last executing test programs: 3m30.708127775s ago: executing program 0 (id=873): r0 = syz_usb_connect(0x0, 0x5a, &(0x7f00000004c0)={{0x12, 0x1, 0x141, 0x30, 0xf5, 0x69, 0x20, 0x5ac, 0x219, 0xf072, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48, 0x1, 0x0, 0x0, 0x10, 0x0, [{{0x9, 0x4, 0x55, 0x7, 0x6, 0x3, 0x49, 0x2, 0x0, [], [{{0x9, 0x5, 0xa, 0x0, 0x8, 0x2b, 0x7, 0x7}}, {{0x9, 0x5, 0x81, 0x1, 0x3ff, 0xe, 0x7, 0x1}}, {{0x9, 0x5, 0x8, 0x10, 0x200, 0x9, 0xa, 0x49}}, {{0x9, 0x5, 0x1, 0x1, 0x8, 0x9, 0x1, 0xf}}, {{0x9, 0x5, 0x82, 0x3, 0x400, 0x0, 0x33, 0x81}}, {{0x9, 0x5, 0x7, 0x301151bc8652c9db, 0x200, 0x6, 0x3, 0x80}}]}}]}}]}}, 0x0) syz_usb_control_io$uac1(r0, &(0x7f0000000140)={0x14, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000000004df5670834e29bfe8f661bf7eb9f10f373cc8705718ec007fbf7071eba357668c800fffd403f1d7f0688821b59f1e65f861306f71c8d981a3cce02e1d14b899a551e750d0c09bf1355186e125b399aa3f9"], &(0x7f0000000100)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x459}}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff002, 0x0, 0x2000000000032, 0xffffffffffffffff, 0x0) 3m29.262933419s ago: executing program 0 (id=884): syz_usb_connect$cdc_ecm(0x0, 0x79, &(0x7f00000001c0)=ANY=[@ANYBLOB="12010002020000102505a1a440f1ffff00010902670001010000000904000012020600000b2406000002f332ac000005240000000d240f010000000087000600001524120600a317a88b045e4f01a607c0ffcb7e392a072414000001000324"], 0x0) r0 = syz_usb_connect$hid(0x1, 0x36, &(0x7f0000000080)={{0x12, 0x1, 0x200, 0x0, 0x0, 0x0, 0x8, 0x2179, 0x53, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0xff, 0x1, 0x3, 0x0, 0x1, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0xb}}}}]}}]}}, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) socket$xdp(0x2c, 0x3, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000005c0)={0x24, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x22, 0xb, {[@global=@item_4={0x3, 0x1, 0x8, "7af01f6b"}, @local=@item_4={0x3, 0x2, 0x7, "9924c7d3"}, @local=@item_012={0x0, 0x2, 0x5}]}}, 0x0}, 0x0) 3m28.042528479s ago: executing program 0 (id=889): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f1, &(0x7f0000000340)={'ip6gre0\x00', &(0x7f0000000140)=@ethtool_cmd={0x0, 0x80000000, 0x0, 0x9, 0xf, 0x3, 0x3, 0xfc, 0x0, 0x1, 0x0, 0x0, 0x6, 0xff, 0x0, 0xfffffeff}}) (async) r1 = socket$netlink(0x10, 0x3, 0x0) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000440)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01002abd7000ffdbdf2501000000000000000c41"], 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$netlink(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000080)={0x6c, 0x76, 0x31f, 0x0, 0x0, "", [@nested={0xc, 0x112, 0x0, 0x1, [@nested={0x8, 0x28, 0x0, 0x1, [@nested={0x4, 0x85}]}]}, @generic="7981f2d259aee4265a92a7f97f613c08384ccaa855d725959b7da912450ed3e9e5df3ed15038ed094170b17308aef260d885de2db97828b95928854a7b83b977cc374ec859d41a2bb1e71d572e"]}, 0x6c}], 0x1}, 0x0) (async) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000040)={'batadv_slave_1\x00', {0x2, 0x4e23, @empty=0x7f000000}}) (async) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e21, @empty=0x7f000000}}) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r5, 0x1, 0x35, &(0x7f0000000040)=0x1, 0x4) 3m27.951946855s ago: executing program 0 (id=890): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x6) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='loginuid\x00') r1 = socket(0x1000000000000010, 0x80802, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/49, 0x2c000, 0x1000, 0x10, 0x1}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000080)=0x1, 0x4) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000001980)=0x100, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00', 0x0}) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000300)=0x1, 0x4) bind$xdp(r2, &(0x7f0000000100)={0x2c, 0x0, r4}, 0x10) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000540)="5500000018007fd500fe01b2a4a280930a46000000a843089100fe801100080008000c00085540002d000f009b2c136ef75afb83de448daa72540d8102d2c55327c43ab82286ef1fdd20642383656d4d2449155037", 0x55}], 0x1}, 0x20000004) pwritev(r0, 0x0, 0x0, 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r5, 0x29, 0x24, 0x0, 0x0) r6 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x842, 0x0) ioctl$PTP_SYS_OFFSET(r6, 0x43403d05, &(0x7f0000000300)={0x18}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/wake_lock', 0x202, 0x0) r8 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000014c0), 0x0, 0x0) fgetxattr(r8, 0x0, 0x0, 0x0) syz_clone3(&(0x7f0000000040)={0x206361100, &(0x7f00000002c0), 0x0, 0x0, {0x13}, 0x0, 0x0, 0x0, 0x0, 0x0, {r7}}, 0x58) 3m27.935366005s ago: executing program 0 (id=891): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448e3, 0x0) (async) ioctl$sock_bt_hci(r0, 0x400448e3, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x28) open(&(0x7f0000000300)='.\x00', 0x0, 0x0) (async) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)=0x10) rmdir(&(0x7f000001f940)='./file0\x00') bind$bt_hci(r0, &(0x7f0000000100)={0x1f, 0xffff}, 0x6) 3m27.900416118s ago: executing program 0 (id=892): r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000000)=ANY=[], 0x18) setsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, 0x0) mount(&(0x7f0000000140)=@loop={'/dev/loop', 0x0}, &(0x7f0000000100)='./cgroup\x00', &(0x7f0000000000)='erofs\x00', 0x200804, 0x0) 3m20.927917031s ago: executing program 3 (id=931): r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x109200, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffff3) (async) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x8000) (async, rerun: 32) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) (rerun: 32) ioctl$KDADDIO(r1, 0x4b34, 0x40) (async, rerun: 64) r2 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80800) (async, rerun: 64) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) (async) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x6) (async, rerun: 32) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x3000) (async, rerun: 32) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@file={0x0, './file1\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) (async, rerun: 32) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async, rerun: 32) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x4) ioctl$KVM_GET_MSRS_cpu(r8, 0xc008ae88, &(0x7f0000000040)={0x1, 0x0, [{0xc0000100, 0x0, 0x7c03}]}) (async) getsockopt$sock_linger(r2, 0x1, 0xd, 0x0, 0x0) (async) syz_open_dev$usbfs(0x0, 0x77, 0x101301) (async) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) (async) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xb) (async) r9 = syz_open_procfs$pagemap(0x0, 0x0) ioctl$PAGEMAP_SCAN(r9, 0xc0606610, 0x0) (async) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) (async) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x4, 0x13, r0, 0x0) (async) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000dc0)='\x00\x00\x03\x01\x00\x00\x00\x1f\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x02\x00g\x00\x00\x00\x80\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-\xac\x99\xb8\xd2\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc4\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b^:\x14\xeb\xd37\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0HdO\xb9\xa2\x1d\x13\x8fCha\xb3\x95wl},\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80Z\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9\x13f=\xbd\x03\xe8\xbex:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13\xba\x00|g]7\xdc\xe9=\"\xe4\x90[\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146\'Z\x83H\xabF\x18<\x86h\x01=\x03\\\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84\x1b\xdaR-\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&@\x00\x00\x00rT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\xd7c\t(\xf2\x93\x8d\\\x91\xef\xab(Jck\xdf\xa3 \x16\x9bH=\x01\x7f\x02\x1dF3\x7f\xd15\xa8\xd2\x94\xa7\xe9\xbd\xdc\x16\xe1Z\x9c\xe3\xeb9\x8f\xfdC\x0e\xd3]\xb5\xfdB\\\xd2\xfe\xf6H\x8ai}kDM\xbd\xfcJ{T{@iC\xb7x\xc5z\xfds\x85\xef\x1f\xf0t\xf5\xaf\xb21F\x01\xe0\x86\xde\x88\xb8\x8f \xfc\xcd\xba\xea\x16\xc1J\xb7\xe3\x04m\x0e\xaf\xd6\x88\xd6XX\xba\x8a\xdb\xeda\x83.H\xe3\x86\x03\t\xcb\xdc\x80\xee\x0ec\x12\x8a\x92\x11\xb6\xcc#\x10\xec\xfd\xbb\xd3\\\xc8\x88\x04,\'\x14\xbf\x84\x16\xb3\x8f,6\xc6D\xae\xa1\xf9\xe7@\xac\xaa\x104\x8b\x8eQ8\x11\xa7|\x87\xe2\xccrj%\xc4r&\r\a\xa7\xda\xf5\'V\x89\xe6\xa4\x05\xde\xf5\xaa@\xec\xe2\xf6\xb5x\xa1w\n\xda\xf2\xd67\xc6%\x0f[sF\xb6\xaeS>\xe9^\xd4\xf03\xe9.\xc4\xd5\xe0\r\xa1Q\xa8\xf2\xa2`zs\'k\xd4pV\xab&%\xf8\x8a\x80\x9d\"\xf3\xcc\xd2i\xc8\xd8\xc6\xbeD\xda\x86?\xf9\x13\xe5L`R\xe8Vq\xa3\nD\x9f\xe4M\xe6\xab\xdd!=%\x06z$\x99\';O\xfc\xf0u\x83\v\x83\a8\xfe<\x9e\xa8\xfe\xca`D\x91\x81!QT$\x05T\x85\xd6\xe9!\xb9wfL\x12\xa8\xb0\xb0\x86\xc2\xa1\xf7\x05i\xf5\xf0\r\xe7h\xdaD\xcb\xd4\x87\x84\xe5\xc7r;.\xf0\xed\x17\x83Nn\xb7\x0f!u}J)\xa1\xa1\x16\xc5`Z,\xa3\xcf\xfdy\aH\x06\x14l\x92x\xdbB=\xcc\xcdfpi\xe5\x04=HQ\xeaE-v\x02\x0eY\x8e\xbf\xec\x16\xc4G\xea\x8bS\x8e\xd5f\xdcj\xe1\x86\xf9s\x90\xe5\xf9\x89\xc0\xf3\xcd;r4j]\x9b\xdf\xf5\xe9\x82\xe1\xdb\x11\xb3\b\xa2Y\xdb\\\xc1H\xc3\xcf\xb1W\xe9(\xee\x18\xca\xda\xf5p,\x16\xbc\x17\xfe\xd8\n\xe1\xa1&=+)\xf9Vd\x11\xf6hX\xbe\x85O=\xe2\x9f~I\xa1\"\xa9\xd9\x19\xa2\\\xb8>f\xe2Jh+u\x90\x13\x94\x12\xc8X\xd7\xb4\xf1JS0FN\xa0\xda\xb6ez`\x9a\xea\xcf^\xa5\x17{\v\xe8n\xe9 \xc0/D\t\x7f\xd8\xad\xf2e\xff\x8b\x16p\x0f\xe4\x1a/\xe1\x96\xd2\xae\x94\x0e5\xb0b+\xac\x14\xaa\xb0\xb7\xa5.\x15\x8a\xca\xb5~=D-\x90\xc1\xbf\x05\xb9\xd5\x86\xeb\xd2#\xda\xc132\'\xfc!%\x94\x1f\xbfL)\xc2c\xa8\xef\x152\x8d\xef\xde\xbe\xab\xf5g\x80\x02G>\xf5\x04a-\xff\x06X+\xc1\xd3\xb1\xcdn\x15p\xdf\xd8.\x89\x95{\xb6+:`\x9c\xcf2\x01\x1d1\xf7\xe6\x7f\x1f\xf5\xb0\xb9\t2\x14\x81\x99\xb8@7y\xb4\xce\xf1]\a\x03y\xc5F\xfa\xae\xd1O\x7f7\xa7\xc1\xb2.~B\xe8@G\xd1\xd9R~\x1b\xf7\xa8\x86\xa7\xc1\b\x9ej\x01\xf4\xb7\xd2\x0e\xc2\x15S\x19\xd7\xd4\xe6\xaf!\xf8_\x8aEOp@>4\xd7\xcf\x11\xe0;\x99}QmE\xdd\xa69)Q\xb5\xb9\'\x97\x9b\xe7\xa4?Ed\x9c\x7fE\xba5\x90\xc07\x96S\x9d\xe1\x84\xfa\x1a\xd6\x9a\x15\xd1o \xc0\xd28\x01\xa7\x99\x85q\xbd\x80\x00\x00\x00\x00\x00\x00\x00H\x0f\xbbT\xd5\xb3\xf4\xcd<\x8a\x01\x19\xd0|B\f0\xf8i\xd3\x1bJke\t\x8b7Q\x1dQ&\x96H\x05\xec\x80\xf0\xab\x8f\x94{\x9d+\xefs\x1c\xfck\xf7q\x10\xf6\x16\xbc\xe7\x93\x0f\x7f\xcd\xa7b\xbe\x88\xcc\xb6^\x93\xa9P\xf3\xa3\xe4Az=\xe0+Q\x9e\xb5\x11\xb3\xc1\xa8P0+\xc9\xa1\xdbU~J$\xa4\x03\x11\x1aa~\x9du\x8f\x8d\xbcI\x85k\xa0\xae\xf6\xa0\x94r\xfb\xe3\xaa\xd4\xf0\x99\x06\xe1i\x1f\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\\\xb2/R\xedI2e5\x88(\xc0+^\xe7G\x17\x03^\xd7g\xb9n\x8c2\xb3\x12\x91\x86b\t\xd0R\x01\xda$Y\x85\x02&\x95FC\xc8\xd9') (async) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000600)='\x00\x00\x100\x00\x00\x00\x1f\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\x87\xa3\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xfc\"\xee\xc4*<.\x88\xda\xcf3=\x97\xdd\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b^:4\xeb\xd37\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Hd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xc9\x91\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\x00\x01\x00\x00\x00\x00\x00\x00\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84\x1b\xdaR-\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\x06\x00\x00\x00\xf2\xd5\b^[D~\x00\x00\x00\x00\x00\x00\x00I\x1b[\xeb\xd8\x06\xfd\xe5J\x1eJ\xb6\xce!]%UR\xbb\xa7\x96') 3m20.889397723s ago: executing program 3 (id=932): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./bus\x00', 0x1e0) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid_for_children\x00') (async) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) (async) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='smaps_rollup\x00') setreuid(0xee00, 0xee00) (async) fchdir(r0) (async) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=""/156, 0x9c) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc8) (async, rerun: 64) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080), 0x8, &(0x7f0000000200)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file0'}}]}) (rerun: 64) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000280), 0x80, 0x0) (async) rename(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000380)='./file0/file0\x00') 3m20.807289298s ago: executing program 3 (id=933): sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={0x0, 0xa0}}, 0x84) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_opts(r0, 0x29, 0x40, &(0x7f00000001c0)=ANY=[], 0xd0060) syz_clone(0x2280, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x8100000e, &(0x7f00000002c0)) 3m20.515864025s ago: executing program 3 (id=934): r0 = openat$rnullb(0xffffffffffffff9c, &(0x7f0000000080), 0x20002, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000300)=0x80000001) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000001640), r1) sendmsg$IEEE802154_START_REQ(r1, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000001800)={&(0x7f00000017c0)={0x1c, r2, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@IEEE802154_ATTR_COORD_PAN_ID={0x6, 0xa, 0x3}]}, 0x1c}}, 0x2800) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000500)=ANY=[]) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x78, r3, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0x28, 0x7, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r4}}, {0xc, 0x1, 0x0, 0x1, {0x8}}, {0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r5}}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '\xb7{'}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x6}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}]}, 0x78}, 0x1, 0x0, 0x0, 0x20001800}, 0x20000091) r6 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r6, &(0x7f0000000140)={0xa, 0x3, 0x0, @remote, 0x9}, 0x1c) mkdirat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', 0x44) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x23e9c9e, 0x0) mount$bind(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) r7 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r7, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x1) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') syz_open_procfs$namespace(0x0, 0x0) lseek(r8, 0xfffd, 0x0) sendmsg(r6, &(0x7f00000000c0)={0x0, 0x952b, &(0x7f0000000100)=[{&(0x7f0000000000)="2b10", 0xffbd}], 0x1, 0x0, 0x0, 0x2c}, 0x4) 3m20.477236347s ago: executing program 3 (id=935): r0 = syz_usb_connect$uac1(0x0, 0x96, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000000000106b1d01014000010203010902840003010000000904000000010100000a2401000000020102072405000000000c24020106020604800e0509090401000001020000090401010101020000090501090800000000072501010000000904020000010200000904020101010200000b2402016f0200018b7e8e0724010000000009058209100000000007250181"], 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x68840}, 0x20000004) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x8aba, 0x2, 0x80020007, 0x804, 0x7, 0xf, 0x8001, 0x6, 0x0, 0x200000000000006, 0xfffffffffffffffb, 0x5, 0x0, 0x102, 0x3, 0xfffffffffffffffe], 0x7ffffff, 0x141202}) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000140)=@arm64={0x6, 0xd1, 0x82, '\x00', 0x1}) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_usb_control_io$uac1(r0, &(0x7f0000001100)={0x14, 0x0, &(0x7f0000001040)={0x0, 0x3, 0x2, @string={0x2}}}, 0x0) syz_usb_control_io(r0, &(0x7f00000021c0)={0x2c, 0x0, &(0x7f00000002c0)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x44c}}, 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, &(0x7f0000000280)={0x14, &(0x7f00000000c0)={0x0, 0x7, 0x74, {0x74, 0x21, "400615777056722f42258bdc67aa88607e6bb3f430f1e4043e804821b935cb14f66fef5d71bd81ce0806da94f65b8a590d4b0cb1dc12f6bb861d5252288de02a68f1e9c80b0b8eda8ddc4246eac7b03fd563d585d2ceba8942491b1c8b8c6e81fc3f7dbfb941391a5cc9edcf498f9ff80fc4"}}, &(0x7f0000000180)={0x0, 0x3, 0x4f, @string={0x4f, 0x3, "a71173350dca97976ab4b3f2feca45c14250ab2b816d84c90a07ae2a58da6f42851ef2b4aa7be4522278437ecd43d109a11eba674186c21a5ebcbdf1415b7387b7ac6ed7827929a7176af9d234"}}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 3m20.328217785s ago: executing program 3 (id=937): r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000300)=0x20500101, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x5, @private2, 0x1}, 0x1c) 3m20.309612037s ago: executing program 32 (id=937): r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000300)=0x20500101, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x5, @private2, 0x1}, 0x1c) 3m12.741226344s ago: executing program 33 (id=892): r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000000)=ANY=[], 0x18) setsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, 0x0) mount(&(0x7f0000000140)=@loop={'/dev/loop', 0x0}, &(0x7f0000000100)='./cgroup\x00', &(0x7f0000000000)='erofs\x00', 0x200804, 0x0) 2m48.845438126s ago: executing program 4 (id=1112): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33, 0x0, 0xffffffffffffffff}, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x33}, @in=@broadcast, {}, {0x0, 0x0, 0x0, 0xfffffffffffffffd}, {}, 0x0, 0x0, 0x2}}}, 0xf8}}, 0x0) io_setup(0x800, &(0x7f0000000440)=0x0) pipe2$9p(&(0x7f0000001880)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) io_submit(r1, 0x1, &(0x7f0000000980)=[&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x8, 0x83, r2, &(0x7f0000000480)="b828b7dd577f545b", 0x8, 0xfffffffffffff40e}]) 2m48.703952994s ago: executing program 4 (id=1114): r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f00000000c0)=0x660a, 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000001000/0x4000)=nil) (async) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000001000/0x4000)=nil) prctl$PR_SET_MM(0x23, 0x9, &(0x7f0000004000/0x3000)=nil) (async) prctl$PR_SET_MM(0x23, 0x9, &(0x7f0000004000/0x3000)=nil) sendmsg$can_raw(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x1d, r3}, 0x10, &(0x7f0000000380)={&(0x7f00000002c0)=@can={{0x3, 0x0, 0x1}, 0x4, 0x2, 0x0, 0x0, "e3997e3df56fe25b"}, 0x10}, 0x1, 0x0, 0x0, 0x20000004}, 0x40) (async) sendmsg$can_raw(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x1d, r3}, 0x10, &(0x7f0000000380)={&(0x7f00000002c0)=@can={{0x3, 0x0, 0x1}, 0x4, 0x2, 0x0, 0x0, "e3997e3df56fe25b"}, 0x10}, 0x1, 0x0, 0x0, 0x20000004}, 0x40) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001c40)=ANY=[@ANYBLOB="781100001100000000020000141d0000006411e3800800228004002b80080035000000"], 0x1178}, 0x1, 0x0, 0x0, 0x1}, 0x8000) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @loopback, 0x3}, 0x1c) 2m48.701959085s ago: executing program 4 (id=1115): r0 = syz_init_net_socket$bt_hidp(0x1f, 0x3, 0x6) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f00000000c0)={r1, r0, 0x4, 0x0, 0x0, 0x3, 0xf6, 0x3, 0x6, 0xcf4, 0x1, 0x9, 'syz0\x00'}) 2m48.657293727s ago: executing program 4 (id=1116): mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000200)='.