [ 585.256882][T12489] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 585.262773][T12489] RIP: 0033:0x7fd9bc38472c [ 585.267179][T12489] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 585.286779][T12489] RSP: 002b:00007fd9bd246030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 585.295187][T12489] RAX: ffffffffffffffda RBX: 00007fd9bc575fa0 RCX: 00007fd9bc38472c [ 585.303148][T12489] RDX: 000000000000000f RSI: 00007fd9bd2460a0 RDI: 0000000000000004 [ 585.311110][T12489] RBP: 00007fd9bd246090 R08: 0000000000000000 R09: 0000000000000000 [ 585.319069][T12489] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 585.327032][T12489] R13: 0000000000000000 R14: 00007fd9bc575fa0 R15: 00007ffeeab09728 [ 585.335008][T12489] [ 586.662311][ T5819] usb 6-1: new full-speed USB device number 20 using dummy_hcd [ 586.856592][ T969] usb 4-1: new high-speed USB device number 51 using dummy_hcd [ 586.911486][ T5819] usb 6-1: config 0 has an invalid interface number: 151 but max is 0 [ 586.919984][ T5819] usb 6-1: config 0 has no interface number 0 [ 586.946170][ T5819] usb 6-1: New USB device found, idVendor=0499, idProduct=6bb7, bcdDevice=68.2f [ 586.981918][ T5819] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 586.995596][ T5819] usb 6-1: Product: syz [ 586.999790][ T5819] usb 6-1: Manufacturer: syz [ 587.024835][ T5819] usb 6-1: SerialNumber: syz [ 587.069233][ T5819] usb 6-1: config 0 descriptor?? [ 587.129112][ T969] usb 4-1: Using ep0 maxpacket: 8 [ 587.142628][ T969] usb 4-1: New USB device found, idVendor=0ccd, idProduct=00b3, bcdDevice=2d.ee [ 587.151959][ T969] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 587.164863][ T969] usb 4-1: Product: syz [ 587.173525][ T969] usb 4-1: Manufacturer: syz [ 587.182561][ T969] usb 4-1: SerialNumber: syz [ 587.197548][ T969] usb 4-1: config 0 descriptor?? [ 587.198701][T12514] FAULT_INJECTION: forcing a failure. [ 587.198701][T12514] name failslab, interval 1, probability 0, space 0, times 0 [ 587.219269][T12514] CPU: 1 UID: 0 PID: 12514 Comm: syz.2.1650 Not tainted 6.13.0-rc2-syzkaller-00362-g2d8308bf5b67 #0 [ 587.230043][T12514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 587.240120][T12514] Call Trace: [ 587.243392][T12514] [ 587.246305][T12514] dump_stack_lvl+0x16c/0x1f0 [ 587.250975][T12514] should_fail_ex+0x497/0x5b0 [ 587.255646][T12514] should_failslab+0xc2/0x120 [ 587.260316][T12514] __kmalloc_cache_noprof+0x68/0x410 [ 587.265614][T12514] ? loop_rw_iter+0x416/0x590 [ 587.270306][T12514] io_arm_poll_handler+0x3e7/0xc60 [ 587.275420][T12514] ? __pfx_io_arm_poll_handler+0x10/0x10 [ 587.281064][T12514] ? io_read+0x32/0x70 [ 587.285149][T12514] io_queue_async+0xaa/0x420 [ 587.289729][T12514] io_submit_sqes+0x1772/0x25c0 [ 587.294586][T12514] __do_sys_io_uring_enter+0xd43/0x1620 [ 587.300148][T12514] ? __fget_files+0x206/0x3a0 [ 587.304831][T12514] ? __pfx___do_sys_io_uring_enter+0x10/0x10 [ 587.310823][T12514] ? fput+0x67/0x440 [ 587.314719][T12514] ? ksys_write+0x1ba/0x250 [ 587.319228][T12514] ? __pfx_ksys_write+0x10/0x10 [ 587.324095][T12514] do_syscall_64+0xcd/0x250 [ 587.328609][T12514] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 587.334503][T12514] RIP: 0033:0x7fd9bc385d19 [ 587.338905][T12514] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 587.358522][T12514] RSP: 002b:00007fd9bd246038 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 587.366934][T12514] RAX: ffffffffffffffda RBX: 00007fd9bc575fa0 RCX: 00007fd9bc385d19 [ 587.374901][T12514] RDX: 0000000000000000 RSI: 00000000000047ba RDI: 0000000000000005 [ 587.382875][T12514] RBP: 00007fd9bd246090 R08: 0000000000000000 R09: 0000000000000000 [ 587.390838][T12514] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 587.398807][T12514] R13: 0000000000000000 R14: 00007fd9bc575fa0 R15: 00007ffeeab09728 [ 587.406784][T12514] [ 587.478417][ T5819] usb 6-1: Quirk or no altset; falling back to MIDI 1.0 [ 587.654371][ T5819] usb 6-1: USB disconnect, device number 20 [ 587.704338][ T969] usb 4-1: dvb_usb_v2: found a 'TerraTec NOXON DAB Stick' in warm state [ 587.730381][T12517] netlink: 48 bytes leftover after parsing attributes in process `syz.2.1651'. [ 587.805057][ T5915] usb 3-1: new high-speed USB device number 54 using dummy_hcd [ 588.026444][ T9063] udevd[9063]: error opening ATTR{/sys/devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.151/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 588.813004][ T5819] usb 1-1: new high-speed USB device number 48 using dummy_hcd [ 589.109117][ T5819] usb 1-1: config 4 has an invalid descriptor of length 0, skipping remainder of the config [ 589.121993][ T5819] usb 1-1: New USB device found, idVendor=041e, idProduct=4007, bcdDevice=5d.18 [ 589.143597][ T969] dvb_usb_rtl28xxu 4-1:0.0: probe with driver dvb_usb_rtl28xxu failed with error -32 [ 589.275871][T12537] netlink: 112 bytes leftover after parsing attributes in process `syz.4.1656'. [ 589.292319][ T5819] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 589.331595][ T5819] gspca_main: stv0680-2.14.0 probing 041e:4007 [ 589.429028][ T29] kauditd_printk_skb: 230 callbacks suppressed [ 589.429047][ T29] audit: type=1400 audit(1734298320.961:16915): avc: denied { execmem } for pid=12539 comm="syz.2.1657" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 589.466621][ T29] audit: type=1400 audit(1734298321.024:16916): avc: denied { read } for pid=5174 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 589.624262][ T29] audit: type=1400 audit(1734298321.024:16917): avc: denied { search } for pid=5174 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 589.661262][ T29] audit: type=1400 audit(1734298321.024:16918): avc: denied { append } for pid=5174 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 589.806102][ T29] audit: type=1400 audit(1734298321.024:16919): avc: denied { open } for pid=5174 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 589.906923][ T969] usb 4-1: USB disconnect, device number 51 [ 590.131896][ T29] audit: type=1400 audit(1734298321.024:16920): avc: denied { getattr } for pid=5174 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 590.273447][ T29] audit: type=1400 audit(1734298321.066:16921): avc: denied { execmem } for pid=12541 comm="syz.4.1658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 590.332170][ T29] audit: type=1400 audit(1734298321.213:16922): avc: denied { ioctl } for pid=12524 comm="syz.0.1654" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 590.428569][ T5819] gspca_stv0680: usb_control_msg error 0, request = 0x88, error = -32 [ 590.437577][ T5819] stv0680 1-1:4.0: STV(e): camera ping failed!! [ 590.444223][ T29] audit: type=1400 audit(1734298321.276:16923): avc: denied { map_create } for pid=12541 comm="syz.4.1658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 590.465388][ T29] audit: type=1400 audit(1734298321.318:16924): avc: denied { read } for pid=12539 comm="syz.2.1657" dev="nsfs" ino=4026532857 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 590.929649][ T5819] gspca_stv0680: usb_control_msg error 0, request = 0x80, error = -110 [ 590.943887][ T5819] stv0680 1-1:4.0: last error: 0, command = 0x0 [ 591.449912][T12567] netlink: 'syz.2.1665': attribute type 1 has an invalid length. [ 591.463805][ T5915] usb 1-1: USB disconnect, device number 48 [ 591.949026][ T3876] usb 6-1: new high-speed USB device number 21 using dummy_hcd [ 592.127707][ T3876] usb 6-1: New USB device found, idVendor=17e9, idProduct=8b4e, bcdDevice=9c.08 [ 592.140178][ T3876] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 592.248208][ T3876] usb 6-1: config 0 descriptor?? [ 592.649269][ T969] IPVS: starting estimator thread 0... [ 592.682643][ T3876] [drm] vendor descriptor length:6 data:06 5f 01 72 00 00 00 00 00 00 00 [ 592.746184][ T3876] [drm:udl_init] *ERROR* Unrecognized vendor firmware descriptor [ 592.762418][T12593] IPVS: using max 43 ests per chain, 103200 per kthread [ 592.892247][ T3876] [drm:udl_init] *ERROR* Selecting channel failed [ 592.932707][ T3876] [drm] Initialized udl 0.0.1 for 6-1:0.0 on minor 2 [ 592.958196][ T3876] [drm] Initialized udl on minor 2 [ 592.976747][ T3876] udl 6-1:0.0: [drm] *ERROR* Read EDID byte 0 failed err ffffffb9 [ 592.997974][ T3876] udl 6-1:0.0: [drm] Cannot find any crtc or sizes [ 593.015412][ T5871] udl 6-1:0.0: [drm] *ERROR* Read EDID byte 0 failed err ffffffb9 [ 593.023529][ T5871] udl 6-1:0.0: [drm] Cannot find any crtc or sizes [ 593.152996][ T3876] usb 6-1: USB disconnect, device number 21 [ 593.993267][T12607] netlink: 52 bytes leftover after parsing attributes in process `syz.2.1676'. [ 594.314044][ T29] kauditd_printk_skb: 156 callbacks suppressed [ 594.314062][ T29] audit: type=1400 audit(1734298325.770:17081): avc: denied { read write } for pid=12602 comm="syz.2.1676" name="vbi8" dev="devtmpfs" ino=1006 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 594.415229][ T5819] usb 1-1: new high-speed USB device number 49 using dummy_hcd [ 594.453163][ T29] audit: type=1400 audit(1734298325.770:17082): avc: denied { open } for pid=12602 comm="syz.2.1676" path="/dev/vbi8" dev="devtmpfs" ino=1006 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 594.498241][ T29] audit: type=1400 audit(1734298325.770:17083): avc: denied { create } for pid=12602 comm="syz.2.1676" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 594.583107][ T29] audit: type=1400 audit(1734298325.770:17084): avc: denied { write } for pid=12602 comm="syz.2.1676" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 594.729348][ T29] audit: type=1400 audit(1734298326.148:17085): avc: denied { read } for pid=5174 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 594.791414][ T29] audit: type=1400 audit(1734298326.148:17086): avc: denied { search } for pid=5174 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 594.819954][ T29] audit: type=1400 audit(1734298326.148:17087): avc: denied { append } for pid=5174 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 594.852317][ T29] audit: type=1400 audit(1734298326.148:17088): avc: denied { open } for pid=5174 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 594.972342][ T29] audit: type=1400 audit(1734298326.148:17089): avc: denied { getattr } for pid=5174 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 595.001746][ T29] audit: type=1400 audit(1734298326.190:17090): avc: denied { prog_load } for pid=12610 comm="syz.3.1679" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 595.067009][T12620] syzkaller1: entered allmulticast mode [ 597.306774][T12655] macvlan0: entered allmulticast mode [ 597.451218][T12655] veth1_vlan: entered allmulticast mode [ 597.991943][T12656] bridge_slave_0: left allmulticast mode [ 597.997664][T12656] bridge_slave_0: left promiscuous mode [ 598.003297][T12656] bridge0: port 1(bridge_slave_0) entered disabled state [ 598.059595][T12656] bridge_slave_1: left allmulticast mode [ 598.065322][T12656] bridge_slave_1: left promiscuous mode [ 598.070952][T12656] bridge0: port 2(bridge_slave_1) entered disabled state [ 598.248948][T12656] bond0: (slave bond_slave_0): Releasing backup interface [ 598.267323][T12656] bond0: (slave bond_slave_1): Releasing backup interface [ 598.286570][T12656] team0: Port device team_slave_0 removed [ 598.296362][T12656] team0: Port device team_slave_1 removed [ 598.302560][T12656] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 598.309952][T12656] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 598.320369][T12656] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 598.327777][T12656] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 598.342730][T12672] tmpfs: Unknown parameter '00000000000000000005' [ 598.517451][ T5870] usb 3-1: new high-speed USB device number 55 using dummy_hcd [ 598.539711][T12678] siw: device registration error -23 [ 598.825249][ T5819] usb 6-1: new full-speed USB device number 22 using dummy_hcd [ 599.127349][ T29] kauditd_printk_skb: 180 callbacks suppressed [ 599.127366][ T29] audit: type=1400 audit(1734298331.145:17271): avc: denied { ioctl } for pid=12665 comm="syz.2.1690" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 599.167962][ T29] audit: type=1400 audit(1734298331.156:17272): avc: denied { read } for pid=12675 comm="syz.3.1695" dev="nsfs" ino=4026532871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 599.418117][ T5870] usb 3-1: New USB device found, idVendor=17e9, idProduct=8b4e, bcdDevice=9c.08 [ 599.427572][ T5870] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 599.436132][ T29] audit: type=1400 audit(1734298331.156:17273): avc: denied { open } for pid=12675 comm="syz.3.1695" path="net:[4026532871]" dev="nsfs" ino=4026532871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 599.470603][ T29] audit: type=1400 audit(1734298331.156:17274): avc: denied { create } for pid=12675 comm="syz.3.1695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 599.505061][ T5870] usb 3-1: config 0 descriptor?? [ 600.509426][ T29] audit: type=1400 audit(1734298331.156:17275): avc: denied { bind } for pid=12675 comm="syz.3.1695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 600.742856][ T5870] [drm] vendor descriptor length:6 data:06 5f 01 72 00 00 00 00 00 00 00 [ 600.751395][ T5870] [drm:udl_init] *ERROR* Unrecognized vendor firmware descriptor [ 600.763532][ T29] audit: type=1400 audit(1734298331.156:17276): avc: denied { create } for pid=12675 comm="syz.3.1695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 600.979316][ T5819] usb 6-1: unable to get BOS descriptor or descriptor too short [ 600.992123][ T5819] usb 6-1: not running at top speed; connect to a high speed hub [ 601.002431][ T5819] usb 6-1: config 4 has an invalid interface number: 111 but max is 0 [ 601.536942][T12692] netlink: 96 bytes leftover after parsing attributes in process `syz.4.1696'. [ 601.552694][ T5819] usb 6-1: config 4 has no interface number 0 [ 601.559141][ T5819] usb 6-1: config 4 interface 111 has no altsetting 0 [ 601.749910][ T29] audit: type=1400 audit(1734298331.166:17277): avc: denied { getopt } for pid=12675 comm="syz.3.1695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 601.771047][ T29] audit: type=1400 audit(1734298331.166:17278): avc: denied { setopt } for pid=12675 comm="syz.3.1695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 601.853423][ T5870] [drm:udl_init] *ERROR* Selecting channel failed [ 601.891389][ T5174] audit: audit_backlog=65 > audit_backlog_limit=64 [ 601.903500][ T5174] audit: audit_lost=55 audit_rate_limit=0 audit_backlog_limit=64 [ 601.922750][ T5819] usb 6-1: New USB device found, idVendor=0ccd, idProduct=0039, bcdDevice=44.99 [ 601.927892][ T5870] [drm] Initialized udl 0.0.1 for 3-1:0.0 on minor 2 [ 601.931948][ T5819] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 601.931974][ T5819] usb 6-1: Product: syz [ 601.931991][ T5819] usb 6-1: Manufacturer: syz [ 601.932008][ T5819] usb 6-1: SerialNumber: syz [ 602.120701][T12697] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 602.184400][ T5870] [drm] Initialized udl on minor 2 [ 602.222595][ T5870] udl 3-1:0.0: [drm] *ERROR* Read EDID byte 0 failed err ffffffb9 [ 602.238158][ T5870] udl 3-1:0.0: [drm] Cannot find any crtc or sizes [ 602.310558][ T5870] usb 3-1: USB disconnect, device number 55 [ 602.958035][T12714] netlink: 72 bytes leftover after parsing attributes in process `syz.2.1701'. [ 604.056423][ T5819] pvrusb2: Hardware description: Terratec Grabster AV400 [ 604.063688][ T5819] pvrusb2: ********** [ 604.067744][ T5819] pvrusb2: ***WARNING*** Support for this device (Terratec Grabster AV400) is experimental. [ 604.077936][ T5819] pvrusb2: Important functionality might not be entirely working. [ 604.085865][ T5819] pvrusb2: Please consider contacting the driver author to help with further stabilization of the driver. [ 604.097245][ T5819] pvrusb2: ********** [ 604.102070][ T5819] usb 6-1: selecting invalid altsetting 0 [ 604.154943][ T2336] pvrusb2: control-write URB failure, status=-71 [ 604.167096][ T2336] pvrusb2: Device being rendered inoperable [ 604.177836][ T2336] pvrusb2: ***WARNING*** pvrusb2 device hardware appears to be jammed and I can't clear it. [ 604.196697][ T29] kauditd_printk_skb: 141 callbacks suppressed [ 604.196711][ T29] audit: type=1400 audit(1734298336.490:17416): avc: denied { read } for pid=5174 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 604.233438][ T2336] pvrusb2: You might need to power cycle the pvrusb2 device in order to recover. [ 604.252325][ T5819] usb 6-1: USB disconnect, device number 22 [ 604.285293][ T29] audit: type=1400 audit(1734298336.490:17417): avc: denied { create } for pid=12730 comm="syz.2.1708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 604.306174][ T29] audit: type=1400 audit(1734298336.500:17418): avc: denied { map_create } for pid=12730 comm="syz.2.1708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 604.325585][ T29] audit: type=1400 audit(1734298336.500:17419): avc: denied { create } for pid=12730 comm="syz.2.1708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 604.346436][ T29] audit: type=1400 audit(1734298336.500:17420): avc: denied { write } for pid=12730 comm="syz.2.1708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 604.409523][ T29] audit: type=1400 audit(1734298336.500:17421): avc: denied { read } for pid=12730 comm="syz.2.1708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 604.430160][ T29] audit: type=1400 audit(1734298336.511:17422): avc: denied { write } for pid=12730 comm="syz.2.1708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 604.451224][ T29] audit: type=1400 audit(1734298336.511:17423): avc: denied { prog_load } for pid=12732 comm="syz.4.1709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 604.475802][ T29] audit: type=1400 audit(1734298336.511:17424): avc: denied { bpf } for pid=12732 comm="syz.4.1709" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 604.496667][ T29] audit: type=1400 audit(1734298336.511:17425): avc: denied { create } for pid=12730 comm="syz.2.1708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 605.167806][T12752] netlink: 'syz.0.1714': attribute type 27 has an invalid length. [ 605.218004][T12743] netlink: 16 bytes leftover after parsing attributes in process `syz.5.1711'. [ 605.406418][ T969] usb 4-1: new high-speed USB device number 52 using dummy_hcd [ 605.438988][T12757] No control pipe specified [ 605.825277][ T969] usb 4-1: New USB device found, idVendor=17e9, idProduct=8b4e, bcdDevice=9c.08 [ 605.848918][ T969] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 606.020859][ T969] usb 4-1: config 0 descriptor?? [ 606.395743][ T969] [drm] vendor descriptor length:6 data:06 5f 01 72 00 00 00 00 00 00 00 [ 606.404314][ T969] [drm:udl_init] *ERROR* Unrecognized vendor firmware descriptor [ 606.856230][ T969] [drm:udl_init] *ERROR* Selecting channel failed [ 606.892717][ T5871] usb 6-1: new high-speed USB device number 23 using dummy_hcd [ 606.906366][ T969] [drm] Initialized udl 0.0.1 for 4-1:0.0 on minor 2 [ 606.924014][ T969] [drm] Initialized udl on minor 2 [ 606.932702][ T969] udl 4-1:0.0: [drm] *ERROR* Read EDID byte 0 failed err ffffffb9 [ 606.944525][ T969] udl 4-1:0.0: [drm] Cannot find any crtc or sizes [ 606.953307][ T5915] udl 4-1:0.0: [drm] *ERROR* Read EDID byte 0 failed err ffffffb9 [ 606.970539][ T5915] udl 4-1:0.0: [drm] Cannot find any crtc or sizes [ 606.985551][ T969] usb 4-1: USB disconnect, device number 52 [ 607.035339][ T5871] usb 6-1: device descriptor read/64, error -71 [ 607.264908][ T5871] usb 6-1: new high-speed USB device number 24 using dummy_hcd [ 607.540862][ T5871] usb 6-1: device descriptor read/64, error -71 [ 607.664732][ T5871] usb usb6-port1: attempt power cycle [ 608.321046][ T5871] usb 6-1: new high-speed USB device number 25 using dummy_hcd [ 608.370248][ T5871] usb 6-1: device descriptor read/8, error -71 [ 608.524966][T12807] overlayfs: failed to resolve './file1': -2 [ 608.597534][ T5871] usb 6-1: new high-speed USB device number 26 using dummy_hcd [ 608.694451][ T5871] usb 6-1: device descriptor read/8, error -71 [ 608.990664][ T5871] usb usb6-port1: unable to enumerate USB device [ 609.013914][ T29] kauditd_printk_skb: 316 callbacks suppressed [ 609.013930][ T29] audit: type=1400 audit(1734298341.540:17742): avc: denied { ioctl } for pid=12767 comm="syz.5.1718" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 610.031244][ T29] audit: type=1400 audit(1734298342.600:17743): avc: denied { read } for pid=5174 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 610.261225][T12808] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 610.395614][T12815] netlink: 12 bytes leftover after parsing attributes in process `syz.5.1718'. [ 610.416351][ T29] audit: type=1400 audit(1734298342.600:17744): avc: denied { search } for pid=5174 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 610.457275][ T29] audit: type=1400 audit(1734298342.600:17745): avc: denied { append } for pid=5174 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 610.494373][ T29] audit: type=1400 audit(1734298342.600:17746): avc: denied { open } for pid=5174 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 610.517257][ T29] audit: type=1400 audit(1734298342.600:17747): avc: denied { getattr } for pid=5174 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 610.541014][ T29] audit: type=1400 audit(1734298342.611:17748): avc: denied { create } for pid=12767 comm="syz.5.1718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 610.561471][ T29] audit: type=1400 audit(1734298342.611:17749): avc: denied { create } for pid=12767 comm="syz.5.1718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 610.591613][ T29] audit: type=1400 audit(1734298342.642:17750): avc: denied { prog_load } for pid=12808 comm="syz.0.1728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 610.659289][ T29] audit: type=1400 audit(1734298342.642:17751): avc: denied { bpf } for pid=12808 comm="syz.0.1728" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 610.719943][ T5870] usb 3-1: new high-speed USB device number 56 using dummy_hcd [ 610.813928][T12825] netlink: 40 bytes leftover after parsing attributes in process `syz.4.1733'. [ 610.823373][T12825] netlink: 40 bytes leftover after parsing attributes in process `syz.4.1733'. [ 611.112845][ T5870] usb 3-1: New USB device found, idVendor=9710, idProduct=7730, bcdDevice=96.33 [ 611.122057][ T5870] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 611.269497][ T5870] usb 3-1: config 0 descriptor?? [ 611.317165][T12828] syzkaller1: entered allmulticast mode [ 611.847506][T12819] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 611.893414][T12819] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 612.285975][T12858] siw: device registration error -23 [ 612.606982][ T5915] usb 1-1: new full-speed USB device number 50 using dummy_hcd [ 612.829715][ T5915] usb 1-1: unable to get BOS descriptor or descriptor too short [ 612.859700][ T5915] usb 1-1: not running at top speed; connect to a high speed hub [ 612.879082][ T5915] usb 1-1: config 4 has an invalid interface number: 111 but max is 0 [ 612.895877][ T5915] usb 1-1: config 4 has no interface number 0 [ 612.924761][ T5915] usb 1-1: config 4 interface 111 has no altsetting 0 [ 612.981283][ T5915] usb 1-1: New USB device found, idVendor=0ccd, idProduct=0039, bcdDevice=44.99 [ 612.990630][ T5915] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 612.998689][ T5915] usb 1-1: Product: syz [ 613.002897][ T5915] usb 1-1: Manufacturer: syz [ 613.009773][ T5915] usb 1-1: SerialNumber: syz [ 613.834249][ T29] kauditd_printk_skb: 211 callbacks suppressed [ 613.834304][ T29] audit: type=1400 audit(1734298346.600:17963): avc: denied { prog_load } for pid=12872 comm="syz.3.1746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 613.889846][ T29] audit: type=1400 audit(1734298346.600:17964): avc: denied { bpf } for pid=12872 comm="syz.3.1746" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 613.947156][ T29] audit: type=1400 audit(1734298346.611:17965): avc: denied { setopt } for pid=12872 