last executing test programs: 15.781945818s ago: executing program 2 (id=3965): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) mkdir(&(0x7f00000004c0)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000140)='./bus\x00', &(0x7f0000000000), 0x0, &(0x7f0000000180)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0, 0x92) mknodat(r0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) (fail_nth: 8) chdir(&(0x7f00000000c0)='./bus\x00') rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='.\x02\x00') r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000280)=""/81, 0x51) 15.460912654s ago: executing program 2 (id=3968): prlimit64(0x0, 0xe, &(0x7f0000000200)={0x8, 0x8a}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e25}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0), 0x4) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000280)=@gcm_128={{0x303}, "ed197fbfb5c342b6", "28852cbbbeba35380ee5190047169f9d", "2eb387e0", "11edf8da8e55bb27"}, 0x28) r3 = syz_io_uring_setup(0xb5c, &(0x7f0000000640)={0x0, 0x9916, 0x0, 0x0, 0x164, 0x0, r2}, &(0x7f0000000540)=0x0, &(0x7f0000000480)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3) syz_io_uring_submit(r4, r5, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r1, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000880)=""/254, 0xfe}], 0x2}) io_uring_enter(r3, 0xf23, 0x0, 0xc, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r6 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r6, &(0x7f0000019680)=""/102392, 0x18ff8) 15.401254745s ago: executing program 0 (id=3970): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="4c0000006d00673c2bbd7000ffdadf25000000004a82c7c78645fac9f88aa07c2dd6cd754b75b3ae2f4e7c46484cc2c5338c4f79b9674e0d02fb803bcd5d2048e550660a11a82b3f97eeba6378df2c1129b082d6b7975486346c2cf0515610c9a7821431df38674c9aafd28483033d892ad54d11b94f8a0758709ef6abd892e4f82fbd45ccd7da4b0bb825bb048662078088335483f7bef49b95f9a691017d7138f89bf53d413cb668018487385a12ffccfe43719dc619baf035f70b538e0506f9bf72001f25ed01abf68dc911971324ff937cc2fdca113b6df647512831a5c79cf9430f90", @ANYRES32=0x0, @ANYBLOB="0110040004e80200180034801400350076657468315f746f5f626f6e640000001400030076657468315f746f5f626f6e64000000"], 0x4c}, 0x1, 0x0, 0x0, 0x8004}, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000100), 0xf3c, 0x8630644572849689) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f0000000040)=0x8001) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r3 = syz_open_dev$media(&(0x7f0000001a80), 0x3, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r3, 0xc0287c02, &(0x7f0000000400)={0x80000000, 0x0, &(0x7f0000000100)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r3, 0xc0287c02, &(0x7f0000000280)={r4, 0x0, &(0x7f0000000080)=[{{0x80000000, 0x0}}, {{0x80000000, 0x0}}]}) ioctl$MEDIA_IOC_SETUP_LINK(r3, 0xc0347c03, &(0x7f000000a300)={{0x80000000, r6, 0x5, [0x80000001, 0x4]}, {r5, r7, 0x4, [0xc1b, 0x4]}, 0x0, [0x7e, 0x8]}) read$FUSE(r2, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) syz_fuse_handle_req(r2, &(0x7f0000008400)="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", 0x2000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x90, 0x0, 0x2, {0x2, 0x0, 0x0, 0x3, 0x4000, 0x265, {0x3, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x3ff, 0x6000, 0x0, 0x0, 0x0, 0x801}}}, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_INIT(r2, &(0x7f0000000180)={0x50, 0x0, r8, {0x7, 0x2b, 0xfff, 0x83520, 0x3, 0x7, 0x1ff, 0x2, 0x0, 0x0, 0x10, 0x8}}, 0x50) r9 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0/file0\x00', 0x4a300, 0xcd) ioctl$sock_inet_sctp_SIOCINQ(r9, 0x541b, 0x0) 15.340938378s ago: executing program 0 (id=3972): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) close(0x3) r2 = socket$xdp(0x2c, 0x3, 0x0) fgetxattr(r0, &(0x7f0000000300)=@known='user.syz\x00', &(0x7f0000000340)=""/156, 0x9c) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) syz_emit_vhci(&(0x7f00000024c0)=@HCI_EVENT_PKT={0x4, @hci_ev_cmd_complete={{0xe, 0x5}, @hci_rp_read_num_supported_iac={{0x75}, {0x6, 0x5}}}}, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'sit0\x00'}) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000001c0)=0x2, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000180)=0x20, 0x4) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000480)={0x73622a85, 0x0, 0x2}) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000200)='./binderfs/binder0\x00', 0x802, 0x0) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000400)=[@increfs], 0x0, 0x0, 0x0}) dup3(r5, r4, 0x80000) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f0000000440)=[@request_death={0x400c6313}], 0xffffffffffffff9a, 0x1000000, 0x0}) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r6 = getpid() sched_setscheduler(r6, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r7, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r8, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r7, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x0, 0x0) setrlimit(0xe, &(0x7f0000000040)={0x5, 0x200000000}) 15.262004644s ago: executing program 1 (id=3974): prlimit64(0x0, 0xe, &(0x7f0000000200)={0x8, 0x8a}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000006c0)=[{{&(0x7f0000000300)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000380)}, {&(0x7f0000000100)="c47de5", 0x3}], 0x2, &(0x7f0000000500), 0x0, 0x40000}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}], 0x20, 0x14}}], 0x2, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e25}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000000)=0x1, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000001300), 0x0, 0x48, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000280)=@gcm_128={{0x303}, "ed197fbfb5c342b6", "28852cbbbeba35380ee5190047169f9d", "2eb387e0", "11edf8da8e55bb27"}, 0x28) r3 = syz_io_uring_setup(0xb5c, &(0x7f0000000640)={0x0, 0x9916, 0x0, 0x0, 0x164}, &(0x7f0000000540)=0x0, &(0x7f0000000480)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3) syz_io_uring_submit(r4, r5, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r2, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000880)=""/254, 0xfe}], 0x2}) io_uring_enter(r3, 0xf23, 0xfe, 0xc, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x3) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r6 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r6, &(0x7f0000019680)=""/102392, 0x18ff8) 15.144385661s ago: executing program 4 (id=3977): r0 = getpgrp(0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000040)=0x5) prlimit64(0x0, 0xe, &(0x7f0000000100)={0x8, 0x80000100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000300)=0x7) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000000)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) syz_clone(0x8000, 0x0, 0xfffffffffffffe7e, 0x0, 0x0, 0x0) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) socket(0x400000000010, 0x3, 0x0) sync() 14.268334172s ago: executing program 0 (id=3980): r0 = getpgrp(0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000040)=0x5) prlimit64(0x0, 0xe, &(0x7f0000000100)={0x8, 0x80000100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000300)=0x7) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000000)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x8000, 0x0, 0xfffffffffffffe7e, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, r2, 0x1, 0x0) r3 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r3, &(0x7f0000019680)=""/102392, 0x18ff8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x2000) r6 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r6}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000002c0)=0x2, 0xb, 0x2, &(0x7f0000000300)={0x77359400}, &(0x7f00000004c0)=0x1, 0x2) syz_open_dev$vim2m(&(0x7f0000000300), 0x80000007, 0x2) shutdown(r4, 0x2) gettid() timer_create(0x0, 0x0, 0x0) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r7, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 14.107282019s ago: executing program 1 (id=3982): socket(0xa, 0x1, 0x0) socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x20, 0x13, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000008000000000000000600000018110000", @ANYRES32=0x1, @ANYBLOB="0000000400000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000000000008500000086000000bf91000000000000b7020000e09268c78500000085000000b7000000000000009500000000000000"], &(0x7f0000000c40)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf51c}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb01001800000000d80000001000000210000000030000000100be000000000e0900000000000000005f"], 0x0, 0x2b, 0x0, 0x5}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000000100)='syzkaller\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) io_uring_setup(0x1d48, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) syz_open_dev$usbfs(&(0x7f0000000480), 0x77, 0x41341) prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) sched_setscheduler(r0, 0x1, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, 0x0, 0x0) sendmmsg$inet6(r1, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980)}}], 0x1, 0x4040044) socket$inet6_mptcp(0xa, 0x1, 0x106) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x100400000000000, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000001000), 0x0, 0x20c0) 14.096705331s ago: executing program 4 (id=3983): getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000280)={0x0, 0x9a, 0xb, 0x4, 0x11, 0x5392, 0xfb9d, 0x9, {0x0, @in={{0x2, 0x4e22, @multicast1}}, 0x81, 0x0, 0x2000000c, 0x4b, 0x9}}, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000040900010073797a30000000009c000000090a010400000000000000000700000308000a40000000000900020073797a30000000000900010073797a3000000000080005400000000d58001280200001800e000100636f6e6e6c696d69740000000c0002800800014000000008200001800e000100636f6e6e6c696d69740000000c000280080001400000000014000180090001006cdbf80789f3f947dd000280080003"], 0xe4}}, 0x20050840) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = syz_open_dev$MSR(&(0x7f0000019240), 0x0, 0x0) ioctl$COMEDI_CMD(0xffffffffffffffff, 0x80506409, &(0x7f0000000180)={0xfffffffc, 0x1, 0xffffffff, 0x6dc, 0x2, 0x200, 0x20, 0x368, 0x20, 0xffffffff, 0x20, 0x7, &(0x7f0000000380)=[0x4], 0x1, 0x0}) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) capset(&(0x7f0000000100)={0x20080522}, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb010004000000000000000c0000000c000000020000000500000000000010040000000080"], 0x0, 0x26, 0x0, 0x1, 0x1}, 0x28) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') pread64(r3, &(0x7f0000000200)=""/102400, 0x19000, 0x1000000000) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x4e22, @private=0xa010102}], 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x35451d7003000c0b, 0x0) ioctl$TUNSETGROUP(r5, 0x400454ce, 0xee01) ioctl$TUNSETLINK(r5, 0x400454cd, 0x310) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{0x0, 0xb2}, {0x0}, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/55, 0x37}], 0x1, 0x1000000000042}}], 0x48}, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030041000b05d25a806c8c6394f90324fc60100000000a000200053582c137153e3704020180fc5409000c00", 0x33fe0}], 0x1}, 0x0) 13.901378393s ago: executing program 1 (id=3986): r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f0000000080)={0xc, 0x0, 0x0}) ioctl$IOMMU_VFIO_IOAS$SET(r0, 0x3b88, &(0x7f0000000000)={0xc, r1}) ioctl$IOMMU_VFIO_IOAS$GET(r0, 0x3b88, &(0x7f0000000100)={0xc}) ioctl$IOMMU_VFIO_IOAS$CLEAR(r0, 0x3b88, &(0x7f0000000140)={0xc}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="440100001000130726bd70000000000000000000000000000000ffffe0000002ac1414130000000000000000000000004e22000100000003020000003a000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x144}, 0x1, 0x0, 0x0, 0xc0}, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000001340)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x4) openat$urandom(0xffffffffffffff9c, 0x0, 0x482, 0x0) socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, '.\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x11000) ioctl$TIOCSPGRP(r3, 0x5410, &(0x7f0000000100)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/stat\x00', 0x0, 0x0) r5 = syz_io_uring_setup(0x5ca5, &(0x7f0000000480)={0x0, 0xf7fa, 0x1, 0x7ffd, 0x1da, 0x0, r4}, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r6, r7, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x40, 0x4007, @fd=r4, 0xffffffffffffffff, &(0x7f0000000580)=""/207, 0xcf, 0x2, 0x1}) io_uring_enter(r5, 0x24a0, 0x4c1, 0x43, 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOW_IOVAS(r0, 0x3b82, &(0x7f0000000180)={0x20, r1, 0x0, 0x0, &(0x7f00000001c0)}) landlock_create_ruleset(&(0x7f0000000180)={0x2062}, 0xfffffd2f, 0x0) ioctl$IOMMU_VFIO_IOAS$SET(r0, 0x3b88, &(0x7f0000000200)={0xc, r1}) 13.742041865s ago: executing program 4 (id=3988): mkdirat(0xffffffffffffff9c, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0xa4, 0x30, 0x1, 0x0, 0x0, {}, [{0x90, 0x1, [@m_ct={0x44, 0x2, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x9d, 0x11e41e7a, 0x20000000, 0x0, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x1}}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x804}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380), 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=@can={{0x4, 0x0, 0x1}, 0x2, 0x2, 0x0, 0x0, "6de36b07774de41a"}, 0x10}, 0x1, 0x0, 0x0, 0x20000004}, 0x8085) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r4 = fsopen(&(0x7f0000000280)='ceph\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r4, 0x1, &(0x7f0000000b40)='source', &(0x7f0000000040)='c:::\x00', 0x0) gettid() fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f00000006c0)={0x4, 0x0, 0x0, 0x0, 0x132, 0x3}) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000001900)={0x2, {0xc, 0x117, 0x5, 0x101, 0x200}}) 13.67802465s ago: executing program 3 (id=3989): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000200)=""/49, &(0x7f0000000240)=0x31) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x4e24, @remote}]}, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000008c0)=@newtaction={0x5c, 0x30, 0x1, 0x70bd28, 0x200000, {}, [{0x48, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x10000, 0x8003, 0x8ef7807338d50069, 0x7ff, 0x3}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc}}}]}]}, 0x5c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x48, 0x37, 0x0, 0x8}, {0x28, 0x1, 0xf7, 0xfffff034}, {0x6, 0x6, 0x0, 0x57c}]}, 0x10) sendto(r3, &(0x7f0000000380)="72e1fb4d9326d24774d16e", 0xb, 0x80, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x20001, 0x0) pselect6(0x40, &(0x7f0000000200)={0xb, 0x7, 0x15, 0x6366, 0x7fff, 0x200, 0x9, 0x1}, 0x0, 0x0, &(0x7f0000000300), 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000340)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0x6}}, {{0xa, 0xfffe, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3}}}, 0x108) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x83, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xd2, &(0x7f00000002c0)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r8, 0x1, 0x1000000000000f, &(0x7f0000000080)=0x7fffffff, 0x4) setsockopt$sock_attach_bpf(r8, 0x1, 0x34, &(0x7f0000000040)=r7, 0x4) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="b7000000ecffffff0c0000000000000095000000000000005e0c83dfb64a3eb1cdfa541cd3957aa8a96b9fa4591c1eb556e38defc504b011face5a06294c2115a9ad943bac350e8d7961537181f79ead9176dc7c3ed2d45004deb987fa0d"], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000002c0)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff37}, 0x48) r10 = dup2(r9, r7) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x2c, r12, 0x6a98047402e98331, 0x70bd2a, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x50}, 0x4886) setsockopt$sock_attach_bpf(r8, 0x1, 0x34, &(0x7f00000000c0)=r10, 0x4) ioctl$COMEDI_DEVCONFIG(r10, 0x40946400, &(0x7f0000000080)={'das1800\x00', [0xffff7fff, 0x5e1b, 0x2, 0x7fff, 0x1, 0x6, 0x0, 0xd, 0xfffffff4, 0x8, 0x8, 0x2, 0x3, 0x3, 0x4, 0x81, 0x2, 0xa3a, 0x2, 0xffff9fd8, 0xd, 0x7, 0x1, 0x7ff, 0x7, 0x3, 0x2, 0x29be9712, 0x5, 0x3, 0x9, 0x3]}) sendmsg$nl_route_sched(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@gettclass={0x24, 0x2a, 0x129, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0xb, 0xd}, {}, {0xe, 0xfff1}}}, 0x24}}, 0x40004) r13 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(r13, 0x84, 0x0, &(0x7f0000000180)={r5, 0x8, 0xffff, 0x7}, 0x10) 13.437547535s ago: executing program 3 (id=3990): r0 = syz_open_dev$loop(&(0x7f0000000000), 0xc000000000004f, 0x418401) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x320, 0x250, 0x5c, 0x160, 0x140, 0x3e0, 0x250, 0x228, 0x25a, 0x250, 0x228, 0x4, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'veth0_to_batadv\x00', 'pim6reg\x00', {0xff}, {}, 0x3a}, 0x5002, 0xf8, 0x140, 0x52020000, {0x0, 0x6802000000000000}, [@common=@icmp6={{0x28}, {0x12, "d176", 0x1}}, @common=@unspec=@state={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x1}}}, {{@ipv6={@local, @empty, [0xffffffff], [], 'veth1_to_hsr\x00', 'dummy0\x00'}, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x10, 0x0, 0x0, 0x0, 'snmp\x00', 'syz0\x00', {0x2}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x380) fsetxattr$security_capability(r1, &(0x7f0000000380), &(0x7f00000003c0)=@v2={0x2000000, [{0x10001, 0x9}, {0x100}]}, 0x14, 0x2) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000400)={0x0, 0x200}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={r2, 0x8001}, &(0x7f0000000080)=0x8) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000000)="d8000000180081064e81f782db44b904021d080400007c09e8fe55a10a0015c005001c2603600e1208000f0000000401a8001600a4000140000000017fffffffb94dcf5c0461c1d6900094007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x20004000) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000000c0)={r3, 0x7}, &(0x7f0000000100)=0x8) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000200)={'\x00', 0x0, 0x7, 0x0, 0xa, 0x2}) 13.284864363s ago: executing program 3 (id=3991): openat$sequencer(0xffffff9c, &(0x7f0000000040), 0x2000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r3, &(0x7f0000000300)={0x0, 0x9e, &(0x7f0000000fc0)={&(0x7f00000004c0)={0x38, 0x1403, 0x1, 0x70bd2d, 0x0, "", [{{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'lo\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x854}, 0x0) prlimit64(r0, 0xc, &(0x7f0000000180)={0x8, 0x6}, &(0x7f0000000f80)) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r3, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x24, 0x4, 0x8, 0x201, 0x0, 0x0, {0xa, 0x0, 0x7}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x11}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8}]}, 0x24}}, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@ipv6_newrule={0x30, 0x20, 0x1, 0x0, 0x25dfdbfb, {0xa, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3001a}, [@FRA_DST={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, 0x30}}, 0x40000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9}}, './file0\x00'}) syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "4dd708", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4001, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0xc2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3, 0x96}]}}}}}}}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0xfe, &(0x7f0000000500)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10, 0x1000}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0xff}}]}}}]}, 0x48}}, 0x0) 13.27793147s ago: executing program 0 (id=3992): mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000013c0)='./file0/file0\x00', 0x42, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x8d) mount$overlay(0x0, &(0x7f0000000080)='./file7/file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={[{@redirect_dir_off}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './bus'}}, {@uuid_auto}, {@xino_on}, {@metacopy_on}, {@xino_off}, {@volatile}]}) chdir(&(0x7f00000003c0)='./bus\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000540)='./file7\x00', 0x1c0) renameat2(0xffffffffffffff9c, &(0x7f0000000180)='./file7/file0\x00', 0xffffffffffffff9c, &(0x7f0000000200)='./file7/file0\x00', 0x5) mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x212) socket$igmp(0x2, 0x3, 0x2) connect$unix(r0, &(0x7f000057eff8)=@abs={0x3, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$video4linux(0x0, 0x1, 0x34f881) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f0000000240)={0x24, @short={0x2, 0x2, 0xaaa3}}, 0xb) syz_open_dev$dri(0x0, 0x1, 0x0) r2 = semget$private(0x0, 0x3, 0x0) semop(r2, &(0x7f0000000240)=[{0x2, 0xd5db}, {0x0, 0x200, 0x800}], 0x2) semctl$GETZCNT(r2, 0x2, 0xf, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000340)='./file7/file0\x00', 0x608402, 0x107) close(r3) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) setpriority(0x2, 0x0, 0x7fffff7ffffffffb) r4 = socket$rds(0x15, 0x5, 0x0) bind$rds(r4, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) socket$rds(0x15, 0x5, 0x0) 12.889909269s ago: executing program 1 (id=3993): r0 = socket$alg(0x26, 0x5, 0x0) sched_setscheduler(0x0, 0x3, &(0x7f0000000300)=0x7) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) getpid() iopl(0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r1 = syz_clone(0x8000, 0x0, 0xfffffffffffffe7e, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, r1, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000bce) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x300) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, 0x0) syz_emit_ethernet(0xc9, &(0x7f0000000040)={@local, @empty, @void, {@ipv6={0x86dd, @gre_packet={0x1, 0x6, "954a5b", 0x93, 0x2f, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x88be, 0x0, 0x1}, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [0x56a]}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [], "345058ca25488c16129f797f557c7d67a8c9cf47d86f45464426d990668dcf277343479fb138dc96d6fceb89158d4e4ea42f7a1d90fb2ebde85d2d4792c70ed1857305c13bdcedcce98f162097"}, {0x8, 0x88be, 0x3, {{0xc, 0x1, 0x48, 0x1, 0x1, 0x0, 0x4, 0x10}, 0x1, {0x7b40}}}, {0x8, 0x22eb, 0x2, {{0x3, 0x2, 0x2, 0x3, 0x0, 0x0, 0x1, 0x9}, 0x2, {0x5, 0xee, 0x0, 0xd, 0x1, 0x1, 0x1, 0x1, 0x1}}}}}}}}}, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000b00)={0x300, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES8], 0x18}}, 0x40) bind$alg(r0, &(0x7f0000000940)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) r5 = syz_io_uring_setup(0xd7, &(0x7f0000000000)={0x0, 0xb46, 0x0, 0x0, 0x34f}, &(0x7f00000002c0)=0x0, &(0x7f0000000080)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) syz_io_uring_submit(r6, r7, &(0x7f0000000200)=@IORING_OP_READ=@pass_buffer={0x16, 0x40, 0x4000, @fd, 0xd4b, 0x0, 0x0, 0x0, 0x1}) io_uring_enter(r5, 0x47bc, 0x0, 0x0, 0x0, 0x0) 12.650924794s ago: executing program 4 (id=3994): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) mkdir(&(0x7f00000004c0)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000140)='./bus\x00', &(0x7f0000000000), 0x0, &(0x7f0000000180)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0, 0x92) mknodat(r0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./bus\x00') rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='.