\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x2125099, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.kill\x00', 0x275a, 0x0) fcntl$lock(r0, 0x7, &(0x7f00000000c0)={0x1, 0x2, 0x6, 0x80}) mount$bind(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x100000, 0x0) syz_clone3(&(0x7f0000001000)={0x12b024000, 0x0, 0x0, 0x0, {0x2c}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$bind(&(0x7f0000000340)='./file0/../file0\x00', &(0x7f0000000280)='./file0/file0\x00', 0x0, 0xb101e, 0x0) mount$bind(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') read$FUSE(r1, &(0x7f0000000340)={0x2020}, 0x2020) syz_usb_connect(0x0, 0x5d, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000551b8920b822276080c20102030109024b0001000000000904000000020a0000052406000005241d00000d240f01000200000000000200072414003824d0062413", @ANYRES8], 0x0) 2m47.428830688s ago: executing program 4 (id=1122): r0 = socket(0x28, 0x805, 0x0) bind$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x19e) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000001440)='./file0\x00', &(0x7f0000000040)='erofs\x00', 0x8800, 0x0) listen(r0, 0x7) accept4$unix(r0, 0x0, 0x0, 0x100800) 2m47.335323003s ago: executing program 4 (id=1123): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) (async) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0xc, &(0x7f0000000300), 0x4) (async) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x0, 0x0) (async) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340), 0x80000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r2, 0xae03, 0x2) mount$bpf(0x0, &(0x7f00000023c0)='./file0\x00', 0x0, 0x958028, &(0x7f0000000080)={[{}], [{@obj_user={'obj_user', 0x3d, '\''}}, {@smackfsroot={'smackfsroot', 0x3d, 'devpts\x00'}}, {@subj_role={'subj_role', 0x3d, '(\xb7'}}, {@dont_hash}]}) 2m47.288519026s ago: executing program 34 (id=1123): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) (async) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0xc, &(0x7f0000000300), 0x4) (async) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x0, 0x0) (async) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340), 0x80000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r2, 0xae03, 0x2) mount$bpf(0x0, &(0x7f00000023c0)='./file0\x00', 0x0, 0x958028, &(0x7f0000000080)={[{}], [{@obj_user={'obj_user', 0x3d, '\''}}, {@smackfsroot={'smackfsroot', 0x3d, 'devpts\x00'}}, {@subj_role={'subj_role', 0x3d, '(\xb7'}}, {@dont_hash}]}) 2m23.511034961s ago: executing program 5 (id=1294): mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x1000, 0x0) (async) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, 0x0) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x54, r1, 0x1, 0x0, 0xfffffffc, {0x3}, [@TIPC_NLA_BEARER={0x40, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @empty}}, {0x14, 0x2, @in={0x2, 0x0, @broadcast}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) (async) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00', 0x1}], 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="14000000000000000100000001"], 0x18}, 0x0) (async) r6 = fsopen(&(0x7f0000000100)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r6, 0x6, 0x0, 0x0, 0x0) (async) r7 = fsmount(r6, 0x0, 0x5) fchdir(r7) (async) r8 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x20000, 0x0) lseek(r8, 0xffffffffffbfffff, 0x1) (async) prlimit64(0x0, 0x7, &(0x7f0000000140), 0x0) (async) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r9, &(0x7f0000001540)=[{0x0}, {&(0x7f0000001380)=""/129, 0x7ffff000}], 0x2, 0x0, 0x0, 0x0) (async) sendmmsg$unix(r5, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000200)="d8", 0x1}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001"], 0x18, 0x40000}}], 0x1, 0x4004080) (async) statx(r3, 0x0, 0x1000, 0x100, &(0x7f0000000100)) mknodat(r3, &(0x7f0000000180)='./file0\x00', 0x4, 0x1b3) (async) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@v3={0x3000000, [{0x200, 0xfffffff9}, {0x30020000, 0x9}], r2}, 0xfffffffffffffeed, 0x0) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)=ANY=[], 0x0, 0x0) 2m23.464555764s ago: executing program 5 (id=1295): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000002880)='.\x00', &(0x7f00000028c0), 0x0, &(0x7f0000000180)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}}) mount$fuse(0x0, &(0x7f0000002880)='.\x00', &(0x7f00000028c0), 0x0, &(0x7f0000000080)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0xca02}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r2, 0x8983, &(0x7f00000002c0)={0x0, 'syzkaller0\x00', {0x1}, 0xb5}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x300) 2m23.320142932s ago: executing program 5 (id=1297): r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r1, &(0x7f00000000c0)={0x1d, r2}, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000003c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a5976ac6bcd41fd8"}}, 0x48}}, 0x410) sendmsg$can_bcm(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000680)={0x1, 0x35e, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x3, 0x0, 0x0, "ee6a491530f05065"}}, 0x48}}, 0x0) r3 = dup(r0) getpeername(r3, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000140)=0x80) r4 = socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f0000000000)) prlimit64(0x0, 0x7, &(0x7f0000000180)={0x1, 0x8}, 0x0) ioctl$sock_SIOCGSKNS(r4, 0x894c, 0x0) 2m23.293738093s ago: executing program 5 (id=1299): r0 = syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x200, 0x0, 0x0, 0x0, 0x20, 0x46d, 0xc283, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x90, 0x1d, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x4, 0x1, {0x22, 0x7}}, {{{0x9, 0x5, 0x81, 0x3, 0x20, 0x19, 0x0, 0x74}}}}}]}}]}}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000200)='.\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x100000, 0x0) syz_clone3(&(0x7f0000001000)={0x12b024000, 0x0, 0x0, 0x0, {0x2c}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$bind(&(0x7f0000000340)='./file0/../file0\x00', &(0x7f0000000280)='./file0/file0\x00', 0x0, 0xb101e, 0x0) mount$bind(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2c8008, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') read$FUSE(r1, &(0x7f0000000340)={0x2020}, 0x2020) syz_usb_control_io$hid(r0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r3 = openat$selinux_policy(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r3, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f000000f000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, 0x0}], 0x1, 0x19, 0x0, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000200)={0x1, 0x0, [{0x4b564d03, 0x0, 0x1}]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r4) ptrace$setregs(0xf, r4, 0x1005, 0xfffffffffffffffe) r5 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r5, &(0x7f0000000000)={0x2, @long={0x3, 0x1, {0xaaaaaaaaaaaa0302}}}, 0x11) syz_usb_control_io(r0, &(0x7f00000000c0)={0x2c, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\b'], 0x0, 0x0, 0x0, 0x0}, 0x0) 2m21.79600804s ago: executing program 5 (id=1306): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @broadcast}, 0x10) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='cpuset\x00') read$FUSE(r1, &(0x7f0000000640)={0x2020}, 0x2020) (async) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x6) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0x201, 0x0, 0x0) (async) recvfrom$inet(r0, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x720, 0x0, 0xfffffffffffffd25) 2m21.769229001s ago: executing program 5 (id=1307): syz_usb_connect$hid(0x2, 0x36, &(0x7f0000000240)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0xb05, 0x17e0, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x40, 0x8, [{{0x9, 0x4, 0x0, 0x7, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x101, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x3ff, 0xf}}}}}]}}]}}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) pselect6(0x40, &(0x7f0000000000)={0xa, 0x80000001, 0x2, 0x10000000000006, 0x12, 0x8, 0x80000000, 0x8}, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000001c0)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f00000007c0)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001000001000000000000000000ffff00000000000000bd0000000000000000000000e4ec01000000004000000000fc00000000000000000000000000013da51fd47aa2e2f700000000000000000000000000000000000000000000000000000000000000060000000000000000050000000a004e200e8a34c38f"], 0x310) setsockopt$inet6_group_source_req(r1, 0x29, 0x2c, &(0x7f00000005c0)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = syz_clone(0x2000100, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = syz_pidfd_open(r3, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0xff0a, 0x0) ioctl$sock_bt_hci(r2, 0x400448e0, &(0x7f0000000140)="f91b925ea00b84cea9952f292bd9e855e55b189e3b5207a5de2315e112eca4cad2f87f5897c018ff6b4e4bda98476c1d47bfd497160d90b6aa87152a91fc51e239fa80739d7ffb25b17915cc8588d41d611d1bec3c3512a3125e54959e0b3463d553e6df8c35ec2d00137a5eb172f5f20b959e21498bf972a6a8ea8745f09d3af34f1b2c5a9ed5249e0c46b5c83e53e2b0c730fcfdc30e3e6d79c16983ec53822403989c81182430df032373d4f4acac72a2ff0f673909c350f93110093b3605e0e33aa8b1") 2m21.683047387s ago: executing program 35 (id=1307): syz_usb_connect$hid(0x2, 0x36, &(0x7f0000000240)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0xb05, 0x17e0, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x40, 0x8, [{{0x9, 0x4, 0x0, 0x7, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x101, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x3ff, 0xf}}}}}]}}]}}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) pselect6(0x40, &(0x7f0000000000)={0xa, 0x80000001, 0x2, 0x10000000000006, 0x12, 0x8, 0x80000000, 0x8}, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000001c0)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f00000007c0)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001000001000000000000000000ffff00000000000000bd0000000000000000000000e4ec01000000004000000000fc00000000000000000000000000013da51fd47aa2e2f700000000000000000000000000000000000000000000000000000000000000060000000000000000050000000a004e200e8a34c38f"], 0x310) setsockopt$inet6_group_source_req(r1, 0x29, 0x2c, &(0x7f00000005c0)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = syz_clone(0x2000100, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = syz_pidfd_open(r3, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0xff0a, 0x0) ioctl$sock_bt_hci(r2, 0x400448e0, &(0x7f0000000140)="f91b925ea00b84cea9952f292bd9e855e55b189e3b5207a5de2315e112eca4cad2f87f5897c018ff6b4e4bda98476c1d47bfd497160d90b6aa87152a91fc51e239fa80739d7ffb25b17915cc8588d41d611d1bec3c3512a3125e54959e0b3463d553e6df8c35ec2d00137a5eb172f5f20b959e21498bf972a6a8ea8745f09d3af34f1b2c5a9ed5249e0c46b5c83e53e2b0c730fcfdc30e3e6d79c16983ec53822403989c81182430df032373d4f4acac72a2ff0f673909c350f93110093b3605e0e33aa8b1") 42.473621964s ago: executing program 6 (id=1944): r0 = socket(0x10, 0x3, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) (async) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) (async) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x22, 0x0) (async) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) (async) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x810003, 0x0, 0x8, 0xff7ffff4}, 0x10) (async) write(r0, &(0x7f00000000c0)="240000001e005f0214fffffffffffff8070000000b0000000000000008000b000d000000", 0x24) 42.286950305s ago: executing program 2 (id=1945): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder1\x00', 0x1802, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000000, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x8, &(0x7f0000000140)=0xfffffff0, 0x4) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r1, &(0x7f00000044c0)=[{{0x0, 0x0, 0x0}, 0x80000001}], 0x1, 0x3, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, 0x0) ioctl$XFS_IOC_FD_TO_HANDLE(r0, 0xc038586a, &(0x7f0000000180)={r1, &(0x7f0000000000)='%!@)#)&(@\x00', 0x80000, &(0x7f0000000040)={@_ha_fsid={[0x2, 0x5]}, {0xffff, 0x1000, 0x1, 0x6}}, 0x7, &(0x7f0000000080), &(0x7f0000000100)}) fchmod(r2, 0x14d) 42.152186153s ago: executing program 1 (id=1946): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000580), 0x2, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x3d70000000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_CLEAR_DIRTY_LOG(r2, 0xc018aec0, &(0x7f0000000140)={0x0, 0x1c0, 0x300, 0x0}) sendto$inet6(r0, &(0x7f0000000040)="8dc70534c464c12233af173bd6628e2b65ae3ae0f3dc731bef9fb1c122c4352e80680f6e570f5538c5b94bf106df26473d93e2081efac86100cc28729e4c88eab87cb1ee8fb63ae55b14e60c7d9e4b12d5c4065a4c51a043b444a65d29085e0262301c426136f3709e858501abb04322d546f1c3af6cf3511b166ea0b3ac19f59eaec6999d1b11bd453975f5406daba2bc8458945780a1754c008f8efffe7b052c64aa6ddeabea6f", 0xa8, 0x20040884, &(0x7f0000b63fe4)={0xa, 0x4e20, 0x18115, @local, 0x9}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='task\x00') lseek(r3, 0x4, 0x4) ioctl$XFS_IOC_DIOINFO(r3, 0x800c581e, &(0x7f0000000000)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x406f413, 0x0) 42.063924498s ago: executing program 6 (id=1947): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1b96, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x7, 0x0, 0x1, {0x22, 0x7}}}}]}}]}}, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000300), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000340)={0x3, 0x0, 0x1, 0x1, 0x7fffffff}) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) syz_usb_control_io$hid(r0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x800000020000c) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000640)={0x11, 0x1}) syz_usb_control_io(r0, &(0x7f0000000000)={0x2c, &(0x7f00000000c0)=ANY=[@ANYRES32=r3, @ANYBLOB="62a100ec85cf430a94c909c2868fefb074f1b4ec8b7a340f1410a8878bb19adcabcd568c9bf29b0175341aafae00a99a7d328543ca370fcd01ebf9c3002bea1c61aea20bd91fd4a2bf8be5b17fd2c4e3e1218f22d554ce4a409129e4d23fe134c7dce08e7562db6414d12ef6a5", @ANYRESDEC=r3, @ANYRES8=r3, @ANYRES64=0x0, @ANYRES16=r3, @ANYBLOB="0fc748f9223173ca43fd800acb968935ddbabfd40443dc131147e0c11c714e43c75201e5d8a8936d73a478600f98fdfc8e34947a0b89767f3498d67ee1f4e00715dfb4a173341e8478aa26a6e9635127ddfcca3d4b889f519bb5c89fa64abbdf3af0c5b5514961d5aca8f7e69df35768362b31e5368efa6e16470bdf0cb3eed944fc58b9", @ANYRES8=0x0, @ANYRESDEC=r3], 0x0, 0x0, 0x0, 0x0}, 0x0) r4 = syz_open_dev$hiddev(&(0x7f0000000040), 0xcd3d, 0x101040) ioctl$HIDIOCGCOLLECTIONINFO(r4, 0xc0104811, &(0x7f0000000200)={0x6, 0x401, 0x4, 0x3}) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1b96, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x7, 0x0, 0x1, {0x22, 0x7}}}}]}}]}}, 0x0) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000300), 0x0) (async) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000340)={0x3, 0x0, 0x1, 0x1, 0x7fffffff}) (async) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) (async) syz_usb_control_io$hid(r0, 0x0, 0x0) (async) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x800000020000c) (async) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) (async) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000640)={0x11, 0x1}) (async) syz_usb_control_io(r0, &(0x7f0000000000)={0x2c, &(0x7f00000000c0)=ANY=[@ANYRES32=r3, @ANYBLOB="62a100ec85cf430a94c909c2868fefb074f1b4ec8b7a340f1410a8878bb19adcabcd568c9bf29b0175341aafae00a99a7d328543ca370fcd01ebf9c3002bea1c61aea20bd91fd4a2bf8be5b17fd2c4e3e1218f22d554ce4a409129e4d23fe134c7dce08e7562db6414d12ef6a5", @ANYRESDEC=r3, @ANYRES8=r3, @ANYRES64=0x0, @ANYRES16=r3, @ANYBLOB="0fc748f9223173ca43fd800acb968935ddbabfd40443dc131147e0c11c714e43c75201e5d8a8936d73a478600f98fdfc8e34947a0b89767f3498d67ee1f4e00715dfb4a173341e8478aa26a6e9635127ddfcca3d4b889f519bb5c89fa64abbdf3af0c5b5514961d5aca8f7e69df35768362b31e5368efa6e16470bdf0cb3eed944fc58b9", @ANYRES8=0x0, @ANYRESDEC=r3], 0x0, 0x0, 0x0, 0x0}, 0x0) (async) syz_open_dev$hiddev(&(0x7f0000000040), 0xcd3d, 0x101040) (async) ioctl$HIDIOCGCOLLECTIONINFO(r4, 0xc0104811, &(0x7f0000000200)={0x6, 0x401, 0x4, 0x3}) (async) 42.062851308s ago: executing program 2 (id=1948): io_setup(0x6, &(0x7f0000000000)=0x0) r1 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @multicast2}}, &(0x7f0000000080)=0x1c, 