comm="syz.3.1746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 614.041337][ T29] audit: type=1400 audit(1734298346.621:17966): avc: denied { create } for pid=12874 comm="syz.4.1747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 614.069161][ T5870] usb 3-1: Cannot set MAC address [ 614.074784][ T5870] MOSCHIP usb-ethernet driver 3-1:0.0: probe with driver MOSCHIP usb-ethernet driver failed with error -71 [ 614.132813][ T5870] usb 3-1: USB disconnect, device number 56 [ 614.215699][ T29] audit: type=1400 audit(1734298346.621:17967): avc: denied { getopt } for pid=12874 comm="syz.4.1747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 614.348204][ T29] audit: type=1400 audit(1734298346.663:17968): avc: denied { read write } for pid=9159 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 614.672939][ T29] audit: type=1400 audit(1734298346.663:17969): avc: denied { open } for pid=9159 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 614.846269][ T29] audit: type=1400 audit(1734298346.663:17970): avc: denied { ioctl } for pid=9159 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=652 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 614.873089][ T29] audit: type=1400 audit(1734298346.705:17971): avc: denied { name_bind } for pid=12874 comm="syz.4.1747" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 614.915891][ T29] audit: type=1400 audit(1734298346.705:17972): avc: denied { node_bind } for pid=12874 comm="syz.4.1747" saddr=255.255.255.255 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 615.000487][ T5915] pvrusb2: Hardware description: Terratec Grabster AV400 [ 615.015314][ T5915] pvrusb2: ********** [ 615.022384][ T5915] pvrusb2: ***WARNING*** Support for this device (Terratec Grabster AV400) is experimental. [ 615.043934][ T5915] pvrusb2: Important functionality might not be entirely working. [ 615.053040][ T5915] pvrusb2: Please consider contacting the driver author to help with further stabilization of the driver. [ 615.067014][ T5915] pvrusb2: ********** [ 615.071168][ T5915] usb 1-1: selecting invalid altsetting 0 [ 615.103080][ T2336] pvrusb2: control-write URB failure, status=-71 [ 615.109512][ T2336] pvrusb2: Device being rendered inoperable [ 615.115997][ T2336] pvrusb2: ***WARNING*** pvrusb2 device hardware appears to be jammed and I can't clear it. [ 615.131314][ T5915] usb 1-1: USB disconnect, device number 50 [ 615.138191][ T2336] pvrusb2: You might need to power cycle the pvrusb2 device in order to recover. [ 616.819219][T12911] netlink: 20 bytes leftover after parsing attributes in process `syz.5.1757'. [ 616.969522][ T5915] usb 4-1: new high-speed USB device number 53 using dummy_hcd [ 617.740881][ T5915] usb 4-1: device descriptor read/64, error -71 [ 617.926503][T12930] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1761'. [ 618.001013][ T5915] usb 4-1: new high-speed USB device number 54 using dummy_hcd [ 618.159418][ T5915] usb 4-1: device descriptor read/64, error -71 [ 618.599265][ T29] kauditd_printk_skb: 217 callbacks suppressed [ 618.599301][ T29] audit: type=1400 audit(1734298351.608:18190): avc: denied { perfmon } for pid=12936 comm="syz.2.1764" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 618.701435][ T29] audit: type=1400 audit(1734298351.650:18191): avc: denied { perfmon } for pid=12936 comm="syz.2.1764" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 618.722627][ T29] audit: type=1400 audit(1734298351.671:18192): avc: denied { bpf } for pid=12936 comm="syz.2.1764" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 618.771985][ T29] audit: type=1400 audit(1734298351.671:18193): avc: denied { prog_run } for pid=12936 comm="syz.2.1764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 618.795040][ T29] audit: type=1400 audit(1734298351.745:18194): avc: denied { name_bind } for pid=12936 comm="syz.2.1764" src=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 618.817230][ T5915] usb usb4-port1: attempt power cycle [ 618.855528][ T29] audit: type=1400 audit(1734298351.745:18195): avc: denied { node_bind } for pid=12936 comm="syz.2.1764" saddr=::1 src=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 618.918302][ T29] audit: type=1400 audit(1734298351.766:18196): avc: denied { read write } for pid=9159 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 618.944550][ T29] audit: type=1400 audit(1734298351.766:18197): avc: denied { open } for pid=9159 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 618.969290][ T29] audit: type=1400 audit(1734298351.766:18198): avc: denied { ioctl } for pid=9159 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=652 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 618.998701][ T29] audit: type=1400 audit(1734298351.776:18199): avc: denied { create } for pid=12938 comm="syz.4.1765" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 619.027013][ T969] usb 3-1: new high-speed USB device number 57 using dummy_hcd [ 619.188875][ T5915] usb 4-1: new high-speed USB device number 55 using dummy_hcd [ 619.282809][ T5915] usb 4-1: device descriptor read/8, error -71 [ 619.295545][ T969] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 619.307462][ T969] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 619.324527][ T969] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 619.489436][ T969] usb 3-1: New USB device found, idVendor=041e, idProduct=2801, bcdDevice= 0.10 [ 619.498609][ T969] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 619.510053][ T969] usb 3-1: config 0 descriptor?? [ 620.138018][ T969] prodikeys 0003:041E:2801.000C: unknown main item tag 0x7 [ 620.170920][ T969] prodikeys 0003:041E:2801.000C: item fetching failed at offset 4/5 [ 620.196893][T12961] No control pipe specified [ 620.208502][ T5915] usb 4-1: new high-speed USB device number 56 using dummy_hcd [ 620.310706][ T969] prodikeys 0003:041E:2801.000C: hid parse failed [ 620.325046][ T969] prodikeys 0003:041E:2801.000C: probe with driver prodikeys failed with error -22 [ 620.344329][ T5915] usb 4-1: config 0 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 16 [ 620.374040][ T5915] usb 4-1: config 0 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 64 [ 620.404653][ T5915] usb 4-1: New USB device found, idVendor=0a46, idProduct=9621, bcdDevice=4f.32 [ 620.415498][ T5915] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 620.431514][ T5915] usb 4-1: Product: syz [ 620.442427][ T5915] usb 4-1: Manufacturer: syz [ 620.463261][ T5915] usb 4-1: SerialNumber: syz [ 620.485546][ T5915] usb 4-1: config 0 descriptor?? [ 620.502418][T12953] raw-gadget.0 gadget.3: fail, usb_ep_enable returned -22 [ 620.511001][T12953] raw-gadget.0 gadget.3: fail, usb_ep_enable returned -22 [ 620.566501][T12967] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1773'. [ 620.581357][T12967] netlink: 'syz.4.1773': attribute type 1 has an invalid length. [ 620.725119][T12953] raw-gadget.0 gadget.3: fail, usb_ep_enable returned -22 [ 620.736707][T12953] raw-gadget.0 gadget.3: fail, usb_ep_enable returned -22 [ 621.156248][ T5915] dm9601: No valid MAC address in EEPROM, using 00:00:00:00:00:00 [ 621.399163][ T5915] dm9601 4-1:0.0 (unnamed net_device) (uninitialized): Error reading chip ID [ 621.913162][ T1291] ieee802154 phy0 wpan0: encryption failed: -22 [ 622.066166][ T5915] usb 4-1: USB disconnect, device number 56 [ 623.370744][ T29] kauditd_printk_skb: 184 callbacks suppressed [ 623.370761][ T29] audit: type=1400 audit(1734298356.606:18384): avc: denied { ioctl } for pid=12992 comm="syz.3.1781" path="socket:[38044]" dev="sockfs" ino=38044 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 623.402154][ T29] audit: type=1400 audit(1734298356.617:18385): avc: denied { read } for pid=12990 comm="syz.5.1782" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 623.425062][ T29] audit: type=1400 audit(1734298356.617:18386): avc: denied { open } for pid=12990 comm="syz.5.1782" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 623.448527][ T29] audit: type=1400 audit(1734298356.648:18387): avc: denied { bind } for pid=12992 comm="syz.3.1781" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 623.468243][ T29] audit: type=1400 audit(1734298356.648:18388): avc: denied { create } for pid=12990 comm="syz.5.1782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 623.489266][ T29] audit: type=1400 audit(1734298356.648:18389): avc: denied { write } for pid=12990 comm="syz.5.1782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 623.510088][ T29] audit: type=1400 audit(1734298356.669:18390): avc: denied { create } for pid=12992 comm="syz.3.1781" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 623.530064][ T29] audit: type=1400 audit(1734298356.669:18391): avc: denied { bind } for pid=12992 comm="syz.3.1781" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 623.549866][ T29] audit: type=1400 audit(1734298356.669:18392): avc: denied { read write } for pid=12990 comm="syz.5.1782" name="cec5" dev="devtmpfs" ino=978 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 623.573178][ T29] audit: type=1400 audit(1734298356.669:18393): avc: denied { open } for pid=12990 comm="syz.5.1782" path="/dev/cec5" dev="devtmpfs" ino=978 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 624.409760][ T3876] usb 3-1: USB disconnect, device number 57 [ 624.827077][T13016] netlink: 52 bytes leftover after parsing attributes in process `syz.5.1784'. [ 624.908969][T13019] overlayfs: failed to clone upperpath [ 624.969472][T13023] mkiss: ax0: crc mode is auto. [ 625.397543][T13030] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1791'. [ 626.181553][T13033] veth0_to_team: entered promiscuous mode [ 626.187288][T13033] veth0_to_team: entered allmulticast mode [ 626.261051][T13036] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1792'. [ 626.269986][T13036] netlink: 16 bytes leftover after parsing attributes in process `syz.4.1792'. [ 627.208769][T13053] mkiss: ax0: crc mode is auto. [ 627.342009][T13054] block nbd5: Device being setup by another task [ 627.424938][T13053] block nbd5: shutting down sockets [ 627.493663][T13057] batadv0 speed is unknown, defaulting to 1000 [ 628.417075][ T29] kauditd_printk_skb: 200 callbacks suppressed [ 628.417095][ T29] audit: type=1400 audit(1734298361.919:18594): avc: denied { create } for pid=13060 comm="syz.0.1801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 628.503514][ T29] audit: type=1400 audit(1734298361.950:18595): avc: denied { prog_load } for pid=13062 comm="syz.5.1803" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 628.541899][T13068] ptm ptm1: ldisc open failed (-12), clearing slot 1 [ 628.562008][ T29] audit: type=1400 audit(1734298361.950:18596): avc: denied { bpf } for pid=13062 comm="syz.5.1803" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 628.632955][ T29] audit: type=1400 audit(1734298361.950:18597): avc: denied { perfmon } for pid=13062 comm="syz.5.1803" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 628.685296][ T29] audit: type=1400 audit(1734298361.950:18598): avc: denied { prog_run } for pid=13062 comm="syz.5.1803" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 628.741484][ T29] audit: type=1326 audit(1734298361.992:18599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13062 comm="syz.5.1803" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fa525f85d19 code=0x0 [ 628.837155][ T29] audit: type=1400 audit(1734298361.992:18600): avc: denied { create } for pid=13060 comm="syz.0.1801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 628.894577][ T29] audit: type=1400 audit(1734298362.034:18601): avc: denied { read } for pid=13064 comm="syz.3.1802" name="fb0" dev="devtmpfs" ino=629 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 628.953582][ T29] audit: type=1400 audit(1734298362.034:18602): avc: denied { open } for pid=13064 comm="syz.3.1802" path="/dev/fb0" dev="devtmpfs" ino=629 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 629.037072][ T29] audit: type=1400 audit(1734298362.034:18603): avc: denied { read } for pid=5174 