\x02\x00') (fail_nth: 8) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000280)=""/81, 0x51) 12.389542325s ago: executing program 2 (id=3995): r0 = getpgrp(0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000040)=0x5) prlimit64(0x0, 0xe, &(0x7f0000000100)={0x8, 0x80000100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000300)=0x7) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000000)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x18, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000d0000008500000006000000852000000500000003d50300ff000000073401000200000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000e286000000"], &(0x7f0000000280)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x50, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x5, 0x8, 0x101, 0x588}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000bc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000c00)=[{0x5, 0x4, 0xf, 0xb}], 0x10, 0x6}, 0x94) r2 = syz_clone(0x8000, 0x0, 0xfffffffffffffe7e, 0x0, 0x0, 0x0) r3 = gettid() sigaltstack(&(0x7f0000000000)={&(0x7f0000002b40)=""/4096, 0x1, 0x1000}, 0x0) rt_sigqueueinfo(r3, 0x2, &(0x7f00000002c0)={0x3d}) prctl$PR_SCHED_CORE(0x3e, 0x1, r2, 0x1, 0x0) r4 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r4, &(0x7f0000019680)=""/102392, 0x18ff8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) recvmsg$unix(r6, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x2000) shutdown(r5, 0x2) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) gettid() timer_create(0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) madvise(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0xe) futex_waitv(&(0x7f0000000180)=[{0x0, &(0x7f0000000000), 0x2}], 0x1, 0x0, 0x0, 0x0) futex(&(0x7f0000000140)=0xf4, 0x5, 0x0, 0x0, &(0x7f0000000000), 0x0) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x17) mlock(&(0x7f0000bff000/0x400000)=nil, 0x400000) shutdown(0xffffffffffffffff, 0x1) 12.111556366s ago: executing program 0 (id=3996): prlimit64(0x0, 0xe, &(0x7f0000000200)={0x8, 0x8a}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e25}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0), 0x4) r3 = fcntl$dupfd(r2, 0x0, r2) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000280)=@gcm_128={{0x303}, "ed197fbfb5c342b6", "28852cbbbeba35380ee5190047169f9d", "2eb387e0", "11edf8da8e55bb27"}, 0x28) r4 = syz_io_uring_setup(0xb5c, &(0x7f0000000640)={0x0, 0x9916, 0x0, 0x0, 0x164, 0x0, r3}, &(0x7f0000000540)=0x0, &(0x7f0000000480)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3) syz_io_uring_submit(r5, r6, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r2, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000880)=""/254, 0xfe}], 0x2}) io_uring_enter(r4, 0xf23, 0xfe, 0xc, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x3) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r7 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r7, &(0x7f0000019680)=""/102392, 0x18ff8) 12.051234348s ago: executing program 2 (id=3997): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x1a8, &(0x7f0000000100)={@random="3b8032ad2baf", @empty, @void, {@ipv6={0x86dd, @dccp_packet={0x6, 0x6, 'K{d', 0x172, 0x21, 0x0, @private1, @private2={0xfc, 0x2, '\x00', 0x1}, {[@fragment={0x21, 0x0, 0xf8, 0x1, 0x0, 0x1e, 0x67}, @routing={0x3a, 0x4, 0x0, 0x4, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}, @loopback]}, @srh={0x3a, 0x4, 0x4, 0x2, 0x0, 0x38, 0xb, [@ipv4={'\x00', '\xff\xff', @loopback}, @ipv4={'\x00', '\xff\xff', @broadcast}]}, @srh={0x3c, 0x8, 0x4, 0x4, 0x8, 0x40, 0xb, [@ipv4={'\x00', '\xff\xff', @remote}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}]}, @srh={0x11, 0x2, 0x4, 0x1, 0x7, 0x10, 0xffff, [@private1={0xfc, 0x1, '\x00', 0x1}]}, @routing={0x2b, 0x4, 0x2, 0x3d, 0x0, [@private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02']}], {{0x4e24, 0x4e21, 0x4, 0x1, 0x2, 0x0, 0x0, 0x7, 0x6, '\x00', 0xa, "c6dcc9"}, "9c2b23d9799e869afd73f4d874bdb51ee5309aa07d782a9d7ff0c908565f5720035f6c674af0e2bf31222723c52463baa37a390077e6a7b0f602139efaf21ee333fc34d54fc051be24a47993b3a968f23b780fa031e4c01fc53f202e920cab65fbb57dd12db8680e6557cc377f3ddcb80cebb56a60883ab2e338bea198af9e80a36f"}}}}}}, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e20, @multicast1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000180a0500000000000000000002000000300003802c00038014000100776732000000000000000000000000001400010076657468315f746f5f627269646765000900020073797a30000000000900010073797a30"], 0x84}, 0x1, 0x0, 0x0, 0x24040089}, 0x20008000) connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001a00)=ANY=[@ANYBLOB="18000000030000000000000026d0000095002b000000000093adff012255f674412d02000000880b5f04596a5e99fce658be2f200c699223886d8be4b50000005ab527ee3697f98125f30e6326996a3cfee33025a30b45bdcf2c69d105e5e55a1d273683623f1a5dc6e3c7e20eb7a98ecf3bd2cf898e924abe26ac296f660e69ba982fd76e00dcff7f0000ca6b78ad833488cfe4109eaf009eddcf21f5c63cde2f00150200000001000000520a0000151d010000000100bf00000000cc587424363da52001a3cdf2000000db74596fd72c002a60c1bc7dc8c38b7d2e13c50424b9dd1145d03ff45f70685c6bd9ff41c69b7de406e89dcbb7677e65a88a8407a9e7f9c0e91028b0856eb1ed9474480737a55ebb0bd701f7fb21135c6172eba7eb8a341f07e5a2d1e88b3cfc22df01e4bac9d97328fa2a82b5e8741e02056d93a433f50479387467824262852c7939db5672d07cdbe8e14abf56497e5d56dbe37551b870b2851c3f0a1a9ebfcba105a6ccdd01b0f04edb256c0200000073f6db43661bd7f0e2536ffbfe5ca31b4083145531458b7d1e341c6b351ebc5223f54d6bec93f4ef088e5d1be2515226988d664709ff03f1aa3dc7f1580ace9bf2afd28d0700000000000000d6eb372713255012e028cb2654d493a0b43bf21375709f348f5eda2967199cc936859a538100070000000000dc10e13ef227f627a40000ad1fa253d33fa74f172d3407ae4e1e347c0c6ef9dd2b6bb700000000000000000c586272c3f4d79bc36315745cb149f3cb385e6add14652003c7cdd3324f07d134d3a6c718bbd1aafe1140cff0be4c6f8df084c5e9734ae30aa9af030025f01ab03a9b1074407136bc506031f0916a39d3057d55183612b39e73ae8e6dc30356886a831836469e2051d937eb85f3f2d5ae2c1dca476b97419a3b76ed62409d004d7fbe362145d19605d760df4c5124ca325d374b371867a79b35c6617fc3327191fbf514573f0e30d1d60be2168fffc2f3dccd599a2cb77f124e22f87673675805494db821f39b50d938d5fd8c6b2a3a324c257bc9110971b749ccd74089ed6b86f81ca3ba47d8f71d290ed1b1a11f7a67125170c88c3b6a50692cc0064fc6bbd312536ac15016c85c6332226401b110da9c786eeca22debc99335587b54c13c3107008fa069af8223b38ced735c2d906551004d8dc10d88738488da01ffa4add56474573c964a270000f2f16625c0c10200000000c7a5ca60fdad159f2e44171f39638410020000004825d081f2d987f05c534187738655d7dc958f2046fa0c1619a6554b82d9c162eb61ca74f1ffdaccf0ea5f06e0fca8b27ff3983ab74fd3d560700a1fab44e77e312b3b129e000302d613916c9bcf9f0000fac73a5b6bfb27f88dba816020be760f7b45e001efada8000000000000fdaf4660402f7b3b79a433e08074ea2462974a00040000eb01352638f56dae0249d15ba8767259658878b7492cfbacde9b57cf4de00788adce638190f3570e0b4c80ef682df22201270955afb6008846557ee3bc09fda6dbb6550d597300eb82a184c96ffde5a30e5433e866665b98ca2002c804c22ff2634b7bfbf5c0d586cda5b45fd00dede1e88a4d41dee7cc76d7a23d06acb1d2d4c58faea84158bb440df2a694f4cdcaa4f65c22efffffffffffdd00000000d503d79986958115ae07b70f991430b7fb475d77b869ee02000000000000000000001ffff0ef89b2a68d2b05c995445d8a7700bcdfbec74fb2dd163e863315e84498dfb52bb93f6c9084659ce777ddac563c8596c2b1d8180289a61faa95a82bf1cfb7f2fd7252e9322abe282c33445d443a67467893b9bf0d1c8130ae6b226900000635376413c29f7c6f7b7e29b9a0c64e68328661f0c06e21f7d7dc22174ea4447a6f60edef3a4168d40200fbc71104512efe8e5d7d934aa289b4bd2b870000000000000000000007000000002000000000009b777883a02f0593dfc4cb4114b9f9cf4ad155110cc6ace2b322ac31bfa27847c799c8009a1ea5b98e525e6383ad7fd9795170e7b11e247603c2ff49a11459c7f606d729d3979676bffb3049166bb84a0f061991bd57c2566c10c282352aba05b6164ef876915a3f2491e4793e590dcc71de10da96366c1e992c0068c940dd4422c9882d3aa0f8a797b8fea6efcfb5276b7679f15559edaa977504cc0b2f777acb907ebf5fc14add71d0bca37405ded69b77ab4a3d7487fd04000000de17e1e13b93669b79556abb722d9c085b189b5fd1f30e8dc813f608830b110001732135e8e7262f290000923bfb6b41ff3792cee2fc37eee739c3e36a4bc80112968ec0d8902eced1fe552018014a463abbbf7ccd6a92a5734e3ebfca9b6e88e031f31de2183652e77c164c646a1cfd3710aa4205d8d4d4f974133ccb1e49feb42664eccd809c0ba8917eda87489e8946d5c8156197bcb66fd5606c63e3389ee9e8552381646365066ef9a36a449c96485c22ad1aa423b7b89efbc6cd54000bb0ea5f4f1e8773144fb6ac9a44d43593d77e66aa7ed7f3d4e7b211590c738888d02b2dbb0b2ba73ec72e1d8d7360a128499dd19e1e7b9b0671f4f58515b45ecb9964f3c4ddb8234391d514f8d996d8d6dd7f8fadfee2d7a0035638ce27c2936cb04b30a0eb0cde0000000000000040000000ec3c12ecee8fc3a40000000000000000e215b00ce2570b930723cbadb4033d1b8aaa2cfb3fb89e4a6e89737fd6232218a9e0c099d1eb59d60b3cca089785642f327139bc4394fb6d547a9b3c22599e780c1da7433fb47615d372e3fffe9703e37d5c87d513165278650738efcc04d27b766cf7f60066edd292f6c8a2174f391ed164bb1816819ceb3e378e776d422bc946cd9501accebeac3a5b31d8abc68ae537cd44a04e6bc21c35a7beab2610c51e593676bf635a20f597f4631b91454d182f826071f5210bd6d93173589929b23801e63c2266fde13b5a04b8d48be057c752bc415a756ea9b4d34156c4f73dd5e5924ef101a5fcdaf37c7ba2c4a9de9b000000000000000000000000000000a73b862e4b63c245616b522345587d0ee65a6902bdd0abd941e8aba37510b222ae544f395edd1b92ad53fc68f08ea00edc5e10d768836169dd296d56b306e8b75778c37571792a6c3d8b02ef378ebd59422cdd008bef6f80a80a68641ea5ed4f1126bb676098c10bf663eb3fb8c839364d28fd046dc64b35f9c3397ce6f4ad357b0000000000090000000088c7a8e2638f650a6f04a6f33a090f59414d6ebcbc687e66d600000000bd0a58ea6d36fc2cf9b9a71c137a2a22adb1006f371d4faf47285fd66fe0389afb96854bb360edcdf11b4ff6dd578bba93e949d240cde9b5836cb46032484dc19c93db7b6e5afa10547c78e76a3111557346e52566df196fd630561bb908fff4d2e19562aabd43742a26a43799f8636fa04ceb40c9e4ca1cfbbc7b949cd245a3ee118fd0d4f639444539af8766028d4ac4d4c548e290199e0dacbb4f6796b39bf32934d941ba2f88e3ebd0cf8e24f99eca86e4ca9b2cd2b54044a7fc4631572a6378a32df288785f146275c1f548e2a0c1016744e05f9de5044373d7650125027547eefe7b2d8c8871bb65395fae99d8456883705bfdfb00001854b2e5efa8aaf25827d659f592b1575281ec125de7fb91cd81d91dcb19f5cdf1e1e2b4a8a1389753a09110538689e38e07fb2dc72bd4fd11d7bc16aac5d85c6101bb722895248e463a5fb45ce0e564e90cb19d5993b471687ae4165e29cf2f58082115f5f8569896eedfd798733223e6d6584997510c374912ab798bd4af4654c01bb2c411bc36468ddd62b4eba5cfc8953526e0e5b1359797956152d0098ce47c62c3fe5a23219389622b7f65bf03527d25c3941b9cf1ffeedf6d99082bb57ea871c12213cc40900f83033bc18c529171fae324c315bc6ce358831d0230412212acfd5fc8d5cb0d028cf568e8bb40e27befe2ff01f7c6674a4d86d900633ea36641e0a781ea0ea7f2d928b8b22e2f97dd13348927375baea6863bef4acf4299096ada5cdd2a0eaafaa760a79d102d1e0c0000000000000000007926653b8d79ce16a432f124786a0bc3c5b7d196822492ae1ccf91aeac16406ad6f9cd3d96d57fceba8360ae49f73351814c9c2972f11064aaf3739d9100f9c0e4d0cb17d50c82e305ba7d62cf1cc6da26e34982a8c74dd8122cf5b5e7c34fd2712a0cef05e4d8ec7dd363219676bd9b19943185b132eb35a695e208dfa5cecdb1d6425c8879063c0f11bd64291a4209ee6dc1d9e9010013f6148c603e6a335e298efd6ab5cccc47a2c568c6afec54f8251bd840752addf200371361c9eedf05ed98585cf6d99e9e56055064bda2d373369761238c278147cd0eb7799f6b9c9fcaa3fd282154994f5b25420c86db9b6401e885de1c615a719a1c83e8fbbb181282dbaf3313a4e4a4877e9f37607e2cd6da0cf6371ec06a75f5a4206b2418ad8897ae149085d63f01f22eca44033234b3930b4d5da756669a1d59d69e7de54abf439988ed7ec33c2d0a901bb0985a24878984d8a4340fa9a356d100926fb5f2ef9976366a61b8cc2bcb1c072b0e9c564852388e1edff10d75b3832792e471cc15b40380f94d834243080158603fbc9134d6983c540525447478984611c0d9666941bfc0a30db47a8828b6e5c51aee2094599b4ce52795750e1764f1657ca8c5633c71287239dddf5c651496f7bbd148c937f083d2e4e0197dbc6ff0649c749707b17399b1d7efad23abb8b40b38704737e15662ae4913a4a001cd3b71c7af75b5ffad9780650c800a40ca80ddc41987919142fd28dbf22db5f4c435415a03455e1d55d1783ccef97d7e4655cf839d06f06e137bbe462a03b3100231914b19739dd57b4f12d026ad0c7fd3"], &(0x7f00002bf000)='GPL\x00', 0x4, 0x436, &(0x7f0000000040)=""/183, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffc95}, 0x48) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000180)={r1, r3}) sendmmsg$inet(r4, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000400)="03362a247861461b950d", 0xa}], 0x1}}], 0x1, 0x40) close(r4) r5 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x7a18) ioctl$TIOCL_BLANKSCREEN(r5, 0x541c, &(0x7f0000000000)) recvfrom(r0, &(0x7f00000000c0)=""/10, 0xa, 0x0, 0x0, 0x0) 11.941645264s ago: executing program 1 (id=3998): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000300), 0x64a300, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xd) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000080)={0x5, 0xe5, 0x6, 0x4, 0x0, "991000"}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'wlan1\x00'}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r7 = syz_open_dev$dri(&(0x7f0000000240), 0x8, 0x40) ioctl$DRM_IOCTL_PANTHOR_SET_USER_MMIO_OFFSET(r7, 0xc008644e, &(0x7f00000002c0)={0x7}) r8 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000002c80)="d800000018007b18e00212ba0d8105040a0a1100fe0f040b067c55a1bc0009001e0006990300000005000500fe800000000000000300014002000c0901ac04000bd67f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b01602b2a10c11ce1b14d6d930dfe1d9d322fe04fb95cae8c9010000730d7a5025ccca262f3d40fad95667e04adcdf634c1f215ce3bb9ad8ffd5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd601edef3d93452a92307f00000e97031e9f05e9f16e9cb5", 0xd2}, {&(0x7f00000004c0)="f80ec2e2badd", 0x6}], 0x2, 0x0, 0x0, 0x2663}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)={0x24, r6, 0x5, 0x0, 0x200000, {{}, {@val={0x8, 0x3, r9}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}]}, 0x24}}, 0x10) timer_create(0x7, 0x0, &(0x7f0000001b40)=0x0) timer_settime(r10, 0x1, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_settime(r10, 0x0, &(0x7f0000000080)={{0x77359400}}, &(0x7f0000000100)) r11 = userfaultfd(0x801) ioctl$UFFDIO_API(r11, 0xc018aa3f, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(r11, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000400000/0xc00000)=nil, 0xc00000}, 0x5}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="050003000000000000000600000008000300", @ANYRES32=r12, @ANYBLOB="0afe17000303030303030000"], 0x28}}, 0x0) r13 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r13, 0x84, 0x78, 0x0, 0x0) r14 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r14, &(0x7f0000000600)={0x0, 0xc, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000010008188e6b62aa73772cc9f1ba1f848480000005e140602000000000e000a000f000000028000001294", 0x2e}], 0x1}, 0x0) 11.856841925s ago: executing program 4 (id=3999): sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x20045808}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x2f, 0xc, 0xed, 0x6be8, 0x48, @rand_addr=' \x01\x00', @private0, 0x7, 0x10, 0x8, 0x2}}) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vimc2(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000040)={0x0, 0x2, 0x0, "e5e81571c97b166978ff61fcfd2409b2b73e0f936ed774de107de8a9041b5113"}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="2000000040000701feffffff000000000111b422d7ba29a31366031d92237c0000040042800400018004000280"], 0x20}}, 0xc000) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000280)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000600)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10805}, 0x44049) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x0, &(0x7f00000001c0)='grpquota') r3 = open$dir(&(0x7f0000000000)='./file0/file0\x00', 0x80c42, 0x1d0) quotactl_fd$Q_GETFMT(r3, 0xffffffff80000401, 0x0, &(0x7f0000000780)) r4 = accept4(r2, 0x0, 0x0, 0x800) sendmmsg$alg(r4, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="f78d9ca38fff48f3be52163448412ba8", 0xfffffe3f}, {&(0x7f0000000140)="ebe3a0e9796cfd1647e299f4e376fdba128280b372219d205e81f4a7f71c1926aae1efd7e0054a863f3d5cfe6cb55b5bb9fa6935849e6098ed884e7cb51726b360fbb37b4fe035bbb095873048"}, {&(0x7f00000003c0)="e8700e444d50a969ff67347cff6127e6ef12ee3819271482a4975a52c1ab9b8b4db3945d1032005eabe97b4dc33a47d3a158da988456d30026b433186f53cdcdb93a4722bf306a10470d50f5cb1ece9ead3459bab1cf1538cd0b157653c5e892962c80f158c443e9c6ad7d2a8103ef2f4b93766b9a21501f94c1568b13756b66f74f46cf801704d2da8b96c34070b233af0afcc436712e58ed25e721193af05a045ad3fdc928f02f3dbad19d3e66eebda2e63f3f46ef4511cee26d7b48241847bf9e343ef4674c45e2a085060f11"}], 0x1, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x40800) recvmsg(r4, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/81, 0x7ffff000}, {&(0x7f0000000200)=""/83, 0x20000253}], 0x2}, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000013c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="f4060000", @ANYRES16=r5, @ANYBLOB="01000000000000e14f003b00000008000300", @ANYRES32=r6, @ANYBLOB="d50633008000009effffffffffff080211000001"], 0x6f4}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newtaction={0xb4, 0x30, 0x48b, 0x0, 0x0, {}, [{0xa0, 0x1, [@m_ctinfo={0x48, 0x2, 0x0, 0x0, {{0xb}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CTINFO_ACT={0x9, 0x3, {0x0, 0xa, 0x20000001, 0x6, 0x101}}]}, {0x4}, {0xc}, {0xc}}}, @m_nat={0x54, 0x1, 0x0, 0x0, {{0x8}, {0x2c, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0x400, 0x0, 0x0, 0x2}, @multicast2, @remote}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x3}}}}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4048000}, 0x0) 11.063342101s ago: executing program 2 (id=4000): r0 = io_uring_setup(0x30aa, &(0x7f00000007c0)={0x0, 0x764, 0x200, 0x1, 0x14c}) r1 = socket$alg(0x26, 0x5, 0x0) r2 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000000c0), 0x88a01, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x1, 0x84) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000380)='./binderfs/binder0\x00', 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="7a0a00ff0000000071107000"], &(0x7f0000000480)='syzkaller\x00'}, 0x94) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x7) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x80200, 0x0) r4 = syz_open_dev$sndmidi(&(0x7f0000000240), 0x2, 0x40102) writev(r4, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2f) mount(&(0x7f00000000c0)=@nullb, &(0x7f0000000040)='./cgroup\x00', 0x0, 0x208000, 0x0) r5 = syz_io_uring_setup(0x496, 0x0, &(0x7f0000000340), &(0x7f0000000080)) syz_io_uring_setup(0x641a, &(0x7f0000000300)={0x0, 0x235d, 0x10100, 0x0, 0x400002d8, 0x0, r5}, &(0x7f0000000180), &(0x7f0000000100)) io_uring_enter(r5, 0x627, 0x4c1, 0x43, 0x0, 0x0) shutdown(r3, 0x0) epoll_create1(0x80000) ioctl$SNDCTL_DSP_SETFRAGMENT(r2, 0xc004500a, &(0x7f0000000080)=0x74000000) write$dsp(r2, &(0x7f0000002000)='`', 0x88020) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(streebog256-generic)\x00'}, 0x58) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0x1c, 0x20000048, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000001880)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newqdisc={0x78, 0x24, 0x4ee4e6a52ff56743, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, r7, {0x0, 0xffff}, {0xffff, 0xffff}, {0xc, 0x2}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{0x3, 0x1, 0x0, 0x2, 0x4}, 0x7fffffff, 0x0, 0x2000008, 0x9, 0x9, 0x1c, 0xb, 0x30, 0x1, 0x5, {0x10001, 0x7fff, 0xffffffff, 0x7, 0x2, 0x7fffffff}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x4c850}, 0x800) 10.937998782s ago: executing program 3 (id=4001): openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000080)={0x0, 0x3, 0x2000, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000000f000/0x2000)=nil}) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x1d0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x4004) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000003380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200) fchown(0xffffffffffffffff, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = fsopen(&(0x7f0000000280)='ext4\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r4, 0x1, 0x0, &(0x7f0000000040)='c:::\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8080}, 0x0) socket(0xa, 0x3, 0xff) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_test', 0x141a82, 0x0) sendfile(r5, r5, 0x0, 0x4) 10.623373085s ago: executing program 3 (id=4002): openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000080)={0x0, 0x3, 0x2000, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000000f000/0x2000)=nil}) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x1d0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x4004) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000003380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200) fchown(0xffffffffffffffff, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = fsopen(&(0x7f0000000280)='ext4\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r4, 0x1, 0x0, &(0x7f0000000040)='c:::\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8080}, 0x0) socket(0xa, 0x3, 0xff) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_test', 0x141a82, 