0x80400) r2 = eventfd(0x5291d6f9) io_cancel(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x1abb, r1, &(0x7f00000000c0)="d2340a2e16604354ccfcbddf0948bbef1861afab8eee0d220a94f1a757864ffde71a480a6f34ec014976d6058bba8b", 0x2f, 0x99ef, 0x0, 0x0, r2}, &(0x7f0000000140)) io_destroy(r0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_VLAN(r3, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, r4, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8800}, 0x40000c1) epoll_wait(0xffffffffffffffff, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0x8) io_destroy(r0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r5, 0x810c9365, &(0x7f0000000340)={{0x2, 0x7fffffff}, 0x100, './file0\x00'}) r6 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x80, 0x3d, 0x1d}, 0x18) ioctl$NS_GET_OWNER_UID(r2, 0xb704, &(0x7f0000000540)=0x0) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r6, &(0x7f0000000500)='./file1\x00', r7, r8, 0x400) io_destroy(r0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r5, 0x84009422, &(0x7f0000000640)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0}, {0x0, @struct}}) ioctl$BTRFS_IOC_DEV_INFO(r5, 0xd000941e, &(0x7f0000000a40)={r9, "c7358770082ee5254c1d6535102b1922"}) connect$bt_l2cap(r5, &(0x7f0000001a40)={0x1f, 0xf, @any, 0x200}, 0xe) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000008) r10 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001a80), 0xbc2) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r10, 0xc0505405, &(0x7f0000001ac0)={{0x3, 0x1, 0x6, 0x1, 0x1000}, 0x5, 0x101, 0xa5e1}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xe) r11 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x17) ioctl$KVM_SET_USER_MEMORY_REGION(r11, 0x4020ae46, &(0x7f0000001b40)={0x0, 0x1, 0x1000, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) r12 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched_retired(r12, &(0x7f0000001dc0)={&(0x7f0000001b80)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001d80)={&(0x7f0000001bc0)=@delqdisc={0x1b0, 0x25, 0x20, 0x70bd2a, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0x8, 0xffe0}, {0x10, 0xfff3}, {0xf, 0xe}}, [@q_dsmark={{0xb}, {0x1c, 0x2, [@TCA_DSMARK_DEFAULT_INDEX={0x6, 0x2, 0x3}, @TCA_DSMARK_SET_TC_INDEX={0x4}, @TCA_DSMARK_DEFAULT_INDEX={0x6, 0x2, 0x941}, @TCA_DSMARK_SET_TC_INDEX={0x4}]}}, @q_dsmark={{0xb}, {0x18, 0x2, [@TCA_DSMARK_SET_TC_INDEX={0x4}, @TCA_DSMARK_INDICES={0x6, 0x1, 0x30}, @TCA_DSMARK_DEFAULT_INDEX={0x6}]}}, @q_dsmark={{0xb}, {0x24, 0x2, [@TCA_DSMARK_INDICES={0x6, 0x1, 0x20}, @TCA_DSMARK_SET_TC_INDEX={0x4}, @TCA_DSMARK_INDICES={0x6, 0x1, 0x9}, @TCA_DSMARK_DEFAULT_INDEX={0x6, 0x2, 0x8}, @TCA_DSMARK_SET_TC_INDEX={0x4}]}}, @q_dsmark={{0xb}, {0x14, 0x2, [@TCA_DSMARK_SET_TC_INDEX={0x4}, @TCA_DSMARK_INDICES={0x6, 0x1, 0x8}, @TCA_DSMARK_SET_TC_INDEX={0x4}]}}, @q_dsmark={{0xb}, {0x30, 0x2, [@TCA_DSMARK_SET_TC_INDEX={0x4}, @TCA_DSMARK_DEFAULT_INDEX={0x6, 0x2, 0x2}, @TCA_DSMARK_SET_TC_INDEX={0x4}, @TCA_DSMARK_DEFAULT_INDEX={0x6, 0x2, 0x1}, @TCA_DSMARK_SET_TC_INDEX={0x4}, @TCA_DSMARK_DEFAULT_INDEX={0x6, 0x2, 0x407}, @TCA_DSMARK_INDICES={0x6, 0x1, 0xa}]}}, @q_dsmark={{0xb}, {0x50, 0x2, [@TCA_DSMARK_DEFAULT_INDEX={0x6, 0x2, 0xffff}, @TCA_DSMARK_INDICES={0x6, 0x1, 0x7}, @TCA_DSMARK_INDICES={0x6, 0x1, 0x2}, @TCA_DSMARK_DEFAULT_INDEX={0x6, 0x2, 0x1}, @TCA_DSMARK_INDICES={0x6, 0x1, 0x1}, @TCA_DSMARK_INDICES={0x6, 0x1, 0x34}, @TCA_DSMARK_INDICES={0x6, 0x1, 0x38}, @TCA_DSMARK_SET_TC_INDEX={0x4}, @TCA_DSMARK_DEFAULT_INDEX={0x6, 0x2, 0x1747}, @TCA_DSMARK_INDICES={0x6}]}}, @q_dsmark={{0xb}, {0x20, 0x2, [@TCA_DSMARK_INDICES={0x6, 0x1, 0x20}, @TCA_DSMARK_SET_TC_INDEX={0x4}, @TCA_DSMARK_SET_TC_INDEX={0x4}, @TCA_DSMARK_SET_TC_INDEX={0x4}, @TCA_DSMARK_INDICES={0x6, 0x1, 0x18}]}}, @q_dsmark={{0xb}, {0x20, 0x2, [@TCA_DSMARK_DEFAULT_INDEX={0x6, 0x2, 0x10}, @TCA_DSMARK_DEFAULT_INDEX={0x6, 0x2, 0x5}, @TCA_DSMARK_INDICES={0x6, 0x1, 0x1}, @TCA_DSMARK_SET_TC_INDEX={0x4}]}}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004040) r13 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x38) ioctl$KVM_CAP_DISABLE_QUIRKS(r13, 0x4068aea3, &(0x7f0000001e00)) 41.68877287s ago: executing program 2 (id=1949): r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000240)="900000001d001f4d154a817393278bff0a800500000000000000840014000100ac1414bb0542d6401051a2d708f37ac8da1a297e0099c5ac0000c5b068d0bf46d323456536016466fcb78dcaaf6c3efed4959a6215be0000766436d0c80cefd28581d158ba86c9d2896c6d3bca2d0000000b0015009e49a6560641263da4de1df32c1739d7fbee9aa241731ae9e0b390", 0x90, 0x0, 0x0, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r1, &(0x7f0000001780)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x5, 0x34, 0x0, {}, {0x77359400}, {}, 0x2, @can={{}, 0x0, 0x2, 0x0, 0x0, '\x00\x00(\x00'}}, 0x48}, 0x300}, 0x4844) sendmsg$can_bcm(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="0500000000"], 0x48}, 0x300, 0x0, 0x0, 0x80}, 0x80c0) 41.68347797s ago: executing program 1 (id=1950): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000480)={0x73622a85, 0x1100, 0x40}) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000140)='./binderfs/binder0\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x8) ioctl$KVM_CAP_XEN_HVM(r2, 0x4068aea3, &(0x7f0000000240)={0x26, 0x0, 0xaa}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000400)=[@increfs], 0x0, 0x0, 0x0}) keyctl$assume_authority(0x10, 0x0) r3 = dup3(r1, r0, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000004c0)={0x8, 0x0, &(0x7f0000000000)=[@acquire], 0x0, 0x0, 0x0}) connect$inet(r3, &(0x7f00000002c0)={0x2, 0x4e23, @empty}, 0x10) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000001c0)={0x10, 0x0, &(0x7f0000000200)=[@request_death={0x400c630e, 0x1}], 0x0, 0x0, 0x0}) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000000080)=ANY=[@ANYBLOB="09000000000000000a004e200000009e20010000000000000000000000000002010400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a004e22000100002001000000000000000000000000000206ffffff00"/272], 0x110) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f0000000040)={0x0, 0x302000, 0x1000, 0xe9, 0x7}, 0x20) 41.426292355s ago: executing program 2 (id=1951): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x1, 0x0, 0x6}, 0x10) unlinkat$binderfs_device(0xffffffffffffff9c, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000100)={0x14, 0x52, 0x101, 0x100000, 0x0, {0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x40) syz_usb_connect$uac1(0x1, 0x96, &(0x7f0000000400)=ANY=[@ANYBLOB="12010000000000086b1d0101400001020301090284000f010980090904000005010100000a2401d000f402010206240506"], &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x0, 0x0}]}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080), r0) 41.407915596s ago: executing program 1 (id=1952): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYRES16=r2, @ANYRES16=r4, @ANYBLOB="796100000001000000007e00000008000300", @ANYRES32=0x0, @ANYBLOB="5a63c05215901130438c720883c064c30c71b65c04e2ed6ae117264f9609d2f0d4564a0dd0a824188b4e"], 0x1c}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) r5 = socket(0x11, 0x2, 0x0) openat$kvm(0xffffff9c, &(0x7f0000000100), 0x0, 0x0) socket$xdp(0x2c, 0x3, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) openat$rnullb(0xffffffffffffff9c, &(0x7f0000000080), 0x20242, 0x0) r6 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040), 0x2) ioctl$UDMABUF_CREATE(r6, 0x40187542, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x8000}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r8 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r8, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="2000000052000100000000000000000002"], 0x20}}, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(r9, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000c40)={&(0x7f00000005c0)=ANY=[@ANYBLOB="030000003b9e68ecff13e81ee0b7ae1d6d9ce2c805d401290b4dcc813b8dfa8e38e66837170afcae65b0390e97a9f57cf562cf887ec330247bacf015c87ae6300e925d2c09a3355d56ddc258b506e51530c08f6b7ad68a61ec9af6f4c697372834bf6802927f6fcb6811dd35fa6a1cd6900f2d2bef6ce12670149a5806cefe644b942cfa29713e045756792a853bb9245c230a55a47e0a62acd7cdb42c7afa7d8924eb3bf50f4bafd67d297d42783a9f7f1bacda452975185a6298107a6e61793af2ff6efa82dde5a781b861a348d557abcbbdfbcfd9ac427659ddca19219a13e61fb9b0758a4e9f", @ANYRES16=r10, @ANYBLOB="01002cbd7000fedbdf251b00000008009a0002000000"], 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x40004) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, &(0x7f0000000180)={'wlan1\x00'}) sendmsg$NL80211_CMD_SET_CQM(r5, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f00000006c0)={0x14, r10, 0x400, 0x70bd27, 0x25dfdbfa, {{}, {@void, @void}}}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000400)='./binderfs/binder1\x00', 0x0, 0x0) 41.379860047s ago: executing program 7 (id=1953): mkdir(&(0x7f0000000440)='./file1\x00', 0x0) (async) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) (async) recvmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e40)}, 0xc44}], 0x4000000000001d4, 0x1820b, 0x0) (async) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000040)=0x7, 0x4) (async) r1 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x2409c8c1, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) (async) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) (rerun: 64) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000340)={0x43, 0x3, 0x5, 0x4}, 0x10) write(r2, &(0x7f0000000280)="240000001e005f0214ffffffffff08001f000000000000000800"/36, 0x24) (async) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) (async) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000140), 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file1'}}, {@workdir={'workdir', 0x3d, './bus'}}]}) (async, rerun: 64) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) (rerun: 64) r3 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, &(0x7f0000000080)) (async, rerun: 64) chdir(&(0x7f0000000400)='./file0\x00') (async, rerun: 64) r4 = ioctl$KVM_GET_STATS_FD_vm(0xffffffffffffffff, 0xaece) r5 = syz_io_uring_complete(0x0) (async) stat(&(0x7f0000000240)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000180)='./file1\x00', &(0x7f00000002c0), 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r5, @ANYBLOB=',privport,euid<', @ANYRESDEC=r6, @ANYBLOB="2c7375626a5f726f6c653d776f726064a05d2c666f776e65723e", @ANYRESDEC=r6, @ANYBLOB="2c736d61636b6673666c6f6f723d2f2e3abf2621265e2c7375626a5f757365723d2c00"]) (async) socket$inet6(0xa, 0x3, 0x8000000003c) (async) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) (async, rerun: 64) getpriority(0x0, 0xffffffffffffffff) (rerun: 64) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) (async) timer_create(0x0, &(0x7f0000000080)={0x0, 0x21, 0x800000000004}, &(0x7f0000bbdffc)=0x0) timer_settime(r7, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) (async, rerun: 32) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (rerun: 32) setsockopt$sock_int(r8, 0x1, 0xf, &(0x7f00000001c0)=0x5, 0x4) 41.207270267s ago: executing program 1 (id=1954): futex_waitv(&(0x7f0000004040)=[{0x0, &(0x7f00000001c0), 0x2}, {0x3, &(0x7f0000000140)=0x3, 0x2}], 0x2, 0x0, &(0x7f00000040c0)={0x77359400}, 0x1) r0 = syz_usb_connect$cdc_ecm(0x2, 0x56, &(0x7f0000000300)=ANY=[@ANYBLOB="12010000020000082505a5a4400000000101090244000101000000090400000302060000052406000005240000000d240f0100000000000000000009058103200000000009058202080000000009050302"], 0x0) syz_usb_control_io$cdc_ecm(r0, &(0x7f0000000140)={0x14, &(0x7f0000000380)=ANY=[@ANYBLOB="20238e0000008e3092e1322525b548d87d164b6392e677c9d2b4570ecf0a35b68ac39950a760815fc8486a71dfd83996ac820e5b65ea67f1aa2eb4457975429d48b3e4cd9052d704f3ade9697cfd2e42d52bd2e9ccb4d5c3e58f703e176147e47ed9c81a15cd24564bcbef20eac94d9a861cb690137b29d587e1147b75d800ce6fe5d9a83fe7e8402d8e96fa88e4779f8f4fe4756a2547a9fdbc340d97028ff968"], &(0x7f0000000100)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000240)={0x1c, &(0x7f0000000180)={0x20, 0x8}, &(0x7f00000001c0)={0x0, 0xa, 0x1, 0xaa}, &(0x7f0000000200)={0x0, 0x8, 0x1, 0x6}}) 41.186538869s ago: executing program 7 (id=1955): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0xa) socket$netlink(0x10, 0x3, 0xb) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x8) syz_clone(0x80001000, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 41.124866032s ago: executing program 7 (id=1956): openat$rnullb(0xffffffffffffff9c, &(0x7f0000000000), 0x400a00, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00') 41.030727158s ago: executing program 7 (id=1957): r0 = socket(0x10, 0x3, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x7, 0x7, 0x7, 0x7}]}, 0x10) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000180)={0x1, 0x1ff, 0x0, 0x8009}, 0x10) madvise(&(0x7f0000000000/0x3000)=nil, 0x7fffffffffffffff, 0x15) prctl$PR_MCE_KILL(0x21, 0x1, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x8001) syz_usb_connect$uac1(0x0, 0xac, &(0x7f0000000240)=ANY=[@ANYBLOB="12010000000000106b1d010140000102030109029a0003010000020904000000010100000a24010000000201021324060000060000000000000000020000000009240300000000020009240500070000000009240300ff010404000d24080447000625c4d39954220904010000010200000904010101010200000905010940000000000725010307000009040200000102000009040201010102000009058209ff0300008007250100001dffdb905876f93c9c4225d7954788e039a1c97b372af900117afb57671a57be4da2213505"], 0x0) mount$incfs(&(0x7f0000000000)='./cgroup\x00', &(0x7f0000000200)='./cgroup\x00', &(0x7f00000001c0), 0x1814400, 0x0) setsockopt$MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f00000001c0)={{0xa, 0x4e24, 0x3, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}, {0xa, 0x4e21, 0x8, @private0, 0x7ff}, 0xffffffffffffffff, {[0x8, 0x0, 0x4, 0x0, 0xfffffffb, 0x5, 0x5, 0x6]}}, 0x5c) 40.81713826s ago: executing program 6 (id=1958): r0 = syz_open_dev$loop(&(0x7f0000000440), 0x81, 0x2a82) r1 = openat$rnullb(0xffffffffffffff9c, &(0x7f0000000000), 0x167342, 0x0) rt_sigtimedwait(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000100)={0x77359400}, 0x8) r2 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000140), 0x82084, 0x0) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[], 0x14}, 0x1, 0x0, 0x0, 0x5a476f3fc70229da}, 0xe845) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$FS_IOC_GETFSLABEL(r3, 0x800452d2, &(0x7f0000000100)) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000200)={0xd13, 0x200, 0x4, 0xadeb, 0x7, "ea710000000000f9000000024200", 0x4000000, 0xfffffffb}) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000001280)=0xff) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000180)=0x2) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f0000000140)={r1, 0x800, {0x2a00, 0x80010000, 0x0, 0x1000000005, 0x6, 0x0, 0x12, 0x14, 0x1c, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd6447a4b4e00d96830e8312b62ce29b6efb0a0100", "2809e8dbe108598927875397bab22d0000b420a9c81f40f05f819e01177d3d458dac00000000000000000000003b00000000000000000200", "90be8b1c5512406c7f00", [0xb64b, 0x40000000000000]}}) 39.910087063s ago: executing program 2 (id=1959): r0 = syz_usb_connect$hid(0x2, 0x5b, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x18d1, 0x502b, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0xa0, 0x5, [{{0x9, 0x4, 0x0, 0x4, 0x3, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x9, 0x1, {0x22, 0x4}}, {{{0x9, 0x5, 0x81, 0x3, 0x200, 0xae, 0x0, 0x1}}}}}]}}]}}, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r2 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) r3 = gettid() rt_sigqueueinfo(r3, 0x21, &(0x7f00000002c0)={0xb, 0x4, 0xfffffffe}) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f0000000040)={0x3, 0x80000000, 0xff, 0x1d, 0xfff, 0x6}) ioctl$EVIOCGSW(r2, 0x80404531, &(0x7f00000029c0)=""/4070) capset(&(0x7f0000000100)={0x20080522}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x81, 0xfffffffb, 0x3}) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000040)=0x2) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000200)={0x24, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/13], 0x0}, 0x0) syz_open_dev$hiddev(&(0x7f00000000c0), 0xe180, 0x402080) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$PPPIOCSDEBUG(r5, 0x40047440, &(0x7f0000000240)=0x7) 39.718816384s ago: executing program 6 (id=1960): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) ftruncate(r0, 0x8008976) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x12, r0, 0x0) syz_kvm_setup_syzos_vm$x86(0xffffffffffffffff, &(0x7f00005fb000/0x400000)=nil) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = userfaultfd(0x801) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x4}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000400000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_CONTINUE(r2, 0xc020aa08, &(0x7f0000000080)={{&(0x7f0000400000/0xc00000)=nil, 0xc00000}}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200000001000010700000000e9ffffff0a0000000c0002006e6c3830323131"], 0x20}, 0x1, 0x0, 0x0, 0x4046014}, 0x400c0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_ALM_READ(r3, 0x40187014, &(0x7f0000000040)) recvmmsg(r1, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0}, 0x65}, {{0x0, 0x0, 0x0}, 0x2}, {{0x0, 0x0, &(0x7f0000001a80)=[{&(0x7f00000007c0)=""/82, 0x52}, {&(0x7f0000000840)=""/126, 0x7e}, {&(0x7f00000008c0)=""/124, 0x7c}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/120, 0x78}, {&(0x7f00000003c0)=""/145, 0x91}], 0x6}, 0x9}], 0x3, 0x12040, 0x0) 39.197306944s ago: executing program 7 (id=1961): r0 = landlock_create_ruleset(&(0x7f0000000080)={0xc0d8, 0x1, 0x3}, 0x18, 0x0) landlock_restrict_self(r0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x80080, 0x0) ioctl$TUNSETQUEUE(r1, 0x80811501, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)={0x14, 0x3, 0x1, 0x401, 0x0, 0x0, {0xa, 0x0, 0x9}}, 0x14}, 0x1, 0x0, 0x0, 0x200040c5}, 0x0) 36.705314168s ago: executing program 1 (id=1962): r0 = openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000280), 0x1, 0x0) (async) r1 = syz_open_dev$loop(&(0x7f0000000400), 0x1, 0x2) ioctl$XFS_IOC_GETPARENTS_BY_HANDLE(r1, 0xc040583f, &(0x7f0000000200)={{@_ha_fsid={[0x7, 0x7]}, {0x0, 0x8, 0x3, 0x64}}, {{[0x2, 0x8, 0xfffffffb, 0x5b98]}, 0x0, 0x2, 0x3, 0x0, &(0x7f0000000440)=[{{@align=0x8, {0x7fff, 0x94c9, 0x1000, 0x2}}, 0x8, 0x0, '/,\xd9'}, {{@align=0xb, {0x9a6f, 0x8, 0x0, 0x8}}, 0xff1, 0x0, '/dev/loop#\x00'}, {{@align=0x8, {0xe, 0x1, 0x2, 0x81}}, 0x8, 0x0, '/sys/kernel/mm/transparent_hugepage/khugepaged/scan_sleep_millisecs\x00'}, {{@_ha_fsid={[0x1ff, 0x7]}, {0x7, 0x9, 0x401, 0x10004}}, 0xf9fd, 0x0, '\xf57'}, {{@align=0x7, {0x81, 0x8, 0x6, 0x100000000}}, 0x8, 0x0, '\xa3\x048\x96\xab\xf5\xf0\xb6I\xc9}\xc5\xaccv[^\x00x{v\xb06\"R\xb9\x8d$\xf5\x8d\xcb_\x1c\x9a\xd6c\xb6K.