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 629.543268][T13102] syzkaller1: entered allmulticast mode [ 631.206559][T13117] vlan3: entered allmulticast mode [ 631.476784][T13122] netlink: 36 bytes leftover after parsing attributes in process `syz.5.1818'. [ 632.988484][ T5819] usb 4-1: new high-speed USB device number 57 using dummy_hcd [ 633.130963][T13135] xt_hashlimit: overflow, try lower: 0/0 [ 633.182409][ T29] kauditd_printk_skb: 275 callbacks suppressed [ 633.182427][ T29] audit: type=1400 audit(1734298366.927:18852): avc: denied { module_request } for pid=13133 comm="syz.5.1821" kmod="ip6t_" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 633.469279][ T29] audit: type=1400 audit(1734298367.221:18853): avc: denied { read } for pid=5174 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 633.555113][ T29] audit: type=1400 audit(1734298367.221:18854): avc: denied { search } for pid=5174 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 633.636348][ T29] audit: type=1400 audit(1734298367.221:18855): avc: denied { append } for pid=5174 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 633.712600][ T5819] usb 4-1: config 129 has an invalid interface number: 249 but max is 0 [ 633.721767][ T5819] usb 4-1: config 129 has no interface number 0 [ 633.759005][ T5819] usb 4-1: config 129 interface 249 has no altsetting 0 [ 633.766666][ T29] audit: type=1400 audit(1734298367.221:18856): avc: denied { open } for pid=5174 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 633.799489][ T5819] usb 4-1: New USB device found, idVendor=112a, idProduct=0001, bcdDevice=99.21 [ 633.831466][ T5819] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 633.853885][ T29] audit: type=1400 audit(1734298367.221:18857): avc: denied { getattr } for pid=5174 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 634.825910][ T29] audit: type=1400 audit(1734298367.315:18858): avc: denied { ioctl } for pid=13125 comm="syz.3.1819" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 634.878001][T13129] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 634.889011][ T29] audit: type=1400 audit(1734298367.347:18859): avc: denied { write } for pid=13133 comm="syz.5.1821" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 634.932517][ T29] audit: type=1400 audit(1734298367.389:18860): avc: denied { ioctl } for pid=13125 comm="syz.3.1819" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 634.984763][ T29] audit: type=1400 audit(1734298367.431:18861): avc: denied { read write } for pid=9159 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 635.048605][ T5819] usb 4-1: string descriptor 0 read error: -71 [ 635.063873][ T5819] redrat3 4-1:129.249: Couldn't find all endpoints [ 635.092704][ T5819] usb 4-1: USB disconnect, device number 57 [ 635.303385][T13155] netlink: 56 bytes leftover after parsing attributes in process `syz.2.1828'. [ 635.318657][T13155] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1828'. [ 635.331784][T13155] netlink: 31 bytes leftover after parsing attributes in process `syz.2.1828'. [ 635.358250][T13155] netlink: 'syz.2.1828': attribute type 2 has an invalid length. [ 635.386621][T13155] netlink: 31 bytes leftover after parsing attributes in process `syz.2.1828'. [ 635.637478][ T5871] usb 6-1: new high-speed USB device number 27 using dummy_hcd [ 635.789595][ T5871] usb 6-1: Using ep0 maxpacket: 32 [ 635.817159][ T5871] usb 6-1: config 0 has an invalid interface number: 23 but max is 0 [ 635.840846][ T5871] usb 6-1: config 0 has no interface number 0 [ 635.872067][ T5871] usb 6-1: New USB device found, idVendor=04dd, idProduct=8007, bcdDevice=13.d5 [ 635.907506][ T5871] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 635.941099][ T5871] usb 6-1: Product: syz [ 635.958550][ T5871] usb 6-1: Manufacturer: syz [ 635.981883][ T5871] usb 6-1: SerialNumber: syz [ 636.029033][ T5871] usb 6-1: config 0 descriptor?? [ 636.057748][ T5871] usb 6-1: bad CDC descriptors [ 637.348238][ T5819] libceph: connect (1)[c::]:6789 error -101 [ 637.362767][ T5819] libceph: mon0 (1)[c::]:6789 connect error [ 637.628309][ T5819] libceph: connect (1)[c::]:6789 error -101 [ 637.634295][ T5819] libceph: mon0 (1)[c::]:6789 connect error [ 637.999236][T13176] ceph: No mds server is up or the cluster is laggy [ 638.057119][ T29] kauditd_printk_skb: 158 callbacks suppressed [ 638.057136][ T29] audit: type=1400 audit(1734298372.040:19020): avc: denied { read } for pid=5174 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 638.212280][ T29] audit: type=1400 audit(1734298372.082:19021): avc: denied { search } for pid=5174 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 638.287059][ T29] audit: type=1400 audit(1734298372.082:19022): avc: denied { append } for pid=5174 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 638.315862][ T29] audit: type=1400 audit(1734298372.082:19023): avc: denied { open } for pid=5174 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 638.344400][ T29] audit: type=1400 audit(1734298372.082:19024): avc: denied { getattr } for pid=5174 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 638.398403][ T29] audit: type=1400 audit(1734298372.239:19025): avc: denied { prog_load } for pid=13194 comm="syz.0.1839" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 638.740917][ T29] audit: type=1400 audit(1734298372.239:19026): avc: denied { bpf } for pid=13194 comm="syz.0.1839" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 638.866899][ T29] audit: type=1400 audit(1734298372.239:19027): avc: denied { perfmon } for pid=13194 comm="syz.0.1839" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 638.888093][ T29] audit: type=1400 audit(1734298372.271:19028): avc: denied { prog_load } for pid=13196 comm="syz.4.1840" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 638.907546][ T29] audit: type=1400 audit(1734298372.271:19029): avc: denied { bpf } for pid=13196 comm="syz.4.1840" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 639.982544][T13211] netlink: 209852 bytes leftover after parsing attributes in process `syz.4.1843'. [ 640.162758][ T5819] usb 6-1: USB disconnect, device number 27 [ 640.580520][ T5819] usb 6-1: new high-speed USB device number 28 using dummy_hcd [ 640.754974][ T5819] usb 6-1: New USB device found, idVendor=17e9, idProduct=8b4e, bcdDevice=9c.08 [ 640.782259][ T5819] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 640.818089][ T5819] usb 6-1: config 0 descriptor?? [ 641.703769][ T5819] [drm] vendor descriptor length:6 data:06 5f 01 72 00 00 00 00 00 00 00 [ 641.712575][ T5819] [drm:udl_init] *ERROR* Unrecognized vendor firmware descriptor [ 641.891907][ T5819] [drm:udl_init] *ERROR* Selecting channel failed [ 641.902588][ T5819] [drm] Initialized udl 0.0.1 for 6-1:0.0 on minor 2 [ 641.914793][ T5819] [drm] Initialized udl on minor 2 [ 641.922820][ T5819] udl 6-1:0.0: [drm] *ERROR* Read EDID byte 0 failed err ffffffb9 [ 642.023302][ T5819] udl 6-1:0.0: [drm] Cannot find any crtc or sizes [ 642.059247][ T5871] udl 6-1:0.0: [drm] *ERROR* Read EDID byte 0 failed err ffffffb9 [ 642.068380][ T5871] udl 6-1:0.0: [drm] Cannot find any crtc or sizes [ 642.108766][ T5819] usb 6-1: USB disconnect, device number 28 [ 643.361905][ T29] kauditd_printk_skb: 135 callbacks suppressed [ 643.387228][ T29] audit: type=1400 audit(1734298377.604:19165): avc: denied { read write } for pid=9159 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 643.413971][ T29] audit: type=1400 audit(1734298377.615:19167): avc: denied { read } for pid=5174 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 643.457016][ T29] audit: type=1400 audit(1734298377.615:19166): avc: denied { read write open } for pid=9159 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 643.490520][ T29] audit: type=1400 audit(1734298377.615:19168): avc: denied { search } for pid=5174 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 643.515093][ T29] audit: type=1400 audit(1734298377.615:19169): avc: denied { ioctl } for pid=9159 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=652 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 643.543632][ T29] audit: type=1400 audit(1734298377.615:19170): avc: denied { append } for pid=5174 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 643.575174][ T29] audit: type=1400 audit(1734298377.615:19171): avc: denied { append open } for pid=5174 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 643.599213][ T29] audit: type=1400 audit(1734298377.615:19172): avc: denied { getattr } for pid=5174 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 643.626067][ T29] audit: type=1400 audit(1734298377.667:19173): avc: denied { create } for pid=13237 comm="syz.5.1849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 643.651015][ T29] audit: type=1400 audit(1734298377.667:19174): avc: denied { write } for pid=13237 comm="syz.5.1849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 643.729082][ T969] usb 6-1: new full-speed USB device number 29 using dummy_hcd [ 643.928343][ T969] usb 6-1: config 0 has an invalid interface number: 144 but max is 0 [ 643.942771][ T969] usb 6-1: config 0 has no interface number 0 [ 643.949035][ T969] usb 6-1: New USB device found, idVendor=2c42, idProduct=16f8, bcdDevice=d6.2e [ 643.968694][ T969] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 644.024624][ T969] usb 6-1: config 0 descriptor?? [ 644.085077][T13246] netlink: 'syz.4.1852': attribute type 1 has an invalid length. [ 644.470288][ T969] usb 6-1: USB disconnect, device number 29 [ 644.477792][ T969] f81534a_ctrl 6-1:0.144: failed to set register 0x116: -19 [ 644.485110][ T969] f81534a_ctrl 6-1:0.144: failed to enable ports: -19 [ 644.601823][T13246] 8021q: adding VLAN 0 to HW filter on device bond2 [ 645.396683][T13274] FAULT_INJECTION: forcing a failure. [ 645.396683][T13274] name failslab, interval 1, probability 0, space 0, times 0 [ 645.424106][T13274] CPU: 1 UID: 0 PID: 13274 Comm: syz.0.1856 Not tainted 6.13.0-rc2-syzkaller-00362-g2d8308bf5b67 #0 [ 645.434898][T13274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 645.444970][T13274] Call Trace: [ 645.448255][T13274] [ 645.451193][T13274] dump_stack_lvl+0x16c/0x1f0 [ 645.455892][T13274] should_fail_ex+0x497/0x5b0 [ 645.460593][T13274] ? fs_reclaim_acquire+0xae/0x150 [ 645.465721][T13274] should_failslab+0xc2/0x120 [ 645.470397][T13274] kmem_cache_alloc_noprof+0x6e/0x3d0 [ 645.475763][T13274] ? radix_tree_node_alloc.constprop.0+0x7c/0x350 [ 645.482181][T13274] radix_tree_node_alloc.constprop.0+0x7c/0x350 [ 645.488421][T13274] idr_get_free+0x528/0xa40 [ 645.492932][T13274] idr_alloc_u32+0x191/0x2f0 [ 645.497518][T13274] ? __pfx_idr_alloc_u32+0x10/0x10 [ 645.502633][T13274] tcf_idr_check_alloc+0x137/0x770 [ 645.507740][T13274] ? __pfx_tcf_idr_check_alloc+0x10/0x10 [ 645.513363][T13274] ? __nla_parse+0x40/0x60 [ 645.517776][T13274] tcf_csum_init+0x1e1/0x730 [ 645.522367][T13274] ? __pfx_tcf_csum_init+0x10/0x10 [ 645.527489][T13274] ? __asan_memcpy+0x3c/0x60 [ 645.532075][T13274] tcf_action_init_1+0x45f/0x6c0 [ 645.537006][T13274] ? __pfx_tcf_action_init_1+0x10/0x10 [ 645.542469][T13274] ? __nla_parse+0x40/0x60 [ 645.546878][T13274] tcf_action_init+0x42e/0x9c0 [ 645.551662][T13274] ? __pfx_tcf_action_init+0x10/0x10 [ 645.556941][T13274] ? mark_lock+0xb5/0xc60 [ 645.561265][T13274] ? __pfx_stack_trace_save+0x10/0x10 [ 645.566658][T13274] ? hlock_class+0x4e/0x130 [ 645.571178][T13274] ? __pfx___lock_acquire+0x10/0x10 [ 645.576369][T13274] ? hlock_class+0x4e/0x130 [ 645.580870][T13274] ? __lock_acquire+0xcc5/0x3c40 [ 645.585808][T13274] tcf_action_add+0xfd/0x5d0 [ 645.590393][T13274] ? __pfx_tcf_action_add+0x10/0x10 [ 645.595582][T13274] ? __pfx_lock_release+0x10/0x10 [ 645.600598][T13274] ? trace_lock_acquire+0x14e/0x1f0 [ 645.605827][T13274] ? __nla_parse+0x40/0x60 [ 645.610240][T13274] tc_ctl_action+0x35d/0x470 [ 645.614824][T13274] ? __pfx_tc_ctl_action+0x10/0x10 [ 645.619940][T13274] ? __pfx_tc_ctl_action+0x10/0x10 [ 645.625045][T13274] rtnetlink_rcv_msg+0x3c7/0xea0 [ 