0x0) sendfile(r5, r5, 0x0, 0x4) 10.563905905s ago: executing program 4 (id=4003): socket$nl_route(0x10, 0x3, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040), 0x100, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'netdevsim0\x00'}) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) syz_clone(0x10806600, 0x0, 0x0, 0x0, 0x0, 0x0) shmget(0x1, 0xffffffffff000, 0x200, &(0x7f0000ffb000/0x3000)=nil) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) madvise(&(0x7f0000000000/0x3000)=nil, 0x7fffffffffffffff, 0x3) r5 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, @empty, @private2={0xfc, 0x2, '\x00', 0x1}, 0x0, 0x10, 0xfffffffc, 0xdc67}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000000080)={'syztnl1\x00', &(0x7f00000000c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, @dev={0xfe, 0x80, '\x00', 0x8}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x700, 0x0, 0xfffffffc}}) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x103a02, 0x0) ioctl$RTC_SET_TIME(r6, 0x4024700a, &(0x7f0000000200)={0x4007, 0x20, 0x14, 0x1b, 0xb, 0x63, 0x4, 0xf5, 0x1}) syz_clone3(&(0x7f0000000240)={0x4c000000, 0x0, 0x0, 0x0, {0x1d}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x14, r1, 0x1, 0x70bd29, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x4040000) 10.540299491s ago: executing program 3 (id=4004): mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x20840, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) readv(r0, &(0x7f0000000280)=[{&(0x7f0000000340)=""/127, 0x7f}], 0x1) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x101800, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2241, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'pimreg\x00', 0x5005}) r3 = socket(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0xf21d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) r4 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee3, 0x8031, 0xffffffffffffffff, 0x28f42000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000380)={0x1}) r7 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r7) ptrace$getregset(0x4205, r7, 0x202, &(0x7f0000000240)={&(0x7f0000000180)=""/120, 0xffffffffffffff28}) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'ip6gretap0\x00', &(0x7f0000000580)=@ethtool_drvinfo={0x3, "1f54d18703cc5a48f03db56f16c7395766b94a47ad4b2121ab921de003fda20d", "6c145f10385bfeaae3b0b911ce9d20c9e0897ce0c06a8c726f82227b54580eb0", "78f36de050317ab351653b0e5effa71c13397654c7326b434d0377438f4180ad", "694a51d4ae35798fa1986471a5f792db17a09a7411cc083fd92d730e98e1c49a", "dc36dc9ee5cc307e6dae5a6866dd6e09f6b9a098b0c975d60edfa38a44d17b8d", "0b94f77915cdd5166840b968", 0xa, 0x20008, 0x5, 0x5, 0xfffc}}) r8 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/user\x00') open_by_handle_at(r6, &(0x7f0000000100)=ANY=[@ANYBLOB="9553c816b08e020f001dcfa1b6b7bf43bb29", @ANYRESDEC=r1, @ANYRES8=r8, @ANYRES64, @ANYRES16], 0x0) write$FUSE_INIT(r0, &(0x7f00000002c0)={0x50, 0xfffffffffffffffe, 0x0, {0x7, 0x2b, 0x7, 0xabe6e078c9ddcffc, 0x4, 0x7, 0x101, 0x4, 0x0, 0x0, 0x80, 0xfffff000}}, 0x50) syz_usb_connect$cdc_ecm(0x2, 0x56, &(0x7f0000000300)=ANY=[@ANYBLOB="12010000020000082505a5a4400000000101090244000101000000090400000302060000052406000005240000000d240f0100000000000000000009058103200000000009058202080000000009050302"], 0x0) 10.335938679s ago: executing program 1 (id=4005): prlimit64(0x0, 0xe, &(0x7f0000000200)={0x8, 0x8a}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e25}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0), 0x4) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000280)=@gcm_128={{0x303}, "ed197fbfb5c342b6", "28852cbbbeba35380ee5190047169f9d", "2eb387e0", "11edf8da8e55bb27"}, 0x28) r3 = syz_io_uring_setup(0xb5c, &(0x7f0000000640)={0x0, 0x9916, 0x0, 0x0, 0x164, 0x0, r2}, &(0x7f0000000540)=0x0, &(0x7f0000000480)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3) syz_io_uring_submit(r4, r5, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r1, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000880)=""/254, 0xfe}], 0x2}) io_uring_enter(r3, 0xf23, 0x0, 0xc, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r6 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r6, &(0x7f0000019680)=""/102392, 0x18ff8) 7.193619169s ago: executing program 0 (id=4006): mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000013c0)='./file0/file0\x00', 0x42, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x8d) mount$overlay(0x0, &(0x7f0000000080)='./file7/file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={[{@redirect_dir_off}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './bus'}}, {@uuid_auto}, {@xino_on}, {@metacopy_on}, {@xino_off}, {@volatile}]}) chdir(&(0x7f00000003c0)='./bus\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000540)='./file7\x00', 0x1c0) renameat2(0xffffffffffffff9c, &(0x7f0000000180)='./file7/file0\x00', 0xffffffffffffff9c, &(0x7f0000000200)='./file7/file0\x00', 0x5) mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x212) socket$igmp(0x2, 0x3, 0x2) connect$unix(r0, &(0x7f000057eff8)=@abs={0x3, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$video4linux(0x0, 0x1, 0x34f881) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f0000000240)={0x24, @short={0x2, 0x2, 0xaaa3}}, 0xb) syz_open_dev$dri(0x0, 0x1, 0x0) r2 = semget$private(0x0, 0x3, 0x0) semop(r2, &(0x7f0000000240)=[{0x2, 0xd5db}, {0x0, 0x200, 0x800}], 0x2) semctl$GETZCNT(r2, 0x2, 0xf, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000340)='./file7/file0\x00', 0x608402, 0x107) close(r3) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) setpriority(0x2, 0x0, 0x7fffff7ffffffffb) r4 = socket$rds(0x15, 0x5, 0x0) bind$rds(r4, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) socket$rds(0x15, 0x5, 0x0) 0s ago: executing program 2 (id=4007): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x900, &(0x7f0000000000)={&(0x7f0000000b00)={{0x14}, [@NFT_MSG_NEWRULE={0x20, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x48}}, 0x0) kernel console output (not intermixed with test programs): =2, SerialNumber=3 [ 1750.803575][ T10] usb 1-1: Product: syz [ 1750.807812][ T10] usb 1-1: Manufacturer: syz [ 1750.846316][ T10] usb 1-1: SerialNumber: syz [ 1751.952894][T10095] usb 5-1: new high-speed USB device number 68 using dummy_hcd [ 1752.061209][T12764] usb 4-1: new high-speed USB device number 63 using dummy_hcd [ 1752.121360][T10095] usb 5-1: Using ep0 maxpacket: 32 [ 1752.130454][T10095] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1752.142199][T10095] usb 5-1: New USB device found, idVendor=046d, idProduct=c31c, bcdDevice= 0.40 [ 1752.151345][T10095] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1752.177015][T10095] usb 5-1: config 0 descriptor?? [ 1752.195194][T10095] hub 5-1:0.0: USB hub found [ 1752.223682][T12764] usb 4-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 1752.234169][T12764] usb 4-1: config 1 has 1 interface, different from the descriptor's value: 2 [ 1752.243414][T12764] usb 4-1: config 1 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 1752.259157][T12764] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1752.268756][T12764] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1752.276888][T12764] usb 4-1: Product: syz [ 1752.281304][T12764] usb 4-1: Manufacturer: syz [ 1752.286045][T12764] usb 4-1: SerialNumber: syz [ 1752.329602][T12764] cdc_mbim 4-1:1.0: skipping garbage [ 1752.335223][T12764] cdc_mbim 4-1:1.0: CDC Union missing and no IAD found [ 1752.342540][T12764] cdc_mbim 4-1:1.0: bind() failure [ 1752.398535][T10095] hub 5-1:0.0: 1 port detected [ 1752.522568][ T5889] usb 2-1: USB disconnect, device number 97 [ 1752.812597][T21580] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=27 sclass=netlink_route_socket pid=21580 comm=syz.4.3557 [ 1752.846835][T21580] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65 sclass=netlink_route_socket pid=21580 comm=syz.4.3557 [ 1752.881757][T21580] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=56 sclass=netlink_route_socket pid=21580 comm=syz.4.3557 [ 1752.921555][T21580] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=51 sclass=netlink_route_socket pid=21580 comm=syz.4.3557 [ 1753.010797][ T10] uvcvideo 1-1:220.0: Found UVC 0.00 device syz (8086:0b07) [ 1753.021339][ T10] uvcvideo 1-1:220.0: No valid video chain found. [ 1753.050638][ T10] usb 1-1: USB disconnect, device number 72 [ 1753.055931][T10095] usb 5-1: USB disconnect, device number 68 [ 1753.391459][T21604] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1753.409940][T21604] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1753.623439][T21603] netlink: 162728 bytes leftover after parsing attributes in process `syz.0.3567'. [ 1754.696968][ T5889] usb 4-1: USB disconnect, device number 63 [ 1755.155613][T21624] netlink: 'syz.0.3574': attribute type 4 has an invalid length. [ 1755.166750][T21624] netlink: 'syz.0.3574': attribute type 5 has an invalid length. [ 1755.772956][T21626] workqueue: Failed to create a rescuer kthread for wq "ceph-completion": -EINTR [ 1755.876295][T21633] netlink: 12 bytes leftover after parsing attributes in process `syz.1.3576'. [ 1755.956242][T21633] geneve2: entered promiscuous mode [ 1756.310594][T21635] netlink: 'syz.1.3576': attribute type 8 has an invalid length. [ 1757.751115][T21659] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3580'. [ 1758.210561][T21662] FAULT_INJECTION: forcing a failure. [ 1758.210561][T21662] name failslab, interval 1, probability 0, space 0, times 0 [ 1758.275363][T21662] CPU: 1 UID: 0 PID: 21662 Comm: syz.1.3581 Tainted: G L syzkaller #0 PREEMPT(full) [ 1758.275390][T21662] Tainted: [L]=SOFTLOCKUP [ 1758.275396][T21662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1758.275406][T21662] Call Trace: [ 1758.275411][T21662] [ 1758.275418][T21662] dump_stack_lvl+0x100/0x190 [ 1758.275449][T21662] should_fail_ex.cold+0x5/0xa [ 1758.275476][T21662] should_failslab+0xc2/0x120 [ 1758.275502][T21662] kmem_cache_alloc_lru_noprof+0x80/0x6e0 [ 1758.275525][T21662] ? __d_alloc+0x34/0xa80 [ 1758.275549][T21662] __d_alloc+0x34/0xa80 [ 1758.275570][T21662] d_alloc_parallel+0x111/0x14e0 [ 1758.275597][T21662] ? find_held_lock+0x2b/0x80 [ 1758.275618][T21662] ? avc_has_perm_noaudit+0x11e/0x3b0 [ 1758.275641][T21662] ? look_up_lock_class+0x55/0x120 [ 1758.275660][T21662] ? register_lock_class+0x40/0x560 [ 1758.275679][T21662] ? __pfx_d_alloc_parallel+0x10/0x10 [ 1758.275706][T21662] ? lockdep_init_map_type+0x5c/0x250 [ 1758.275723][T21662] ? lockdep_init_map_type+0x5c/0x250 [ 1758.275745][T21662] __lookup_slow+0x193/0x460 [ 1758.275767][T21662] ? __pfx___lookup_slow+0x10/0x10 [ 1758.275790][T21662] ? irq_entries_start+0xd0/0xcb0 [ 1758.275814][T21662] ? irq_entries_start+0xd0/0xcb0 [ 1758.275839][T21662] lookup_slow+0x50/0x70 [ 1758.275860][T21662] lookup_one_unlocked+0xb8/0xd0 [ 1758.275879][T21662] ovl_lookup_single+0x3df/0x1280 [ 1758.275908][T21662] ? __pfx_ovl_lookup_single+0x10/0x10 [ 1758.275934][T21662] ovl_lookup_layer+0x3f1/0x4b0 [ 1758.275955][T21662] ? rcu_is_watching+0x12/0xc0 [ 1758.275974][T21662] ? trace_kmalloc+0x101/0x130 [ 1758.276000][T21662] ? __pfx_ovl_lookup_layer+0x10/0x10 [ 1758.276018][T21662] ? __kmalloc_noprof+0x320/0x850 [ 1758.276044][T21662] ovl_lookup_layers+0x16d4/0x2ac0 [ 1758.276079][T21662] ? __pfx_ovl_lookup_layers+0x10/0x10 [ 1758.276101][T21662] ? lock_acquire+0x1cf/0x380 [ 1758.276134][T21662] ? find_held_lock+0x2b/0x80 [ 1758.276155][T21662] ? rcu_read_unlock+0x17/0x60 [ 1758.276171][T21662] ? rcu_read_unlock+0x17/0x60 [ 1758.276192][T21662] ovl_lookup+0x4a8/0x6b0 [ 1758.276211][T21662] ? __memcg_slab_post_alloc_hook+0x51e/0x9a0 [ 1758.276233][T21662] ? __pfx_ovl_lookup+0x10/0x10 [ 1758.276252][T21662] ? rcu_is_watching+0x12/0xc0 [ 1758.276278][T21662] ? do_raw_spin_lock+0x128/0x260 [ 1758.276304][T21662] ? do_raw_spin_unlock+0x145/0x1e0 [ 1758.276324][T21662] ? _raw_spin_unlock+0x28/0x50 [ 1758.276355][T21662] lookup_one_qstr_excl+0x1d1/0x250 [ 1758.276376][T21662] ? mnt_want_write+0x161/0x450 [ 1758.276402][T21662] filename_create+0x1cf/0x400 [ 1758.276427][T21662] ? __pfx_filename_create+0x10/0x10 [ 1758.276462][T21662] filename_mknodat+0x190/0x7f0 [ 1758.276491][T21662] ? __pfx_filename_mknodat+0x10/0x10 [ 1758.276509][T21662] ? strncpy_from_user+0x19d/0x2d0 [ 1758.276536][T21662] ? do_getname+0x191/0x390 [ 1758.276559][T21662] __x64_sys_mknodat+0xb5/0xf0 [ 1758.276579][T21662] do_syscall_64+0x106/0xf80 [ 1758.276596][T21662] ? clear_bhb_loop+0x40/0x90 [ 1758.276618][T21662] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1758.276636][T21662] RIP: 0033:0x7f198139c799 [ 1758.276652][T21662] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1758.276668][T21662] RSP: 002b:00007f1982237028 EFLAGS: 00000246 ORIG_RAX: 0000000000000103 [ 1758.276686][T21662] RAX: ffffffffffffffda RBX: 00007f1981615fa0 RCX: 00007f198139c799 [ 1758.276697][T21662] RDX: 0000000000000000 RSI: 00002000000003c0 RDI: 0000000000000003 [ 1758.276708][T21662] RBP: 00007f1982237090 R08: 0000000000000000 R09: 0000000000000000 [ 1758.276718][T21662] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1758.276728][T21662] R13: 00007f1981616038 R14: 00007f1981615fa0 R15: 00007ffe34ad5938 [ 1758.276754][T21662] [ 1758.706685][T21667] netlink: 16 bytes leftover after parsing attributes in process `syz.2.3583'. [ 1760.135095][ T30] audit: type=1400 audit(1772269502.310:858): avc: denied { read } for pid=21687 comm="syz.0.3589" name="autofs" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1761.193804][ T30] audit: type=1400 audit(1772269502.310:859): avc: denied { open } for pid=21687 comm="syz.0.3589" path="/dev/autofs" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1761.255396][T12764] usb 3-1: new high-speed USB device number 84 using dummy_hcd [ 1761.299225][ T30] audit: type=1400 audit(1772269502.310:860): avc: denied { ioctl } for pid=21687 comm="syz.0.3589" path="/dev/autofs" dev="devtmpfs" ino=98 ioctlcmd=0x9377 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1761.441499][T12764] usb 3-1: Using ep0 maxpacket: 32 [ 1761.457979][T12764] usb 3-1: config 0 has an invalid interface number: 85 but max is 0 [ 1761.472173][T12764] usb 3-1: config 0 has no interface number 0 [ 1761.494935][T12764] usb 3-1: config 0 interface 85 altsetting 7 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1761.531250][T12764] usb 3-1: config 0 interface 85 has no altsetting 0 [ 1761.561570][T12764] usb 3-1: New USB device found, idVendor=05ac, idProduct=0219, bcdDevice=f0.72 [ 1761.573285][T12764] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1761.591370][T12764] usb 3-1: Product: syz [ 1761.604898][T12764] usb 3-1: Manufacturer: syz [ 1761.625204][T12764] usb 3-1: SerialNumber: syz [ 1761.645787][T12764] usb 3-1: config 0 descriptor?? [ 1761.697590][T21699] FAULT_INJECTION: forcing a failure. [ 1761.697590][T21699] name failslab, interval 1, probability 0, space 0, times 0 [ 1761.710317][T21699] CPU: 1 UID: 0 PID: 21699 Comm: syz.1.3593 Tainted: G L syzkaller #0 PREEMPT(full) [ 1761.710342][T21699] Tainted: [L]=SOFTLOCKUP [ 1761.710348][T21699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1761.710362][T21699] Call Trace: [ 1761.710369][T21699] [ 1761.710376][T21699] dump_stack_lvl+0x100/0x190 [ 1761.710408][T21699] should_fail_ex.cold+0x5/0xa [ 1761.710430][T21699] ? rds_message_alloc+0x48/0x220 [ 1761.710449][T21699] should_failslab+0xc2/0x120 [ 1761.710475][T21699] __kmalloc_noprof+0xe0/0x850 [ 1761.710497][T21699] ? rds_sendmsg+0x97e/0x3480 [ 1761.710517][T21699] ? rds_sendmsg+0x97e/0x3480 [ 1761.710540][T21699] rds_message_alloc+0x48/0x220 [ 1761.710558][T21699] rds_sendmsg+0xdfc/0x3480 [ 1761.710573][T21699] ? __pfx_avc_has_perm+0x10/0x10 [ 1761.710601][T21699] ? __pfx_rds_sendmsg+0x10/0x10 [ 1761.710620][T21699] ? __pfx_tomoyo_socket_sendmsg_permission+0x10/0x10 [ 1761.710638][T21699] ? iovec_from_user+0xda/0x140 [ 1761.710667][T21699] ? ____sys_sendmsg+0xa54/0xc30 [ 1761.710685][T21699] ____sys_sendmsg+0xa54/0xc30 [ 1761.710704][T21699] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1761.710736][T21699] ___sys_sendmsg+0x190/0x1e0 [ 1761.710756][T21699] ? __pfx____sys_sendmsg+0x10/0x10 [ 1761.710797][T21699] __sys_sendmsg+0x170/0x220 [ 1761.710811][T21699] ? __pfx___sys_sendmsg+0x10/0x10 [ 1761.710836][T21699] do_syscall_64+0x106/0xf80 [ 1761.710850][T21699] ? clear_bhb_loop+0x40/0x90 [ 1761.710868][T21699] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1761.710882][T21699] RIP: 0033:0x7f198139c799 [ 1761.710894][T21699] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1761.710908][T21699] RSP: 002b:00007f19821f5028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1761.710922][T21699] RAX: ffffffffffffffda RBX: 00007f1981616180 RCX: 00007f198139c799 [ 1761.710931][T21699] RDX: 0000000000000000 RSI: 0000200000000680 RDI: 0000000000000008 [ 1761.710940][T21699] RBP: 00007f19821f5090 R08: 0000000000000000 R09: 0000000000000000 [ 1761.710948][T21699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1761.710956][T21699] R13: 00007f1981616218 R14: 00007f1981616180 R15: 00007ffe34ad5938 [ 1761.710975][T21699] [ 1762.356637][T21706] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device nullb0. [ 1762.680637][T12764] appletouch 3-1:0.85: Geyser mode initialized. [ 1762.700421][T12764] input: appletouch as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.85/input/input26 [ 1762.713127][ T30] audit: type=1400 audit(1772269504.920:861): avc: denied { create } for pid=21704 comm="syz.3.3594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 1762.740803][ T30] audit: type=1400 audit(1772269504.920:862): avc: denied { bind } for pid=21704 comm="syz.3.3594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 1762.783238][ T30] audit: type=1400 audit(1772269504.980:863): avc: denied { read } for pid=5160 comm="acpid" name="mouse1" dev="devtmpfs" ino=3663 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1762.905550][ T30] audit: type=1400 audit(1772269504.980:864): avc: denied { open } for pid=5160 comm="acpid" path="/dev/input/mouse1" dev="devtmpfs" ino=3663 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1763.018930][ T30] audit: type=1400 audit(1772269504.980:865): avc: denied { ioctl } for pid=5160 comm="acpid" path="/dev/input/mouse1" dev="devtmpfs" ino=3663 ioctlcmd=0x4520 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1763.051813][ T5889] usb 3-1: USB disconnect, device number 84 [ 1763.274727][T21714] netlink: 169896 bytes leftover after parsing attributes in process `syz.3.3595'. [ 1763.325963][ T5889] appletouch 3-1:0.85: input: appletouch disconnected [ 1763.573783][T21720] netlink: 12 bytes leftover after parsing attributes in process `syz.4.3598'. [ 1763.627492][T21720] geneve2: entered promiscuous mode [ 1763.679675][T21727] netlink: 'syz.4.3598': attribute type 8 has an invalid length. [ 1763.684441][T21725] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3599'. [ 1764.584774][ T30] audit: type=1400 audit(1772269506.790:866): avc: denied { wake_alarm } for pid=21743 comm="syz.4.3605" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1764.667130][T21735] netlink: 162728 bytes leftover after parsing attributes in process `syz.2.3602'. [ 1765.158663][T21767] FAULT_INJECTION: forcing a failure. [ 1765.158663][T21767] name failslab, interval 1, probability 0, space 0, times 0 [ 1765.195338][T21767] CPU: 1 UID: 0 PID: 21767 Comm: syz.2.3609 Tainted: G L syzkaller #0 PREEMPT(full) [ 1765.195367][T21767] Tainted: [L]=SOFTLOCKUP [ 1765.195373][T21767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1765.195383][T21767] Call Trace: [ 1765.195390][T21767] [ 1765.195396][T21767] dump_stack_lvl+0x100/0x190 [ 1765.195418][T21767] should_fail_ex.cold+0x5/0xa [ 1765.195433][T21767] should_failslab+0xc2/0x120 [ 1765.195467][T21767] kmem_cache_alloc_lru_noprof+0x80/0x6e0 [ 1765.195483][T21767] ? __d_alloc+0x34/0xa80 [ 1765.195498][T21767] __d_alloc+0x34/0xa80 [ 1765.195510][T21767] ? __lock_acquire+0x4a5/0x2630 [ 1765.195529][T21767] d_alloc_parallel+0x111/0x14e0 [ 1765.195547][T21767] ? find_held_lock+0x2b/0x80 [ 1765.195561][T21767] ? avc_has_perm_noaudit+0x11e/0x3b0 [ 1765.195580][T21767] ? __pfx_d_alloc_parallel+0x10/0x10 [ 1765.195598][T21767] ? lockdep_init_map_type+0x5c/0x250 [ 1765.195609][T21767] ? lockdep_init_map_type+0x5c/0x250 [ 1765.195623][T21767] __lookup_slow+0x193/0x460 [ 1765.195638][T21767] ? __pfx___lookup_slow+0x10/0x10 [ 1765.195654][T21767] ? irq_entries_start+0xd0/0xcb0 [ 1765.195668][T21767] ? irq_entries_start+0xd0/0xcb0 [ 1765.195683][T21767] lookup_slow+0x50/0x70 [ 1765.195699][T21767] lookup_one_unlocked+0xb8/0xd0 [ 1765.195711][T21767] ovl_lookup_single+0x3df/0x1280 [ 1765.195728][T21767] ? __pfx_ovl_lookup_single+0x10/0x10 [ 1765.195739][T21767] ? __lock_acquire+0x4a5/0x2630 [ 1765.195757][T21767] ? unwind_get_return_address+0x59/0xa0 [ 1765.195772][T21767] ? arch_stack_walk+0xa6/0xf0 [ 1765.195789][T21767] ovl_lookup_layer+0x3f1/0x4b0 [ 1765.195813][T21767] ? __pfx_ovl_lookup_layer+0x10/0x10 [ 1765.195830][T21767] ? xa_load+0x149/0x2c0 [ 1765.195849][T21767] ? xa_load+0x149/0x2c0 [ 1765.195874][T21767] ovl_lookup_layers+0x355/0x2ac0 [ 1765.195897][T21767] ? __lock_acquire+0x4a5/0x2630 [ 1765.195923][T21767] ? __lock_acquire+0x4a5/0x2630 [ 1765.195946][T21767] ? memcg_list_lru_alloc+0x116/0x740 [ 1765.195968][T21767] ? __pfx_ovl_lookup_layers+0x10/0x10 [ 1765.195987][T21767] ? lock_acquire+0x1cf/0x380 [ 1765.196018][T21767] ? find_held_lock+0x2b/0x80 [ 1765.196038][T21767] ? rcu_read_unlock+0x17/0x60 [ 1765.196054][T21767] ? rcu_read_unlock+0x17/0x60 [ 1765.196073][T21767] ovl_lookup+0x4a8/0x6b0 [ 1765.196092][T21767] ? __memcg_slab_post_alloc_hook+0x51e/0x9a0 [ 1765.196112][T21767] ? __pfx_ovl_lookup+0x10/0x10 [ 1765.196129][T21767] ? rcu_is_watching+0x12/0xc0 [ 1765.196154][T21767] ? do_raw_spin_lock+0x128/0x260 [ 1765.196178][T21767] ? do_raw_spin_unlock+0x145/0x1e0 [ 