\xaa\x02R\xaa\xa0akF|\r\xea\xccL!\xcf\xbfW\xd5\xcd\xf9\xe8Yh\x0f\xd3m\xcf\xcbV\xca\x82H\"\x83\xee\a\x88\f\xa31\xb8'}, {{@_ha_fsid={[0x80000001, 0x6f]}, {0x1, 0x6, 0x7fff, 0xfeffffff}}, 0x5, 0x0, '/sys/kernel/mm/transparent_hugepage/khugepaged/scan_sleep_millisecs\x00'}, {{@align=0x4, {0x7, 0x4, 0xffffff7c, 0xddf9}}, 0x1a, 0x0, '/sys/kernel/mm/transparent_hugepage/khugepaged/scan_sleep_millisecs\x00'}]}}) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6004, 0x1) (async) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, 0xffffffffffffffff, r3) (async) mount$fuse(0x0, &(0x7f0000002080)='./file0\x00', &(0x7f0000000000), 0x1000000, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) (async) newfstatat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2000) (async) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) pwritev2(r1, &(0x7f0000000000)=[{&(0x7f0000000d40)='0', 0x1}], 0x1, 0x2, 0x80000000, 0x12) 34.336964825s ago: executing program 6 (id=1963): openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x180) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040), 0x8, &(0x7f0000000200)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file0'}}]}) r0 = openat2$dir(0xffffff9c, &(0x7f00000000c0)='./file0/file1\x00', &(0x7f0000000140)={0x40, 0x110, 0x2}, 0x18) lsetxattr$trusted_overlay_opaque(&(0x7f0000000240)='./file0/file1\x00', &(0x7f0000000280), 0x0, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000280)=ANY=[]) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x20, 0x1a, 0x1, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x4, 0x2}]}, 0x20}}, 0x0) 33.926496679s ago: executing program 2 (id=1964): syz_usb_connect$cdc_ecm(0x2, 0x5c, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000090000202505a1a440000000010109024a000101000000090400001702020000052406000005240000000d240f01000000000600000020062407040700090581034000000000090582021000000000090503024002"], 0x0) getpid() r0 = syz_usb_connect$cdc_ecm(0x3, 0x56, &(0x7f0000000480)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x0, 0x0, 0xffffffffffff8001, 0x1, [{{0x9, 0x2, 0x44, 0x1, 0x1, 0x0, 0x10, 0x0, [{{0x9, 0x4, 0x0, 0x5d, 0x12, 0x2, 0x6, 0x0, 0x0, {{0xffffffffffffffc9}, {0x5}, {0xd, 0x24, 0xf, 0x1, 0x0, 0x22}}, {[{{0x9, 0x5, 0x81, 0x3, 0x10, 0xa, 0xff, 0x4}}], {{0x9, 0x5, 0x82, 0x2, 0x10, 0x0, 0x1}}, {{0x9, 0x5, 0x3, 0x2, 0x10, 0x6, 0x10, 0x7}}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, &(0x7f0000000080)={0x14, 0x0, &(0x7f0000000040)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) syz_usb_ep_write(r0, 0x82, 0x0, 0x0) 30.155013466s ago: executing program 7 (id=1965): r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) (async) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000440)={@multicast2, @loopback, @rand_addr=0x64010100}, 0xc) (async) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) (async) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000080)=0xe000) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000200)="f7790066baa00066b86b4266ef66ba420066b8e20066ef0f29902cbb0000c4e2b1ba8c88d9000000666666440f38826b410f7842280f07b8010000000f01d9c4033921820f47a753fd", 0x49}], 0x1, 0x43, 0x0, 0x0) (async) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000140)=@x86={0x40, 0x1, 0xb, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0xff, 0xff, 0x0, '\x00', 0x0, 0xfffffffffffffffe}) (async) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) close_range(r4, 0xffffffffffffffff, 0x0) 29.029638782s ago: executing program 1 (id=1966): clock_adjtime(0x0, &(0x7f0000000000)={0x3ff, 0x100000000000, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100, 0x0, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1000, 0x8, 0x2, 0x3, 0x0, 0x3}) (async) r0 = syz_usb_connect(0x3, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="1201000014da2108ab12a390eb1e000000010902240001b30000040904410017ff5d810009050f1f01040000000905830300b3"], 0x0) syz_usb_ep_write$ath9k_ep2(r0, 0x83, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB="bcea"]) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) (async) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x3000000, &(0x7f00000004c0)={[{@nfs_export_on}, {@redirect_dir_nofollow}]}) (async) syz_open_dev$evdev(&(0x7f0000001380), 0x3, 0x2e681) r1 = socket$nl_generic(0x10, 0x3, 0x10) select(0x40, &(0x7f0000000000)={0x5, 0x9, 0x3, 0x7, 0x6, 0x9, 0x5, 0x7}, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x2710}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x4, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x4e22, 0x0, @empty}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, 0x20000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1}}]}, 0x70}}, 0x0) (async, rerun: 64) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)={0x6c, r2, 0x1, 0x0, 0x3, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x44, @dev={0xfe, 0x80, '\x00', 0x16}, 0xff8}}, {0x20, 0x2, @in6={0xa, 0x0, 0xfffffffc, @private1, 0x3}}}}]}]}, 0x6c}}, 0x0) (rerun: 64) 22.683165159s ago: executing program 6 (id=1967): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000140)={0x73622a85, 0x1381, 0x1}) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x10000) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x1000, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in=@private=0xa010101, @in6=@loopback}, {@in=@private, 0x0, 0x32}, @in=@private=0xa010100, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup(r5) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x60001, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) write$tun(r7, &(0x7f0000000300)=ANY=[@ANYBLOB="080086dd00016c00b9fd0003a60c6eec00be00442ffffe8000000000000000000000000000aaff020000000000000000000000000001"], 0xfdef) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000100)={0x44, 0x0, &(0x7f0000000040)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x19, 0x0, 0x0, 0x0, 0x18, 0x0, &(0x7f0000000000)={0x30, 0x30, 0x30}}}], 0x0, 0x0, 0x0}) 17.881299726s ago: executing program 36 (id=1964): syz_usb_connect$cdc_ecm(0x2, 0x5c, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000090000202505a1a440000000010109024a000101000000090400001702020000052406000005240000000d240f01000000000600000020062407040700090581034000000000090582021000000000090503024002"], 0x0) getpid() r0 = syz_usb_connect$cdc_ecm(0x3, 0x56, &(0x7f0000000480)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x0, 0x0, 0xffffffffffff8001, 0x1, [{{0x9, 0x2, 0x44, 0x1, 0x1, 0x0, 0x10, 0x0, [{{0x9, 0x4, 0x0, 0x5d, 0x12, 0x2, 0x6, 0x0, 0x0, {{0xffffffffffffffc9}, {0x5}, {0xd, 0x24, 0xf, 0x1, 0x0, 0x22}}, {[{{0x9, 0x5, 0x81, 0x3, 0x10, 0xa, 0xff, 0x4}}], {{0x9, 0x5, 0x82, 0x2, 0x10, 0x0, 0x1}}, {{0x9, 0x5, 0x3, 0x2, 0x10, 0x6, 0x10, 0x7}}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, &(0x7f0000000080)={0x14, 0x0, &(0x7f0000000040)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) syz_usb_ep_write(r0, 0x82, 0x0, 0x0) 14.18308657s ago: executing program 37 (id=1965): r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) (async) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000440)={@multicast2, @loopback, @rand_addr=0x64010100}, 0xc) (async) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) (async) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000080)=0xe000) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000200)="f7790066baa00066b86b4266ef66ba420066b8e20066ef0f29902cbb0000c4e2b1ba8c88d9000000666666440f38826b410f7842280f07b8010000000f01d9c4033921820f47a753fd", 0x49}], 0x1, 0x43, 0x0, 0x0) (async) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000140)=@x86={0x40, 0x1, 0xb, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0xff, 0xff, 0x0, '\x00', 0x0, 0xfffffffffffffffe}) (async) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) close_range(r4, 0xffffffffffffffff, 0x0) 6.251759749s ago: executing program 38 (id=1966): clock_adjtime(0x0, &(0x7f0000000000)={0x3ff, 0x100000000000, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100, 0x0, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1000, 0x8, 0x2, 0x3, 0x0, 0x3}) (async) r0 = syz_usb_connect(0x3, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="1201000014da2108ab12a390eb1e000000010902240001b30000040904410017ff5d810009050f1f01040000000905830300b3"], 0x0) syz_usb_ep_write$ath9k_ep2(r0, 0x83, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB="bcea"]) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) (async) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x3000000, &(0x7f00000004c0)={[{@nfs_export_on}, {@redirect_dir_nofollow}]}) (async) syz_open_dev$evdev(&(0x7f0000001380), 0x3, 0x2e681) r1 = socket$nl_generic(0x10, 0x3, 0x10) select(0x40, &(0x7f0000000000)={0x5, 0x9, 0x3, 0x7, 0x6, 0x9, 0x5, 0x7}, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x2710}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x4, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x4e22, 0x0, @empty}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, 0x20000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1}}]}, 0x70}}, 0x0) (async, rerun: 64) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)={0x6c, r2, 0x1, 0x0, 0x3, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x44, @dev={0xfe, 0x80, '\x00', 0x16}, 0xff8}}, {0x20, 0x2, @in6={0xa, 0x0, 0xfffffffc, @private1, 0x3}}}}]}]}, 0x6c}}, 0x0) (rerun: 64) 0s ago: executing program 39 (id=1967): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000140)={0x73622a85, 0x1381, 0x1}) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x10000) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x1000, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in=@private=0xa010101, @in6=@loopback}, {@in=@private, 0x0, 0x32}, @in=@private=0xa010100, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup(r5) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x60001, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) write$tun(r7, &(0x7f0000000300)=ANY=[@ANYBLOB="080086dd00016c00b9fd0003a60c6eec00be00442ffffe8000000000000000000000000000aaff020000000000000000000000000001"], 0xfdef) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000100)={0x44, 0x0, &(0x7f0000000040)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x19, 0x0, 0x0, 0x0, 0x18, 0x0, &(0x7f0000000000)={0x30, 0x30, 0x30}}}], 0x0, 0x0, 0x0}) kernel console output (not intermixed with test programs): 6] usb 3-1: Product: syz [ 308.468862][ T66] usb 3-1: Manufacturer: syz [ 308.473823][ T66] usb 3-1: SerialNumber: syz [ 308.483148][ T6379] raw-gadget.2 gadget.2: fail, usb_ep_enable returned -22 [ 308.509253][ T355] ryos 0003:1E7D:31CE.005F: hidraw0: USB HID v0.06 Device [HID 1e7d:31ce] on usb-dummy_hcd.1-1/input0 [ 308.711488][ T6379] raw-gadget.2 gadget.2: fail, usb_ep_enable returned -22 [ 308.719617][ T6379] raw-gadget.2 gadget.2: fail, usb_ep_enable returned -22 [ 309.331018][ T6379] raw-gadget.2 gadget.2: fail, usb_ep_enable returned -22 [ 309.338587][ T6379] raw-gadget.2 gadget.2: fail, usb_ep_enable returned -22 [ 309.447832][ T45] usb 7-1: new low-speed USB device number 83 using dummy_hcd [ 309.549980][ T66] cdc_ncm 3-1:1.0: MAC-Address: 42:42:42:42:42:42 [ 309.556460][ T66] cdc_ncm 3-1:1.0: dwNtbInMaxSize=16 is too small. Using 2048 [ 309.563978][ T66] cdc_ncm 3-1:1.0: setting rx_max = 2048 [ 309.597840][ T45] usb 7-1: Invalid ep0 maxpacket: 64 [ 309.727836][ T45] usb 7-1: new low-speed USB device number 84 using dummy_hcd [ 309.768984][ T66] cdc_ncm 3-1:1.0: setting tx_max = 88 [ 309.776585][ T66] cdc_ncm 3-1:1.0 usb0: register 'cdc_ncm' at usb-dummy_hcd.2-1, CDC NCM (NO ZLP), 42:42:42:42:42:42 [ 309.798770][ T355] usb 8-1: new full-speed USB device number 49 using dummy_hcd [ 309.806927][ T66] usb 3-1: USB disconnect, device number 66 [ 309.814057][ T66] cdc_ncm 3-1:1.0 usb0: unregister 'cdc_ncm' usb-dummy_hcd.2-1, CDC NCM (NO ZLP) [ 309.888238][ T45] usb 7-1: Invalid ep0 maxpacket: 64 [ 309.894033][ T45] usb usb7-port1: attempt power cycle [ 309.959695][ T355] usb 8-1: config 0 has an invalid interface number: 34 but max is 0 [ 309.967959][ T355] usb 8-1: config 0 has no interface number 0 [ 309.974080][ T355] usb 8-1: config 0 interface 34 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 309.985156][ T355] usb 8-1: New USB device found, idVendor=046d, idProduct=c517, bcdDevice= 0.00 [ 309.994210][ T355] usb 8-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 310.003654][ T355] usb 8-1: config 0 descriptor?? [ 310.237845][ T45] usb 7-1: new low-speed USB device number 85 using dummy_hcd [ 310.258619][ T45] usb 7-1: Invalid ep0 maxpacket: 64 [ 310.387840][ T45] usb 7-1: new low-speed USB device number 86 using dummy_hcd [ 310.408298][ T748] usb 2-1: USB disconnect, device number 41 [ 310.419626][ T45] usb 7-1: Invalid ep0 maxpacket: 64 [ 310.429441][ T45] usb usb7-port1: unable to enumerate USB device [ 310.441279][ T6414] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1888'. [ 310.449652][ T355] logitech-djreceiver 0003:046D:C517.0060: hidraw0: USB HID v10.00 Device [HID 046d:c517] on usb-dummy_hcd.7-1/input34 [ 310.699944][ T66] usb 8-1: USB disconnect, device number 49 [ 310.837827][ T355] usb 3-1: new high-speed USB device number 67 using dummy_hcd [ 310.867842][ T748] usb 2-1: new high-speed USB device number 42 using dummy_hcd [ 310.987823][ T355] usb 3-1: Using ep0 maxpacket: 16 [ 310.995313][ T355] usb 3-1: unable to get BOS descriptor or descriptor too short [ 311.004475][ T355] usb 3-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 311.014612][ T355] usb 3-1: config 1 interface 0 altsetting 5 has 0 endpoint descriptors, different from the interface descriptor's value: 2 [ 311.027485][ T355] usb 3-1: config 1 interface 0 has no altsetting 0 [ 311.036863][ T355] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 311.037817][ T748] usb 2-1: Using ep0 maxpacket: 16 [ 311.045977][ T355] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 311.053289][ T748] usb 2-1: too many configurations: 247, using maximum allowed: 8 [ 311.059090][ T355] usb 3-1: Product: syz [ 311.059108][ T355] usb 3-1: Manufacturer: syz [ 311.070452][ T748] usb 2-1: unable to read config index 0 descriptor/start: -61 [ 311.071062][ T355] usb 3-1: SerialNumber: syz [ 311.075608][ T748] usb 2-1: can't read configurations, error -61 [ 311.227856][ T748] usb 2-1: new high-speed USB device number 43 using dummy_hcd [ 311.295059][ T355] usb 3-1: bad CDC descriptors [ 311.303443][ T355] usb 3-1: USB disconnect, device number 67 [ 311.387840][ T748] usb 2-1: Using ep0 maxpacket: 16 [ 311.394168][ T748] usb 2-1: too many configurations: 247, using maximum allowed: 8 [ 311.404112][ T748] usb 2-1: unable to read config index 0 descriptor/start: -61 [ 311.411725][ T748] usb 2-1: can't read configurations, error -61 [ 311.418130][ T748] usb usb2-port1: attempt power cycle [ 311.527839][ T66] usb 8-1: new low-speed USB device number 50 using dummy_hcd [ 311.657828][ T66] usb 8-1: device descriptor read/64, error -71 [ 311.757839][ T748] usb 2-1: new high-speed USB device number 44 using dummy_hcd [ 311.778433][ T748] usb 2-1: Using ep0 maxpacket: 16 [ 311.784101][ T748] usb 2-1: too many configurations: 247, using maximum allowed: 8 [ 311.794035][ T748] usb 2-1: unable to read config index 0 descriptor/start: -61 [ 311.802225][ T748] usb 2-1: can't read configurations, error -61 [ 311.833835][ T6425] netlink: 44 bytes leftover after parsing attributes in process `syz.2.1893'. [ 311.842905][ T6425] netlink: 'syz.2.1893': attribute type 6 has an invalid length. [ 311.851392][ T6425] netlink: 'syz.2.1893': attribute type 5 has an invalid length. [ 311.859146][ T6425] netlink: 'syz.2.1893': attribute type 4 has an invalid length. [ 311.907823][ T66] usb 8-1: device descriptor read/64, error -71 [ 311.937854][ T748] usb 2-1: new high-speed USB device number 45 using dummy_hcd [ 311.958833][ T748] usb 2-1: Using ep0 maxpacket: 16 [ 311.964540][ T748] usb 2-1: too many configurations: 247, using maximum allowed: 8 [ 311.974568][ T748] usb 2-1: unable to read config index 0 descriptor/start: -61 [ 311.982164][ T748] usb 2-1: can't read configurations, error -61 [ 311.988545][ T748] usb usb2-port1: unable to enumerate USB device [ 312.107896][ T355] usb 3-1: new high-speed USB device number 68 using dummy_hcd [ 312.147836][ T66] usb 8-1: new low-speed USB device number 51 using dummy_hcd [ 312.247845][ T355] usb 3-1: device descriptor read/64, error -71 [ 312.287874][ T66] usb 8-1: device descriptor read/64, error -71 [ 312.497862][ T355] usb 3-1: device descriptor read/64, error -71 [ 312.527853][ T66] usb 8-1: device descriptor read/64, error -71 [ 312.548218][ T36] kauditd_printk_skb: 526 callbacks suppressed [ 312.548235][ T36] audit: type=1400 audit(2000000031.260:90213): avc: denied { ioctl } for pid=6440 comm="syz.6.1898" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 312.608199][ T36] audit: type=1400 audit(2000000031.320:90214): avc: denied { ioctl } for pid=6424 comm="syz.2.1893" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 312.633330][ T36] audit: type=1400 audit(2000000031.320:90215): avc: denied { ioctl } for pid=6424 comm="syz.2.1893" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 312.658601][ T66] usb usb8-port1: attempt power cycle [ 312.660091][ T36] audit: type=1400 audit(2000000031.340:90216): avc: denied { ioctl } for pid=6440 comm="syz.6.1898" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 312.689050][ T748] usb 7-1: new full-speed USB device number 87 using dummy_hcd [ 312.696656][ T36] audit: type=1400 audit(2000000031.370:90217): avc: denied { ioctl } for pid=6422 comm="syz.7.1892" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 312.722156][ T36] audit: type=1400 audit(2000000031.370:90218): avc: denied { ioctl } for pid=6422 comm="syz.7.1892" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 312.747263][ T36] audit: type=1400 audit(2000000031.370:90219): avc: denied { ioctl } for pid=6422 comm="syz.7.1892" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 312.748025][ T355] usb 3-1: new high-speed USB device number 69 using dummy_hcd [ 312.773117][ T36] audit: type=1400 audit(2000000031.390:90220): avc: denied { ioctl } for pid=6424 comm="syz.2.1893" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 312.804766][ T36] audit: type=1400 audit(2000000031.430:90221): avc: denied { ioctl } for pid=6440 comm="syz.6.1898" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 312.829854][ T36] audit: type=1400 audit(2000000031.460:90222): avc: denied { ioctl } for pid=6440 comm="syz.6.1898" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 312.909743][ T748] usb 7-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 312.917877][ T355] usb 3-1: device descriptor read/64, error -71 [ 312.920829][ T748] usb 7-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 512, setting to 64 [ 312.937860][ T748] usb 7-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid maxpacket 2632, setting to 64 [ 312.948758][ T748] usb 7-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid maxpacket 512, setting to 64 [ 312.962454][ T748] usb 7-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 312.971550][ T748] usb 7-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 312.979561][ T748] usb 7-1: Product: syz [ 312.983706][ T748] usb 7-1: Manufacturer: syz [ 312.988298][ T748] usb 7-1: SerialNumber: syz [ 312.995305][ T6441] raw-gadget.0 gadget.6: fail, usb_ep_enable returned -22 [ 313.007836][ T66] usb 8-1: new low-speed USB device number 52 using dummy_hcd [ 313.030369][ T66] usb 8-1: device descriptor read/8, error -71 [ 313.157945][ T355] usb 3-1: device descriptor read/64, error -71 [ 313.166224][ T66] usb 8-1: device descriptor read/8, error -71 [ 313.206972][ T748] cdc_ncm 7-1:1.0: bind() failure [ 313.213179][ T748] cdc_ncm 7-1:1.1: CDC Union missing and no IAD found [ 313.220020][ T748] cdc_ncm 7-1:1.1: bind() failure [ 313.226449][ T748] usb 7-1: USB disconnect, device number 87 [ 313.268311][ T355] usb usb3-port1: attempt power cycle [ 313.407831][ T66] usb 8-1: new low-speed USB device number 53 using dummy_hcd [ 313.429832][ T66] usb 8-1: device descriptor read/8, error -71 [ 313.560540][ T66] usb 8-1: device descriptor read/8, error -71 [ 313.607857][ T355] usb 3-1: new high-speed USB device number 70 using dummy_hcd [ 313.629661][ T355] usb 3-1: device descriptor read/8, error -71 [ 313.667919][ T66] usb usb8-port1: unable to enumerate USB device [ 313.764145][ T355] usb 3-1: device descriptor read/8, error -71 [ 314.017841][ T355] usb 3-1: new high-speed USB device number 71 using dummy_hcd [ 314.039664][ T355] usb 3-1: device descriptor read/8, error -71 [ 314.068377][ T748] usb 7-1: new high-speed USB device number 88 using dummy_hcd [ 314.169700][ T355] usb 3-1: device descriptor read/8, error -71 [ 314.217820][ T748] usb 7-1: Using ep0 maxpacket: 16 [ 314.224833][ T748] usb 7-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 314.235745][ T748] usb 7-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 314.253587][ T748] usb 7-1: New USB device found, idVendor=0458, idProduct=5013, bcdDevice= 0.00 [ 314.275121][ T748] usb 7-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 314.287141][ T748] usb 7-1: config 0 descriptor?? [ 314.288799][ T355] usb usb3-port1: unable to enumerate USB device [ 314.337831][ T45] usb 2-1: new full-speed USB device number 46 using dummy_hcd [ 314.489583][ T45] usb 2-1: config 0 interface 0 altsetting 9 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 314.500625][ T45] usb 2-1: config 0 interface 0 altsetting 9 endpoint 0x81 has invalid wMaxPacketSize 0 [ 314.510399][ T45] usb 2-1: config 0 interface 0 has no altsetting 0 [ 314.517033][ T45] usb 2-1: New USB device found, idVendor=17ef, idProduct=60ee, bcdDevice= 0.00 [ 314.526963][ T45] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 314.536811][ T45] usb 2-1: config 0 descriptor?? [ 314.677845][ T66] usb 8-1: new high-speed USB device number 54 using dummy_hcd [ 314.728469][ T748] kye 0003:0458:5013.0061: tablet report size too small, or kye_tablet_rdesc unexpectedly large [ 314.741431][ T748] kye 0003:0458:5013.0061: hidraw0: USB HID vff.fc Device [HID 0458:5013] on usb-dummy_hcd.6-1/input0 [ 314.752620][ T748] kye 0003:0458:5013.0061: tablet-enabling feature report not found [ 314.760887][ T748] kye 0003:0458:5013.0061: tablet enabling failed [ 314.769058][ T45] lenovo 0003:17EF:60EE.0062: unknown main item tag 0x0 [ 314.777855][ T45] lenovo 0003:17EF:60EE.0062: unknown main item tag 0x0 [ 314.784838][ T45] lenovo 0003:17EF:60EE.0062: unknown main item tag 0x0 [ 314.805339][ T45] lenovo 0003:17EF:60EE.0062: unknown main item tag 0x0 [ 314.813126][ T45] lenovo 0003:17EF:60EE.0062: unknown main item tag 0x0 [ 314.827819][ T66] usb 8-1: Using ep0 maxpacket: 8 [ 314.829502][ T45] lenovo 0003:17EF:60EE.0062: hidraw0: USB HID v0.01 Device [HID 17ef:60ee] on usb-dummy_hcd.1-1/input0 [ 314.845697][ T66] usb 8-1: config 1 interface 0 altsetting 2 endpoint 0x81 has an invalid bInterval 167, changing to 11 [ 314.864262][ T66] usb 8-1: config 1 interface 0 has no altsetting 0 [ 314.884875][ T66] usb 8-1: New USB device found, idVendor=05ac, idProduct=8241, bcdDevice= 0.40 [ 314.908211][ T66] usb 8-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 314.916364][ T66] usb 8-1: Product: ᘙ왃혭廟垡ꖬ膣맵嫁븸캓匆陶軈쪃ꂨ♟瞮㒙㊅᧌缗괌ꨇ䈮揚ő댰貍᪴ᄞ辽䊐ᨳȫ뛱킼䓁⚒澽蓮艷⥎삷槂⦛碃탻ˡ呍臊行鈌ṣ죡劐彽෧㡭曮ꔫ콪꥟嵘὇위鏧ᜮB킂暈㒆ᐅ썏濦蒒矗˂縒䜔䭮᣺뤾펻肠ᆠ [ 314.948604][ T66] usb 8-1: Manufacturer: 큝쌡谣鎣砿⻇彂琫딕喙煽⩩뱱쑺퇴疳瘻滋ᅭ豽䖇괶퐦뽰靱钊宂䡞캁긡蜲ⓙ⢺䬃䐝앰ꅮ껥줒䭎寔ﰳ뉧렌譺콓麆嘺㊎땗뷛ż澃Ἅ᱋恒締뷽ﱑ鰷㰶 [ 314.949339][ T748] usb 7-1: USB disconnect, device number 88 [ 314.972410][ T66] usb 8-1: SerialNumber: Ⰺ [ 315.199405][ T45] lenovo 0003:17EF:60EE.0062: Fn-lock setting failed: -71 [ 315.206821][ T45] lenovo 0003:17EF:60EE.0062: Sensitivity setting failed: -71 [ 315.213524][ T6466] netlink: 'syz.2.1906': attribute type 21 has an invalid length. [ 315.223546][ T6466] netlink: 388 bytes leftover after parsing attributes in process `syz.2.1906'. [ 315.248920][ T45] usb 2-1: USB disconnect, device number 46 [ 315.448529][ T66] usbhid 8-1:1.0: can't add hid device: -71 [ 315.454591][ T66] usbhid 8-1:1.0: probe with driver usbhid failed with error -71 [ 315.467889][ T66] usb 8-1: USB disconnect, device number 54 [ 315.717832][ T45] usb 2-1: new high-speed USB device number 47 using dummy_hcd [ 315.877813][ T45] usb 2-1: Using ep0 maxpacket: 16 [ 315.885088][ T45] usb 2-1: config 0 has an invalid interface number: 34 but max is 0 [ 315.893290][ T45] usb 2-1: config 0 has no interface number 0 [ 315.899441][ T45] usb 2-1: config 0 interface 34 altsetting 0 bulk endpoint 0xA has invalid maxpacket 1023 [ 315.909573][ T45] usb 2-1: config 0 interface 34 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 80 [ 315.922166][ T45] usb 2-1: New USB device found, idVendor=0b95, idProduct=772a, bcdDevice=82.73 [ 315.931366][ T45] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 315.939366][ T45] usb 2-1: Product: syz [ 315.943529][ T45] usb 2-1: Manufacturer: syz [ 315.948942][ T45] usb 2-1: SerialNumber: syz [ 315.960959][ T45] usb 2-1: config 0 descriptor?? [ 315.967204][ T6482] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 315.978911][ T6482] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 316.097858][ T66] usb 3-1: new high-speed USB device number 72 using dummy_hcd [ 316.189544][ T6482] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 316.197097][ T6482] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 316.247829][ T66] usb 3-1: Using ep0 maxpacket: 16 [ 316.255142][ T66] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 316.266102][ T66] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 316.275862][ T66] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 316.288675][ T66] usb 3-1: New USB device found, idVendor=045e, idProduct=07da, bcdDevice= 0.00 [ 316.297699][ T66] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 316.307413][ T66] usb 3-1: config 0 descriptor?? [ 316.406375][ T45] asix 2-1:0.34 (unnamed net_device) (uninitialized): invalid hw address, using random [ 316.724986][ T66] microsoft 0003:045E:07DA.0063: ignoring exceeding usage max [ 316.755559][ T66] microsoft 0003:045E:07DA.0063: unknown main item tag 0x0 [ 316.773097][ T66] microsoft 0003:045E:07DA.0063: unknown main item tag 0x0 [ 316.791515][ T66] microsoft 0003:045E:07DA.0063: unknown main item tag 0x0 [ 316.818368][ T66] microsoft 0003:045E:07DA.0063: unknown main item tag 0x0 [ 316.830009][ T66] microsoft 0003:045E:07DA.0063: unknown main item tag 0x0 [ 316.854879][ T66] microsoft 0003:045E:07DA.0063: unknown main item tag 0x0 [ 316.871101][ T66] microsoft 0003:045E:07DA.0063: unknown main item tag 0x0 [ 316.878413][ T1049] usb 8-1: new high-speed USB device number 55 using dummy_hcd [ 316.895428][ T66] microsoft 0003:045E:07DA.0063: unknown main item tag 0x0 [ 316.909424][ T66] microsoft 0003:045E:07DA.0063: unknown main item tag 0x0 [ 316.916763][ T66] microsoft 0003:045E:07DA.0063: unknown main item tag 0x0 [ 316.925590][ T66] microsoft 0003:045E:07DA.0063: unknown main item tag 0x0 [ 316.933740][ T66] microsoft 0003:045E:07DA.0063: unknown main item tag 0x0 [ 316.944222][ T66] microsoft 0003:045E:07DA.0063: unknown main item tag 0x0 [ 316.986013][ T66] microsoft 0003:045E:07DA.0063: No inputs registered, leaving [ 317.012095][ T66] microsoft 0003:045E:07DA.0063: hidraw0: USB HID v0.00 Device [HID 045e:07da] on usb-dummy_hcd.2-1/input0 [ 317.037873][ T1049] usb 8-1: Using ep0 maxpacket: 8 [ 317.051301][ T1049] usb 8-1: config 0 interface 0 altsetting 254 endpoint 0x81 has an invalid bInterval 246, changing to 11 [ 317.072846][ T66] microsoft 0003:045E:07DA.0063: no inputs found [ 317.090491][ T66] microsoft 0003:045E:07DA.0063: could not initialize ff, continuing anyway [ 317.107837][ T1049] usb 8-1: config 0 interface 0 has no altsetting 0 [ 317.120673][ T1049] usb 8-1: New USB device found, idVendor=056a, idProduct=4004, bcdDevice= 0.00 [ 317.144991][ T1049] usb 8-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 317.174617][ T1049] usb 8-1: config 0 descriptor?? [ 317.194095][ T6490] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 317.235306][ T6490] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 317.275267][ T9] usb 3-1: USB disconnect, device number 72 [ 317.343702][ T6503] fido_id[6503]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.2/usb3/report_descriptor': No such file or directory [ 317.427856][ T66] usb 7-1: new high-speed USB device number 89 using dummy_hcd [ 317.441527][ T1049] wacom 0003:056A:4004.0064: unknown main item tag 0x0 [ 317.463999][ T1049] wacom 0003:056A:4004.0064: unknown main item tag 0x0 [ 317.488100][ T1049] wacom 0003:056A:4004.0064: unknown main item tag 0x0 [ 317.505908][ T1049] wacom 0003:056A:4004.0064: hidraw0: USB HID v0.02 Device [HID 056a:4004] on usb-dummy_hcd.7-1/input0 [ 317.549774][ T1049] usb 8-1: USB disconnect, device number 55 [ 317.576214][ T36] kauditd_printk_skb: 572 callbacks suppressed [ 317.576234][ T36] audit: type=1400 audit(2000000036.240:90795): avc: denied { ioctl } for pid=6502 comm="syz.6.1919" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 317.628340][ T66] usb 7-1: Using ep0 maxpacket: 32 [ 317.636593][ T66] usb 7-1: config 0 interface 0 altsetting 13 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 317.658915][ T66] usb 7-1: config 0 interface 0 altsetting 13 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 317.677909][ T36] audit: type=1400 audit(2000000036.310:90796): avc: denied { read write } for pid=4614 comm="syz-executor" name="loop7" dev="devtmpfs" ino=56 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 317.722630][ T66] usb 7-1: config 0 interface 0 has no altsetting 0 [ 317.746438][ T66] usb 7-1: New USB device found, idVendor=05ac, idProduct=021c, bcdDevice= 0.00 [ 317.765834][ T36] audit: type=1400 audit(2000000036.310:90797): avc: denied { read write open } for pid=4614 comm="syz-executor" path="/dev/loop7" dev="devtmpfs" ino=56 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 317.797826][ T66] usb 7-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 317.820332][ T6508] fido_id[6508]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.7/usb8/report_descriptor': No such file or directory [ 317.856198][ T66] usb 7-1: config 0 descriptor?? [ 317.895251][ T36] audit: type=1400 audit(2000000036.310:90798): avc: denied { ioctl } for pid=4614 comm="syz-executor" path="/dev/loop7" dev="devtmpfs" ino=56 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 317.997335][ T36] audit: type=1400 audit(2000000036.340:90799): avc: denied { ioctl } for pid=6502 comm="syz.6.1919" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 318.107909][ T36] audit: type=1400 audit(2000000036.340:90800): avc: denied { ioctl } for pid=6502 comm="syz.6.1919" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 318.219885][ T36] audit: type=1400 audit(2000000036.340:90801): avc: denied { ioctl } for pid=6502 comm="syz.6.1919" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 318.277361][ T66] apple 0003:05AC:021C.0065: unknown global tag 0xe [ 318.301428][ T66] apple 0003:05AC:021C.0065: item 0 0 1 14 parsing failed [ 318.338032][ T66] apple 0003:05AC:021C.0065: parse failed [ 318.347126][ T36] audit: type=1400 audit(2000000036.340:90802): avc: denied { ioctl } for pid=6502 comm="syz.6.1919" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 318.374556][ T66] apple 0003:05AC:021C.0065: probe with driver apple failed with error -22 [ 318.427831][ T1049] usb 3-1: new high-speed USB device number 73 using dummy_hcd [ 318.440882][ T45] asix 2-1:0.34 (unnamed net_device) (uninitialized): Failed to read reg index 0x0000: -71 [ 318.469464][ T45] asix 2-1:0.34 (unnamed net_device) (uninitialized): Error reading PHY_ID register: ffffffb9 [ 318.484672][ T6504] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 318.488766][ T45] asix 2-1:0.34: probe with driver asix failed with error -71 [ 318.503344][ T36] audit: type=1400 audit(2000000036.340:90803): avc: denied { ioctl } for pid=6502 comm="syz.6.1919" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 318.503375][ T36] audit: type=1400 audit(2000000036.360:90804): avc: denied { ioctl } for pid=6502 comm="syz.6.1919" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 318.510405][ T6504] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 318.644335][ T6504] SELinux: Context system_u:object_r:apt_var_log_t:s0 is not valid (left unmapped). [ 318.665048][ T1049] usb 3-1: Using ep0 maxpacket: 8 [ 318.691489][ T1049] usb 3-1: unable to get BOS descriptor or descriptor too short [ 318.705565][ T1049] usb 3-1: config 1 interface 2 altsetting 2 has 0 endpoint descriptors, different from the interface descriptor's value: 9 [ 318.741874][ T6504] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 318.751256][ T1049] usb 3-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 318.763447][ T6504] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 318.782605][ T1049] usb 3-1: string descriptor 0 read error: -22 [ 318.789276][ T1049] usb 3-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 318.801932][ T6504] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 318.814706][ T1049] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 318.828001][ T6504] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 318.861673][ T9] usb 7-1: USB disconnect, device number 89 [ 318.878070][ T66] usb 8-1: new high-speed USB device number 56 using dummy_hcd [ 319.056818][ T6519] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 319.068094][ T6519] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 319.089846][ T66] usb 8-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 319.120551][ T9] usb 3-1: USB disconnect, device number 73 [ 319.146547][ T66] usb 8-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 319.169700][ T66] usb 8-1: New USB device