645.629985][T13274] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 645.635456][T13274] netlink_rcv_skb+0x16b/0x440 [ 645.640219][T13274] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 645.645676][T13274] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 645.650971][T13274] ? netlink_deliver_tap+0x1ae/0xd30 [ 645.656255][T13274] netlink_unicast+0x53c/0x7f0 [ 645.661020][T13274] ? __pfx_netlink_unicast+0x10/0x10 [ 645.666308][T13274] netlink_sendmsg+0x8b8/0xd70 [ 645.671073][T13274] ? __pfx_netlink_sendmsg+0x10/0x10 [ 645.676367][T13274] ____sys_sendmsg+0xaaf/0xc90 [ 645.681126][T13274] ? copy_msghdr_from_user+0x10b/0x160 [ 645.686575][T13274] ? __pfx_____sys_sendmsg+0x10/0x10 [ 645.691866][T13274] ___sys_sendmsg+0x135/0x1e0 [ 645.696536][T13274] ? __pfx____sys_sendmsg+0x10/0x10 [ 645.701733][T13274] ? __pfx_lock_release+0x10/0x10 [ 645.706751][T13274] ? trace_lock_acquire+0x14e/0x1f0 [ 645.711955][T13274] ? __fget_files+0x206/0x3a0 [ 645.716633][T13274] __sys_sendmsg+0x16e/0x220 [ 645.721215][T13274] ? __pfx___sys_sendmsg+0x10/0x10 [ 645.726332][T13274] do_syscall_64+0xcd/0x250 [ 645.730833][T13274] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 645.736725][T13274] RIP: 0033:0x7f2ce8985d19 [ 645.741132][T13274] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 645.760907][T13274] RSP: 002b:00007f2ce9771038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 645.769314][T13274] RAX: ffffffffffffffda RBX: 00007f2ce8b76080 RCX: 00007f2ce8985d19 [ 645.777297][T13274] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000005 [ 645.785274][T13274] RBP: 00007f2ce9771090 R08: 0000000000000000 R09: 0000000000000000 [ 645.793243][T13274] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 645.801209][T13274] R13: 0000000000000000 R14: 00007f2ce8b76080 R15: 00007ffd8ec59a78 [ 645.809193][T13274] [ 645.864693][T13275] FAULT_INJECTION: forcing a failure. [ 645.864693][T13275] name failslab, interval 1, probability 0, space 0, times 0 [ 645.879085][T13275] CPU: 0 UID: 0 PID: 13275 Comm: syz.2.1855 Not tainted 6.13.0-rc2-syzkaller-00362-g2d8308bf5b67 #0 [ 645.889866][T13275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 645.899967][T13275] Call Trace: [ 645.903255][T13275] [ 645.906212][T13275] dump_stack_lvl+0x16c/0x1f0 [ 645.910907][T13275] should_fail_ex+0x497/0x5b0 [ 645.915580][T13275] ? fs_reclaim_acquire+0xae/0x150 [ 645.920686][T13275] should_failslab+0xc2/0x120 [ 645.925349][T13275] kmem_cache_alloc_lru_noprof+0x73/0x3d0 [ 645.931053][T13275] ? mqueue_alloc_inode+0x25/0x50 [ 645.936070][T13275] ? __pfx_mqueue_fill_super+0x10/0x10 [ 645.941513][T13275] ? __pfx_mqueue_alloc_inode+0x10/0x10 [ 645.947044][T13275] mqueue_alloc_inode+0x25/0x50 [ 645.951882][T13275] alloc_inode+0x5d/0x230 [ 645.956196][T13275] new_inode+0x22/0x210 [ 645.960351][T13275] ? __pfx_mqueue_fill_super+0x10/0x10 [ 645.965798][T13275] mqueue_get_inode+0x2e/0xd50 [ 645.970562][T13275] ? sget_fc+0x808/0xc20 [ 645.974794][T13275] ? __pfx_mqueue_fill_super+0x10/0x10 [ 645.980253][T13275] mqueue_fill_super+0x112/0x210 [ 645.985180][T13275] get_tree_nodev+0xda/0x190 [ 645.989757][T13275] mqueue_get_tree+0xf1/0x130 [ 645.994423][T13275] vfs_get_tree+0x8f/0x380 [ 645.998819][T13275] ? refcount_dec_and_lock+0x32/0xc0 [ 646.004148][T13275] fc_mount+0x16/0xc0 [ 646.008126][T13275] mq_init_ns+0x426/0x620 [ 646.012460][T13275] copy_ipcs+0x383/0x610 [ 646.016686][T13275] ? copy_utsname+0xab/0x470 [ 646.021263][T13275] create_new_namespaces+0x20a/0xad0 [ 646.026535][T13275] ? security_capable+0x7e/0x260 [ 646.031455][T13275] unshare_nsproxy_namespaces+0xc0/0x1f0 [ 646.037078][T13275] ksys_unshare+0x45d/0xa40 [ 646.041571][T13275] ? __pfx_ksys_unshare+0x10/0x10 [ 646.046584][T13275] ? ksys_write+0x1ba/0x250 [ 646.051078][T13275] __x64_sys_unshare+0x31/0x40 [ 646.055841][T13275] do_syscall_64+0xcd/0x250 [ 646.060343][T13275] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 646.066221][T13275] RIP: 0033:0x7fd9bc385d19 [ 646.070624][T13275] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 646.090224][T13275] RSP: 002b:00007fd9bd204038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 646.098620][T13275] RAX: ffffffffffffffda RBX: 00007fd9bc576160 RCX: 00007fd9bc385d19 [ 646.106570][T13275] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000006a040000 [ 646.114523][T13275] RBP: 00007fd9bd204090 R08: 0000000000000000 R09: 0000000000000000 [ 646.122495][T13275] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 646.130452][T13275] R13: 0000000000000000 R14: 00007fd9bc576160 R15: 00007ffeeab09728 [ 646.138417][T13275] [ 646.141462][ C0] vkms_vblank_simulate: vblank timer overrun [ 647.285672][ T5871] usb 4-1: new high-speed USB device number 58 using dummy_hcd [ 647.353468][ T5915] usb 3-1: new high-speed USB device number 58 using dummy_hcd [ 647.440727][ T5871] usb 4-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 647.468729][ T5871] usb 4-1: New USB device found, idVendor=0471, idProduct=0304, bcdDevice=e4.df [ 647.486500][ T5871] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 647.498491][ T5871] usb 4-1: config 0 descriptor?? [ 647.507153][ T5915] usb 3-1: Using ep0 maxpacket: 16 [ 647.527138][ T5871] pwc: Askey VC010 type 2 USB webcam detected. [ 647.528510][ T5915] usb 3-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xB3, changing to 0x83 [ 647.574158][ T5915] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 647.622729][ T5915] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 23 [ 647.685792][ T5915] usb 3-1: New USB device found, idVendor=1781, idProduct=0898, bcdDevice= 0.00 [ 647.708987][ T5915] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 647.723057][ T5915] usb 3-1: config 0 descriptor?? [ 647.748105][ T5915] input: PXRC Flight Controller Adapter as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/input/input24 [ 647.892375][ T5871] pwc: recv_control_msg error -32 req 02 val 2b00 [ 647.912717][ T5871] pwc: recv_control_msg error -32 req 02 val 2700 [ 647.939652][T13296] netlink: 19 bytes leftover after parsing attributes in process `syz.2.1865'. [ 647.983896][ T5871] pwc: recv_control_msg error -32 req 02 val 2c00 [ 648.133213][ T5915] usb 3-1: USB disconnect, device number 58 [ 648.133582][ T5177] pxrc 3-1:0.0: pxrc_open - usb_submit_urb failed, error: -19 [ 648.155927][ T29] kauditd_printk_skb: 243 callbacks suppressed [ 648.155943][ T29] audit: type=1400 audit(1734298382.613:19418): avc: denied { ioctl } for pid=13297 comm="syz.5.1866" path="/dev/video0" dev="devtmpfs" ino=932 ioctlcmd=0x5611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 648.201254][ T29] audit: type=1400 audit(1734298382.686:19419): avc: denied { ioctl } for pid=13297 comm="syz.5.1866" path="/dev/video0" dev="devtmpfs" ino=932 ioctlcmd=0x5611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 648.226289][ C0] vkms_vblank_simulate: vblank timer overrun [ 648.266926][ T5871] pwc: recv_control_msg error -32 req 04 val 1000 [ 648.294525][ T29] audit: type=1400 audit(1734298382.686:19420): avc: denied { module_request } for pid=13297 comm="syz.5.1866" kmod="net-pf-10-proto-3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 648.359560][ T5871] pwc: recv_control_msg error -32 req 04 val 1300 [ 648.447695][ T29] audit: type=1400 audit(1734298382.749:19421): avc: denied { ioctl } for pid=13292 comm="syz.3.1864" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x550c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 648.523914][ T29] audit: type=1400 audit(1734298382.812:19422): avc: denied { ioctl } for pid=13292 comm="syz.3.1864" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 648.595945][ T29] audit: type=1400 audit(1734298382.812:19423): avc: denied { ioctl } for pid=13292 comm="syz.3.1864" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 648.622555][ T29] audit: type=1400 audit(1734298382.833:19424): avc: denied { ioctl } for pid=13297 comm="syz.5.1866" path="/dev/video0" dev="devtmpfs" ino=932 ioctlcmd=0x5611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 648.647764][ T29] audit: type=1400 audit(1734298382.865:19425): avc: denied { ioctl } for pid=13297 comm="syz.5.1866" path="/dev/video0" dev="devtmpfs" ino=932 ioctlcmd=0x5611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 648.673071][ T29] audit: type=1400 audit(1734298382.875:19426): avc: denied { ioctl } for pid=13297 comm="syz.5.1866" path="/dev/video0" dev="devtmpfs" ino=932 ioctlcmd=0x5611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 648.698315][ T29] audit: type=1400 audit(1734298382.886:19427): avc: denied { ioctl } for pid=13297 comm="syz.5.1866" path="/dev/video0" dev="devtmpfs" ino=932 ioctlcmd=0x5611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 648.743406][ T5871] pwc: recv_control_msg error -32 req 04 val 1400 [ 648.766669][ T5871] pwc: recv_control_msg error -32 req 02 val 2000 [ 648.795781][ T5871] pwc: recv_control_msg error -32 req 02 val 2100 [ 648.896714][T13314] batman_adv: batadv0: Adding interface: geneve2 [ 648.927965][T13314] batman_adv: batadv0: Not using interface geneve2 (retrying later): interface not active [ 649.038226][ T5819] usb 1-1: new high-speed USB device number 51 using dummy_hcd [ 649.045943][ T3876] usb 6-1: new high-speed USB device number 30 using dummy_hcd [ 649.193303][ T5819] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 649.203681][ T5819] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 2 [ 649.214199][ T3876] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 649.242444][ T3876] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 649.256487][ T5819] usb 1-1: config 1 has no interface number 0 [ 649.266457][ T5819] usb 1-1: config 1 interface 1 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 649.277454][ T3876] usb 6-1: New USB device found, idVendor=28de, idProduct=1142, bcdDevice= 0.00 [ 649.286876][ T5819] usb 1-1: Duplicate descriptor for config 1 interface 1 altsetting 0, skipping [ 649.296030][ T3876] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 649.313641][ T5819] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 649.324362][ T3876] usb 6-1: config 0 descriptor?? [ 649.329687][ T5819] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 649.345539][ T5819] usb 1-1: Product: syz [ 649.392850][ T5819] usb 1-1: Manufacturer: syz [ 649.449526][ T5819] usb 1-1: SerialNumber: syz [ 649.923801][ T3876] usbhid 6-1:0.0: can't add hid device: -71 [ 649.975070][ T3876] usbhid 6-1:0.0: probe with driver usbhid failed with error -71 [ 649.985235][ T3876] usb 6-1: USB disconnect, device number 30 [ 650.210126][T13326] batadv0 speed is unknown, defaulting to 1000 [ 650.530291][ T5871] pwc: recv_control_msg error -71 req 02 val 2500 [ 650.544051][ T5871] pwc: recv_control_msg error -71 req 02 val 2400 [ 650.550989][ T5871] pwc: recv_control_msg error -71 req 02 val 2600 [ 650.569612][ T5871] pwc: recv_control_msg error -71 req 02 val 2900 [ 650.581214][ T5871] pwc: recv_control_msg error -71 req 02 val 2800 [ 650.586068][T13311] overlayfs: failed to resolve './file0': -2 [ 650.588008][ T5871] pwc: recv_control_msg error -71 req 04 val 1100 [ 650.635913][ T5871] pwc: recv_control_msg error -71 req 04 val 1200 [ 650.682792][ T5871] pwc: Registered as video103. [ 650.710883][ T5871] input: PWC snapshot button as /devices/platform/dummy_hcd.3/usb4/4-1/input/input25 [ 650.752289][T13329] netlink: 48 bytes leftover after parsing attributes in process `syz.4.1876'. [ 650.806904][ T5871] usb 4-1: USB disconnect, device number 58 [ 650.902876][T13311] ieee802154 phy0 wpan0: encryption failed: -22 [ 650.926568][T13311] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 651.035894][ T5819] cdc_ncm 1-1:1.1: SET_CRC_MODE failed [ 651.049085][ T5819] cdc_ncm 1-1:1.1: SET_NTB_FORMAT failed [ 651.076836][ T5819] cdc_ncm 1-1:1.1: bind() failure [ 651.099847][ T5819] usb 1-1: USB disconnect, device number 51 [ 651.331201][T13342] JFS: charset not found [ 651.427346][T13346] fuse: Unknown parameter 'grou00000000000000000000' [ 651.573705][T13348] overlayfs: failed to resolve './file0': -2 [ 652.096282][T13367] FAULT_INJECTION: forcing a failure. [ 652.096282][T13367] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 652.122112][T13368] netlink: 48 bytes leftover after parsing attributes in process `syz.2.1889'. [ 652.218874][T13367] CPU: 1 UID: 0 PID: 13367 Comm: syz.3.1891 Not tainted 6.13.0-rc2-syzkaller-00362-g2d8308bf5b67 #0 [ 652.229668][T13367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 652.239742][T13367] Call Trace: [ 652.243028][T13367] [ 652.245969][T13367] dump_stack_lvl+0x16c/0x1f0 [ 652.250670][T13367] should_fail_ex+0x497/0x5b0 [ 652.255362][T13367] _copy_from_user+0x2e/0xd0 [ 652.259950][T13367] copy_msghdr_from_user+0x99/0x160 [ 652.265130][T13367] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 652.270935][T13367] ___sys_sendmsg+0xff/0x1e0 [ 652.275526][T13367] ? __pfx____sys_sendmsg+0x10/0x10 [ 652.280728][T13367] ? irqentry_exit+0x3b/0x90 [ 652.285309][T13367] ? fdget+0x1b6/0x210 [ 652.289366][T13367] ? __pfx___sanitizer_cov_trace_pc+0x10/0x10 [ 652.295420][T13367] __sys_sendmsg+0x16e/0x220 [ 652.299993][T13367] ? __pfx___sys_sendmsg+0x10/0x10 [ 652.305097][T13367] ? __pfx___schedule+0x10/0x10 [ 652.309939][T13367] ? xfd_validate_state+0x5d/0x180 [ 652.315056][T13367] do_syscall_64+0xcd/0x250 [ 652.319565][T13367] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 652.325448][T13367] RIP: 0033:0x7fc648585d19 [ 652.329848][T13367] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 652.349438][T13367] RSP: 002b:00007fc64932b038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 652.357839][T13367] RAX: ffffffffffffffda RBX: 00007fc648775fa0 RCX: 00007fc648585d19 [ 652.365794][T13367] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000005 [ 652.373747][T13367] RBP: 00007fc64932b090 R08: 0000000000000000 R09: 0000000000000000 [ 652.381701][T13367] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 652.389654][T13367] R13: 0000000000000000 R14: 00007fc648775fa0 R15: 00007ffec31bf7d8 [ 652.397616][T13367] [ 652.901334][T13383] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 653.052394][ T29] kauditd_printk_skb: 209 callbacks suppressed [ 653.059880][ T29] audit: type=1400 audit(1734298387.778:19637): avc: denied { create } for pid=13372 comm="syz.5.1892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 653.100206][ T29] audit: type=1400 audit(1734298387.799:19638): avc: denied { prog_load } for pid=13384 comm="syz.4.1897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 653.144104][T13383] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 653.170213][ T29] audit: type=1400 audit(1734298387.810:19639): avc: denied { bpf } for pid=13384 comm="syz.4.1897" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 653.362307][ T29] audit: type=1400 audit(1734298387.810:19640): avc: denied { map } for pid=13384 comm="syz.4.1897" path="socket:[40056]" dev="sockfs" ino=40056 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 653.557684][ T29] audit: type=1400 audit(1734298388.314:19641): avc: denied { create } for pid=13390 comm="syz.2.1899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 653.560329][T13391] audit: audit_lost=66 audit_rate_limit=0 audit_backlog_limit=64 [ 653.585729][ T29] audit: type=1400 audit(1734298388.314:19642): avc: denied { bind } for pid=13390 comm="syz.2.1899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 653.605411][ T29] audit: type=1400 audit(1734298388.314:19643): avc: denied { setopt } for pid=13390 comm="syz.2.1899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 653.625054][ T29] audit: type=1400 audit(1734298388.314:19644): avc: denied { accept } for pid=13390 comm="syz.2.1899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 653.644742][ T29] audit: type=1400 audit(1734298388.345:19645): avc: denied { read } for pid=5174 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 654.029138][T13411] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1906'. [ 654.055509][T13411] netlink: 20 bytes leftover after parsing attributes in process `syz.0.1906'. [ 654.694580][ C1] vcan0: j1939_tp_rxtimer: 0xffff88807af49800: rx timeout, send abort [ 654.972640][T13385] Bluetooth: hci4: command 0x0c1a tx timeout [ 655.181633][ C1] vcan0: j1939_tp_rxtimer: 0xffff88807af49800: abort rx timeout. Force session deactivation [ 655.393550][T13421] lo speed is unknown, defaulting to 1000 [ 655.399439][T13421] lo speed is unknown, defaulting to 1000 [ 655.405765][T13421] lo speed is unknown, defaulting to 1000 [ 655.419250][T13421] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 655.544075][T13421] lo speed is unknown, defaulting to 1000 [ 655.552676][T13421] lo speed is unknown, defaulting to 1000 [ 655.561529][T13421] lo speed is unknown, defaulting to 1000 [ 655.573041][T13421] lo speed is unknown, defaulting to 1000 [ 655.579679][T13421] lo speed is unknown, defaulting to 1000 [ 655.782442][ T5915] usb 1-1: new high-speed USB device number 52 using dummy_hcd [ 655.934766][ T5915] usb 1-1: Using ep0 maxpacket: 32 [ 655.958633][ T5915] usb 1-1: config 0 has an invalid interface number: 67 but max is 0 [ 655.988184][ T5915] usb 1-1: config 0 has no interface number 0 [ 656.019035][ T5915] usb 1-1: New USB device found, idVendor=0424, idProduct=9901, bcdDevice=c2.57 [ 656.032265][ T5915] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 656.047796][ T5915] usb 1-1: Product: syz [ 656.055855][ T5915] usb 1-1: Manufacturer: syz [ 656.063261][ T5915] usb 1-1: SerialNumber: syz [ 656.088295][ T5915] usb 1-1: config 0 descriptor?? [ 656.102463][ T5915] smsc95xx v2.0.0 [ 657.153221][ T5870] usb 4-1: new high-speed USB device number 59 using dummy_hcd [ 657.248089][T13457] netlink: 16 bytes leftover after parsing attributes in process `syz.5.1918'. [ 657.387574][ T5870] usb 4-1: Using ep0 maxpacket: 8 [ 657.421698][ T5870] usb 4-1: New USB device found, idVendor=1557, idProduct=7720, bcdDevice=b7.eb [ 657.446340][ T5870] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 657.544613][ T5870] usb 4-1: config 0 descriptor?? [ 657.830349][ T29] kauditd_printk_skb: 215 callbacks suppressed [ 657.830368][ T29] audit: type=1400 audit(1734298392.797:19860): avc: denied { ioctl } for pid=13446 comm="syz.3.1915" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 657.914840][ T29] audit: type=1400 audit(1734298392.849:19861): avc: denied { prog_load } for pid=13459 comm="syz.5.1919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 657.938711][ T29] audit: type=1400 audit(1734298392.849:19862): avc: denied { bpf } for pid=13459 comm="syz.5.1919" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 657.960994][ T29] audit: type=1400 audit(1734298392.849:19863): avc: denied { perfmon } for pid=13459 comm="syz.5.1919" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 657.983038][ T5915] smsc95xx 1-1:0.67 (unnamed net_device) (uninitialized): Failed to read reg index 0x00000030: -71 [ 658.000739][ T5915] smsc95xx 1-1:0.67 (unnamed net_device) (uninitialized): Error reading E2P_CMD [ 658.018737][ T5915] smsc95xx 1-1:0.67 (unnamed net_device) (uninitialized): Failed to write reg index 0x00000014: -71 [ 658.058045][ T29] audit: type=1400 audit(1734298392.849:19864): avc: denied { prog_run } for pid=13459 comm="syz.5.1919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 658.078042][ T5915] smsc95xx 1-1:0.67: probe with driver smsc95xx failed with error -71 [ 658.112718][ T29] audit: type=1400 audit(1734298392.975:19865): avc: denied { write } for pid=13454 comm="syz.4.1917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 658.133939][ T29] audit: type=1400 audit(1734298393.007:19866): avc: denied { read } for pid=5174 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 658.164563][ T29] audit: type=1400 audit(1734298393.007:19867): avc: denied { search } for pid=5174 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 658.353472][ T29] audit: type=1400 audit(1734298393.007:19868): avc: denied { append } for pid=5174 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 658.430940][ T29] audit: type=1400 audit(1734298393.007:19869): avc: denied { open } for pid=5174 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 658.531759][ T5915] usb 1-1: USB disconnect, device number 52 [ 658.539577][ T5870] asix 4-1:0.0 (unnamed net_device) (uninitialized): Failed to read reg index 0x0000: -61 [ 658.550188][ T5870] asix 4-1:0.0: probe with driver asix failed with error -61 [ 658.711442][T13470] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1921'. [ 659.524882][T13483] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 659.535522][T13483] TCP: tcp_parse_options: Illegal window scaling value 249 > 14 received [ 659.748716][T13496] netlink: zone id is out of range [ 659.750525][T13494] fuse: Unknown parameter '000000000000000000070x0000000000000008' [ 659.774524][T13496] netlink: zone id is out of range [ 659.793319][T13496] netlink: zone id is out of range [ 659.882685][T13496] netlink: zone id is out of range [ 659.909223][T13496] netlink: set zone limit has 8 unknown bytes [ 659.971002][T13500] netlink: 16 bytes leftover after parsing attributes in process `syz.4.1931'. [ 660.000241][T13500] netlink: 16 bytes leftover after parsing attributes in process `syz.4.1931'. [ 660.103276][T13498] Bluetooth: MGMT ver 1.23 [ 660.796325][ T5871] usb 4-1: USB disconnect, device number 59 [ 660.875765][T13505] netlink: 20 bytes leftover after parsing attributes in process `syz.0.1932'. [ 661.360666][T13521] netlink: 40 bytes leftover after parsing attributes in process `syz.0.1937'. [ 661.421626][ T5915] usb 4-1: new high-speed USB device number 60 using dummy_hcd [ 662.575764][ T5915] usb 4-1: too many configurations: 63, using maximum allowed: 8 [ 662.604552][ T5915] usb 4-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 662.616495][ T5915] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 662.624617][ T5915] usb 4-1: Product: syz [ 662.628861][ T5915] usb 4-1: Manufacturer: syz [ 662.636884][ T5915] usb 4-1: SerialNumber: syz [ 662.659819][ T29] kauditd_printk_skb: 206 callbacks suppressed [ 662.659835][ T29] audit: type=1400 audit(1734298397.878:20077): avc: denied { ioctl } for pid=13510 comm="syz.3.1934" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x550a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 662.662452][ T5915] usb 4-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 662.671412][ T29] audit: type=1400 audit(1734298397.878:20078): avc: denied { ioctl } for pid=13510 comm="syz.3.1934" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 662.879107][ T29] audit: type=1400 audit(1734298397.868:20076): avc: denied { read write } for pid=9159 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 662.898906][ T5913] usb 4-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 663.259694][ T29] audit: type=1400 audit(1734298397.878:20079): avc: denied { read write open } for pid=9159 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 663.284817][ C0] vkms_vblank_simulate: vblank timer overrun [ 663.390721][ T29] audit: type=1400 audit(1734298397.878:20080): avc: denied { ioctl } for pid=9159 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=652 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 663.416494][ C0] vkms_vblank_simulate: vblank timer overrun [ 663.766813][ T29] audit: type=1400 audit(1734298397.983:20081): avc: denied { create } for pid=13530 comm="syz.2.1940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 663.849166][ T3876] usb 4-1: USB disconnect, device number 60 [ 663.859813][ T29] audit: type=1400 audit(1734298397.994:20082): avc: denied { create } for pid=13530 comm="syz.2.1940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 663.942887][ T29] audit: type=1400 audit(1734298397.994:20083): avc: denied { bind } for pid=13530 comm="syz.2.1940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 663.962930][ T29] audit: type=1400 audit(1734298397.994:20084): avc: denied { name_bind } for pid=13530 comm="syz.2.1940" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=dccp_socket