1765.196197][T21767] ? _raw_spin_unlock+0x28/0x50 [ 1765.196225][T21767] lookup_one_qstr_excl+0x1d1/0x250 [ 1765.196244][T21767] ? mnt_get_write_access+0x52/0x2f0 [ 1765.196268][T21767] __start_renaming+0x1c9/0x520 [ 1765.196294][T21767] filename_renameat2+0x538/0xa60 [ 1765.196321][T21767] ? __pfx_filename_renameat2+0x10/0x10 [ 1765.196346][T21767] ? __might_fault+0xc5/0x140 [ 1765.196382][T21767] ? do_getname+0x191/0x390 [ 1765.196405][T21767] __x64_sys_rename+0x81/0xb0 [ 1765.196426][T21767] do_syscall_64+0x106/0xf80 [ 1765.196450][T21767] ? clear_bhb_loop+0x40/0x90 [ 1765.196471][T21767] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1765.196489][T21767] RIP: 0033:0x7f285899c799 [ 1765.196505][T21767] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1765.196521][T21767] RSP: 002b:00007f2859907028 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1765.196541][T21767] RAX: ffffffffffffffda RBX: 00007f2858c15fa0 RCX: 00007f285899c799 [ 1765.196552][T21767] RDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000200000000140 [ 1765.196563][T21767] RBP: 00007f2859907090 R08: 0000000000000000 R09: 0000000000000000 [ 1765.196573][T21767] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1765.196583][T21767] R13: 00007f2858c16038 R14: 00007f2858c15fa0 R15: 00007fff2fde0408 [ 1765.196608][T21767] [ 1765.937163][T21774] FAULT_INJECTION: forcing a failure. [ 1765.937163][T21774] name failslab, interval 1, probability 0, space 0, times 0 [ 1766.021328][T21774] CPU: 1 UID: 0 PID: 21774 Comm: syz.0.3613 Tainted: G L syzkaller #0 PREEMPT(full) [ 1766.021357][T21774] Tainted: [L]=SOFTLOCKUP [ 1766.021363][T21774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1766.021374][T21774] Call Trace: [ 1766.021380][T21774] [ 1766.021387][T21774] dump_stack_lvl+0x100/0x190 [ 1766.021419][T21774] should_fail_ex.cold+0x5/0xa [ 1766.021447][T21774] ? genl_family_rcv_msg_attrs_parse.isra.0+0xc2/0x280 [ 1766.021470][T21774] should_failslab+0xc2/0x120 [ 1766.021497][T21774] __kmalloc_noprof+0xe0/0x850 [ 1766.021526][T21774] genl_family_rcv_msg_attrs_parse.isra.0+0xc2/0x280 [ 1766.021553][T21774] genl_family_rcv_msg_doit+0xc7/0x300 [ 1766.021574][T21774] ? __pfx_genl_family_rcv_msg_doit+0x10/0x10 [ 1766.021599][T21774] ? bpf_lsm_capable+0x9/0x10 [ 1766.021611][T21774] ? security_capable+0x80/0x260 [ 1766.021637][T21774] genl_rcv_msg+0x560/0x800 [ 1766.021657][T21774] ? __pfx_genl_rcv_msg+0x10/0x10 [ 1766.021676][T21774] ? __pfx_ila_xlat_nl_cmd_add_mapping+0x10/0x10 [ 1766.021701][T21774] netlink_rcv_skb+0x159/0x420 [ 1766.021718][T21774] ? __pfx_genl_rcv_msg+0x10/0x10 [ 1766.021737][T21774] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 1766.021761][T21774] ? netlink_deliver_tap+0x1ae/0xcc0 [ 1766.021778][T21774] genl_rcv+0x28/0x40 [ 1766.021794][T21774] netlink_unicast+0x5aa/0x870 [ 1766.021813][T21774] ? __pfx_netlink_unicast+0x10/0x10 [ 1766.021836][T21774] netlink_sendmsg+0x8b0/0xda0 [ 1766.021855][T21774] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1766.021870][T21774] ? __might_fault+0xa0/0x140 [ 1766.021895][T21774] ____sys_sendmsg+0xa54/0xc30 [ 1766.021915][T21774] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1766.021942][T21774] ___sys_sendmsg+0x190/0x1e0 [ 1766.021962][T21774] ? __pfx____sys_sendmsg+0x10/0x10 [ 1766.022004][T21774] __sys_sendmsg+0x170/0x220 [ 1766.022019][T21774] ? __pfx___sys_sendmsg+0x10/0x10 [ 1766.022045][T21774] do_syscall_64+0x106/0xf80 [ 1766.022060][T21774] ? clear_bhb_loop+0x40/0x90 [ 1766.022077][T21774] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1766.022095][T21774] RIP: 0033:0x7f4b0a19c799 [ 1766.022108][T21774] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1766.022122][T21774] RSP: 002b:00007f4b0afd0028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1766.022136][T21774] RAX: ffffffffffffffda RBX: 00007f4b0a415fa0 RCX: 00007f4b0a19c799 [ 1766.022145][T21774] RDX: 000000000000c000 RSI: 0000200000000000 RDI: 0000000000000003 [ 1766.022154][T21774] RBP: 00007f4b0afd0090 R08: 0000000000000000 R09: 0000000000000000 [ 1766.022162][T21774] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1766.022170][T21774] R13: 00007f4b0a416038 R14: 00007f4b0a415fa0 R15: 00007ffd002e39a8 [ 1766.022189][T21774] [ 1767.485368][T21783] netlink: 12 bytes leftover after parsing attributes in process `syz.3.3616'. [ 1767.645100][T21783] geneve2: entered promiscuous mode [ 1767.700645][T21789] netlink: 'syz.3.3616': attribute type 8 has an invalid length. [ 1767.724315][T21790] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device nullb0. [ 1768.237704][T21788] syzkaller0: entered promiscuous mode [ 1768.245574][T21788] syzkaller0: entered allmulticast mode [ 1768.906623][ T8655] usb 2-1: new high-speed USB device number 98 using dummy_hcd [ 1770.102499][ T8655] usb 2-1: config 1 has an invalid interface number: 7 but max is 0 [ 1770.118388][ T8655] usb 2-1: config 1 has no interface number 0 [ 1770.131267][ T8655] usb 2-1: config 1 interface 7 altsetting 0 has an endpoint descriptor with address 0xDD, changing to 0x8D [ 1770.162979][ T8655] usb 2-1: config 1 interface 7 altsetting 0 bulk endpoint 0x8D has invalid maxpacket 64 [ 1770.201168][ T8655] usb 2-1: config 1 interface 7 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1770.236811][ T8655] usb 2-1: New USB device found, idVendor=1199, idProduct=68a3, bcdDevice= 0.00 [ 1770.265939][ T8655] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1770.281218][T12764] usb 4-1: new high-speed USB device number 64 using dummy_hcd [ 1770.284771][ T8655] usb 2-1: Product: syz [ 1770.311155][ T8655] usb 2-1: Manufacturer: syz [ 1770.315741][ T8655] usb 2-1: SerialNumber: syz [ 1770.357364][T21795] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 1770.505423][T12764] usb 4-1: New USB device found, idVendor=20b7, idProduct=1540, bcdDevice=b7.5a [ 1770.530253][T12764] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1770.568070][T12764] usb 4-1: Product: syz [ 1770.581594][T12764] usb 4-1: Manufacturer: syz [ 1770.602550][ T30] audit: type=1400 audit(1772269512.810:867): avc: denied { read } for pid=21794 comm="syz.1.3618" name="ptp0" dev="devtmpfs" ino=1265 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1770.625661][T12764] usb 4-1: SerialNumber: syz [ 1770.667407][ T30] audit: type=1400 audit(1772269512.810:868): avc: denied { open } for pid=21794 comm="syz.1.3618" path="/dev/ptp0" dev="devtmpfs" ino=1265 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1770.733411][ T30] audit: type=1400 audit(1772269512.810:869): avc: denied { read } for pid=21794 comm="syz.1.3618" path="socket:[88899]" dev="sockfs" ino=88899 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1770.787953][T12764] usb 4-1: config 0 descriptor?? [ 1770.807005][ T30] audit: type=1400 audit(1772269512.890:870): avc: denied { ioctl } for pid=21794 comm="syz.1.3618" path="socket:[88899]" dev="sockfs" ino=88899 ioctlcmd=0xae90 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1770.878480][ T30] audit: type=1400 audit(1772269513.080:871): avc: denied { module_load } for pid=21794 comm="syz.1.3618" path="/sys/kernel/oops_count" dev="sysfs" ino=57509 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 1770.910426][ T30] audit: type=1400 audit(1772269513.110:872): avc: denied { setopt } for pid=21794 comm="syz.1.3618" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1772.078644][ T30] audit: type=1400 audit(1772269513.680:873): avc: denied { read write } for pid=21824 comm="syz.0.3623" name="rdma_cm" dev="devtmpfs" ino=1271 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1772.111231][T12764] usb 4-1: Firmware version (0.0) predates our first public release. [ 1772.126368][T12764] usb 4-1: Please update to version 0.2 or newer [ 1772.207697][ T30] audit: type=1400 audit(1772269513.690:874): avc: denied { open } for pid=21824 comm="syz.0.3623" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=1271 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1772.337907][T12764] usb 4-1: USB disconnect, device number 64 [ 1772.399445][ T30] audit: type=1400 audit(1772269514.350:875): avc: denied { ioctl } for pid=21794 comm="syz.1.3618" path="/dev/input/event0" dev="devtmpfs" ino=918 ioctlcmd=0x4504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1772.511288][ T30] audit: type=1400 audit(1772269514.580:876): avc: denied { read } for pid=5470 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 1773.262825][ T8655] usb 2-1: Error in usbnet_get_endpoints (-71) [ 1773.323572][ T8655] usb 2-1: USB disconnect, device number 98 [ 1773.523255][T21841] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3631'. [ 1775.487700][T21855] netlink: 149416 bytes leftover after parsing attributes in process `syz.0.3634'. [ 1775.497048][T21855] openvswitch: netlink: Message has 6 unknown bytes. [ 1776.162050][T21868] siw: device registration error -23 [ 1776.186151][T21868] TCP: tcp_parse_options: Illegal window scaling value 150 > 14 received [ 1776.541189][ T30] kauditd_printk_skb: 52 callbacks suppressed [ 1776.541206][ T30] audit: type=1400 audit(1772269518.360:929): avc: denied { create } for pid=21865 comm="syz.0.3639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1776.572584][ T30] audit: type=1400 audit(1772269518.360:930): avc: denied { write } for pid=21865 comm="syz.0.3639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1776.877403][ T30] audit: type=1326 audit(1772269519.080:931): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21872 comm="syz.0.3640" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f4b0a19c799 code=0x0 [ 1777.002411][ T30] audit: type=1400 audit(1772269519.200:932): avc: denied { read } for pid=21872 comm="syz.0.3640" name="usbmon4" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1777.026537][ T30] audit: type=1400 audit(1772269519.210:933): avc: denied { open } for pid=21872 comm="syz.0.3640" path="/dev/usbmon4" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1777.354661][T12764] libceph: connect (1)[c::]:6789 error -13 [ 1777.368357][T12764] libceph: mon0 (1)[c::]:6789 connect error [ 1777.728843][T21878] ceph: No mds server is up or the cluster is laggy [ 1778.411873][ T30] audit: type=1400 audit(1772269520.270:934): avc: denied { read write } for pid=21872 comm="syz.0.3640" name="loop-control" dev="devtmpfs" ino=646 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1778.597854][ T30] audit: type=1400 audit(1772269520.270:935): avc: denied { open } for pid=21872 comm="syz.0.3640" path="/dev/loop-control" dev="devtmpfs" ino=646 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1778.666631][ T30] audit: type=1400 audit(1772269520.280:936): avc: denied { ioctl } for pid=21872 comm="syz.0.3640" path="/dev/loop-control" dev="devtmpfs" ino=646 ioctlcmd=0x4c80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1778.893735][ T30] audit: type=1400 audit(1772269520.360:937): avc: denied { create } for pid=21872 comm="syz.0.3640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1778.914182][T21893] netlink: 12 bytes leftover after parsing attributes in process `syz.4.3642'. [ 1778.951417][ T30] audit: type=1400 audit(1772269520.380:938): avc: denied { ioctl } for pid=21872 comm="syz.0.3640" path="/dev/usbmon4" dev="devtmpfs" ino=728 ioctlcmd=0x9204 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1778.998437][T21895] netlink: 'syz.4.3642': attribute type 8 has an invalid length. [ 1779.010784][T21893] geneve2: entered promiscuous mode [ 1779.161292][T12764] usb 3-1: new high-speed USB device number 85 using dummy_hcd [ 1779.351244][T21897] netlink: 171432 bytes leftover after parsing attributes in process `syz.1.3644'. [ 1779.551389][T12764] usb 3-1: Using ep0 maxpacket: 32 [ 1779.562021][T12764] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1779.645706][T12764] usb 3-1: New USB device found, idVendor=046d, idProduct=c31c, bcdDevice= 0.40 [ 1779.754860][T12764] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1779.937967][T12764] usb 3-1: config 0 descriptor?? [ 1780.010568][T12764] hub 3-1:0.0: USB hub found [ 1780.356696][T12764] hub 3-1:0.0: 1 port detected [ 1780.769738][T21887] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=27 sclass=netlink_route_socket pid=21887 comm=syz.2.3641 [ 1780.845825][T21887] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65 sclass=netlink_route_socket pid=21887 comm=syz.2.3641 [ 1780.921912][T21887] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=56 sclass=netlink_route_socket pid=21887 comm=syz.2.3641 [ 1781.021307][T21887] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=51 sclass=netlink_route_socket pid=21887 comm=syz.2.3641 [ 1781.250917][T12764] usb 3-1: USB disconnect, device number 85 [ 1782.189390][T21917] netlink: 'syz.4.3647': attribute type 11 has an invalid length. [ 1782.742797][ T30] kauditd_printk_skb: 23 callbacks suppressed [ 1782.742815][ T30] audit: type=1400 audit(1772269524.950:962): avc: denied { create } for pid=21921 comm="syz.0.3648" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1782.898378][T21925] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3648'. [ 1783.031199][ T30] audit: type=1400 audit(1772269525.060:963): avc: denied { read } for pid=21923 comm="syz.2.3649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1783.092129][ T30] audit: type=1400 audit(1772269525.100:964): avc: denied { write } for pid=21921 comm="syz.0.3648" name="video36" dev="devtmpfs" ino=1044 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 1783.179194][ T30] audit: type=1400 audit(1772269525.100:965): avc: denied { ioctl } for pid=21921 comm="syz.0.3648" path="/dev/video36" dev="devtmpfs" ino=1044 ioctlcmd=0x5608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 1783.213556][T21933] netlink: 'syz.1.3650': attribute type 6 has an invalid length. [ 1783.221908][T21933] netlink: 'syz.1.3650': attribute type 6 has an invalid length. [ 1783.581589][ T30] audit: type=1400 audit(1772269525.110:966): avc: denied { create } for pid=21921 comm="syz.0.3648" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 1783.676156][ T30] audit: type=1400 audit(1772269525.450:967): avc: denied { read } for pid=5470 comm="dhcpcd" name="n131" dev="tmpfs" ino=12653 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1783.711266][ T5889] usb 2-1: new high-speed USB device number 99 using dummy_hcd [ 1783.774726][ T30] audit: type=1400 audit(1772269525.450:968): avc: denied { open } for pid=5470 comm="dhcpcd" path="/run/udev/data/n131" dev="tmpfs" ino=12653 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1783.849718][ T30] audit: type=1400 audit(1772269525.450:969): avc: denied { getattr } for pid=5470 comm="dhcpcd" path="/run/udev/data/n131" dev="tmpfs" ino=12653 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1783.924030][ T5889] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1783.935014][ T5889] usb 2-1: config 0 has 0 interfaces, different from the descriptor's value: 1 [ 1783.963980][ T5889] usb 2-1: New USB device found, idVendor=1ac7, idProduct=0001, bcdDevice=cc.19 [ 1783.974036][ T5889] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1783.988662][ T5889] usb 2-1: Product: syz [ 1784.061150][ T5889] usb 2-1: Manufacturer: syz [ 1784.097258][ T5889] usb 2-1: SerialNumber: syz [ 1784.113110][ T5889] usb 2-1: config 0 descriptor?? [ 1784.253820][ T30] audit: type=1400 audit(1772269526.450:970): avc: denied { read } for pid=21945 comm="syz.3.3655" name="vhost-vsock" dev="devtmpfs" ino=1275 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1784.346922][ T5916] usb 2-1: USB disconnect, device number 99 [ 1784.367207][T21950] netlink: 16 bytes leftover after parsing attributes in process `syz.3.3655'. [ 1785.081817][T21954] ªªªªªª: renamed from lo (while UP) [ 1785.536395][ T30] audit: type=1400 audit(1772269526.450:971): avc: denied { open } for pid=21945 comm="syz.3.3655" path="/dev/vhost-vsock" dev="devtmpfs" ino=1275 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1785.727280][ T5889] usb 2-1: new high-speed USB device number 100 using dummy_hcd [ 1786.974396][ T1294] ieee802154 phy0 wpan0: encryption failed: -22 [ 1786.980758][ T1294] ieee802154 phy1 wpan1: encryption failed: -22 [ 1787.081393][ T5889] usb 2-1: config 4 has an invalid descriptor of length 0, skipping remainder of the config [ 1787.291888][ T5889] usb 2-1: New USB device found, idVendor=041e, idProduct=4007, bcdDevice=5d.18 [ 1787.300917][ T5889] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1787.469682][ T5889] gspca_main: stv0680-2.14.0 probing 041e:4007 [ 1787.576238][T21973] FAULT_INJECTION: forcing a failure. [ 1787.576238][T21973] name failslab, interval 1, probability 0, space 0, times 0 [ 1787.590050][T21973] CPU: 0 UID: 0 PID: 21973 Comm: syz.2.3662 Tainted: G L syzkaller #0 PREEMPT(full) [ 1787.590068][T21973] Tainted: [L]=SOFTLOCKUP [ 1787.590072][T21973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1787.590079][T21973] Call Trace: [ 1787.590083][T21973] [ 1787.590087][T21973] dump_stack_lvl+0x100/0x190 [ 1787.590109][T21973] should_fail_ex.cold+0x5/0xa [ 1787.590123][T21973] ? tomoyo_encode2+0xfb/0x3c0 [ 1787.590136][T21973] should_failslab+0xc2/0x120 [ 1787.590154][T21973] __kmalloc_noprof+0xe0/0x850 [ 1787.590168][T21973] ? d_absolute_path+0x136/0x1b0 [ 1787.590187][T21973] tomoyo_encode2+0xfb/0x3c0 [ 1787.590201][T21973] tomoyo_encode+0x29/0x50 [ 1787.590213][T21973] tomoyo_realpath_from_path+0x18c/0x690 [ 1787.590230][T21973] tomoyo_path_number_perm+0x23c/0x580 [ 1787.590248][T21973] ? tomoyo_path_number_perm+0x22e/0x580 [ 1787.590267][T21973] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 1787.590300][T21973] ? find_held_lock+0x2b/0x80 [ 1787.590314][T21973] ? __fget_files+0x215/0x3d0 [ 1787.590323][T21973] ? hook_file_ioctl_common+0x146/0x410 [ 1787.590342][T21973] ? __fget_files+0x21f/0x3d0 [ 1787.590354][T21973] security_file_ioctl+0xd3/0x230 [ 1787.590367][T21973] __x64_sys_ioctl+0xb7/0x210 [ 1787.590384][T21973] do_syscall_64+0x106/0xf80 [ 1787.590395][T21973] ? clear_bhb_loop+0x40/0x90 [ 1787.590410][T21973] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1787.590421][T21973] RIP: 0033:0x7f285899c799 [ 1787.590431][T21973] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1787.590442][T21973] RSP: 002b:00007f2859907028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1787.590453][T21973] RAX: ffffffffffffffda RBX: 00007f2858c15fa0 RCX: 00007f285899c799 [ 1787.590461][T21973] RDX: 0000200000000280 RSI: 0000000000003b71 RDI: 0000000000000003 [ 1787.590467][T21973] RBP: 00007f2859907090 R08: 0000000000000000 R09: 0000000000000000 [ 1787.590474][T21973] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1787.590480][T21973] R13: 00007f2858c16038 R14: 00007f2858c15fa0 R15: 00007fff2fde0408 [ 1787.590494][T21973] [ 1787.590504][T21973] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1788.136701][T21980] netlink: 16 bytes leftover after parsing attributes in process `syz.0.3664'. [ 1788.662229][ T5889] stv0680 2-1:4.0: STV(e): camera ping failed!! [ 1788.763289][ T5889] stv0680 2-1:4.0: last error: 42, command = 0xd7 [ 1789.012123][ T5889] usb 2-1: USB disconnect, device number 100 [ 1789.442567][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 1789.442582][ T30] audit: type=1400 audit(1772269531.520:982): avc: denied { create } for pid=21987 comm="syz.0.3667" name="file2" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1789.601772][T21991] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3665'. [ 1789.657664][ T30] audit: type=1400 audit(1772269531.530:983): avc: denied { read } for pid=21987 comm="syz.0.3667" name="file2" dev="tmpfs" ino=4037 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1789.991183][ T30] audit: type=1400 audit(1772269531.530:984): avc: denied { open } for pid=21987 comm="syz.0.3667" path="/728/file2" dev="tmpfs" ino=4037 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1790.071685][ T30] audit: type=1400 audit(1772269531.530:985): avc: denied { ioctl } for pid=21987 comm="syz.0.3667" path="/728/file2" dev="tmpfs" ino=4037 ioctlcmd=0x583c scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1790.451668][ T30] audit: type=1400 audit(1772269531.720:986): avc: denied { create } for pid=21987 comm="syz.0.3667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1790.532080][ T30] audit: type=1400 audit(1772269531.720:987): avc: denied { setopt } for pid=21987 comm="syz.0.3667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1790.565463][ T5916] usb 4-1: new high-speed USB device number 65 using dummy_hcd [ 1790.661268][ T30] audit: type=1400 audit(1772269531.920:988): avc: denied { unlink } for pid=5815 comm="syz-executor" name="file2" dev="tmpfs" ino=4037 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1790.755806][T22002] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3670'. [ 1790.783258][ T30] audit: type=1400 audit(1772269532.010:989): avc: denied { map } for pid=21993 comm="syz.3.3669" path="/dev/cpu/0/msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 1790.860296][ T30] audit: type=1400 audit(1772269532.010:990): avc: denied { execute } for pid=21993 comm="syz.3.3669" path="/dev/cpu/0/msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 1791.027801][ T5916] usb 4-1: New USB device found, idVendor=20b7, idProduct=1540, bcdDevice=b7.5a [ 1791.051327][ T5916] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1791.069700][ T30] audit: type=1400 audit(1772269532.080:991): avc: denied { create } for pid=21993 comm="syz.3.3669" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1791.101245][ T5916] usb 4-1: Product: syz [ 1791.141404][ T5916] usb 4-1: Manufacturer: syz [ 1791.271312][ T5916] usb 4-1: SerialNumber: syz [ 1791.282050][ T5916] usb 4-1: config 0 descriptor?? [ 1791.890254][T22021] FAULT_INJECTION: forcing a failure. [ 1791.890254][T22021] name failslab, interval 1, probability 0, space 0, times 0 [ 1791.903431][T22021] CPU: 0 UID: 0 PID: 22021 Comm: syz.1.3675 Tainted: G L syzkaller #0 PREEMPT(full) [ 1791.903463][T22021] Tainted: [L]=SOFTLOCKUP [ 1791.903469][T22021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1791.903479][T22021] Call Trace: [ 1791.903486][T22021] [ 1791.903493][T22021] dump_stack_lvl+0x100/0x190 [ 1791.903527][T22021] should_fail_ex.cold+0x5/0xa [ 1791.903551][T22021] should_failslab+0xc2/0x120 [ 1791.903579][T22021] kmem_cache_alloc_lru_noprof+0x80/0x6e0 [ 1791.903609][T22021] ? proc_alloc_inode+0x25/0x200 [ 1791.903640][T22021] ? __pfx_proc_alloc_inode+0x10/0x10 [ 1791.903668][T22021] proc_alloc_inode+0x25/0x200 [ 1791.903694][T22021] alloc_inode+0x68/0x250 [ 1791.903718][T22021] new_inode+0x22/0x1c0 [ 1791.903744][T22021] proc_pid_make_inode+0x22/0x160 [ 1791.903771][T22021] proc_fdinfo_instantiate+0x57/0x240 [ 1791.903795][T22021] proc_fill_cache+0x384/0x490 [ 1791.903821][T22021] ? __pfx_proc_fdinfo_instantiate+0x10/0x10 [ 1791.903846][T22021] ? __pfx_proc_fill_cache+0x10/0x10 [ 1791.903881][T22021] ? snprintf+0xc7/0x100 [ 1791.903915][T22021] ? fget_task_next+0x2c6/0x5a0 [ 1791.903939][T22021] proc_readfd_common+0x1ef/0x5f0 [ 1791.903962][T22021] ? __pfx_proc_fdinfo_instantiate+0x10/0x10 [ 1791.903988][T22021] ? __pfx_proc_readfd_common+0x10/0x10 [ 1791.904011][T22021] ? down_read_killable+0x30e/0x4c0 [ 1791.904035][T22021] ? __pfx_down_read_killable+0x10/0x10 [ 1791.904056][T22021] ? avc_policy_seqno+0x9/0x20 [ 1791.904087][T22021] iterate_dir+0x296/0xae0 [ 1791.904117][T22021] __x64_sys_getdents64+0x13b/0x2c0 [ 1791.904145][T22021] ? __pfx___x64_sys_getdents64+0x10/0x10 [ 1791.904170][T22021] ? fput+0x79/0x100 [ 1791.904188][T22021] ? __pfx_filldir64+0x10/0x10 [ 1791.904223][T22021] do_syscall_64+0x106/0xf80 [ 1791.904241][T22021] ? clear_bhb_loop+0x40/0x90 [ 1791.904264][T22021] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1791.904283][T22021] RIP: 0033:0x7f198139c799 [ 1791.904299][T22021] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1791.904316][T22021] RSP: 002b:00007f19821f5028 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1791.904333][T22021] RAX: ffffffffffffffda RBX: 00007f1981616180 RCX: 00007f198139c799 [ 1791.904345][T22021] RDX: 0000000000001002 RSI: 0000200000002f40 RDI: 000000000000000a [ 1791.904355][T22021] RBP: 00007f19821f5090 R08: 0000000000000000 R09: 0000000000000000 [ 1791.904366][T22021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1791.904376][T22021] R13: 00007f1981616218 R14: 00007f1981616180 R15: 00007ffe34ad5938 [ 1791.904402][T22021] [ 1792.484828][ T5916] usb 4-1: Firmware version (0.0) predates our first public release. [ 1792.498713][ T5916] usb 4-1: Please update to version 0.2 or newer [ 1792.637143][ T5916] usb 4-1: USB disconnect, device number 65 [ 1793.064975][T22029] netlink: 16 bytes leftover after parsing attributes in process `syz.1.3678'. [ 1794.487663][T22038] netlink: 12 bytes leftover after parsing attributes in process `syz.4.3681'. [ 1794.504854][T22038] geneve2: entered promiscuous mode [ 1794.558994][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 1794.559009][ T30] audit: type=1400 audit(1772269536.760:996): avc: denied { mount } for pid=22039 comm="syz.2.3682" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 1794.619989][ T30] audit: type=1400 audit(1772269536.810:997): avc: denied { audit_write } for pid=22039 comm="syz.2.3682" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1794.706801][T22046] fuse: Bad value for 'fd' [ 1794.796550][ T30] audit: type=1400 audit(1772269536.900:998): avc: denied { getopt } for pid=22045 comm="syz.1.3683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1794.870327][ T30] audit: type=1400 audit(1772269536.910:999): avc: denied { bind } for pid=22045 comm="syz.1.3683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1794.907958][T22052] overlayfs: NFS export requires "redirect_dir=nofollow" on non-upper mount, falling back to nfs_export=off. [ 1794.960044][ T30] audit: type=1400 audit(1772269536.910:1000): avc: denied { listen } for pid=22045 comm="syz.1.3683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1795.061307][T22052] overlayfs: missing 'lowerdir' [ 1795.216713][ T30] audit: type=1400 audit(1772269536.910:1001): avc: denied { connect } for pid=22045 comm="syz.1.3683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1795.457931][T22059] netlink: 149416 bytes leftover after parsing attributes in process `syz.4.3688'. [ 1795.467697][T22059] openvswitch: netlink: Message has 6 unknown bytes. [ 1795.741250][ T30] audit: type=1400 audit(1772269536.910:1002): avc: denied { getopt } for pid=22045 comm="syz.1.3683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1795.987567][ T30] audit: type=1400 audit(1772269536.920:1003): avc: denied { watch } for pid=22039 comm="syz.2.3682" path="/750" dev="tmpfs" ino=4211 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1797.039511][T22075] netlink: 'syz.1.3690': attribute type 11 has an invalid length. [ 1797.559341][ T30] audit: type=1400 audit(1772269537.050:1004): avc: denied { mount } for pid=22049 comm="syz.0.3684" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1797.765863][ T30] audit: type=1400 audit(1772269538.040:1005): avc: denied { create } for pid=22061 comm="syz.2.3689" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1797.954529][T22079] netlink: 16 bytes leftover after parsing attributes in process `syz.3.3693'. [ 1800.483819][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 1800.483837][ T30] audit: type=1400 audit(1772269541.560:1008): avc: denied { override_creds } for pid=22083 comm="syz.3.3696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1801.491326][ T30] audit: type=1400 audit(1772269543.100:1009): avc: denied { create } for pid=22092 comm="syz.2.3699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 1801.531201][T12764] usb 3-1: new full-speed USB device number 86 using dummy_hcd [ 1801.718080][T12764] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 1801.978763][T12764] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x3 has invalid wMaxPacketSize 0 [ 1802.056801][T12764] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a5, bcdDevice= 0.40 [ 1802.100292][T12764] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 1802.131195][T12764] usb 3-1: SerialNumber: syz [ 1802.149368][T12764] cdc_ether 3-1:1.0: probe with driver cdc_ether failed with error -22 [ 1802.174027][T12764] usb-storage 3-1:1.0: USB Mass Storage device detected [ 1803.160382][ T30] audit: type=1400 audit(1772269545.360:1010): avc: denied { map } for pid=22092 comm="syz.2.3699" path="/dev/net/tun" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 1803.185975][T22103] netlink: 171432 bytes leftover after parsing attributes in process `syz.0.3698'. [ 1803.224755][T12764] usb-storage 3-1:1.0: Quirks match for vid 0525 pid a4a5: 10000 [ 1803.248922][ T30] audit: type=1400 audit(1772269545.360:1011): avc: denied { execute } for pid=22092 comm="syz.2.3699" path="/dev/net/tun" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 1803.274117][T12764] scsi host1: usb-storage 3-1:1.0 [ 1804.686579][ T30] audit: type=1400 audit(1772269546.880:1012): avc: denied { create } for pid=22130 comm="syz.2.3706" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 1804.772619][ T30] audit: type=1400 audit(1772269546.880:1013): avc: denied { write } for pid=22130 comm="syz.2.3706" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 1804.930097][ T30] audit: type=1400 audit(1772269546.880:1014): avc: denied { ioctl } for pid=22130 comm="syz.2.3706" path="socket:[91238]" dev="sockfs" ino=91238 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1805.249817][T10095] libceph: connect (1)[c::]:6789 error -13 [ 1805.257988][T10095] libceph: mon0 (1)[c::]:6789 connect error [ 1805.382914][ T5916] usb 3-1: USB disconnect, device number 86 [ 1805.655127][T22137] ceph: No mds server is up or the cluster is laggy [ 1805.682361][T12764] libceph: connect (1)[c::]:6789 error -13 [ 1805.688486][T12764] libceph: mon0 (1)[c::]:6789 connect error [ 1805.875444][ T30] audit: type=1400 audit(1772269548.080:1015): avc: denied { create } for pid=22145 comm="syz.4.3709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 1805.920997][ T30] audit: type=1400 audit(1772269548.080:1016): avc: denied { write } for pid=22146 comm="syz.2.3710" name="001" dev="devtmpfs" ino=745 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1805.965692][T22150] dummy0: entered promiscuous mode [ 1805.971432][ T30] audit: type=1400 audit(1772269548.170:1017): avc: denied { setopt } for pid=22149 comm="syz.3.3711" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1805.995050][ T30] audit: type=1400 audit(1772269548.170:1018): avc: denied { ioctl } for pid=22149 comm="syz.3.3711" path="socket:[91299]" dev="sockfs" ino=91299 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1806.102029][ T30] audit: type=1400 audit(1772269548.180:1019): avc: denied { read } for pid=22149 comm="syz.3.3711" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1806.311926][ T30] audit: type=1400 audit(1772269548.510:1020): avc: denied { connect } for pid=22145 comm="syz.4.3709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 1806.717085][T22149] dummy0: left promiscuous mode [ 1806.791351][ T30] audit: type=1400 audit(1772269548.580:1021): avc: denied { bind } for pid=22145 comm="syz.4.3709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 1807.212821][ T30] audit: type=1400 audit(1772269548.670:1022): avc: denied { accept } for pid=22145 comm="syz.4.3709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 1807.240913][ T30] audit: type=1400 audit(1772269548.840:1023): avc: denied { create } for pid=22159 comm="syz.1.3702" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1807.289829][T22166] netlink: 16 bytes leftover after parsing attributes in process `syz.1.3702'. [ 1807.514532][ T30] audit: type=1400 audit(1772269549.310:1024): avc: denied { write } for pid=22159 comm="syz.1.3702" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1807.681062][T22162] orangefs_mount: mount request failed with -4 [ 1809.159704][T22181] netlink: 149416 bytes leftover after parsing attributes in process `syz.0.3717'. [ 1809.169062][T22181] openvswitch: netlink: Message has 6 unknown bytes. [ 1809.718633][T22195] input: syz0 as /devices/virtual/input/input28 [ 1810.021489][T22202] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3722'. [ 1810.030482][T22202] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3722'. [ 1812.073875][T22212] overlay: filesystem on ./file0 not supported as upperdir [ 1812.097279][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 1812.097291][ T30] audit: type=1400 audit(1772269554.270:1030): avc: denied { unlink } for pid=22210 comm="syz.0.3725" name="#a1" dev="tmpfs" ino=4116 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1812.218553][ T30] audit: type=1400 audit(1772269554.270:1031): avc: denied { mount } for pid=22210 comm="syz.0.3725" name="/" dev="overlay" ino=4111 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1812.441198][ T30] audit: type=1400 audit(1772269554.580:1032): avc: denied { unmount } for pid=5815 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1813.011676][ T30] audit: type=1400 audit(1772269555.210:1033): avc: denied { read write } for pid=22225 comm="syz.2.3729" name="uhid" dev="devtmpfs" ino=1273 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1813.164995][ T30] audit: type=1400 audit(1772269555.210:1034): avc: denied { open } for pid=22225 comm="syz.2.3729" path="/dev/uhid" dev="devtmpfs" ino=1273 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1813.346853][T22230] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device nullb0. [ 1813.664173][T22231] vivid-000: kernel_thread() failed [ 1813.873496][T22235] netlink: 148904 bytes leftover after parsing attributes in process `syz.0.3731'. [ 1813.883382][T22235] openvswitch: netlink: Message has 6 unknown bytes. [ 1814.090187][ T30] audit: type=1400 audit(1772269556.290:1035): avc: denied { create } for pid=22236 comm="syz.2.3733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 1814.289995][ T30] audit: type=1400 audit(1772269556.290:1036): avc: denied { connect } for pid=22236 comm="syz.2.3733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1814.443076][ T30] audit: type=1400 audit(1772269556.290:1037): avc: denied { setopt } for pid=22236 comm="syz.2.3733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1814.490528][ T30] audit: type=1400 audit(1772269556.480:1038): avc: denied { read write } for pid=22236 comm="syz.2.3733" name="sg0" dev="devtmpfs" ino=815 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 1814.546880][ T30] audit: type=1400 audit(1772269556.480:1039): avc: denied { open } for pid=22236 comm="syz.2.3733" path="/dev/sg0" dev="devtmpfs" ino=815 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 1814.556089][T22237] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3733'. [ 1816.481226][T12764] usb 1-1: new low-speed USB device number 73 using dummy_hcd [ 1816.591524][T17067] usb 2-1: new full-speed USB device number 101 using dummy_hcd [ 1816.643373][T12764] usb 1-1: device descriptor read/64, error -71 [ 1816.761260][T10095] usb 4-1: new high-speed USB device number 66 using dummy_hcd [ 1816.767856][T22267] netlink: 149416 bytes leftover after parsing attributes in process `syz.2.3736'. [ 1816.779027][T22267] openvswitch: netlink: Message has 6 unknown bytes. [ 1816.782589][T17067] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 1816.852551][T17067] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x3 has invalid wMaxPacketSize 0 [ 1816.907302][T12764] usb 1-1: new low-speed USB device number 74 using dummy_hcd [ 1816.924470][T17067] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a5, bcdDevice= 0.40 [ 1816.941175][T17067] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 1816.957740][T17067] usb 2-1: SerialNumber: syz [ 1816.992351][T10095] usb 4-1: config index 0 descriptor too short (expected 45, got 36) [ 1817.013158][T17067] cdc_ether 2-1:1.0: probe with driver cdc_ether failed with error -22 [ 1817.022678][T10095] usb 4-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 1817.040987][T17067] usb-storage 2-1:1.0: USB Mass Storage device detected [ 1817.048281][T12764] usb 1-1: device descriptor read/64, error -71 [ 1817.059230][T10095] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 1817.089509][T10095] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 1817.106653][T10095] usb 4-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1817.134575][T17067] usb-storage 2-1:1.0: Quirks match for vid 0525 pid a4a5: 10000 [ 1817.143918][T17067] scsi host1: usb-storage 2-1:1.0 [ 1817.161176][T20957] usb 5-1: new high-speed USB device number 69 using dummy_hcd [ 1817.184536][T12764] usb usb1-port1: attempt power cycle [ 1817.264557][T10095] usb 4-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1817.267239][T22275] netlink: 'syz.2.3740': attribute type 5 has an invalid length. [ 1817.281547][T22275] FAULT_INJECTION: forcing a failure. [ 1817.281547][T22275] name failslab, interval 1, probability 0, space 0, times 0 [ 1817.285213][T10095] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1817.294189][T22275] CPU: 0 UID: 0 PID: 22275 Comm: syz.2.3740 Tainted: G L syzkaller #0 PREEMPT(full) [ 1817.294216][T22275] Tainted: [L]=SOFTLOCKUP [ 1817.294223][T22275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1817.294233][T22275] Call Trace: [ 1817.294239][T22275] [ 1817.294246][T22275] dump_stack_lvl+0x100/0x190 [ 1817.294275][T22275] should_fail_ex.cold+0x5/0xa [ 1817.294296][T22275] should_failslab+0xc2/0x120 [ 1817.294319][T22275] kmem_cache_alloc_node_noprof+0x81/0x6f0 [ 1817.294341][T22275] ? __alloc_skb+0x140/0x710 [ 1817.294368][T22275] __alloc_skb+0x140/0x710 [ 1817.294389][T22275] ? __alloc_skb+0x5b7/0x710 [ 1817.294412][T22275] ? __pfx___alloc_skb+0x10/0x10 [ 1817.294440][T22275] netlink_ack+0x117/0xb80 [ 1817.294465][T22275] netlink_rcv_skb+0x333/0x420 [ 1817.294482][T22275] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1817.294500][T22275] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 1817.294530][T22275] ? netlink_deliver_tap+0x1ae/0xcc0 [ 1817.294551][T22275] netlink_unicast+0x5aa/0x870 [ 1817.294572][T22275] ? __pfx_netlink_unicast+0x10/0x10 [ 1817.294597][T22275] netlink_sendmsg+0x8b0/0xda0 [ 1817.294618][T22275] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1817.294643][T22275] __sys_sendto+0x4aa/0x520 [ 1817.294666][T22275] ? __pfx___sys_sendto+0x10/0x10 [ 1817.294706][T22275] ? ksys_write+0x1ac/0x250 [ 1817.294728][T22275] ? __pfx_ksys_write+0x10/0x10 [ 1817.294752][T22275] __x64_sys_sendto+0xe0/0x1c0 [ 1817.294774][T22275] ? do_syscall_64+0x95/0xf80 [ 1817.294790][T22275] ? lockdep_hardirqs_on+0x78/0x100 [ 1817.294805][T22275] do_syscall_64+0x106/0xf80 [ 1817.294820][T22275] ? clear_bhb_loop+0x40/0x90 [ 1817.294839][T22275] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1817.294855][T22275] RIP: 0033:0x7f285899c799 [ 1817.294869][T22275] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1817.294883][T22275] RSP: 002b:00007f2859907028 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1817.294900][T22275] RAX: ffffffffffffffda RBX: 00007f2858c15fa0 RCX: 00007f285899c799 [ 1817.294910][T22275] RDX: 0000000000000078 RSI: 0000200000000340 RDI: 0000000000000003 [ 1817.294920][T22275] RBP: 00007f2859907090 R08: 0000000000000000 R09: 0000000000000000 [ 1817.294929][T22275] R10: 0000000000044014 R11: 0000000000000246 R12: 0000000000000001 [ 1817.294938][T22275] R13: 00007f2858c16038 R14: 00007f2858c15fa0 R15: 00007fff2fde0408 [ 1817.294959][T22275] [ 1817.467969][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 1817.467982][ T30] audit: type=1400 audit(1772269559.670:1043): avc: denied { ioctl } for pid=22278 comm="syz.2.3742" path="socket:[91603]" dev="sockfs" ino=91603 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1817.474724][T10095] usb 4-1: config 0 descriptor?? [ 1817.531869][ T30] audit: type=1400 audit(1772269559.710:1044): avc: denied { create } for pid=22278 comm="syz.2.3742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1817.539906][T12764] usb 1-1: new low-speed USB device number 75 using dummy_hcd [ 1817.548971][ T30] audit: type=1400 audit(1772269559.710:1045): avc: denied { bind } for pid=22278 comm="syz.2.3742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1817.573833][T20957] usb 5-1: Using ep0 maxpacket: 32 [ 1817.612927][ T30] audit: type=1400 audit(1772269559.810:1046): avc: denied { create } for pid=22278 comm="syz.2.3742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1817.652785][T20957] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1817.664475][T12764] usb 1-1: device descriptor read/8, error -71 [ 1817.670673][T20957] usb 5-1: New USB device found, idVendor=046d, idProduct=c31c, bcdDevice= 0.40 [ 1817.670918][ T30] audit: type=1400 audit(1772269559.860:1047): avc: denied { write } for pid=22278 comm="syz.2.3742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1817.701553][T20957] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1817.764105][T20957] usb 5-1: config 0 descriptor?? [ 1817.785260][T20957] hub 5-1:0.0: USB hub found [ 1817.911220][T12764] usb 1-1: new low-speed USB device number 76 using dummy_hcd [ 1817.931658][T12764] usb 1-1: device descriptor read/8, error -71 [ 1817.980527][T20957] hub 5-1:0.0: 1 port detected [ 1818.041932][T12764] usb usb1-port1: unable to enumerate USB device [ 1818.106385][T10095] plantronics 0003:047F:FFFF.0003: reserved main item tag 0xd [ 1818.120885][T10095] plantronics 0003:047F:FFFF.0003: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.3-1/input0 [ 1818.341774][ T30] audit: type=1400 audit(1772269560.550:1048): avc: denied { connect } for pid=22282 comm="syz.2.3743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 1818.493323][T10095] usb 2-1: USB disconnect, device number 101 [ 1818.503963][T22285] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 1818.503963][T22285] The task syz.2.3743 (22285) triggered the difference, watch for misbehavior. [ 1818.527801][T22255] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=27 sclass=netlink_route_socket pid=22255 comm=syz.4.3738 [ 1818.897601][T22255] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65 sclass=netlink_route_socket pid=22255 comm=syz.4.3738 [ 1818.926974][T22255] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=56 sclass=netlink_route_socket pid=22255 comm=syz.4.3738 [ 1818.943377][T22255] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=51 sclass=netlink_route_socket pid=22255 comm=syz.4.3738 [ 1819.007347][T20957] usb 5-1: USB disconnect, device number 69 [ 1819.374569][T22289] netlink: 148904 bytes leftover after parsing attributes in process `syz.1.3744'. [ 1819.384825][T22289] openvswitch: netlink: Message has 6 unknown bytes. [ 1819.395950][ T30] audit: type=1404 audit(1772269561.600:1049): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 1819.420665][T22294] FAULT_INJECTION: forcing a failure. [ 1819.420665][T22294] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1819.435450][T22294] CPU: 0 UID: 0 PID: 22294 Comm: syz.2.3746 Tainted: G L syzkaller #0 PREEMPT(full) [ 1819.435469][T22294] Tainted: [L]=SOFTLOCKUP [ 1819.435473][T22294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1819.435480][T22294] Call Trace: [ 1819.435484][T22294] [ 1819.435489][T22294] dump_stack_lvl+0x100/0x190 [ 1819.435511][T22294] should_fail_ex.cold+0x5/0xa [ 1819.435525][T22294] _copy_from_user+0x2e/0xd0 [ 1819.435542][T22294] copy_msghdr_from_user+0x9f/0x4f0 [ 1819.435557][T22294] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1819.435575][T22294] ? __lock_acquire+0x4a5/0x2630 [ 1819.435596][T22294] ___sys_recvmsg+0xdd/0x1a0 [ 1819.435611][T22294] ? __pfx____sys_recvmsg+0x10/0x10 [ 1819.435627][T22294] ? find_held_lock+0x2b/0x80 [ 