found, idVendor=08b7, idProduct=0000, bcdDevice= 0.00 [ 319.199619][ T66] usb 8-1: New USB device strings: Mfr=0, Product=0, SerialNumber=3 [ 319.209782][ T45] usb 2-1: USB disconnect, device number 47 [ 319.228243][ T66] usb 8-1: SerialNumber: syz [ 319.444052][ T66] usb 8-1: 0:2 : does not exist [ 319.457915][ T66] usb 8-1: USB disconnect, device number 56 [ 319.572328][ T45] usb 2-1: new high-speed USB device number 48 using dummy_hcd [ 319.601994][ T332] udevd[332]: error opening ATTR{/sys/devices/platform/dummy_hcd.7/usb8/8-1/8-1:1.0/sound/card0/controlC0/../uevent} for writing: No such file or directory [ 319.771581][ T45] usb 2-1: Using ep0 maxpacket: 16 [ 319.818980][ T45] usb 2-1: too many configurations: 17, using maximum allowed: 8 [ 319.977815][ T66] usb 3-1: new high-speed USB device number 74 using dummy_hcd [ 319.982563][ T45] usb 2-1: string descriptor 0 read error: -71 [ 320.010848][ T45] usb 2-1: New USB device found, idVendor=04e8, idProduct=a101, bcdDevice= 4.48 [ 320.037975][ T45] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 320.091929][ T45] r8152-cfgselector 2-1: Unknown version 0x0000 [ 320.100825][ T45] r8152-cfgselector 2-1: rejected 8 configurations due to insufficient available bus power [ 320.151494][ T66] usb 3-1: config 17 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 320.163594][ T66] usb 3-1: config 17 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 320.185895][ T66] usb 3-1: config 17 interface 0 altsetting 0 endpoint 0x8F has invalid maxpacket 59391, setting to 1024 [ 320.207838][ T66] usb 3-1: New USB device found, idVendor=0458, idProduct=5003, bcdDevice= 0.00 [ 320.225313][ T66] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 320.249328][ T45] r8152-cfgselector 2-1: no configuration chosen from 8 choices [ 320.262844][ T6535] raw-gadget.1 gadget.2: fail, usb_ep_enable returned -22 [ 320.278606][ T45] r8152-cfgselector 2-1: USB disconnect, device number 48 [ 320.490593][ T66] aiptek 3-1:17.0: Aiptek using 400 ms programming speed [ 320.524680][ T66] input: Aiptek as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:17.0/input/input56 [ 320.581104][ T66] usb 3-1: USB disconnect, device number 74 [ 320.587065][ C0] aiptek 3-1:17.0: aiptek_irq - usb_submit_urb failed with result -19 [ 320.957837][ T9] usb 7-1: new high-speed USB device number 90 using dummy_hcd [ 321.137824][ T9] usb 7-1: Using ep0 maxpacket: 32 [ 321.151121][ T9] usb 7-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 321.181406][ T9] usb 7-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 321.211536][ T9] usb 7-1: New USB device found, idVendor=1e7d, idProduct=2d5a, bcdDevice= 0.00 [ 321.227885][ T66] usb 2-1: new high-speed USB device number 49 using dummy_hcd [ 321.278946][ T9] usb 7-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 321.307919][ T9] usb 7-1: config 0 descriptor?? [ 321.379707][ T6566] overlayfs: missing 'lowerdir' [ 321.429036][ T66] usb 2-1: config 0 interface 0 altsetting 1 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 321.460272][ T66] usb 2-1: config 0 interface 0 altsetting 1 endpoint 0x81 has invalid wMaxPacketSize 0 [ 321.482090][ T66] usb 2-1: config 0 interface 0 has no altsetting 0 [ 321.497664][ T66] usb 2-1: New USB device found, idVendor=04fc, idProduct=05d8, bcdDevice= 0.00 [ 321.518448][ T66] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 321.548011][ T66] usb 2-1: config 0 descriptor?? [ 321.670954][ T45] usb 3-1: new high-speed USB device number 75 using dummy_hcd [ 321.743870][ T6551] input: syz0 as /devices/virtual/input/input57 [ 321.778793][ T9] usbhid 7-1:0.0: can't add hid device: -71 [ 321.793995][ T9] usbhid 7-1:0.0: probe with driver usbhid failed with error -71 [ 321.807219][ T9] usb 7-1: USB disconnect, device number 90 [ 321.892735][ T45] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 233, changing to 11 [ 321.918507][ T45] usb 3-1: New USB device found, idVendor=0458, idProduct=501b, bcdDevice= 0.00 [ 321.927570][ T45] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 321.960788][ T45] usb 3-1: config 0 descriptor?? [ 321.995665][ T66] sunplus 0003:04FC:05D8.0066: item fetching failed at offset 0/1 [ 322.013720][ T66] sunplus 0003:04FC:05D8.0066: probe with driver sunplus failed with error -22 [ 322.205774][ T66] usb 2-1: USB disconnect, device number 49 [ 322.609479][ T36] kauditd_printk_skb: 534 callbacks suppressed [ 322.609497][ T36] audit: type=1400 audit(2000000041.320:91339): avc: denied { create } for pid=6574 comm="syz.6.1940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 322.646537][ T45] kye 0003:0458:501B.0067: tablet report size too small, or kye_tablet_rdesc unexpectedly large [ 322.669009][ T45] kye 0003:0458:501B.0067: unknown main item tag 0x0 [ 322.675751][ T45] kye 0003:0458:501B.0067: unknown main item tag 0x0 [ 322.738388][ T36] audit: type=1400 audit(2000000041.340:91340): avc: denied { ioctl } for pid=6562 comm="syz.2.1936" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 322.904037][ T36] audit: type=1400 audit(2000000041.340:91341): avc: denied { ioctl } for pid=6562 comm="syz.2.1936" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 322.937012][ T45] kye 0003:0458:501B.0067: unknown main item tag 0x0 [ 322.948320][ T45] kye 0003:0458:501B.0067: unknown main item tag 0x0 [ 322.955040][ T45] kye 0003:0458:501B.0067: unknown main item tag 0x0 [ 323.007386][ T6581] netlink: 24 bytes leftover after parsing attributes in process `syz.1.1942'. [ 323.056974][ T36] audit: type=1400 audit(2000000041.350:91342): avc: denied { write } for pid=6574 comm="syz.6.1940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 323.154862][ T36] audit: type=1400 audit(2000000041.350:91343): avc: denied { read } for pid=6574 comm="syz.6.1940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 323.157886][ T45] kye 0003:0458:501B.0067: unknown main item tag 0x0 [ 323.198861][ T45] kye 0003:0458:501B.0067: unknown main item tag 0x0 [ 323.231164][ T45] kye 0003:0458:501B.0067: hidraw0: USB HID v0.03 Device [HID 0458:501b] on usb-dummy_hcd.2-1/input0 [ 323.231288][ T36] audit: type=1400 audit(2000000041.350:91344): avc: denied { read } for pid=6574 comm="syz.6.1940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 323.262839][ T66] usb 8-1: new high-speed USB device number 57 using dummy_hcd [ 323.342712][ T36] audit: type=1400 audit(2000000041.350:91345): avc: denied { create } for pid=6574 comm="syz.6.1940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 323.413943][ T36] audit: type=1400 audit(2000000041.350:91346): avc: denied { write } for pid=6574 comm="syz.6.1940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 323.418765][ T45] kye 0003:0458:501B.0067: tablet-enabling feature report not found [ 323.488205][ T45] kye 0003:0458:501B.0067: tablet enabling failed [ 323.488404][ T66] usb 8-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 323.533877][ T36] audit: type=1400 audit(2000000041.370:91347): avc: denied { read append } for pid=6574 comm="syz.6.1940" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 323.558148][ T45] usb 3-1: USB disconnect, device number 75 [ 323.587272][ T66] usb 8-1: config 0 has 1 interface, different from the descriptor's value: 2 [ 323.611094][ T66] usb 8-1: config 0 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 2 [ 323.657817][ T36] audit: type=1400 audit(2000000041.370:91348): avc: denied { read open } for pid=6574 comm="syz.6.1940" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 323.790719][ T66] usb 8-1: New USB device found, idVendor=8086, idProduct=0b5b, bcdDevice=e1.c5 [ 323.847824][ T66] usb 8-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 323.887836][ T66] usb 8-1: Product: syz [ 323.909853][ T66] usb 8-1: Manufacturer: syz [ 323.914484][ T66] usb 8-1: SerialNumber: syz [ 323.982817][ T66] usb 8-1: config 0 descriptor?? [ 324.255114][ T66] usb 8-1: USB disconnect, device number 57 [ 324.437836][ T355] usb 7-1: new high-speed USB device number 91 using dummy_hcd [ 324.618689][ T355] usb 7-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 324.650279][ T355] usb 7-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 324.677596][ T355] usb 7-1: New USB device found, idVendor=1b96, idProduct=0012, bcdDevice= 0.00 [ 324.689692][ T355] usb 7-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 324.707189][ T355] usb 7-1: config 0 descriptor?? [ 324.748983][ T6607] rust_binder: BC_REQUEST_DEATH_NOTIFICATION invalid ref 1 [ 324.944333][ T6611] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1952'. [ 324.985184][ T6616] overlayfs: failed to clone upperpath [ 325.153114][ T1049] usb 3-1: new low-speed USB device number 76 using dummy_hcd [ 325.334563][ T355] usbhid 7-1:0.0: can't add hid device: -71 [ 325.344211][ T1049] usb 3-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 325.357822][ T66] usb 2-1: new full-speed USB device number 50 using dummy_hcd [ 325.365550][ T355] usbhid 7-1:0.0: probe with driver usbhid failed with error -71 [ 325.390460][ T1049] usb 3-1: config 1 has 1 interface, different from the descriptor's value: 15 [ 325.403028][ T355] usb 7-1: USB disconnect, device number 91 [ 325.423501][ T1049] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x6 has invalid wMaxPacketSize 0 [ 325.445946][ T1049] usb 3-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 5 [ 325.482784][ T1049] usb 3-1: string descriptor 0 read error: -22 [ 325.498282][ T1049] usb 3-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 325.517854][ T9] usb 8-1: new high-speed USB device number 58 using dummy_hcd [ 325.538301][ T1049] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 325.568591][ T66] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 325.589577][ T1049] usb 3-1: 0:2 : does not exist [ 325.611160][ T66] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x3 has invalid wMaxPacketSize 0 [ 325.654532][ T66] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a5, bcdDevice= 0.40 [ 325.677872][ T66] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 325.706535][ T6633] support for cryptoloop has been removed. Use dm-crypt instead. [ 325.714415][ T9] usb 8-1: Using ep0 maxpacket: 16 [ 325.719629][ T66] usb 2-1: SerialNumber: syz [ 325.732049][ T9] usb 8-1: config 1 interface 1 altsetting 1 endpoint 0x1 has an invalid bInterval 0, changing to 7 [ 325.753121][ T66] cdc_ether 2-1:1.0: probe with driver cdc_ether failed with error -22 [ 325.781889][ T9] usb 8-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 325.801459][ T66] usb-storage 2-1:1.0: USB Mass Storage device detected [ 325.821663][ T1049] usb 3-1: USB disconnect, device number 76 [ 325.851587][ T66] usb-storage 2-1:1.0: Quirks match for vid 0525 pid a4a5: 10000 [ 325.860997][ T332] udevd[332]: error opening ATTR{/sys/devices/platform/dummy_hcd.2/usb3/3-1/3-1:1.0/sound/card0/controlC0/../uevent} for writing: No such file or directory [ 325.888486][ T9] usb 8-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 325.903388][ T9] usb 8-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 325.911581][ T66] scsi host1: usb-storage 2-1:1.0 [ 325.935414][ T9] usb 8-1: Product: syz [ 325.947799][ T9] usb 8-1: Manufacturer: syz [ 325.966481][ T9] usb 8-1: SerialNumber: syz [ 326.201911][ T6627] incfs: Can't find or create .index dir in ./cgroup [ 326.208866][ T6627] incfs: mount failed -22 [ 326.215426][ T9] usb 8-1: 2:1 : UAC_AS_GENERAL descriptor not found [ 326.238608][ T9] usb 8-1: USB disconnect, device number 58 [ 326.385690][ T332] udevd[332]: error opening ATTR{/sys/devices/platform/dummy_hcd.7/usb8/8-1/8-1:1.0/sound/card0/controlC0/../uevent} for writing: No such file or directory [ 326.607857][ T66] usb 3-1: new full-speed USB device number 77 using dummy_hcd [ 326.688261][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 326.700410][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 326.712506][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 326.724597][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 326.736697][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 326.748766][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 326.760836][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 326.772925][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 326.785272][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 326.797355][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 327.124549][ T66] usb 3-1: config 0 interface 0 altsetting 4 endpoint 0x81 has invalid maxpacket 512, setting to 64 [ 327.155231][ T66] usb 3-1: config 0 interface 0 altsetting 4 has 1 endpoint descriptor, different from the interface descriptor's value: 3 [ 327.458510][ T66] usb 3-1: config 0 interface 0 has no altsetting 0 [ 327.589902][ T66] usb 3-1: New USB device found, idVendor=18d1, idProduct=502b, bcdDevice= 0.00 [ 327.875803][ T66] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 328.549493][ T66] usb 3-1: config 0 descriptor?? [ 328.570913][ T6638] raw-gadget.0 gadget.2: fail, usb_ep_enable returned -22 [ 328.593104][ T36] kauditd_printk_skb: 346 callbacks suppressed [ 328.593125][ T36] audit: type=1400 audit(2000000047.280:91695): avc: denied { ioctl } for pid=6637 comm="syz.2.1959" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x550a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 329.009656][ T9] usb 2-1: USB disconnect, device number 50 [ 331.610046][ T36] audit: type=1400 audit(2000000047.280:91696): avc: denied { ioctl } for pid=6637 comm="syz.2.1959" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5509 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 331.697853][ C0] net_ratelimit: 64629 callbacks suppressed [ 331.697875][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 331.715946][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 331.728021][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 331.740092][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 331.752170][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 331.764244][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 331.776316][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 331.788541][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 331.800600][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 331.812668][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 331.881454][ T36] audit: type=1400 audit(2000000047.280:91697): avc: denied { ioctl } for pid=6637 comm="syz.2.1959" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5505 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 332.022404][ T66] usbhid 3-1:0.0: can't add hid device: -71 [ 332.031472][ T66] usbhid 3-1:0.0: probe with driver usbhid failed with error -71 [ 332.919734][ T66] usb 3-1: USB disconnect, device number 77 [ 333.891795][ T36] audit: type=1400 audit(2000000047.710:91698): avc: denied { read write } for pid=450 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 334.973635][ T36] audit: type=1400 audit(2000000047.710:91699): avc: denied { read write open } for pid=450 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 336.162095][ T36] audit: type=1400 audit(2000000047.710:91700): avc: denied { ioctl } for pid=450 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 336.707856][ C0] net_ratelimit: 69315 callbacks suppressed [ 336.707883][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 336.725949][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 336.738023][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 336.750107][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 336.762192][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 336.774285][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 336.786466][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 336.798539][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 336.810623][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 336.822799][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 341.717865][ C0] net_ratelimit: 72120 callbacks suppressed [ 341.717887][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 341.735875][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 341.747898][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 341.759956][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 341.771960][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 341.784036][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 341.796042][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 341.808094][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 341.820107][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 341.832344][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 342.366423][ T36] audit: type=1400 audit(2000000047.870:91701): avc: denied { ioctl } for pid=6637 comm="syz.2.1959" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 344.561199][ T36] audit: type=1400 audit(2000000050.880:91702): avc: denied { read write } for pid=4045 comm="syz-executor" name="loop6" dev="devtmpfs" ino=55 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 346.727824][ C0] net_ratelimit: 100495 callbacks suppressed [ 346.727847][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 346.727914][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.733943][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 346.745918][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.757803][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 346.769953][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.781778][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 