permissive=1 [ 663.984819][ T29] audit: type=1400 audit(1734298397.994:20085): avc: denied { node_bind } for pid=13530 comm="syz.2.1940" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=dccp_socket permissive=1 [ 664.000440][ T5915] usb 1-1: new full-speed USB device number 53 using dummy_hcd [ 664.159491][T13553] netlink: 'syz.4.1947': attribute type 1 has an invalid length. [ 664.192774][T13553] 8021q: adding VLAN 0 to HW filter on device bond3 [ 664.194835][ T5915] usb 1-1: New USB device found, idVendor=17e9, idProduct=8b4e, bcdDevice=9c.08 [ 664.209268][ T5915] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 664.220772][ T5915] usb 1-1: config 0 descriptor?? [ 664.268042][ T5913] ath9k_htc 4-1:1.0: ath9k_htc: Target is unresponsive [ 664.275490][ T5913] ath9k_htc: Failed to initialize the device [ 664.276716][T13556] 8021q: adding VLAN 0 to HW filter on device batadv1 [ 664.289193][ T3876] usb 4-1: ath9k_htc: USB layer deinitialized [ 664.369919][T13556] bond3: (slave batadv1): making interface the new active one [ 664.385637][T13556] bond3: (slave batadv1): Enslaving as an active interface with an up link [ 665.368502][ T5915] [drm] vendor descriptor length:e0 data:00 00 00 00 00 00 00 00 00 00 00 [ 665.420542][ T5915] [drm:udl_init] *ERROR* Unrecognized vendor firmware descriptor [ 665.432559][ T5915] [drm:udl_init] *ERROR* Selecting channel failed [ 665.446328][ T5915] [drm] Initialized udl 0.0.1 for 1-1:0.0 on minor 2 [ 665.453764][ T5915] [drm] Initialized udl on minor 2 [ 665.460665][ T5915] udl 1-1:0.0: [drm] *ERROR* Read EDID byte 0 failed err ffffffb9 [ 665.469164][ T5915] udl 1-1:0.0: [drm] Cannot find any crtc or sizes [ 665.495299][ T5870] udl 1-1:0.0: [drm] *ERROR* Read EDID byte 0 failed err ffffffb9 [ 665.505560][ T5915] usb 1-1: USB disconnect, device number 53 [ 665.506186][ T3876] usb 4-1: new high-speed USB device number 61 using dummy_hcd [ 665.512591][ T5870] udl 1-1:0.0: [drm] *ERROR* Read EDID byte 0 failed err ffffffb9 [ 665.527476][ T5870] udl 1-1:0.0: [drm] Cannot find any crtc or sizes [ 665.839845][ T5875] usb 6-1: new high-speed USB device number 31 using dummy_hcd [ 665.916174][ T5819] usb 3-1: new high-speed USB device number 59 using dummy_hcd [ 666.082716][ T5819] usb 3-1: New USB device found, idVendor=17e9, idProduct=8b4e, bcdDevice=9c.08 [ 666.092249][ T5819] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 666.104459][ T5819] usb 3-1: config 0 descriptor?? [ 666.108493][ T5875] usb 6-1: New USB device found, idVendor=17e9, idProduct=8b4e, bcdDevice=9c.08 [ 666.129248][ T5875] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 666.153882][ T3876] usb 4-1: device descriptor read/64, error -71 [ 666.155188][ T5875] usb 6-1: config 0 descriptor?? [ 666.353895][ T5819] [drm] vendor descriptor length:6 data:06 5f 01 72 00 00 00 00 00 00 00 [ 666.384999][ T5875] [drm] vendor descriptor length:6 data:06 5f 01 72 00 00 00 00 00 00 00 [ 666.389128][ T3876] usb 4-1: new high-speed USB device number 62 using dummy_hcd [ 666.394164][ T5875] [drm:udl_init] *ERROR* Unrecognized vendor firmware descriptor [ 666.401196][ T5819] [drm:udl_init] *ERROR* Unrecognized vendor firmware descriptor [ 666.488567][T13584] xt_hashlimit: overflow, try lower: 0/0 [ 666.665548][ T5875] [drm:udl_init] *ERROR* Selecting channel failed [ 666.982033][ T5875] [drm] Initialized udl 0.0.1 for 6-1:0.0 on minor 3 [ 667.081296][ T5875] [drm] Initialized udl on minor 3 [ 667.113331][ T5875] udl 6-1:0.0: [drm] *ERROR* Read EDID byte 0 failed err ffffffb9 [ 667.117375][ T5819] [drm:udl_init] *ERROR* Selecting channel failed [ 667.134348][ T3876] usb 4-1: New USB device found, idVendor=17e9, idProduct=8b4e, bcdDevice=9c.08 [ 667.146375][ T5819] [drm] Initialized udl 0.0.1 for 3-1:0.0 on minor 2 [ 667.158867][ T3876] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 667.166999][ T5819] [drm] Initialized udl on minor 2 [ 667.172787][ T5875] udl 6-1:0.0: [drm] Cannot find any crtc or sizes [ 667.173883][ T5819] udl 3-1:0.0: [drm] *ERROR* Read EDID byte 0 failed err ffffffb9 [ 667.180629][ T5870] udl 6-1:0.0: [drm] *ERROR* Read EDID byte 0 failed err ffffffb9 [ 667.188496][ T5819] udl 3-1:0.0: [drm] Cannot find any crtc or sizes [ 667.202669][ T3876] usb 4-1: config 0 descriptor?? [ 667.254227][ T5875] usb 6-1: USB disconnect, device number 31 [ 667.260904][ T5870] udl 6-1:0.0: [drm] *ERROR* Read EDID byte 0 failed err ffffffed [ 667.269434][ T5870] udl 6-1:0.0: [drm] Cannot find any crtc or sizes [ 667.289797][ T5871] udl 3-1:0.0: [drm] *ERROR* Read EDID byte 0 failed err ffffffb9 [ 667.299170][ T5871] udl 3-1:0.0: [drm] Cannot find any crtc or sizes [ 667.435253][ T29] kauditd_printk_skb: 264 callbacks suppressed [ 667.435270][ T29] audit: type=1400 audit(1734298402.886:20350): avc: denied { prog_load } for pid=13588 comm="syz.5.1960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 667.529952][ T29] audit: type=1400 audit(1734298402.928:20351): avc: denied { bpf } for pid=13588 comm="syz.5.1960" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 667.627766][ T29] audit: type=1400 audit(1734298402.928:20352): avc: denied { perfmon } for pid=13588 comm="syz.5.1960" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 667.644042][ T3876] [drm] vendor descriptor length:6 data:06 5f 01 72 00 00 00 00 00 00 00 [ 667.664845][ T3876] [drm:udl_init] *ERROR* Unrecognized vendor firmware descriptor [ 667.748937][ T29] audit: type=1400 audit(1734298402.928:20353): avc: denied { prog_run } for pid=13588 comm="syz.5.1960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 667.757181][ T5819] usb 3-1: USB disconnect, device number 59 [ 667.853815][ T29] audit: type=1400 audit(1734298402.939:20354): avc: denied { create } for pid=13588 comm="syz.5.1960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 667.876693][ T3876] [drm:udl_init] *ERROR* Selecting channel failed [ 667.900389][ T3876] [drm] Initialized udl 0.0.1 for 4-1:0.0 on minor 4 [ 667.934572][ T3876] [drm] Initialized udl on minor 4 [ 667.959263][ T3876] udl 4-1:0.0: [drm] *ERROR* Read EDID byte 0 failed err ffffffb9 [ 667.974989][ T29] audit: type=1400 audit(1734298402.939:20355): avc: denied { write } for pid=13588 comm="syz.5.1960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 667.990051][ T3876] udl 4-1:0.0: [drm] Cannot find any crtc or sizes [ 668.005978][ T29] audit: type=1400 audit(1734298403.002:20356): avc: denied { read } for pid=5174 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 668.057436][ T29] audit: type=1400 audit(1734298403.002:20357): avc: denied { search } for pid=5174 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 668.169095][ T29] audit: type=1400 audit(1734298403.002:20358): avc: denied { append } for pid=5174 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 668.176456][ T5871] udl 4-1:0.0: [drm] *ERROR* Read EDID byte 0 failed err ffffffb9 [ 668.203014][ T3876] usb 4-1: USB disconnect, device number 62 [ 668.213520][ T5871] udl 4-1:0.0: [drm] Cannot find any crtc or sizes [ 668.258349][ T29] audit: type=1400 audit(1734298403.002:20359): avc: denied { open } for pid=5174 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 668.924553][T13616] FAULT_INJECTION: forcing a failure. [ 668.924553][T13616] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 668.949476][T13616] CPU: 1 UID: 0 PID: 13616 Comm: syz.2.1968 Not tainted 6.13.0-rc2-syzkaller-00362-g2d8308bf5b67 #0 [ 668.960258][T13616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 668.970309][T13616] Call Trace: [ 668.973593][T13616] [ 668.976529][T13616] dump_stack_lvl+0x16c/0x1f0 [ 668.981230][T13616] should_fail_ex+0x497/0x5b0 [ 668.985930][T13616] _copy_from_user+0x2e/0xd0 [ 668.990542][T13616] copy_msghdr_from_user+0x99/0x160 [ 668.995766][T13616] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 669.001616][T13616] ___sys_sendmsg+0xff/0x1e0 [ 669.006221][T13616] ? __pfx____sys_sendmsg+0x10/0x10 [ 669.011444][T13616] ? __pfx_lock_release+0x10/0x10 [ 669.016487][T13616] ? trace_lock_acquire+0x14e/0x1f0 [ 669.021716][T13616] ? __fget_files+0x206/0x3a0 [ 669.026412][T13616] __sys_sendmsg+0x16e/0x220 [ 669.031012][T13616] ? __pfx___sys_sendmsg+0x10/0x10 [ 669.036153][T13616] do_syscall_64+0xcd/0x250 [ 669.040673][T13616] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 669.046586][T13616] RIP: 0033:0x7fd9bc385d19 [ 669.051009][T13616] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 669.070626][T13616] RSP: 002b:00007fd9bd246038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 669.079052][T13616] RAX: ffffffffffffffda RBX: 00007fd9bc575fa0 RCX: 00007fd9bc385d19 [ 669.087032][T13616] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 669.095009][T13616] RBP: 00007fd9bd246090 R08: 0000000000000000 R09: 0000000000000000 [ 669.102986][T13616] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 669.110964][T13616] R13: 0000000000000000 R14: 00007fd9bc575fa0 R15: 00007ffeeab09728 [ 669.118960][T13616] [ 669.441614][T13630] netlink: 48 bytes leftover after parsing attributes in process `syz.2.1974'. [ 672.203562][ T29] kauditd_printk_skb: 126 callbacks suppressed [ 672.203579][ T29] audit: type=1400 audit(1734298407.884:20486): avc: denied { prog_load } for pid=13639 comm="syz.2.1978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 672.229604][ T29] audit: type=1400 audit(1734298407.884:20487): avc: denied { bpf } for pid=13639 comm="syz.2.1978" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 676.187595][ T29] audit: type=1400 audit(1734298412.073:20488): avc: denied { read } for pid=13639 comm="syz.2.1978" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 676.858298][ T29] audit: type=1400 audit(1734298412.105:20489): avc: denied { ioctl } for pid=13622 comm="syz.3.1971" path="/dev/loop5" dev="devtmpfs" ino=652 ioctlcmd=0x4c0a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 677.052949][ T29] audit: type=1400 audit(1734298412.105:20490): avc: denied { write } for pid=13622 comm="syz.3.1971" name="loop6" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 677.297883][ T29] audit: type=1400 audit(1734298412.105:20491): avc: denied { open } for pid=13622 comm="syz.3.1971" path="/dev/loop6" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 677.644308][ T29] audit: type=1400 audit(1734298412.724:20492): avc: denied { read } for pid=13639 comm="syz.2.1978" dev="nsfs" ino=4026532857 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 677.758125][T13647] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1979'. [ 677.779531][ T29] audit: type=1400 audit(1734298412.724:20493): avc: denied { open } for pid=13639 comm="syz.2.1978" path="net:[4026532857]" dev="nsfs" ino=4026532857 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 677.793207][T13647] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1979'. [ 677.894649][ T29] audit: type=1400 audit(1734298412.724:20494): avc: denied { create } for pid=13639 comm="syz.2.1978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 677.956465][ T29] audit: type=1400 audit(1734298412.745:20495): avc: denied { write } for pid=13622 comm="syz.3.1971" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 678.004158][ T29] audit: type=1400 audit(1734298412.756:20496): avc: denied { read } for pid=13622 comm="syz.3.1971" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 678.049745][ T29] audit: type=1400 audit(1734298412.777:20497): avc: denied { read } for pid=5174 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 678.076073][ T5174] audit: audit_backlog=65 > audit_backlog_limit=64 [ 678.082969][ T5174] audit: audit_lost=67 audit_rate_limit=0 audit_backlog_limit=64 [ 679.279531][T13690] bridge0: port 1(erspan0) entered blocking state [ 679.286054][T13690] bridge0: port 1(erspan0) entered disabled state [ 679.292741][T13690] erspan0: entered allmulticast mode [ 679.299099][T13690] erspan0: entered promiscuous mode [ 679.305057][T13690] bridge0: port 1(erspan0) entered blocking state [ 679.311586][T13690] bridge0: port 1(erspan0) entered forwarding state [ 