1819.435649][T22294] do_recvmmsg+0x301/0x760 [ 1819.435665][T22294] ? __pfx_do_recvmmsg+0x10/0x10 [ 1819.435679][T22294] ? ksys_write+0x190/0x250 [ 1819.435695][T22294] ? ksys_write+0x190/0x250 [ 1819.435713][T22294] ? __mutex_unlock_slowpath+0x15c/0x790 [ 1819.435730][T22294] ? __fget_files+0x21f/0x3d0 [ 1819.435744][T22294] __x64_sys_recvmmsg+0x22a/0x280 [ 1819.435756][T22294] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 1819.435772][T22294] do_syscall_64+0x106/0xf80 [ 1819.435782][T22294] ? clear_bhb_loop+0x40/0x90 [ 1819.435796][T22294] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1819.435807][T22294] RIP: 0033:0x7f285899c799 [ 1819.435818][T22294] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1819.435828][T22294] RSP: 002b:00007f2859907028 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1819.435839][T22294] RAX: ffffffffffffffda RBX: 00007f2858c15fa0 RCX: 00007f285899c799 [ 1819.435847][T22294] RDX: 000000000000036f RSI: 0000200000000d80 RDI: 0000000000000003 [ 1819.435853][T22294] RBP: 00007f2859907090 R08: 0000000000000000 R09: 0000000000000000 [ 1819.435860][T22294] R10: 0000000000020102 R11: 0000000000000246 R12: 0000000000000001 [ 1819.435867][T22294] R13: 00007f2858c16038 R14: 00007f2858c15fa0 R15: 00007fff2fde0408 [ 1819.435880][T22294] [ 1819.659784][ T30] audit: type=1400 audit(1772269561.860:1050): avc: denied { read write } for pid=5805 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1819.697197][ T30] audit: type=1400 audit(1772269561.900:1051): avc: denied { read write } for pid=22295 comm="syz.2.3747" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 1819.721183][ T5916] usb 4-1: reset high-speed USB device number 66 using dummy_hcd [ 1819.732941][ T30] audit: type=1400 audit(1772269561.900:1052): avc: denied { create } for pid=22295 comm="syz.2.3747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 1820.009993][T22306] FAULT_INJECTION: forcing a failure. [ 1820.009993][T22306] name failslab, interval 1, probability 0, space 0, times 0 [ 1820.035522][T22306] CPU: 0 UID: 0 PID: 22306 Comm: syz.3.3751 Tainted: G L syzkaller #0 PREEMPT(full) [ 1820.035549][T22306] Tainted: [L]=SOFTLOCKUP [ 1820.035556][T22306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1820.035565][T22306] Call Trace: [ 1820.035572][T22306] [ 1820.035579][T22306] dump_stack_lvl+0x100/0x190 [ 1820.035611][T22306] should_fail_ex.cold+0x5/0xa [ 1820.035635][T22306] should_failslab+0xc2/0x120 [ 1820.035662][T22306] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 1820.035686][T22306] ? security_inode_alloc+0x3b/0x2c0 [ 1820.035705][T22306] ? lockdep_init_map_type+0x5c/0x250 [ 1820.035726][T22306] security_inode_alloc+0x3b/0x2c0 [ 1820.035744][T22306] inode_init_always_gfp+0xced/0x1040 [ 1820.035766][T22306] alloc_inode+0x8e/0x250 [ 1820.035788][T22306] new_inode+0x22/0x1c0 [ 1820.035813][T22306] shmem_get_inode+0x212/0x1040 [ 1820.035837][T22306] ? __pfx_shmem_get_inode+0x10/0x10 [ 1820.035860][T22306] ? may_create+0x285/0x440 [ 1820.035884][T22306] shmem_mknod+0x20c/0x470 [ 1820.035907][T22306] ? __pfx_shmem_mknod+0x10/0x10 [ 1820.035933][T22306] vfs_create+0x301/0x6c0 [ 1820.035960][T22306] filename_mknodat+0x2de/0x7f0 [ 1820.035982][T22306] ? __pfx_filename_mknodat+0x10/0x10 [ 1820.036000][T22306] ? strncpy_from_user+0x19d/0x2d0 [ 1820.036026][T22306] ? do_getname+0x191/0x390 [ 1820.036050][T22306] __x64_sys_mknodat+0xb5/0xf0 [ 1820.036070][T22306] do_syscall_64+0x106/0xf80 [ 1820.036087][T22306] ? clear_bhb_loop+0x40/0x90 [ 1820.036109][T22306] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1820.036127][T22306] RIP: 0033:0x7f34f099c799 [ 1820.036143][T22306] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1820.036160][T22306] RSP: 002b:00007f34f18a1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000103 [ 1820.036179][T22306] RAX: ffffffffffffffda RBX: 00007f34f0c15fa0 RCX: 00007f34f099c799 [ 1820.036191][T22306] RDX: 0000000000000000 RSI: 00002000000003c0 RDI: 0000000000000003 [ 1820.036201][T22306] RBP: 00007f34f18a1090 R08: 0000000000000000 R09: 0000000000000000 [ 1820.036212][T22306] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1820.036222][T22306] R13: 00007f34f0c16038 R14: 00007f34f0c15fa0 R15: 00007fff1996a068 [ 1820.036248][T22306] [ 1820.929791][ T8655] usb 4-1: USB disconnect, device number 66 [ 1821.227570][T22328] netlink: 24 bytes leftover after parsing attributes in process `syz.2.3760'. [ 1822.526195][ T30] kauditd_printk_skb: 119 callbacks suppressed [ 1822.526207][ T30] audit: type=1400 audit(1772269564.730:1172): avc: denied { create } for pid=22362 comm="syz.0.3772" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=0 [ 1822.643549][ T30] audit: type=1400 audit(1772269564.730:1173): avc: denied { create } for pid=22362 comm="syz.0.3772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 1822.701475][ T30] audit: type=1400 audit(1772269564.730:1174): avc: denied { read write } for pid=22362 comm="syz.0.3772" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 1822.791329][ T30] audit: type=1400 audit(1772269564.730:1175): avc: denied { read write } for pid=22362 comm="syz.0.3772" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 1822.853222][T22367] TCP: tcp_parse_options: Illegal window scaling value 150 > 14 received [ 1822.894808][T22372] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=27 sclass=netlink_route_socket pid=22372 comm=syz.4.3776 [ 1822.961182][ T30] audit: type=1400 audit(1772269564.730:1176): avc: denied { read write } for pid=22362 comm="syz.0.3772" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 1823.051181][ T30] audit: type=1400 audit(1772269564.730:1177): avc: denied { read } for pid=22362 comm="syz.0.3772" name="autofs" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=0 [ 1823.162925][ T30] audit: type=1400 audit(1772269564.760:1178): avc: denied { mounton } for pid=22362 comm="syz.0.3772" path="/747/file1" dev="tmpfs" ino=4151 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1823.185780][ T30] audit: type=1400 audit(1772269564.760:1179): avc: denied { read } for pid=22362 comm="syz.0.3772" name="autofs" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=0 [ 1823.215971][ T30] audit: type=1400 audit(1772269564.760:1180): avc: denied { map_create } for pid=22362 comm="syz.0.3772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1823.238114][ T30] audit: type=1400 audit(1772269564.760:1181): avc: denied { prog_load } for pid=22362 comm="syz.0.3772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1823.311687][T22380] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3779'. [ 1823.492962][T22395] PKCS7: Unknown OID: [4] 0.0.0.0(bad) [ 1823.508705][T22395] PKCS7: Only support pkcs7_signedData type [ 1823.555812][T22395] syz.2.3783 (22395): attempted to duplicate a private mapping with mremap. This is not supported. [ 1823.702825][T22398] FAULT_INJECTION: forcing a failure. [ 1823.702825][T22398] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1823.761573][T22398] CPU: 1 UID: 0 PID: 22398 Comm: syz.4.3784 Tainted: G L syzkaller #0 PREEMPT(full) [ 1823.761593][T22398] Tainted: [L]=SOFTLOCKUP [ 1823.761597][T22398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1823.761604][T22398] Call Trace: [ 1823.761608][T22398] [ 1823.761612][T22398] dump_stack_lvl+0x100/0x190 [ 1823.761634][T22398] should_fail_ex.cold+0x5/0xa [ 1823.761649][T22398] _copy_to_user+0x32/0xd0 [ 1823.761666][T22398] simple_read_from_buffer+0xcb/0x170 [ 1823.761686][T22398] proc_fail_nth_read+0x1af/0x230 [ 1823.761701][T22398] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1823.761716][T22398] ? rw_verify_area+0xce/0x6d0 [ 1823.761731][T22398] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1823.761745][T22398] vfs_read+0x1e4/0xb30 [ 1823.761763][T22398] ? __pfx_vfs_read+0x10/0x10 [ 1823.761778][T22398] ? __fget_files+0x215/0x3d0 [ 1823.761792][T22398] ? __fget_files+0x21f/0x3d0 [ 1823.761806][T22398] ksys_read+0x12a/0x250 [ 1823.761821][T22398] ? __pfx_ksys_read+0x10/0x10 [ 1823.761841][T22398] do_syscall_64+0x106/0xf80 [ 1823.761853][T22398] ? clear_bhb_loop+0x40/0x90 [ 1823.761867][T22398] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1823.761879][T22398] RIP: 0033:0x7fbc3795cfce [ 1823.761889][T22398] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1823.761900][T22398] RSP: 002b:00007fbc3889bfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1823.761911][T22398] RAX: ffffffffffffffda RBX: 00007fbc3889c6c0 RCX: 00007fbc3795cfce [ 1823.761918][T22398] RDX: 000000000000000f RSI: 00007fbc3889c0a0 RDI: 0000000000000003 [ 1823.761924][T22398] RBP: 00007fbc3889c090 R08: 0000000000000000 R09: 0000000000000000 [ 1823.761931][T22398] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1823.761937][T22398] R13: 00007fbc37c16038 R14: 00007fbc37c15fa0 R15: 00007ffcdff1ba28 [ 1823.761951][T22398] [ 1824.423554][T22409] TCP: tcp_parse_options: Illegal window scaling value 150 > 14 received [ 1824.850179][T22417] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3791'. [ 1825.799799][T22431] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3796'. [ 1825.900913][T22433] netlink: 24 bytes leftover after parsing attributes in process `syz.1.3797'. [ 1827.582799][ T30] kauditd_printk_skb: 223 callbacks suppressed [ 1827.602958][ T30] audit: type=1400 audit(1772269569.690:1405): avc: denied { read write } for pid=22470 comm="syz.2.3811" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 1827.790018][ T30] audit: type=1400 audit(1772269569.990:1406): avc: denied { read write } for pid=5805 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1827.878755][ T30] audit: type=1400 audit(1772269570.080:1407): avc: denied { execmem } for pid=22472 comm="syz.2.3812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1828.363540][ T30] audit: type=1400 audit(1772269570.130:1408): avc: denied { read write } for pid=5806 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1828.436142][T22473] FAULT_INJECTION: forcing a failure. [ 1828.436142][T22473] name failslab, interval 1, probability 0, space 0, times 0 [ 1828.484988][T22473] CPU: 1 UID: 0 PID: 22473 Comm: syz.2.3812 Tainted: G L syzkaller #0 PREEMPT(full) [ 1828.485017][T22473] Tainted: [L]=SOFTLOCKUP [ 1828.485023][T22473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1828.485033][T22473] Call Trace: [ 1828.485040][T22473] [ 1828.485047][T22473] dump_stack_lvl+0x100/0x190 [ 1828.485078][T22473] should_fail_ex.cold+0x5/0xa [ 1828.485101][T22473] should_failslab+0xc2/0x120 [ 1828.485128][T22473] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 1828.485151][T22473] ? ptlock_alloc+0x1f/0x70 [ 1828.485175][T22473] ptlock_alloc+0x1f/0x70 [ 1828.485194][T22473] pte_alloc_one+0x84/0x3e0 [ 1828.485216][T22473] __pte_alloc+0x6d/0x3f0 [ 1828.485241][T22473] ? __pfx___pte_alloc+0x10/0x10 [ 1828.485266][T22473] ? __lock_acquire+0x4a5/0x2630 [ 1828.485296][T22473] do_anonymous_page+0x13cc/0x1fb0 [ 1828.485326][T22473] __handle_mm_fault+0x1d42/0x2b60 [ 1828.485351][T22473] ? mt_find+0x45e/0x8e0 [ 1828.485372][T22473] ? __pfx___handle_mm_fault+0x10/0x10 [ 1828.485391][T22473] ? __pfx_mt_find+0x10/0x10 [ 1828.485431][T22473] handle_mm_fault+0x36d/0xa20 [ 1828.485458][T22473] __get_user_pages+0xf9c/0x34d0 [ 1828.485492][T22473] ? __pfx___get_user_pages+0x10/0x10 [ 1828.485516][T22473] populate_vma_page_range+0x267/0x3f0 [ 1828.485537][T22473] ? __pfx_populate_vma_page_range+0x10/0x10 [ 1828.485555][T22473] ? __pfx_find_vma_intersection+0x10/0x10 [ 1828.485583][T22473] ? __pfx_apply_vma_lock_flags+0x10/0x10 [ 1828.485609][T22473] __mm_populate+0x107/0x3a0 [ 1828.485628][T22473] ? __pfx___mm_populate+0x10/0x10 [ 1828.485648][T22473] ? up_write+0x290/0x4f0 [ 1828.485670][T22473] do_mlock+0x3f0/0x7f0 [ 1828.485694][T22473] ? __fget_files+0x21f/0x3d0 [ 1828.485712][T22473] ? __pfx_do_mlock+0x10/0x10 [ 1828.485736][T22473] ? fput+0x79/0x100 [ 1828.485755][T22473] ? ksys_write+0x1ac/0x250 [ 1828.485779][T22473] ? __pfx_ksys_write+0x10/0x10 [ 1828.485810][T22473] __x64_sys_mlock+0x59/0x80 [ 1828.485833][T22473] do_syscall_64+0x106/0xf80 [ 1828.485850][T22473] ? clear_bhb_loop+0x40/0x90 [ 1828.485872][T22473] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1828.485890][T22473] RIP: 0033:0x7f285899c799 [ 1828.485905][T22473] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1828.485921][T22473] RSP: 002b:00007f2859907028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 1828.485939][T22473] RAX: ffffffffffffffda RBX: 00007f2858c15fa0 RCX: 00007f285899c799 [ 1828.485950][T22473] RDX: 0000000000000000 RSI: 0000000000400000 RDI: 0000200000bff000 [ 1828.485961][T22473] RBP: 00007f2859907090 R08: 0000000000000000 R09: 0000000000000000 [ 1828.485972][T22473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1828.485982][T22473] R13: 00007f2858c16038 R14: 00007f2858c15fa0 R15: 00007fff2fde0408 [ 1828.486006][T22473] [ 1828.914727][ T30] audit: type=1400 audit(1772269570.410:1409): avc: denied { read } for pid=22472 comm="syz.2.3812" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 1828.937457][ T30] audit: type=1400 audit(1772269570.420:1410): avc: denied { read } for pid=22466 comm="syz.3.3808" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 1829.331431][ T30] audit: type=1400 audit(1772269570.430:1411): avc: denied { read write } for pid=22466 comm="syz.3.3808" name="card0" dev="devtmpfs" ino=627 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=0 [ 1829.420557][T22483] 8021q: adding VLAN 0 to HW filter on device .` [ 1829.452472][ T30] audit: type=1400 audit(1772269570.430:1412): avc: denied { read write } for pid=22466 comm="syz.3.3808" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 1829.540287][ T30] audit: type=1400 audit(1772269570.430:1413): avc: denied { read } for pid=22466 comm="syz.3.3808" dev="nsfs" ino=4026533152 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1829.581281][ T30] audit: type=1400 audit(1772269570.490:1414): avc: denied { read write } for pid=5801 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1829.767142][T22483] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1829.890925][T22499] FAULT_INJECTION: forcing a failure. [ 1829.890925][T22499] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1829.950170][T22499] CPU: 1 UID: 0 PID: 22499 Comm: syz.4.3819 Tainted: G L syzkaller #0 PREEMPT(full) [ 1829.950197][T22499] Tainted: [L]=SOFTLOCKUP [ 1829.950203][T22499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1829.950213][T22499] Call Trace: [ 1829.950225][T22499] [ 1829.950232][T22499] dump_stack_lvl+0x100/0x190 [ 1829.950264][T22499] should_fail_ex.cold+0x5/0xa [ 1829.950286][T22499] _copy_from_user+0x2e/0xd0 [ 1829.950310][T22499] snd_rawmidi_kernel_write1+0x390/0x7c0 [ 1829.950346][T22499] snd_rawmidi_write+0x2dc/0xc60 [ 1829.950378][T22499] ? __pfx_snd_rawmidi_write+0x10/0x10 [ 1829.950402][T22499] ? avc_policy_seqno+0x9/0x20 [ 1829.950424][T22499] ? selinux_file_permission+0x8f/0x6d0 [ 1829.950446][T22499] ? bpf_lsm_file_permission+0x9/0x10 [ 1829.950470][T22499] ? security_file_permission+0x76/0x210 [ 1829.950490][T22499] ? rw_verify_area+0xce/0x6d0 [ 1829.950515][T22499] ? __pfx_snd_rawmidi_write+0x10/0x10 [ 1829.950538][T22499] vfs_writev+0x5ea/0xe10 [ 1829.950566][T22499] ? __pfx_vfs_writev+0x10/0x10 [ 1829.950583][T22499] ? find_held_lock+0x2b/0x80 [ 1829.950605][T22499] ? __fget_files+0x21f/0x3d0 [ 1829.950619][T22499] ? do_writev+0x28a/0x340 [ 1829.950634][T22499] do_writev+0x28a/0x340 [ 1829.950649][T22499] ? __pfx_do_writev+0x10/0x10 [ 1829.950667][T22499] do_syscall_64+0x106/0xf80 [ 1829.950679][T22499] ? clear_bhb_loop+0x40/0x90 [ 1829.950693][T22499] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1829.950705][T22499] RIP: 0033:0x7fbc3799c799 [ 1829.950714][T22499] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1829.950725][T22499] RSP: 002b:00007fbc3889c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 1829.950736][T22499] RAX: ffffffffffffffda RBX: 00007fbc37c15fa0 RCX: 00007fbc3799c799 [ 1829.950743][T22499] RDX: 0000000000000002 RSI: 00002000000001c0 RDI: 0000000000000003 [ 1829.950750][T22499] RBP: 00007fbc3889c090 R08: 0000000000000000 R09: 0000000000000000 [ 1829.950756][T22499] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1829.950763][T22499] R13: 00007fbc37c16038 R14: 00007fbc37c15fa0 R15: 00007ffcdff1ba28 [ 1829.950776][T22499] [ 1830.502158][T22505] FAULT_INJECTION: forcing a failure. [ 1830.502158][T22505] name failslab, interval 1, probability 0, space 0, times 0 [ 1830.515660][T22505] CPU: 0 UID: 0 PID: 22505 Comm: syz.1.3821 Tainted: G L syzkaller #0 PREEMPT(full) [ 1830.515687][T22505] Tainted: [L]=SOFTLOCKUP [ 1830.515693][T22505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1830.515702][T22505] Call Trace: [ 1830.515708][T22505] [ 1830.515715][T22505] dump_stack_lvl+0x100/0x190 [ 1830.515747][T22505] should_fail_ex.cold+0x5/0xa [ 1830.515769][T22505] ? lsm_blob_alloc+0x68/0x90 [ 1830.515791][T22505] should_failslab+0xc2/0x120 [ 1830.515818][T22505] __kmalloc_noprof+0xe0/0x850 [ 1830.515840][T22505] ? trace_kmem_cache_alloc+0xf3/0x120 [ 1830.515870][T22505] lsm_blob_alloc+0x68/0x90 [ 1830.515894][T22505] security_prepare_creds+0x2d/0x290 [ 1830.515917][T22505] prepare_creds+0x5d6/0x950 [ 1830.515939][T22505] lookup_user_key+0x8e9/0x1300 [ 1830.515960][T22505] ? __pfx_lookup_user_key+0x10/0x10 [ 1830.515985][T22505] ? __pfx_lookup_user_key_possessed+0x10/0x10 [ 1830.516016][T22505] __do_sys_add_key+0x2a6/0x460 [ 1830.516042][T22505] ? __pfx___do_sys_add_key+0x10/0x10 [ 1830.516065][T22505] ? ksys_write+0x1ac/0x250 [ 1830.516098][T22505] do_syscall_64+0x106/0xf80 [ 1830.516115][T22505] ? clear_bhb_loop+0x40/0x90 [ 1830.516136][T22505] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1830.516154][T22505] RIP: 0033:0x7f198139c799 [ 1830.516169][T22505] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1830.516180][T22505] RSP: 002b:00007f1982216028 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1830.516192][T22505] RAX: ffffffffffffffda RBX: 00007f1981616090 RCX: 00007f198139c799 [ 1830.516199][T22505] RDX: 0000200000000440 RSI: 0000200000000300 RDI: 00002000000002c0 [ 1830.516206][T22505] RBP: 00007f1982216090 R08: ffffffffffffffff R09: 0000000000000000 [ 1830.516213][T22505] R10: 0000000000000048 R11: 0000000000000246 R12: 0000000000000001 [ 1830.516219][T22505] R13: 00007f1981616128 R14: 00007f1981616090 R15: 00007ffe34ad5938 [ 1830.516233][T22505] [ 1832.597895][ T30] kauditd_printk_skb: 114 callbacks suppressed [ 1832.597913][ T30] audit: type=1400 audit(1772269574.780:1529): avc: denied { read write } for pid=5805 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1832.813427][ T30] audit: type=1400 audit(1772269574.780:1530): avc: denied { read } for pid=22538 comm="syz.1.3836" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 1833.086782][ T30] audit: type=1400 audit(1772269574.790:1531): avc: denied { read write } for pid=22538 comm="syz.1.3836" name="card0" dev="devtmpfs" ino=627 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=0 [ 1833.341173][ T30] audit: type=1400 audit(1772269574.790:1532): avc: denied { read write } for pid=22538 comm="syz.1.3836" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 1833.591285][ T30] audit: type=1400 audit(1772269574.790:1533): avc: denied { read } for pid=22538 comm="syz.1.3836" dev="nsfs" ino=4026532818 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1833.659308][ T30] audit: type=1400 audit(1772269574.800:1534): avc: denied { read } for pid=22536 comm="syz.3.3835" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 1833.730771][ T30] audit: type=1400 audit(1772269574.840:1535): avc: denied { create } for pid=22536 comm="syz.3.3835" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 1833.783156][ T30] audit: type=1400 audit(1772269574.860:1536): avc: denied { read write } for pid=5806 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1833.874718][ T30] audit: type=1400 audit(1772269575.000:1537): avc: denied { prog_load } for pid=22541 comm="syz.2.3837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1833.925516][ T30] audit: type=1400 audit(1772269575.000:1538): avc: denied { execmem } for pid=22541 comm="syz.2.3837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1834.571660][T22565] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3844'. [ 1835.115569][T22575] netlink: 20 bytes leftover after parsing attributes in process `syz.0.3848'. [ 1835.864393][T22577] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=27 sclass=netlink_route_socket pid=22577 comm=syz.1.3847 [ 1837.622031][ T30] kauditd_printk_skb: 159 callbacks suppressed [ 1837.622043][ T30] audit: type=1400 audit(1772269579.830:1698): avc: denied { execmem } for pid=22612 comm="syz.2.3862" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1837.741191][ T30] audit: type=1400 audit(1772269579.850:1699): avc: denied { read write } for pid=5800 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1837.845843][ T30] audit: type=1400 audit(1772269579.860:1700): avc: denied { prog_load } for pid=22618 comm="syz.4.3864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1837.901179][ T30] audit: type=1400 audit(1772269579.860:1701): avc: denied { prog_load } for pid=22618 comm="syz.4.3864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1838.011197][ T30] audit: type=1400 audit(1772269579.870:1702): avc: denied { create } for pid=22618 comm="syz.4.3864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 1838.131249][ T30] audit: type=1400 audit(1772269579.870:1703): avc: denied { create } for pid=22618 comm="syz.4.3864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 1838.234442][ T30] audit: type=1400 audit(1772269579.920:1704): avc: denied { read write } for pid=22618 comm="syz.4.3864" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 1838.319977][ T30] audit: type=1400 audit(1772269579.920:1705): avc: denied { create } for pid=22618 