346.793637][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.805462][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 346.817637][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 348.340911][ T36] audit: type=1400 audit(2000000050.880:91703): avc: denied { read write open } for pid=4045 comm="syz-executor" path="/dev/loop6" dev="devtmpfs" ino=55 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 349.019167][ T36] audit: type=1400 audit(2000000051.630:91704): avc: denied { ioctl } for pid=4045 comm="syz-executor" path="/dev/loop6" dev="devtmpfs" ino=55 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 350.415121][ T36] audit: type=1400 audit(2000000051.690:91705): avc: denied { read write } for pid=6300 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 351.737804][ C0] net_ratelimit: 101353 callbacks suppressed [ 351.737825][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 351.737971][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.743940][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 351.755842][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.767697][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 351.779822][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.791633][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 351.803506][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.815359][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 351.827501][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.169010][ T36] audit: type=1400 audit(2000000051.690:91706): avc: denied { read write open } for pid=6300 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 354.169342][ T36] audit: type=1400 audit(2000000051.690:91707): avc: denied { ioctl } for pid=6300 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 354.758214][ T36] audit: type=1400 audit(2000000054.450:91708): avc: denied { create } for pid=6642 comm="syz.7.1961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 356.747824][ C0] net_ratelimit: 94435 callbacks suppressed [ 356.747845][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 356.747918][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.753836][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 356.765834][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.777730][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 356.789704][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.801507][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 356.813483][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.825367][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 356.837367][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.618114][ T36] audit: type=1400 audit(2000000054.450:91709): avc: denied { write } for pid=6642 comm="syz.7.1961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 358.442302][ C1] sched: DL replenish lagged too much [ 358.808662][ T36] audit: type=1400 audit(2000000054.740:91710): avc: denied { read write } for pid=4614 comm="syz-executor" name="loop7" dev="devtmpfs" ino=56 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 361.757843][ C0] net_ratelimit: 108793 callbacks suppressed [ 361.757865][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 361.757874][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.757943][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.763909][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 361.776054][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.787826][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 361.799904][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.811783][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 361.823815][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.835630][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 364.759357][ T36] audit: type=1400 audit(2000000054.820:91711): avc: denied { read write } for pid=6645 comm="syz.1.1962" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 365.049553][ T36] audit: type=1400 audit(2000000054.820:91712): avc: denied { read write open } for pid=6645 comm="syz.1.1962" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 365.453553][ T6667] rust_binder: Failure in copy_transaction_data: BR_FAILED_REPLY { source: EINVAL } [ 365.453586][ T6667] rust_binder: Transaction failed: BR_FAILED_REPLY { source: EINVAL } my_pid:499 [ 366.421254][ T36] audit: type=1400 audit(2000000054.900:91713): avc: denied { ioctl } for pid=6645 comm="syz.1.1962" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x583f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 366.767805][ C0] net_ratelimit: 135195 callbacks suppressed [ 366.767826][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 366.767864][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.773904][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 366.785904][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.797738][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 366.809708][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.821607][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 366.833562][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.845394][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 366.857373][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.777849][ C0] net_ratelimit: 150655 callbacks suppressed [ 371.777871][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 371.777875][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.777938][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.783922][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 371.796034][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.807864][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 371.819805][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.831629][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 371.843653][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.855510][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 373.210112][ T36] audit: type=1400 audit(2000000054.930:91714): avc: denied { create } for pid=6645 comm="syz.1.1962" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 376.787827][ C0] net_ratelimit: 149518 callbacks suppressed [ 376.787850][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 376.787894][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.793891][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 376.806002][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.817867][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 376.829826][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.841693][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 376.853704][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.865564][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 376.877571][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.052804][ T36] audit: type=1400 audit(2000000054.930:91715): avc: denied { read write } for pid=6645 comm="syz.1.1962" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 377.610094][ T36] audit: type=1400 audit(2000000054.930:91716): avc: denied { read write open } for pid=6645 comm="syz.1.1962" path="/dev/fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 377.969673][ T36] audit: type=1400 audit(2000000054.960:91717): avc: denied { mounton } for pid=6648 comm="syz.6.1963" path="/165/file0" dev="tmpfs" ino=894 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 381.797806][ C0] net_ratelimit: 148404 callbacks suppressed [ 381.797826][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 381.797893][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.803893][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 381.815830][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.827661][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 381.839988][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.851882][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 381.863759][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.875587][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 381.887723][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 383.988571][ T36] audit: type=1400 audit(2000000055.180:91718): avc: denied { read write open } for pid=4614 comm="syz-executor" path="/dev/loop7" dev="devtmpfs" ino=56 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 386.807799][ C0] net_ratelimit: 144060 callbacks suppressed [ 386.807827][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 386.807874][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.813868][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 386.825973][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.837859][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 386.849794][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.861646][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 386.873916][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.886003][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 386.897883][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.631072][ T36] audit: type=1400 audit(2000000055.180:91719): avc: denied { ioctl } for pid=4614 comm="syz-executor" path="/dev/loop7" dev="devtmpfs" ino=56 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 391.817813][ C0] net_ratelimit: 142501 callbacks suppressed [ 391.817834][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 391.817904][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.823912][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 391.835801][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.847669][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 391.859747][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.871624][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 391.883525][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.895354][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 391.907959][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.312779][ T36] audit: type=1400 audit(2000000055.210:91720): avc: denied { unlink } for pid=6648 comm="syz.6.1963" name="#26" dev="tmpfs" ino=898 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 393.409476][ T36] audit: type=1400 audit(2000000055.290:91721): avc: denied { mounton } for pid=6645 comm="syz.1.1962" path="/359/file0" dev="tmpfs" ino=1956 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 396.078155][ T36] audit: type=1400 audit(2000000055.310:91722): avc: denied { mount } for pid=6645 comm="syz.1.1962" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 396.827820][ C0] net_ratelimit: 142112 callbacks suppressed [ 396.827842][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 396.827852][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.828067][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.833924][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 396.845993][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.858017][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 396.870126][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.881831][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 396.893907][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.905856][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 396.921108][ T36] audit: type=1400 audit(2000000055.760:91723): avc: denied { unmount } for pid=450 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 398.188759][ T36] audit: type=1400 audit(2000000061.660:91724): avc: denied { unlink } for pid=450 comm="syz-executor" name="file0" dev="tmpfs" ino=1956 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 401.399471][ T36] audit: type=1400 audit(2000000061.780:91725): avc: denied { mount } for pid=6648 comm="syz.6.1963" name="/" dev="overlay" ino=894 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 401.837805][ C0] net_ratelimit: 141250 callbacks suppressed [ 401.837826][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 401.837878][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.843893][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 401.855945][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.867785][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 401.879754][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.891614][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 401.903631][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.915425][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 401.927424][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.009427][ T36] audit: type=1400 audit(2000000062.280:91726): avc: denied { unmount } for pid=4045 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 403.017923][ T36] audit: type=1400 audit(2000000064.350:91727): avc: denied { read write } for pid=450 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 403.758146][ T36] audit: type=1400 audit(2000000064.350:91728): avc: denied { read write open } for pid=450 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 403.858904][ T36] audit: type=1400 audit(2000000066.830:91729): avc: denied { ioctl } for pid=450 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 404.488067][ T36] audit: type=1400 audit(2000000067.720:91730): avc: denied { read write } for pid=4045 comm="syz-executor" name="loop6" dev="devtmpfs" ino=55 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 405.157998][ T36] audit: type=1400 audit(2000000067.720:91731): avc: denied { read write open } for pid=4045 comm="syz-executor" path="/dev/loop6" dev="devtmpfs" ino=55 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 405.448885][ T36] audit: type=1400 audit(2000000067.720:91732): avc: denied { ioctl } for pid=4045 comm="syz-executor" path="/dev/loop6" dev="devtmpfs" ino=55 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 405.830907][ T36] audit: type=1400 audit(2000000069.050:91733): avc: denied { read } for pid=6654 comm="syz.7.1965" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 406.529480][ T36] audit: type=1400 audit(2000000069.050:91734): avc: denied { read open } for pid=6654 comm="syz.7.1965" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 406.768911][ T36] audit: type=1400 audit(2000000069.120:91735): avc: denied { ioctl } for pid=6654 comm="syz.7.1965" path="/dev/kvm" dev="devtmpfs" ino=13 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 406.847836][ C0] net_ratelimit: 137609 callbacks suppressed [ 406.847856][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 406.847897][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.854025][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 406.866032][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.877861][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 406.889843][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.901751][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 406.913700][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.925531][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 406.937891][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.188963][ T36] audit: type=1400 audit(2000000069.150:91736): avc: denied { execmem } for pid=6653 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 407.248688][ T36] audit: type=1400 audit(2000000079.710:91737): avc: denied { execmem } for pid=6659 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 410.560059][ T36] kauditd_printk_skb: 44 callbacks suppressed [ 410.560080][ T36] audit: type=1400 audit(2000000129.260:91782): avc: denied { execmem } for pid=6673 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 411.857837][ C1] net_ratelimit: 141798 callbacks suppressed [ 411.857858][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 411.857862][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 411.857926][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 411.863935][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 411.875824][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 411.887844][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 411.899674][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 411.911667][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 411.923764][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 411.935841][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.867846][ C0] net_ratelimit: 142245 callbacks suppressed [ 416.867867][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 416.867894][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.873985][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 416.885946][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.898003][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 416.909986][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.921864][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 416.933873][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.945752][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 416.957716][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 420.002583][ T36] audit: type=1400 audit(2000000138.710:91783): avc: denied { read } for pid=6675 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 421.877803][ C1] net_ratelimit: 140140 callbacks suppressed [ 421.877825][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.877842][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 421.877884][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 421.884092][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.895908][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 