679.860852][T13699] netlink: 48 bytes leftover after parsing attributes in process `syz.5.1991'. [ 680.413832][ T1291] ieee802154 phy0 wpan0: encryption failed: -22 [ 680.560749][T13714] FAULT_INJECTION: forcing a failure. [ 680.560749][T13714] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 680.581815][T13714] CPU: 0 UID: 0 PID: 13714 Comm: syz.5.1995 Not tainted 6.13.0-rc2-syzkaller-00362-g2d8308bf5b67 #0 [ 680.592613][T13714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 680.602681][T13714] Call Trace: [ 680.605966][T13714] [ 680.608905][T13714] dump_stack_lvl+0x16c/0x1f0 [ 680.613623][T13714] should_fail_ex+0x497/0x5b0 [ 680.618325][T13714] _copy_from_user+0x2e/0xd0 [ 680.622938][T13714] do_futimesat+0xe6/0x200 [ 680.627370][T13714] ? __pfx_do_futimesat+0x10/0x10 [ 680.632413][T13714] ? ksys_write+0x1ba/0x250 [ 680.636940][T13714] do_syscall_64+0xcd/0x250 [ 680.641467][T13714] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 680.647378][T13714] RIP: 0033:0x7fa525f85d19 [ 680.651812][T13714] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 680.671435][T13714] RSP: 002b:00007fa526ea3038 EFLAGS: 00000246 ORIG_RAX: 00000000000000eb [ 680.679872][T13714] RAX: ffffffffffffffda RBX: 00007fa526175fa0 RCX: 00007fa525f85d19 [ 680.687857][T13714] RDX: 0000000000000000 RSI: 00000000200005c0 RDI: 0000000020000500 [ 680.695841][T13714] RBP: 00007fa526ea3090 R08: 0000000000000000 R09: 0000000000000000 [ 680.703827][T13714] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 680.711813][T13714] R13: 0000000000000000 R14: 00007fa526175fa0 R15: 00007ffec6506d98 [ 680.719820][T13714] [ 681.491040][T13714] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 681.510892][T13730] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1995'. [ 681.565637][T13723] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13723 comm=syz.5.1995 [ 681.659145][T13714] netlink: 'syz.5.1995': attribute type 1 has an invalid length. [ 681.873514][ T29] kauditd_printk_skb: 242 callbacks suppressed [ 681.873532][ T29] audit: type=1400 audit(1734298417.974:20739): avc: denied { read } for pid=13733 comm="syz.0.2000" dev="nsfs" ino=4026532913 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 681.909114][ T29] audit: type=1400 audit(1734298417.974:20740): avc: denied { open } for pid=13733 comm="syz.0.2000" path="net:[4026532913]" dev="nsfs" ino=4026532913 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 681.934011][ T29] audit: type=1400 audit(1734298417.974:20741): avc: denied { create } for pid=13733 comm="syz.0.2000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 681.954812][ T29] audit: type=1400 audit(1734298417.974:20742): avc: denied { write } for pid=13733 comm="syz.0.2000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 681.976549][ T29] audit: type=1400 audit(1734298417.974:20743): avc: denied { read } for pid=13733 comm="syz.0.2000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 681.997804][ T29] audit: type=1400 audit(1734298418.016:20744): avc: denied { execmem } for pid=13736 comm="syz.4.2002" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 682.039067][ T29] audit: type=1400 audit(1734298418.047:20745): avc: denied { create } for pid=13736 comm="syz.4.2002" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 682.060050][ T29] audit: type=1400 audit(1734298418.215:20746): avc: denied { read } for pid=13735 comm="syz.3.2003" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="unconfined" [ 682.085285][ T29] audit: type=1400 audit(1734298418.215:20747): avc: denied { open } for pid=13735 comm="syz.3.2003" path="/dev/cpu/0/msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="unconfined" [ 682.111015][ T29] audit: type=1400 audit(1734298418.215:20748): avc: denied { create } for pid=13735 comm="syz.3.2003" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 682.170596][T13747] evm: overlay not supported [ 682.182114][T13747] [ 682.184470][T13747] ====================================================== [ 682.191491][T13747] WARNING: possible circular locking dependency detected [ 682.198542][T13747] 6.13.0-rc2-syzkaller-00362-g2d8308bf5b67 #0 Not tainted [ 682.205647][T13747] ------------------------------------------------------ [ 682.212661][T13747] syz.0.2004/13747 is trying to acquire lock: [ 682.218721][T13747] ffff88805a184c90 (&ovl_i_mutex_dir_key[depth]){++++}-{4:4}, at: walk_component+0x342/0x5b0 [ 682.228929][T13747] [ 682.228929][T13747] but task is already holding lock: [ 682.236293][T13747] ffff888036298088 (&of->mutex){+.+.}-{4:4}, at: kernfs_fop_write_iter+0x27b/0x500 [ 682.245632][T13747] [ 682.245632][T13747] which lock already depends on the new lock. [ 682.245632][T13747] [ 682.256034][T13747] [ 682.256034][T13747] the existing dependency chain (in reverse order) is: [ 682.265049][T13747] [ 682.265049][T13747] -> #3 (&of->mutex){+.+.}-{4:4}: [ 682.272274][T13747] __mutex_lock+0x19b/0xa60 [ 682.277313][T13747] kernfs_fop_write_iter+0x27b/0x500 [ 682.283137][T13747] iter_file_splice_write+0x90f/0x10b0 [ 682.289136][T13747] do_splice+0x145c/0x1f60 [ 682.294080][T13747] __do_splice+0x327/0x360 [ 682.299020][T13747] __x64_sys_splice+0x187/0x250 [ 682.304396][T13747] do_syscall_64+0xcd/0x250 [ 682.309443][T13747] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 682.315870][T13747] [ 682.315870][T13747] -> #2 (&pipe->mutex){+.+.}-{4:4}: [ 682.323260][T13747] __mutex_lock+0x19b/0xa60 [ 682.328270][T13747] pipe_lock+0x64/0x80 [ 682.332850][T13747] iter_file_splice_write+0x1eb/0x10b0 [ 682.338841][T13747] do_splice+0x145c/0x1f60 [ 682.343777][T13747] __do_splice+0x327/0x360 [ 682.348708][T13747] __x64_sys_splice+0x187/0x250 [ 682.354070][T13747] do_syscall_64+0xcd/0x250 [ 682.359089][T13747] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 682.365501][T13747] [ 682.365501][T13747] -> #1 (sb_writers#6){.+.+}-{0:0}: [ 682.372885][T13747] mnt_want_write+0x6f/0x450 [ 682.377998][T13747] ovl_create_object+0x12e/0x300 [ 682.383454][T13747] lookup_open.isra.0+0x1174/0x14c0 [ 682.389168][T13747] path_openat+0x904/0x2d60 [ 682.394179][T13747] do_filp_open+0x20c/0x470 [ 682.399187][T13747] do_sys_openat2+0x17a/0x1e0 [ 682.404377][T13747] __x64_sys_open+0x154/0x1e0 [ 682.409564][T13747] do_syscall_64+0xcd/0x250 [ 682.414579][T13747] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 682.420985][T13747] [ 682.420985][T13747] -> #0 (&ovl_i_mutex_dir_key[depth]){++++}-{4:4}: [ 682.429660][T13747] __lock_acquire+0x249e/0x3c40 [ 682.435022][T13747] lock_acquire.part.0+0x11b/0x380 [ 682.440641][T13747] down_read+0x9a/0x330 [ 682.445311][T13747] walk_component+0x342/0x5b0 [ 682.450504][T13747] path_lookupat+0x17f/0x770 [ 682.455603][T13747] filename_lookup+0x221/0x5f0 [ 682.460875][T13747] kern_path+0x35/0x50 [ 682.465450][T13747] lookup_bdev+0xd9/0x280 [ 682.470299][T13747] resume_store+0x1d8/0x460 [ 682.475324][T13747] kobj_attr_store+0x55/0x80 [ 682.480433][T13747] sysfs_kf_write+0x117/0x170 [ 682.485626][T13747] kernfs_fop_write_iter+0x33d/0x500 [ 682.491420][T13747] vfs_write+0x5ae/0x1150 [ 682.496263][T13747] ksys_write+0x12b/0x250 [ 682.501100][T13747] do_syscall_64+0xcd/0x250 [ 682.506114][T13747] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 682.512522][T13747] [ 682.512522][T13747] other info that might help us debug this: [ 682.512522][T13747] [ 682.522732][T13747] Chain exists of: [ 682.522732][T13747] &ovl_i_mutex_dir_key[depth] --> &pipe->mutex --> &of->mutex [ 682.522732][T13747] [ 682.536106][T13747] Possible unsafe locking scenario: [ 682.536106][T13747] [ 682.543537][T13747] CPU0 CPU1 [ 682.548884][T13747] ---- ---- [ 682.554228][T13747] lock(&of->mutex); [ 682.558197][T13747] lock(&pipe->mutex); [ 682.564859][T13747] lock(&of->mutex); [ 682.571347][T13747] rlock(&ovl_i_mutex_dir_key[depth]); [ 682.576881][T13747] [ 682.576881][T13747] *** DEADLOCK *** [ 682.576881][T13747] [ 682.585004][T13747] 4 locks held by syz.0.2004/13747: [ 682.590185][T13747] #0: ffff8880287c3b38 (&f->f_pos_lock){+.+.}-{4:4}, at: fdget_pos+0x267/0x390 [ 682.599230][T13747] #1: ffff888031986420 (sb_writers#9){.+.+}-{0:0}, at: ksys_write+0x12b/0x250 [ 682.608187][T13747] #2: ffff888036298088 (&of->mutex){+.+.}-{4:4}, at: kernfs_fop_write_iter+0x27b/0x500 [ 682.617926][T13747] #3: ffff88801decd878 (kn->active#61){.+.+}-{0:0}, at: kernfs_fop_write_iter+0x29e/0x500 [ 682.627931][T13747] [ 682.627931][T13747] stack backtrace: [ 682.633799][T13747] CPU: 1 UID: 0 PID: 13747 Comm: syz.0.2004 Not tainted 6.13.0-rc2-syzkaller-00362-g2d8308bf5b67 #0 [ 682.644542][T13747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 682.654582][T13747] Call Trace: [ 682.657846][T13747] [ 682.660768][T13747] dump_stack_lvl+0x116/0x1f0 [ 682.665448][T13747] print_circular_bug+0x419/0x5d0 [ 682.670466][T13747] check_noncircular+0x31a/0x400 [ 682.675393][T13747] ? stack_trace_save+0x95/0xd0 [ 682.680244][T13747] ? __pfx_check_noncircular+0x10/0x10 [ 682.685694][T13747] ? add_lock_to_list+0x17d/0x390 [ 682.690714][T13747] __lock_acquire+0x249e/0x3c40 [ 682.695557][T13747] ? __pfx___lock_acquire+0x10/0x10 [ 682.700745][T13747] ? lock_acquire.part.0+0x11b/0x380 [ 682.706021][T13747] ? find_held_lock+0x2d/0x110 [ 682.710780][T13747] lock_acquire.part.0+0x11b/0x380 [ 682.715882][T13747] ? walk_component+0x342/0x5b0 [ 682.720729][T13747] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 682.726349][T13747] ? rcu_is_watching+0x12/0xc0 [ 682.731105][T13747] ? trace_lock_acquire+0x14e/0x1f0 [ 682.736298][T13747] ? walk_component+0x342/0x5b0 [ 682.741142][T13747] ? lock_acquire+0x2f/0xb0 [ 682.745631][T13747] ? walk_component+0x342/0x5b0 [ 682.750480][T13747] down_read+0x9a/0x330 [ 682.754631][T13747] ? walk_component+0x342/0x5b0 [ 682.759480][T13747] ? __pfx_down_read+0x10/0x10 [ 682.764325][T13747] ? lookup_fast+0x155/0x540 [ 682.768928][T13747] walk_component+0x342/0x5b0 [ 682.773624][T13747] path_lookupat+0x17f/0x770 [ 682.778215][T13747] filename_lookup+0x221/0x5f0 [ 682.782975][T13747] ? __pfx_filename_lookup+0x10/0x10 [ 682.788260][T13747] ? getname_kernel+0x52/0x370 [ 682.793019][T13747] ? __asan_memcpy+0x3c/0x60 [ 682.797605][T13747] kern_path+0x35/0x50 [ 682.801662][T13747] lookup_bdev+0xd9/0x280 [ 682.805996][T13747] ? __pfx_lookup_bdev+0x10/0x10 [ 682.810939][T13747] ? __asan_memcpy+0x3c/0x60 [ 682.815519][T13747] resume_store+0x1d8/0x460 [ 682.820016][T13747] ? __pfx_resume_store+0x10/0x10 [ 682.825033][T13747] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 682.830658][T13747] ? rcu_is_watching+0x12/0xc0 [ 682.835421][T13747] ? __pfx_resume_store+0x10/0x10 [ 682.840440][T13747] kobj_attr_store+0x55/0x80 [ 682.845026][T13747] ? __pfx_kobj_attr_store+0x10/0x10 [ 682.850302][T13747] sysfs_kf_write+0x117/0x170 [ 682.854978][T13747] kernfs_fop_write_iter+0x33d/0x500 [ 682.860257][T13747] ? __pfx_sysfs_kf_write+0x10/0x10 [ 682.865448][T13747] vfs_write+0x5ae/0x1150 [ 682.869769][T13747] ? __pfx_kernfs_fop_write_iter+0x10/0x10 [ 682.875568][T13747] ? __pfx___mutex_lock+0x10/0x10 [ 682.880582][T13747] ? __pfx_vfs_write+0x10/0x10 [ 682.885339][T13747] ksys_write+0x12b/0x250 [ 682.889655][T13747] ? __pfx_ksys_write+0x10/0x10 [ 682.894518][T13747] do_syscall_64+0xcd/0x250 [ 682.899036][T13747] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 682.904940][T13747] RIP: 0033:0x7f2ce8985d19 [ 682.909346][T13747] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 682.928945][T13747] RSP: 002b:00007f2ce9792038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 682.937347][T13747] RAX: ffffffffffffffda RBX: 00007f2ce8b75fa0 RCX: 00007f2ce8985d19 [ 682.945305][T13747] RDX: 0000000000000012 RSI: 00000000200000c0 RDI: 0000000000000003 [ 682.953263][T13747] RBP: 00007f2ce8a01a20 R08: 0000000000000000 R09: 0000000000000000 [ 682.961235][T13747] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 682.969196][T13747] R13: 0000000000000000 R14: 00007f2ce8b75fa0 R15: 00007ffd8ec59a78 [ 682.977164][T13747] [ 683.073792][T13747] block device autoloading is deprecated and will be removed. [ 683.086066][T13747] PM: Image not found (code -22)