comm="syz.4.3864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1838.362535][T22642] FAULT_INJECTION: forcing a failure. [ 1838.362535][T22642] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1838.411263][T22642] CPU: 0 UID: 0 PID: 22642 Comm: syz.3.3871 Tainted: G L syzkaller #0 PREEMPT(full) [ 1838.411291][T22642] Tainted: [L]=SOFTLOCKUP [ 1838.411297][T22642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1838.411307][T22642] Call Trace: [ 1838.411312][T22642] [ 1838.411319][T22642] dump_stack_lvl+0x100/0x190 [ 1838.411348][T22642] should_fail_ex.cold+0x5/0xa [ 1838.411368][T22642] _copy_to_user+0x32/0xd0 [ 1838.411390][T22642] simple_read_from_buffer+0xcb/0x170 [ 1838.411415][T22642] proc_fail_nth_read+0x1af/0x230 [ 1838.411435][T22642] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1838.411454][T22642] ? rw_verify_area+0xce/0x6d0 [ 1838.411472][T22642] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1838.411490][T22642] vfs_read+0x1e4/0xb30 [ 1838.411519][T22642] ? __pfx_vfs_read+0x10/0x10 [ 1838.411538][T22642] ? __fget_files+0x215/0x3d0 [ 1838.411556][T22642] ? __fget_files+0x21f/0x3d0 [ 1838.411574][T22642] ksys_read+0x12a/0x250 [ 1838.411594][T22642] ? __pfx_ksys_read+0x10/0x10 [ 1838.411619][T22642] do_syscall_64+0x106/0xf80 [ 1838.411634][T22642] ? clear_bhb_loop+0x40/0x90 [ 1838.411652][T22642] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1838.411666][T22642] RIP: 0033:0x7f34f095cfce [ 1838.411678][T22642] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1838.411692][T22642] RSP: 002b:00007f34f187ffe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1838.411707][T22642] RAX: ffffffffffffffda RBX: 00007f34f18806c0 RCX: 00007f34f095cfce [ 1838.411716][T22642] RDX: 000000000000000f RSI: 00007f34f18800a0 RDI: 0000000000000005 [ 1838.411725][T22642] RBP: 00007f34f1880090 R08: 0000000000000000 R09: 0000000000000000 [ 1838.411733][T22642] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1838.411741][T22642] R13: 00007f34f0c16128 R14: 00007f34f0c16090 R15: 00007fff1996a068 [ 1838.411760][T22642] [ 1838.641268][ T30] audit: type=1400 audit(1772269579.920:1706): avc: denied { create } for pid=22618 comm="syz.4.3864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1838.661851][ T30] audit: type=1400 audit(1772269579.920:1707): avc: denied { read } for pid=22618 comm="syz.4.3864" dev="nsfs" ino=4026532851 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1839.776352][T22671] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=27 sclass=netlink_route_socket pid=22671 comm=syz.0.3882 [ 1839.905650][T22678] netlink: 'syz.4.3886': attribute type 27 has an invalid length. [ 1839.950854][T22678] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3886'. [ 1841.001426][T22695] FAULT_INJECTION: forcing a failure. [ 1841.001426][T22695] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1841.101495][T22695] CPU: 0 UID: 0 PID: 22695 Comm: syz.3.3890 Tainted: G L syzkaller #0 PREEMPT(full) [ 1841.101519][T22695] Tainted: [L]=SOFTLOCKUP [ 1841.101523][T22695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1841.101530][T22695] Call Trace: [ 1841.101534][T22695] [ 1841.101539][T22695] dump_stack_lvl+0x100/0x190 [ 1841.101562][T22695] should_fail_ex.cold+0x5/0xa [ 1841.101577][T22695] _copy_from_user+0x2e/0xd0 [ 1841.101593][T22695] kstrtouint_from_user+0xd6/0x1d0 [ 1841.101605][T22695] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 1841.101616][T22695] ? __lock_acquire+0x4a5/0x2630 [ 1841.101635][T22695] ? lock_acquire+0x1cf/0x380 [ 1841.101656][T22695] proc_fail_nth_write+0x83/0x220 [ 1841.101671][T22695] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1841.101690][T22695] vfs_write+0x2aa/0x1070 [ 1841.101707][T22695] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1841.101723][T22695] ? __pfx_vfs_write+0x10/0x10 [ 1841.101738][T22695] ? __fget_files+0x215/0x3d0 [ 1841.101752][T22695] ? __fget_files+0x21f/0x3d0 [ 1841.101766][T22695] ksys_write+0x12a/0x250 [ 1841.101782][T22695] ? __pfx_ksys_write+0x10/0x10 [ 1841.101803][T22695] do_syscall_64+0x106/0xf80 [ 1841.101814][T22695] ? clear_bhb_loop+0x40/0x90 [ 1841.101828][T22695] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1841.101840][T22695] RIP: 0033:0x7f34f095cfce [ 1841.101849][T22695] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1841.101860][T22695] RSP: 002b:00007f34f18a0fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1841.101871][T22695] RAX: ffffffffffffffda RBX: 00007f34f18a16c0 RCX: 00007f34f095cfce [ 1841.101878][T22695] RDX: 0000000000000001 RSI: 00007f34f18a10a0 RDI: 0000000000000003 [ 1841.101884][T22695] RBP: 00007f34f18a1090 R08: 0000000000000000 R09: 0000000000000000 [ 1841.101891][T22695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1841.101897][T22695] R13: 00007f34f0c16038 R14: 00007f34f0c15fa0 R15: 00007fff1996a068 [ 1841.101911][T22695] [ 1841.804704][T22703] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=22703 comm=syz.3.3895 [ 1841.962007][T22709] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=22709 comm=syz.3.3895 [ 1842.248962][T22703] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3895'. [ 1842.448559][T22710] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1842.667021][T22715] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3898'. [ 1842.683198][ T30] kauditd_printk_skb: 142 callbacks suppressed [ 1842.683213][ T30] audit: type=1400 audit(1772269584.890:1850): avc: denied { create } for pid=22698 comm="syz.4.3894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 1842.709406][T22710] batadv_slave_0: entered promiscuous mode [ 1842.772302][ T30] audit: type=1400 audit(1772269584.980:1851): avc: denied { map_create } for pid=22716 comm="syz.0.3899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1842.802016][T22717] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks [ 1842.875337][ T30] audit: type=1400 audit(1772269584.980:1852): avc: denied { map_create } for pid=22716 comm="syz.0.3899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1842.947371][T12764] libceph: connect (1)[c::]:6789 error -13 [ 1842.957343][T12764] libceph: mon0 (1)[c::]:6789 connect error [ 1842.973551][ T30] audit: type=1400 audit(1772269584.980:1853): avc: denied { map_create } for pid=22716 comm="syz.0.3899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1843.068550][ T30] audit: type=1400 audit(1772269584.980:1854): avc: denied { prog_load } for pid=22716 comm="syz.0.3899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1843.147320][ T30] audit: type=1400 audit(1772269585.010:1855): avc: denied { read write } for pid=5805 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1843.421672][T12764] libceph: connect (1)[c::]:6789 error -13 [ 1843.427704][T12764] libceph: mon0 (1)[c::]:6789 connect error [ 1843.463347][ T30] audit: type=1400 audit(1772269585.030:1856): avc: denied { read } for pid=22714 comm="syz.1.3898" dev="nsfs" ino=4026532818 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1843.530387][ T30] audit: type=1400 audit(1772269585.080:1857): avc: denied { read write } for pid=5801 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1843.603946][ T30] audit: type=1400 audit(1772269585.100:1858): avc: denied { create } for pid=22714 comm="syz.1.3898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1843.691218][T22722] ceph: No mds server is up or the cluster is laggy [ 1843.781332][ T30] audit: type=1400 audit(1772269585.100:1859): avc: denied { read } for pid=22714 comm="syz.1.3898" dev="nsfs" ino=4026532818 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1845.752790][T12764] libceph: connect (1)[c::]:6789 error -13 [ 1845.764178][T12764] libceph: mon0 (1)[c::]:6789 connect error [ 1846.041393][T12764] libceph: connect (1)[c::]:6789 error -13 [ 1846.047373][T12764] libceph: mon0 (1)[c::]:6789 connect error [ 1846.260462][T22781] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=22781 comm=syz.1.3918 [ 1846.621442][T20957] libceph: connect (1)[c::]:6789 error -13 [ 1846.627967][T22768] ceph: No mds server is up or the cluster is laggy [ 1846.763595][T20957] libceph: mon0 (1)[c::]:6789 connect error [ 1847.544351][ T1294] ieee802154 phy0 wpan0: encryption failed: -22 [ 1847.550735][ T1294] ieee802154 phy1 wpan1: encryption failed: -22 [ 1847.862221][ T30] kauditd_printk_skb: 124 callbacks suppressed [ 1847.862239][ T30] audit: type=1400 audit(1772269590.010:1984): avc: denied { read write } for pid=5805 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1848.141399][ T30] audit: type=1400 audit(1772269590.010:1985): avc: denied { execmem } for pid=22806 comm="syz.1.3928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1848.227545][ T30] audit: type=1400 audit(1772269590.220:1986): avc: denied { read } for pid=22810 comm="syz.2.3929" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 1848.365834][ T30] audit: type=1400 audit(1772269590.240:1987): avc: denied { create } for pid=22791 comm="syz.3.3924" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1848.441148][ T30] audit: type=1400 audit(1772269590.250:1988): avc: denied { create } for pid=22791 comm="syz.3.3924" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1848.473031][T22814] FAULT_INJECTION: forcing a failure. [ 1848.473031][T22814] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1848.500644][ T30] audit: type=1400 audit(1772269590.300:1989): avc: denied { read } for pid=22806 comm="syz.1.3928" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 1848.541426][T22818] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3930'. [ 1848.841156][T22814] CPU: 1 UID: 0 PID: 22814 Comm: syz.1.3930 Tainted: G L syzkaller #0 PREEMPT(full) [ 1848.841186][T22814] Tainted: [L]=SOFTLOCKUP [ 1848.841192][T22814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1848.841203][T22814] Call Trace: [ 1848.841209][T22814] [ 1848.841217][T22814] dump_stack_lvl+0x100/0x190 [ 1848.841250][T22814] should_fail_ex.cold+0x5/0xa [ 1848.841277][T22814] _copy_from_user+0x2e/0xd0 [ 1848.841301][T22814] kstrtouint_from_user+0xd6/0x1d0 [ 1848.841320][T22814] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 1848.841337][T22814] ? __lock_acquire+0x4a5/0x2630 [ 1848.841366][T22814] ? lock_acquire+0x1cf/0x380 [ 1848.841397][T22814] proc_fail_nth_write+0x83/0x220 [ 1848.841425][T22814] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1848.841454][T22814] vfs_write+0x2aa/0x1070 [ 1848.841481][T22814] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1848.841506][T22814] ? __pfx_vfs_write+0x10/0x10 [ 1848.841528][T22814] ? __fget_files+0x215/0x3d0 [ 1848.841551][T22814] ? __fget_files+0x21f/0x3d0 [ 1848.841575][T22814] ksys_write+0x12a/0x250 [ 1848.841599][T22814] ? __pfx_ksys_write+0x10/0x10 [ 1848.841632][T22814] do_syscall_64+0x106/0xf80 [ 1848.841649][T22814] ? clear_bhb_loop+0x40/0x90 [ 1848.841670][T22814] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1848.841688][T22814] RIP: 0033:0x7f198135cfce [ 1848.841703][T22814] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1848.841718][T22814] RSP: 002b:00007f1982236fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1848.841736][T22814] RAX: ffffffffffffffda RBX: 00007f19822376c0 RCX: 00007f198135cfce [ 1848.841747][T22814] RDX: 0000000000000001 RSI: 00007f19822370a0 RDI: 0000000000000003 [ 1848.841758][T22814] RBP: 00007f1982237090 R08: 0000000000000000 R09: 0000000000000000 [ 1848.841768][T22814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1848.841778][T22814] R13: 00007f1981616038 R14: 00007f1981615fa0 R15: 00007ffe34ad5938 [ 1848.841802][T22814] [ 1849.052008][ T30] audit: type=1400 audit(1772269590.310:1990): avc: denied { read write } for pid=22806 comm="syz.1.3928" name="card0" dev="devtmpfs" ino=627 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=0 [ 1849.075501][ T30] audit: type=1400 audit(1772269590.310:1991): avc: denied { read write } for pid=22806 comm="syz.1.3928" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 1849.098938][ T30] audit: type=1400 audit(1772269590.310:1992): avc: denied { read } for pid=22806 comm="syz.1.3928" dev="nsfs" ino=4026532818 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1849.121028][ T30] audit: type=1400 audit(1772269590.390:1993): avc: denied { read write } for pid=5800 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1849.585915][T22829] netlink: 20 bytes leftover after parsing attributes in process `syz.3.3934'. [ 1849.749735][T22838] FAULT_INJECTION: forcing a failure. [ 1849.749735][T22838] name failslab, interval 1, probability 0, space 0, times 0 [ 1849.805568][T22838] CPU: 0 UID: 0 PID: 22838 Comm: syz.1.3933 Tainted: G L syzkaller #0 PREEMPT(full) [ 1849.805592][T22838] Tainted: [L]=SOFTLOCKUP [ 1849.805596][T22838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1849.805603][T22838] Call Trace: [ 1849.805607][T22838] [ 1849.805612][T22838] dump_stack_lvl+0x100/0x190 [ 1849.805633][T22838] should_fail_ex.cold+0x5/0xa [ 1849.805648][T22838] should_failslab+0xc2/0x120 [ 1849.805667][T22838] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 1849.805682][T22838] ? radix_tree_node_alloc.constprop.0+0x66/0x340 [ 1849.805703][T22838] radix_tree_node_alloc.constprop.0+0x66/0x340 [ 1849.805722][T22838] idr_get_free+0x52e/0xa00 [ 1849.805745][T22838] idr_alloc_u32+0x1ac/0x320 [ 1849.805756][T22838] ? __pfx_idr_alloc_u32+0x10/0x10 [ 1849.805768][T22838] ? tcf_idr_check_alloc+0x598/0x7a0 [ 1849.805784][T22838] ? tcf_idr_check_alloc+0x598/0x7a0 [ 1849.805801][T22838] tcf_idr_check_alloc+0x136/0x7a0 [ 1849.805816][T22838] ? find_held_lock+0x2b/0x80 [ 1849.805830][T22838] ? __pfx_tcf_idr_check_alloc+0x10/0x10 [ 1849.805847][T22838] ? __nla_parse+0x40/0x60 [ 1849.805860][T22838] tcf_nat_init+0x1e2/0x900 [ 1849.805873][T22838] ? __pfx_tcf_nat_init+0x10/0x10 [ 1849.805889][T22838] ? __asan_memcpy+0x3c/0x60 [ 1849.805905][T22838] tcf_action_init_1+0x466/0x6c0 [ 1849.805922][T22838] ? __pfx_tcf_action_init_1+0x10/0x10 [ 1849.805936][T22838] ? tc_action_load_ops+0x1f5/0x3e0 [ 1849.805959][T22838] ? __nla_parse+0x40/0x60 [ 1849.805971][T22838] tcf_action_init+0x43f/0xa60 [ 1849.805991][T22838] ? __pfx_tcf_action_init+0x10/0x10 [ 1849.806017][T22838] ? __kernel_text_address+0xd/0x30 [ 1849.806029][T22838] ? unwind_get_return_address+0x59/0xa0 [ 1849.806043][T22838] ? arch_stack_walk+0xa6/0xf0 [ 1849.806069][T22838] ? __lock_acquire+0x4a5/0x2630 [ 1849.806089][T22838] tcf_action_add+0xed/0x5c0 [ 1849.806106][T22838] ? __pfx_tcf_action_add+0x10/0x10 [ 1849.806141][T22838] ? __nla_parse+0x40/0x60 [ 1849.806159][T22838] tc_ctl_action+0x2e3/0x470 [ 1849.806175][T22838] ? __pfx_tc_ctl_action+0x10/0x10 [ 1849.806196][T22838] ? __pfx_tc_ctl_action+0x10/0x10 [ 1849.806212][T22838] rtnetlink_rcv_msg+0x3c9/0xe90 [ 1849.806225][T22838] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1849.806240][T22838] ? ref_tracker_free+0x37e/0x6c0 [ 1849.806259][T22838] netlink_rcv_skb+0x159/0x420 [ 1849.806272][T22838] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1849.806285][T22838] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 1849.806302][T22838] ? netlink_deliver_tap+0x1ae/0xcc0 [ 1849.806317][T22838] netlink_unicast+0x5aa/0x870 [ 1849.806331][T22838] ? __pfx_netlink_unicast+0x10/0x10 [ 1849.806349][T22838] netlink_sendmsg+0x8b0/0xda0 [ 1849.806365][T22838] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1849.806377][T22838] ? __might_fault+0xa0/0x140 [ 1849.806396][T22838] ____sys_sendmsg+0xa54/0xc30 [ 1849.806413][T22838] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1849.806434][T22838] ___sys_sendmsg+0x190/0x1e0 [ 1849.806449][T22838] ? __pfx____sys_sendmsg+0x10/0x10 [ 1849.806480][T22838] __sys_sendmsg+0x170/0x220 [ 1849.806491][T22838] ? __pfx___sys_sendmsg+0x10/0x10 [ 1849.806511][T22838] do_syscall_64+0x106/0xf80 [ 1849.806522][T22838] ? clear_bhb_loop+0x40/0x90 [ 1849.806536][T22838] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1849.806547][T22838] RIP: 0033:0x7f198139c799 [ 1849.806557][T22838] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1849.806567][T22838] RSP: 002b:00007f1982237028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1849.806579][T22838] RAX: ffffffffffffffda RBX: 00007f1981615fa0 RCX: 00007f198139c799 [ 1849.806586][T22838] RDX: 0000000000000000 RSI: 00002000000002c0 RDI: 0000000000000003 [ 1849.806592][T22838] RBP: 00007f1982237090 R08: 0000000000000000 R09: 0000000000000000 [ 1849.806599][T22838] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1849.806605][T22838] R13: 00007f1981616038 R14: 00007f1981615fa0 R15: 00007ffe34ad5938 [ 1849.806627][T22838] [ 1850.463919][T22845] FAULT_INJECTION: forcing a failure. [ 1850.463919][T22845] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1850.501841][T22845] CPU: 1 UID: 0 PID: 22845 Comm: syz.0.3939 Tainted: G L syzkaller #0 PREEMPT(full) [ 1850.501868][T22845] Tainted: [L]=SOFTLOCKUP [ 1850.501873][T22845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1850.501880][T22845] Call Trace: [ 1850.501884][T22845] [ 1850.501888][T22845] dump_stack_lvl+0x100/0x190 [ 1850.501911][T22845] should_fail_ex.cold+0x5/0xa [ 1850.501926][T22845] _copy_from_user+0x2e/0xd0 [ 1850.501942][T22845] kstrtouint_from_user+0xd6/0x1d0 [ 1850.501954][T22845] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 1850.501965][T22845] ? __lock_acquire+0x4a5/0x2630 [ 1850.501985][T22845] ? lock_acquire+0x1cf/0x380 [ 1850.502006][T22845] proc_fail_nth_write+0x83/0x220 [ 1850.502021][T22845] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1850.502040][T22845] vfs_write+0x2aa/0x1070 [ 1850.502057][T22845] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1850.502073][T22845] ? __pfx_vfs_write+0x10/0x10 [ 1850.502088][T22845] ? __fget_files+0x215/0x3d0 [ 1850.502102][T22845] ? __fget_files+0x21f/0x3d0 [ 1850.502118][T22845] ksys_write+0x12a/0x250 [ 1850.502135][T22845] ? __pfx_ksys_write+0x10/0x10 [ 1850.502156][T22845] do_syscall_64+0x106/0xf80 [ 1850.502167][T22845] ? clear_bhb_loop+0x40/0x90 [ 1850.502181][T22845] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1850.502193][T22845] RIP: 0033:0x7f4b0a15cfce [ 1850.502202][T22845] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1850.502213][T22845] RSP: 002b:00007f4b0afcffe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1850.502224][T22845] RAX: ffffffffffffffda RBX: 00007f4b0afd06c0 RCX: 00007f4b0a15cfce [ 1850.502232][T22845] RDX: 0000000000000001 RSI: 00007f4b0afd00a0 RDI: 0000000000000004 [ 1850.502238][T22845] RBP: 00007f4b0afd0090 R08: 0000000000000000 R09: 0000000000000000 [ 1850.502245][T22845] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1850.502251][T22845] R13: 00007f4b0a416038 R14: 00007f4b0a415fa0 R15: 00007ffd002e39a8 [ 1850.502266][T22845] [ 1850.734984][T22846] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=27 sclass=netlink_route_socket pid=22846 comm=syz.4.3940 [ 1850.994502][T22867] xt_addrtype: input interface limitation not valid in POSTROUTING and OUTPUT [ 1851.585695][T22876] FAULT_INJECTION: forcing a failure. [ 1851.585695][T22876] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1851.629234][T22876] CPU: 0 UID: 0 PID: 22876 Comm: syz.2.3951 Tainted: G L syzkaller #0 PREEMPT(full) [ 1851.629261][T22876] Tainted: [L]=SOFTLOCKUP [ 1851.629268][T22876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1851.629278][T22876] Call Trace: [ 1851.629284][T22876] [ 1851.629290][T22876] dump_stack_lvl+0x100/0x190 [ 1851.629322][T22876] should_fail_ex.cold+0x5/0xa [ 1851.629343][T22876] _copy_from_user+0x2e/0xd0 [ 1851.629367][T22876] kstrtouint_from_user+0xd6/0x1d0 [ 1851.629385][T22876] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 1851.629400][T22876] ? __lock_acquire+0x4a5/0x2630 [ 1851.629429][T22876] ? lock_acquire+0x1cf/0x380 [ 1851.629460][T22876] proc_fail_nth_write+0x83/0x220 [ 1851.629482][T22876] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1851.629510][T22876] vfs_write+0x2aa/0x1070 [ 1851.629535][T22876] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1851.629558][T22876] ? __pfx_vfs_write+0x10/0x10 [ 1851.629581][T22876] ? __fget_files+0x215/0x3d0 [ 1851.629602][T22876] ? __fget_files+0x21f/0x3d0 [ 1851.629624][T22876] ksys_write+0x12a/0x250 [ 1851.629647][T22876] ? __pfx_ksys_write+0x10/0x10 [ 1851.629677][T22876] do_syscall_64+0x106/0xf80 [ 1851.629693][T22876] ? clear_bhb_loop+0x40/0x90 [ 1851.629714][T22876] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1851.629730][T22876] RIP: 0033:0x7f285895cfce [ 1851.629744][T22876] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1851.629760][T22876] RSP: 002b:00007f2859906fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1851.629777][T22876] RAX: ffffffffffffffda RBX: 00007f28599076c0 RCX: 00007f285895cfce [ 1851.629788][T22876] RDX: 0000000000000001 RSI: 00007f28599070a0 RDI: 0000000000000004 [ 1851.629797][T22876] RBP: 00007f2859907090 R08: 0000000000000000 R09: 0000000000000000 [ 1851.629807][T22876] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1851.629817][T22876] R13: 00007f2858c16038 R14: 00007f2858c15fa0 R15: 00007fff2fde0408 [ 1851.629840][T22876] [ 1852.518906][T22890] netlink: 36 bytes leftover after parsing attributes in process `syz.1.3955'. [ 1852.528373][T22890] netlink: 36 bytes leftover after parsing attributes in process `syz.1.3955'. [ 1852.989692][ T30] kauditd_printk_skb: 129 callbacks suppressed [ 1852.989708][ T30] audit: type=1400 audit(1772269595.190:2123): avc: denied { read write } for pid=5805 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1853.026287][ T30] audit: type=1400 audit(1772269595.230:2124): avc: denied { execmem } for pid=22896 comm="syz.2.3958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1853.046810][ T30] audit: type=1400 audit(1772269595.250:2125): avc: denied { read } for pid=22896 comm="syz.2.3958" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 1853.070140][ T30] audit: type=1400 audit(1772269595.250:2126): avc: denied { create } for pid=22896 comm="syz.2.3958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 1853.111248][ T30] audit: type=1400 audit(1772269595.300:2127): avc: denied { allowed } for pid=22896 comm="syz.2.3958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 1853.151427][ T30] audit: type=1400 audit(1772269595.300:2128): avc: denied { create } for pid=22896 comm="syz.2.3958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1853.172406][ T30] audit: type=1400 audit(1772269595.300:2129): avc: denied { create } for pid=22896 comm="syz.2.3958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1853.193518][ T30] audit: type=1400 audit(1772269595.300:2130): avc: denied { create } for pid=22896 comm="syz.2.3958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1853.213872][ T30] audit: type=1400 audit(1772269595.300:2131): avc: denied { allowed } for pid=22896 comm="syz.2.3958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 1853.234575][ T30] audit: type=1400 audit(1772269595.310:2132): avc: denied { read write } for pid=5805 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1853.316955][T22908] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3963'. [ 1853.394441][T22910] FAULT_INJECTION: forcing a failure. [ 1853.394441][T22910] name failslab, interval 1, probability 0, space 0, times 0 [ 1853.418179][T22910] CPU: 0 UID: 0 PID: 22910 Comm: syz.2.3965 Tainted: G L syzkaller #0 PREEMPT(full) [ 1853.418206][T22910] Tainted: [L]=SOFTLOCKUP [ 1853.418211][T22910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1853.418222][T22910] Call Trace: [ 1853.418228][T22910] [ 1853.418234][T22910] dump_stack_lvl+0x100/0x190 [ 1853.418266][T22910] should_fail_ex.cold+0x5/0xa [ 1853.418288][T22910] ? security_inode_init_security+0x113/0x370 [ 1853.418309][T22910] should_failslab+0xc2/0x120 [ 1853.418332][T22910] __kmalloc_noprof+0xe0/0x850 [ 1853.418356][T22910] security_inode_init_security+0x113/0x370 [ 1853.418385][T22910] ? __pfx_shmem_initxattrs+0x10/0x10 [ 1853.418401][T22910] ? __pfx_security_inode_init_security+0x10/0x10 [ 1853.418424][T22910] ? may_create+0x285/0x440 [ 1853.418445][T22910] shmem_mknod+0x2bf/0x470 [ 1853.418466][T22910] ? __pfx_shmem_mknod+0x10/0x10 [ 1853.418492][T22910] vfs_create+0x301/0x6c0 [ 1853.418518][T22910] filename_mknodat+0x2de/0x7f0 [ 1853.418541][T22910] ? __pfx_filename_mknodat+0x10/0x10 [ 1853.418560][T22910] ? strncpy_from_user+0x19d/0x2d0 [ 1853.418585][T22910] ? do_getname+0x191/0x390 [ 1853.418608][T22910] __x64_sys_mknodat+0xb5/0xf0 [ 1853.418626][T22910] do_syscall_64+0x106/0xf80 [ 1853.418644][T22910] ? clear_bhb_loop+0x40/0x90 [ 1853.418664][T22910] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1853.418677][T22910] RIP: 0033:0x7f285899c799 [ 1853.418687][T22910] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1853.418699][T22910] RSP: 002b:00007f2859907028 EFLAGS: 00000246 ORIG_RAX: 0000000000000103 [ 1853.418710][T22910] RAX: ffffffffffffffda RBX: 00007f2858c15fa0 RCX: 00007f285899c799 [ 1853.418717][T22910] RDX: 0000000000000000 RSI: 00002000000003c0 RDI: 0000000000000003 [ 1853.418723][T22910] RBP: 00007f2859907090 R08: 0000000000000000 R09: 0000000000000000 [ 1853.418730][T22910] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1853.418736][T22910] R13: 00007f2858c16038 R14: 00007f2858c15fa0 R15: 00007fff2fde0408 [ 1853.418751][T22910] [ 1853.762495][T22927] netlink: 44 bytes leftover after parsing attributes in process `syz.0.3970'. [ 1854.005920][T22943] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3976'. [ 1854.943599][T22956] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3981'. [ 1855.005027][T22956] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3981'. [ 1855.036189][T22956] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3981'. [ 1855.047036][T22956] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3981'. [ 1855.198145][T22969] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3985'. [ 1855.386061][T22976] netlink: 'syz.3.3987': attribute type 5 has an invalid length. [ 1855.591858][T12764] libceph: connect (1)[c::]:6789 error -13 [ 1855.599397][T12764] libceph: mon0 (1)[c::]:6789 connect error [ 1855.723499][T22987] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1855.767333][T22987] netlink: 'syz.3.3990': attribute type 21 has an invalid length. [ 1855.881466][T12764] libceph: connect (1)[c::]:6789 error -13 [ 1855.889571][T12764] libceph: mon0 (1)[c::]:6789 connect error [ 1856.081789][T22993] TCP: tcp_parse_options: Illegal window scaling value 150 > 14 received [ 1856.346496][T22981] ceph: No mds server is up or the cluster is laggy [ 1856.619468][T22999] FAULT_INJECTION: forcing a failure. [ 1856.619468][T22999] name failslab, interval 1, probability 0, space 0, times 0 [ 1856.767785][T22999] CPU: 0 UID: 0 PID: 22999 Comm: syz.4.3994 Tainted: G L syzkaller #0 PREEMPT(full) [ 1856.767815][T22999] Tainted: [L]=SOFTLOCKUP [ 1856.767822][T22999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1856.767832][T22999] Call Trace: [ 1856.767838][T22999] [ 1856.767845][T22999] dump_stack_lvl+0x100/0x190 [ 1856.767878][T22999] should_fail_ex.cold+0x5/0xa [ 1856.767900][T22999] ? tomoyo_realpath_from_path+0xb6/0x690 [ 1856.767920][T22999] should_failslab+0xc2/0x120 [ 1856.767948][T22999] __kmalloc_noprof+0xe0/0x850 [ 1856.767977][T22999] tomoyo_realpath_from_path+0xb6/0x690 [ 1856.768004][T22999] tomoyo_path2_perm+0x366/0x700 [ 1856.768023][T22999] ? __pfx_tomoyo_path2_perm+0x10/0x10 [ 1856.768066][T22999] ? d_add+0x45e/0x850 [ 1856.768087][T22999] ? do_raw_spin_lock+0x128/0x260 [ 1856.768113][T22999] tomoyo_path_rename+0xfc/0x1a0 [ 1856.768135][T22999] ? __pfx_tomoyo_path_rename+0x10/0x10 [ 1856.768167][T22999] ? do_raw_spin_unlock+0x145/0x1e0 [ 1856.768192][T22999] security_path_rename+0x18e/0x3c0 [ 1856.768218][T22999] filename_renameat2+0x731/0xa60 [ 1856.768247][T22999] ? __pfx_filename_renameat2+0x10/0x10 [ 1856.768274][T22999] ? __might_fault+0xc5/0x140 [ 1856.768311][T22999] ? do_getname+0x191/0x390 [ 1856.768334][T22999] __x64_sys_rename+0x81/0xb0 [ 1856.768355][T22999] do_syscall_64+0x106/0xf80 [ 1856.768373][T22999] ? clear_bhb_loop+0x40/0x90 [ 1856.768395][T22999] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1856.768413][T22999] RIP: 0033:0x7fbc3799c799 [ 1856.768428][T22999] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1856.768445][T22999] RSP: 002b:00007fbc3889c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1856.768462][T22999] RAX: ffffffffffffffda RBX: 00007fbc37c15fa0 RCX: 00007fbc3799c799 [ 1856.768474][T22999] RDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000200000000140 [ 1856.768484][T22999] RBP: 00007fbc3889c090 R08: 0000000000000000 R09: 0000000000000000 [ 1856.768494][T22999] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1856.768504][T22999] R13: 00007fbc37c16038 R14: 00007fbc37c15fa0 R15: 00007ffcdff1ba28 [ 1856.768529][T22999] [ 1856.769959][T22999] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1858.045965][ T30] kauditd_printk_skb: 167 callbacks suppressed [ 1858.045983][ T30] audit: type=1400 audit(1772269600.140:2300): avc: denied { allowed } for pid=23006 comm="syz.0.3996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 1858.093766][ T30] audit: type=1400 audit(1772269600.140:2301): avc: denied { read } for pid=23006 comm="syz.0.3996" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 1858.181196][ T30] audit: type=1400 audit(1772269600.290:2302): avc: denied { read write } for pid=5805 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1858.223705][T23011] netlink: 'syz.1.3998': attribute type 10 has an invalid length. [ 1858.278061][ T30] audit: type=1400 audit(1772269600.340:2303): avc: denied { create } for pid=23010 comm="syz.1.3998" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1858.301553][T23011] wlan1: mtu less than device minimum [ 1858.306950][T23011] .`: (slave wlan1): Error -22 calling dev_set_mtu [ 1858.605527][ T30] audit: type=1400 audit(1772269600.340:2304): avc: denied { read write } for pid=5801 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1858.786738][ T30] audit: type=1400 audit(1772269600.360:2305): avc: denied { create } for pid=23010 comm="syz.1.3998" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1858.835458][ T30] audit: type=1400 audit(1772269600.360:2306): avc: denied { create } for pid=23010 comm="syz.1.3998" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=0 [ 1858.864861][ T30] audit: type=1400 audit(1772269600.360:2307): avc: denied { create } for pid=23010 comm="syz.1.3998" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1858.900613][ T30] audit: type=1400 audit(1772269600.360:2308): avc: denied { create } for pid=23010 comm="syz.1.3998" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1858.935310][ T30] audit: type=1400 audit(1772269600.360:2309): avc: denied { create } for pid=23010 comm="syz.1.3998" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1867.108989][ C1] sched: DL replenish lagged too much [ 1959.953833][ T1294] ieee802154 phy0 wpan0: encryption failed: -22 [ 1959.966025][ T1294] ieee802154 phy1 wpan1: encryption failed: -22 [ 1967.351059][ C0] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 1967.358032][ C0] rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P23024/1:b..l [ 1967.366432][ C0] rcu: (detected by 0, t=10503 jiffies, g=126909, q=729 ncpus=2) [ 1967.374226][ C0] task:syz.4.4003 state:R running task stack:25416 pid:23024 tgid:23023 ppid:5806 task_flags:0x400140 flags:0x00080000 [ 1967.388509][ C0] Call Trace: [ 1967.391784][ C0] [ 1967.394710][ C0] __schedule+0xfee/0x60e0 [ 1967.399149][ C0] ? unwind_get_return_address+0x59/0xa0 [ 1967.404786][ C0] ? __pfx___schedule+0x10/0x10 [ 1967.409642][ C0] ? mark_held_locks+0x40/0x70 [ 1967.414409][ C0] preempt_schedule_irq+0x50/0x90 [ 1967.419427][ C0] irqentry_exit+0x17b/0x670 [ 1967.424013][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1967.429989][ C0] RIP: 0010:write_comp_data+0x10/0x90 [ 1967.435358][ C0] Code: 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 65 8b 05 79 f8 04 12 49 89 f8 49 89 f1 49 89 d2 <65> 48 8b 3d 50 f8 04 12 a9 00 01 ff 00 74 1b f6 c4 01 74 07 a9 00 [ 1967.454957][ C0] RSP: 0018:ffffc900037eee70 EFLAGS: 00000202 [ 1967.461015][ C0] RAX: 0000000080000000 RBX: ffff88801d66c028 RCX: ffffffff82802efd [ 1967.468976][ C0] RDX: 000000000000000b RSI: 0000000000000010 RDI: 0000000000000007 [ 1967.476935][ C0] RBP: ffff88801d66c000 R08: 0000000000000007 R09: 0000000000000010 [ 1967.484896][ C0] R10: 000000000000000b R11: 0000000000000000 R12: 000000000000000b [ 1967.492857][ C0] R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000001 [ 1967.500828][ C0] ? __update_page_owner_handle+0x15d/0x550 [ 1967.506725][ C0] __update_page_owner_handle+0x15d/0x550 [ 1967.512453][ C0] __set_page_owner+0x11f/0x540 [ 1967.517303][ C0] ? __pfx___set_page_owner+0x10/0x10 [ 1967.522671][ C0] ? bad_range+0x261/0x400 [ 1967.527078][ C0] ? lockdep_hardirqs_on+0x78/0x100 [ 1967.532270][ C0] post_alloc_hook+0x153/0x170 [ 1967.537031][ C0] get_page_from_freelist+0x111d/0x3140 [ 1967.542576][ C0] ? __pfx___might_resched+0x10/0x10 [ 1967.547855][ C0] ? prepare_alloc_pages+0x16d/0x5f0 [ 1967.553144][ C0] __alloc_frozen_pages_noprof+0x27c/0x2ba0 [ 1967.559035][ C0] ? rcu_is_watching+0x12/0xc0 [ 1967.563793][ C0] ? __lock_acquire+0x4a5/0x2630 [ 1967.568735][ C0] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1967.575065][ C0] ? do_raw_spin_lock+0x128/0x260 [ 1967.580079][ C0] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 1967.585442][ C0] ? find_held_lock+0x2b/0x80 [ 1967.590120][ C0] ? __lock_acquire+0x4a5/0x2630 [ 1967.595055][ C0] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1967.600944][ C0] ? policy_nodemask+0xed/0x4f0 [ 1967.605795][ C0] alloc_pages_mpol+0x1fb/0x550 [ 1967.610648][ C0] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1967.616026][ C0] ? __folio_batch_add_and_move+0x5e5/0xc60 [ 1967.621921][ C0] folio_alloc_mpol_noprof+0x36/0x340 [ 1967.627286][ C0] shmem_alloc_folio+0x135/0x160 [ 1967.632219][ C0] shmem_alloc_and_add_folio+0x371/0xd40 [ 1967.637852][ C0] ? __pfx_shmem_alloc_and_add_folio+0x10/0x10 [ 1967.644005][ C0] ? shmem_allowable_huge_orders+0x2bd/0x400 [ 1967.649988][ C0] shmem_get_folio_gfp+0x6ab/0x1900 [ 1967.655188][ C0] ? __pfx_shmem_get_folio_gfp+0x10/0x10 [ 1967.660815][ C0] ? filemap_map_pages+0xe69/0x2020 [ 1967.666014][ C0] shmem_fault+0x1f9/0xa20 [ 1967.670425][ C0] ? __lock_acquire+0x4a5/0x2630 [ 1967.675365][ C0] ? __pfx_shmem_fault+0x10/0x10 [ 1967.680305][ C0] ? __pfx_filemap_map_pages+0x10/0x10 [ 1967.685764][ C0] __do_fault+0x10d/0x550 [ 1967.690095][ C0] do_fault+0xaf9/0x1950 [ 1967.694334][ C0] __handle_mm_fault+0x180f/0x2b60 [ 1967.699446][ C0] ? __pfx___handle_mm_fault+0x10/0x10 [ 1967.704901][ C0] ? pte_offset_map_lock+0x174/0x320 [ 1967.710185][ C0] ? find_held_lock+0x2b/0x80 [ 1967.714863][ C0] ? follow_page_pte+0x5b3/0x1400 [ 1967.719885][ C0] handle_mm_fault+0x36d/0xa20 [ 1967.724647][ C0] __get_user_pages+0xf9c/0x34d0 [ 1967.729585][ C0] ? __pfx___get_user_pages+0x10/0x10 [ 1967.734953][ C0] populate_vma_page_range+0x267/0x3f0 [ 1967.740402][ C0] ? __pfx_populate_vma_page_range+0x10/0x10 [ 1967.746373][ C0] ? __pfx_find_vma_intersection+0x10/0x10 [ 1967.752184][ C0] __mm_populate+0x107/0x3a0 [ 1967.756769][ C0] ? __pfx___mm_populate+0x10/0x10 [ 1967.761875][ C0] ? up_write+0x406/0x4f0 [ 1967.766200][ C0] vm_mmap_pgoff+0x37f/0x470 [ 1967.770787][ C0] ? __pfx_vm_mmap_pgoff+0x10/0x10 [ 1967.775891][ C0] ? do_futex+0x192/0x350 [ 1967.780211][ C0] ? __pfx_do_futex+0x10/0x10 [ 1967.784876][ C0] ? __do_sys_clone+0xd9/0x120 [ 1967.789640][ C0] ksys_mmap_pgoff+0xe1/0x650 [ 1967.794318][ C0] ? __x64_sys_futex+0x34f/0x4d0 [ 1967.799243][ C0] ? __x64_sys_futex+0x358/0x4d0 [ 1967.804171][ C0] ? __pfx_ksys_mmap_pgoff+0x10/0x10 [ 1967.809455][ C0] ? xfd_validate_state+0x129/0x190 [ 1967.814661][ C0] __x64_sys_mmap+0x125/0x190 [ 1967.819333][ C0] do_syscall_64+0x106/0xf80 [ 1967.823914][ C0] ? clear_bhb_loop+0x40/0x90 [ 1967.828590][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1967.834474][ C0] RIP: 0033:0x7fbc3799c799 [ 1967.838876][ C0] RSP: 002b:00007fbc3889c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1967.847281][ C0] RAX: ffffffffffffffda RBX: 00007fbc37c15fa0 RCX: 00007fbc3799c799 [ 1967.855241][ C0] RDX: b635773f06ebbee2 RSI: 0000000000b36000 RDI: 0000200000000000 [ 1967.863201][ C0] RBP: 00007fbc37a32bd9 R08: ffffffffffffffff R09: 0000000000000000 [ 1967.871159][ C0] R10: 0000000000008031 R11: 0000000000000246 R12: 0000000000000000 [ 1967.879120][ C0] R13: 00007fbc37c16038 R14: 00007fbc37c15fa0 R15: 00007ffcdff1ba28 [ 1967.887093][ C0] [ 1967.890103][ C0] rcu: rcu_preempt kthread starved for 7625 jiffies! g126909 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 1967.901285][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 1967.911241][ C0] rcu: RCU grace-period kthread stack dump: [ 1967.917112][ C0] task:rcu_preempt state:R running task stack:28968 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00080000 [ 1967.930589][ C0] Call Trace: [ 1967.933856][ C0] [ 1967.936779][ C0] __schedule+0xfee/0x60e0 [ 1967.941198][ C0] ? __lock_acquire+0x4a5/0x2630 [ 1967.946146][ C0] ? __pfx___schedule+0x10/0x10 [ 1967.950993][ C0] ? find_held_lock+0x2b/0x80 [ 1967.955667][ C0] ? schedule+0x2bf/0x390 [ 1967.960001][ C0] schedule+0xdd/0x390 [ 1967.964066][ C0] schedule_timeout+0x127/0x280 [ 1967.968912][ C0] ? __pfx_schedule_timeout+0x10/0x10 [ 1967.974281][ C0] ? __pfx_process_timeout+0x10/0x10 [ 1967.979561][ C0] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 1967.985373][ C0] ? prepare_to_swait_event+0xdf/0x4a0 [ 1967.990835][ C0] rcu_gp_fqs_loop+0x1a9/0x900 [ 1967.995594][ C0] ? __pfx_rcu_gp_fqs_loop+0x10/0x10 [ 1968.000878][ C0] ? __pfx_rcu_gp_init+0x10/0x10 [ 1968.005815][ C0] ? __pfx_rcu_gp_cleanup+0x10/0x10 [ 1968.011010][ C0] ? rcu_is_watching+0x12/0xc0 [ 1968.015768][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 1968.021574][ C0] rcu_gp_kthread+0x179/0x230 [ 1968.026249][ C0] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 1968.031442][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 1968.037251][ C0] ? __kthread_parkme+0x18c/0x230 [ 1968.042273][ C0] ? kthread+0x13a/0x450 [ 1968.046506][ C0] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 1968.051701][ C0] kthread+0x370/0x450 [ 1968.055762][ C0] ? __pfx_kthread+0x10/0x10 [ 1968.060342][ C0] ret_from_fork+0x754/0xd80 [ 1968.064923][ C0] ? __pfx_ret_from_fork+0x10/0x10 [ 1968.070025][ C0] ? __switch_to+0x7b4/0x1120 [ 1968.074695][ C0] ? __pfx_kthread+0x10/0x10 [ 1968.079276][ C0] ret_from_fork_asm+0x1a/0x30 [ 1968.084046][ C0] [ 1968.087052][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 1968.093359][ C0] Sending NMI from CPU 0 to CPUs 1: [ 1968.098551][ C1] NMI backtrace for cpu 1 [ 1968.098565][ C1] CPU: 1 UID: 0 PID: 17067 Comm: kworker/1:3 Tainted: G L syzkaller #0 PREEMPT(full) [ 1968.098585][ C1] Tainted: [L]=SOFTLOCKUP [ 1968.098590][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1968.098599][ C1] Workqueue: wg-kex-wg0 wg_packet_handshake_receive_worker [ 1968.098621][ C1] RIP: 0010:debug_check_no_locks_freed+0x69/0x120 [ 1968.098642][ C1] Code: 4c 8d 24 37 48 8b 43 10 48 8d 50 28 48 39 d5 73 36 4c 39 e0 73 31 e8 66 b8 0d 03 85 c0 74 0a 8b 05 ac 39 f5 0e 85 c0 74 30 9c <58> f6 c4 02 75 22 41 f7 c6 00 02 00 00 74 01 fb 5b 5d 41 5c 41 5d [ 1968.098654][ C1] RSP: 0018:ffffc90000a084b8 EFLAGS: 00000046 [ 1968.098665][ C1] RAX: ffffffff8e7e93e0 RBX: ffff88802a413060 RCX: ffff88802a413060 [ 1968.098675][ C1] RDX: ffffffff8e7e9408 RSI: 00000000000002c0 RDI: ffff8881d0694d00 [ 1968.098684][ C1] RBP: ffff8881d0694d00 R08: 0000000000000000 R09: 0000000000000000 [ 1968.098692][ C1] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8881d0694fc0 [ 1968.098701][ C1] R13: ffff88802a412480 R14: 0000000000000202 R15: 0000000000000000 [ 1968.098709][ C1] FS: 0000000000000000(0000) GS:ffff888124447000(0000) knlGS:0000000000000000 [ 1968.098724][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1968.098733][ C1] CR2: 00007fc8b19e12f0 CR3: 0000000036288000 CR4: 00000000003526f0 [ 1968.098742][ C1] Call Trace: [ 1968.098747][ C1] [ 1968.098754][ C1] ? skb_free_head+0x1c6/0x220 [ 1968.098772][ C1] kmem_cache_free+0xb5/0x6a0 [ 1968.098790][ C1] skb_free_head+0x1c6/0x220 [ 1968.098809][ C1] skb_release_data+0x79b/0x9d0 [ 1968.098822][ C1] ? dst_release+0x9a/0x330 [ 1968.098841][ C1] consume_skb+0xc4/0x110 [ 1968.098855][ C1] nft_synproxy_do_eval+0x949/0xd50 [ 1968.098873][ C1] ? __pfx_nft_synproxy_do_eval+0x10/0x10 [ 1968.098891][ C1] ? __queue_work+0x445/0x1150 [ 1968.098906][ C1] ? mark_held_locks+0x40/0x70 [ 1968.098925][ C1] ? __pfx_nft_synproxy_eval+0x10/0x10 [ 1968.098942][ C1] nft_do_chain+0x2e8/0x1930 [ 1968.098958][ C1] ? ip6t_do_table+0xbed/0x1c90 [ 1968.098976][ C1] ? __pfx_nft_do_chain+0x10/0x10 [ 1968.099006][ C1] ? __pfx_nf_nat_ipv6_fn+0x10/0x10 [ 1968.099026][ C1] nft_do_chain_inet+0xee/0x340 [ 1968.099041][ C1] ? __pfx_nft_do_chain_inet+0x10/0x10 [ 1968.099056][ C1] ? nf_nat_inet_fn+0x390/0xc10 [ 1968.099074][ C1] ? lock_acquire+0x1cf/0x380 [ 1968.099094][ C1] nf_hook_slow+0xbf/0x220 [ 1968.099109][ C1] nf_hook.constprop.0+0x2a6/0x750 [ 1968.099126][ C1] ? __pfx_ip6_input_finish+0x10/0x10 [ 1968.099143][ C1] ? __pfx_nf_hook.constprop.0+0x10/0x10 [ 1968.099161][ C1] ? __pfx_ip6_input_finish+0x10/0x10 [ 1968.099180][ C1] ip6_input+0xe0/0x2f0 [ 1968.099197][ C1] ipv6_rcv+0x261/0x610 [ 1968.099214][ C1] ? __pfx_ipv6_rcv+0x10/0x10 [ 1968.099229][ C1] __netif_receive_skb_one_core+0x12d/0x1e0 [ 1968.099248][ C1] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 1968.099267][ C1] ? lock_acquire+0x1cf/0x380 [ 1968.099285][ C1] ? process_backlog+0x32a/0x1580 [ 1968.099304][ C1] ? process_backlog+0x32a/0x1580 [ 1968.099320][ C1] __netif_receive_skb+0x1f/0x120 [ 1968.099338][ C1] process_backlog+0x37a/0x1580 [ 1968.099358][ C1] __napi_poll.constprop.0+0xaf/0x450 [ 1968.099376][ C1] net_rx_action+0xa40/0xf20 [ 1968.099396][ C1] ? __pfx_net_rx_action+0x10/0x10 [ 1968.099415][ C1] ? sched_balance_domains+0x26c/0xd20 [ 1968.099438][ C1] ? mark_held_locks+0x40/0x70 [ 1968.099457][ C1] handle_softirqs+0x1eb/0x9e0 [ 1968.099475][ C1] ? __pfx_handle_softirqs+0x10/0x10 [ 1968.099491][ C1] ? wg_socket_send_skb_to_peer+0x145/0x210 [ 1968.099509][ C1] do_softirq+0xac/0xe0 [ 1968.099523][ C1] [ 1968.099528][ C1] [ 1968.099533][ C1] __local_bh_enable_ip+0xf8/0x120 [ 1968.099548][ C1] wg_socket_send_skb_to_peer+0x145/0x210 [ 1968.099567][ C1] wg_socket_send_buffer_to_peer+0x148/0x1a0 [ 1968.099585][ C1] wg_packet_send_handshake_response+0x298/0x310 [ 1968.099609][ C1] ? wg_socket_set_peer_endpoint+0x324/0xbe0 [ 1968.099627][ C1] ? __pfx_wg_packet_send_handshake_response+0x10/0x10 [ 1968.099648][ C1] ? kfree_skbmem+0x19a/0x210 [ 1968.099665][ C1] wg_receive_handshake_packet+0x7dd/0xc20 [ 1968.099683][ C1] ? __pfx_wg_receive_handshake_packet+0x10/0x10 [ 1968.099701][ C1] ? do_raw_spin_lock+0x128/0x260 [ 1968.099717][ C1] ? __local_bh_enable_ip+0x9e/0x120 [ 1968.099734][ C1] wg_packet_handshake_receive_worker+0x15e/0x370 [ 1968.099755][ C1] process_one_work+0x9d7/0x1920 [ 1968.099772][ C1] ? __pfx_process_one_work+0x10/0x10 [ 1968.099789][ C1] ? __pfx_wg_packet_handshake_receive_worker+0x10/0x10 [ 1968.099808][ C1] worker_thread+0x5da/0xe40 [ 1968.099824][ C1] ? __pfx_worker_thread+0x10/0x10 [ 1968.099837][ C1] ? kthread+0x13a/0x450 [ 1968.099849][ C1] ? __pfx_worker_thread+0x10/0x10 [ 1968.099861][ C1] kthread+0x370/0x450 [ 1968.099873][ C1] ? __pfx_kthread+0x10/0x10 [ 1968.099886][ C1] ret_from_fork+0x754/0xd80 [ 1968.099899][ C1] ? __pfx_ret_from_fork+0x10/0x10 [ 1968.099913][ C1] ? __switch_to+0x7b4/0x1120 [ 1968.099928][ C1] ? __pfx_kthread+0x10/0x10 [ 1968.099941][ C1] ret_from_fork_asm+0x1a/0x30 [ 1968.099962][ C1] [ 1974.725661][ T1294] ieee802154 phy0 wpan0: encryption failed: -22 [ 1974.743662][ T1294] ieee802154 phy1 wpan1: encryption failed: -22