421.907891][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.919785][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 421.931799][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.943561][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 421.955554][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.027013][ T36] audit: type=1400 audit(2000000138.760:91784): avc: denied { read open } for pid=6675 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 422.310830][ T36] audit: type=1400 audit(2000000138.760:91785): avc: denied { mounton } for pid=6675 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 422.630089][ T36] audit: type=1400 audit(2000000138.820:91786): avc: denied { execmem } for pid=6674 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 423.079437][ T36] audit: type=1400 audit(2000000138.830:91787): avc: denied { sys_module } for pid=6675 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 423.298093][ T36] audit: type=1400 audit(2000000138.920:91788): avc: denied { sys_module } for pid=6675 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 423.518640][ T36] audit: type=1400 audit(2000000141.190:91789): avc: denied { sys_module } for pid=6675 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 424.910331][ T36] audit: type=1400 audit(2000000141.200:91790): avc: denied { sys_module } for pid=6675 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 426.519118][ T36] audit: type=1400 audit(2000000141.780:91791): avc: denied { read } for pid=6679 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 426.767821][ T36] audit: type=1400 audit(2000000141.780:91792): avc: denied { read open } for pid=6679 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 426.887803][ C0] net_ratelimit: 132921 callbacks suppressed [ 426.887825][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 426.887856][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.893893][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 426.905893][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.927810][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 426.929777][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.941604][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 426.953680][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.965518][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 426.977501][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.709390][ T36] audit: type=1400 audit(2000000141.780:91793): avc: denied { mounton } for pid=6679 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 427.999045][ T36] audit: type=1400 audit(2000000141.930:91794): avc: denied { sys_module } for pid=6679 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 429.928976][ T36] audit: type=1400 audit(2000000148.620:91795): avc: denied { execmem } for pid=6680 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 430.488868][ T36] audit: type=1400 audit(2000000149.180:91796): avc: denied { sys_module } for pid=6679 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 430.549823][ T6672] workqueue: Failed to create a rescuer kthread for wq "wg-crypt-wg0": -EINTR [ 431.009951][ T36] audit: type=1400 audit(2000000149.190:91797): avc: denied { sys_module } for pid=6679 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 431.317931][ T36] audit: type=1400 audit(2000000149.220:91798): avc: denied { sys_module } for pid=6679 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 431.897819][ C0] net_ratelimit: 139747 callbacks suppressed [ 431.897841][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 431.897867][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.903955][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 431.915837][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.927788][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 431.939868][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.951840][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 431.963693][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.975537][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 431.987865][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 436.907827][ C0] net_ratelimit: 149581 callbacks suppressed [ 436.907849][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 436.907894][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 436.913925][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 436.926032][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 436.937915][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 436.949790][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 436.961616][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 436.973742][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 436.985570][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 436.997475][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.355139][ T36] audit: type=1400 audit(2000000149.540:91799): avc: denied { execmem } for pid=6681 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 441.917834][ C0] net_ratelimit: 131954 callbacks suppressed [ 441.917857][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 441.917981][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.923926][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 441.936010][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.947943][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 441.960016][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.971742][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 441.983900][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.995786][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 442.007818][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.319168][ T36] audit: type=1400 audit(2000000161.020:91800): avc: denied { read } for pid=6683 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 443.019022][ T36] audit: type=1400 audit(2000000161.050:91801): avc: denied { read open } for pid=6683 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 446.149579][ T36] audit: type=1400 audit(2000000161.050:91802): avc: denied { mounton } for pid=6683 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 446.688533][ T36] audit: type=1400 audit(2000000161.070:91803): avc: denied { sys_module } for pid=6683 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 446.927817][ C0] net_ratelimit: 123714 callbacks suppressed [ 446.927840][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 446.927960][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.933944][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 446.946025][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.957929][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 446.969926][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.981637][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 446.993735][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 447.005709][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 447.017696][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 447.418272][ T36] audit: type=1400 audit(2000000161.090:91804): avc: denied { read } for pid=6684 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 448.979880][ T36] audit: type=1400 audit(2000000161.090:91805): avc: denied { read open } for pid=6684 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 450.098694][ T36] audit: type=1400 audit(2000000161.180:91806): avc: denied { mounton } for pid=6684 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 450.158418][ T36] audit: type=1400 audit(2000000161.300:91807): avc: denied { sys_module } for pid=6684 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 450.918801][ T36] audit: type=1400 audit(2000000169.620:91808): avc: denied { sys_module } for pid=6683 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 451.908407][ T36] audit: type=1400 audit(2000000169.690:91809): avc: denied { sys_module } for pid=6684 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 451.937805][ C0] net_ratelimit: 130600 callbacks suppressed [ 451.937828][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 451.937853][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 451.943907][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 451.955871][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 451.967716][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 451.979919][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 451.991673][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 452.003624][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.015506][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 452.027607][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 453.668550][ T36] audit: type=1400 audit(2000000169.700:91810): avc: denied { sys_module } for pid=6684 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 453.767997][ T36] audit: type=1400 audit(2000000169.710:91811): avc: denied { sys_module } for pid=6684 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 453.939478][ T36] audit: type=1400 audit(2000000169.830:91812): avc: denied { sys_module } for pid=6683 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 453.988515][ T36] audit: type=1400 audit(2000000169.840:91813): avc: denied { sys_module } for pid=6683 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 456.947815][ C0] net_ratelimit: 136397 callbacks suppressed [ 456.947837][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 456.947957][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 456.953885][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 456.965987][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 456.977903][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 456.989953][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.001700][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 457.013886][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.025770][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 457.037841][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 459.380230][ T6675] bridge0: port 1(bridge_slave_0) entered blocking state [ 459.387302][ T6675] bridge0: port 1(bridge_slave_0) entered disabled state [ 460.338553][ T6675] bridge_slave_0: entered allmulticast mode [ 460.558510][ T6675] bridge_slave_0: entered promiscuous mode [ 460.963412][ T6675] bridge0: port 2(bridge_slave_1) entered blocking state [ 461.151009][ T6675] bridge0: port 2(bridge_slave_1) entered disabled state [ 461.178921][ T6675] bridge_slave_1: entered allmulticast mode [ 461.208028][ T6675] bridge_slave_1: entered promiscuous mode [ 461.957802][ C0] net_ratelimit: 133140 callbacks suppressed [ 461.957823][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 461.957873][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 461.963903][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 461.975929][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 461.987791][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 461.999928][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 462.011653][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 462.023648][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 462.035520][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 462.047606][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 462.432644][ T36] audit: type=1400 audit(2000000181.110:91814): avc: denied { sys_module } for pid=6675 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 462.618908][ T36] audit: type=1400 audit(2000000181.130:91815): avc: denied { sys_module } for pid=6675 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 462.968311][ T36] audit: type=1400 audit(2000000181.410:91816): avc: denied { sys_module } for pid=6675 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 463.688003][ T36] audit: type=1400 audit(2000000182.280:91817): avc: denied { sys_module } for pid=6675 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 464.308037][ T36] audit: type=1400 audit(2000000183.000:91818): avc: denied { sys_module } for pid=6675 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 464.668680][ T6679] bridge0: port 1(bridge_slave_0) entered blocking state [ 464.675756][ T6679] bridge0: port 1(bridge_slave_0) entered disabled state [ 464.698245][ T36] audit: type=1400 audit(2000000183.290:91819): avc: denied { sys_module } for pid=6675 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 464.721221][ T6679] bridge_slave_0: entered allmulticast mode [ 464.760462][ T6679] bridge_slave_0: entered promiscuous mode [ 465.738691][ T6679] bridge0: port 2(bridge_slave_1) entered blocking state [ 465.749024][ T6679] bridge0: port 2(bridge_slave_1) entered disabled state [ 465.756137][ T6679] bridge_slave_1: entered allmulticast mode [ 465.818904][ T6679] bridge_slave_1: entered promiscuous mode [ 466.868895][ T6684] bridge0: port 1(bridge_slave_0) entered blocking state [ 466.875963][ T6684] bridge0: port 1(bridge_slave_0) entered disabled state [ 466.908167][ T36] audit: type=1400 audit(2000000185.600:91820): avc: denied { sys_module } for pid=6679 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 466.933980][ T6684] bridge_slave_0: entered allmulticast mode [ 466.967831][ C0] net_ratelimit: 119714 callbacks suppressed [ 466.967853][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 466.967855][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.968032][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.974054][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 466.986223][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.998036][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 467.010107][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 467.021899][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 467.034366][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 467.046181][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 467.094342][ T6684] bridge_slave_0: entered promiscuous mode [ 467.218824][ T6684] bridge0: port 2(bridge_slave_1) entered blocking state [ 467.225878][ T6684] bridge0: port 2(bridge_slave_1) entered disabled state [ 467.235196][ T6684] bridge_slave_1: entered allmulticast mode [ 467.259096][ T6684] bridge_slave_1: entered promiscuous mode [ 467.638465][ T36] audit: type=1400 audit(2000000186.350:91821): avc: denied { sys_module } for pid=6679 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 467.931009][ T6683] bridge0: port 1(bridge_slave_0) entered blocking state [ 467.957890][ T6683] bridge0: port 1(bridge_slave_0) entered disabled state [ 467.965026][ T6683] bridge_slave_0: entered allmulticast mode [ 467.974709][ T36] audit: type=1400 audit(2000000186.630:91822): avc: denied { sys_module } for pid=6684 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 468.028541][ T6683] bridge_slave_0: entered promiscuous mode [ 468.391534][ T6683] bridge0: port 2(bridge_slave_1) entered blocking state [ 468.418654][ T6683] bridge0: port 2(bridge_slave_1) entered disabled state [ 468.425855][ T6683] bridge_slave_1: entered allmulticast mode [ 468.468224][ T6683] bridge_slave_1: entered promiscuous mode [ 468.540233][ T36] audit: type=1400 audit(2000000187.250:91823): avc: denied { sys_module } for pid=6684 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 469.579421][ T36] audit: type=1400 audit(2000000188.280:91824): avc: denied { sys_module } for pid=6684 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 469.849424][ T36] audit: type=1400 audit(2000000188.340:91825): avc: denied { sys_module } for pid=6679 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 470.148190][ T36] audit: type=1400 audit(2000000188.370:91826): avc: denied { sys_module } for pid=6679 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 470.509770][ T36] audit: type=1400 audit(2000000188.480:91827): avc: denied { sys_module } for pid=6683 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 471.578559][ T36] audit: type=1400 audit(2000000188.520:91828): avc: denied { sys_module } for pid=6683 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 471.977806][ C1] net_ratelimit: 131058 callbacks suppressed [ 471.977831][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 471.977885][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 471.984089][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 471.995954][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 472.008059][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 472.019912][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 472.032474][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 472.044773][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 472.056929][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 472.068958][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 474.609567][ T36] audit: type=1400 audit(2000000188.680:91829): avc: denied { sys_module } for pid=6684 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 474.699596][ T36] audit: type=1400 audit(2000000189.190:91830): avc: denied { execmem } for pid=6699 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 474.867994][ T36] audit: type=1400 audit(2000000189.280:91831): avc: denied { sys_module } for pid=6679 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 476.207955][ T36] audit: type=1400 audit(2000000189.300:91832): avc: denied { sys_module } for pid=6679 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 476.987825][ C0] net_ratelimit: 131806 callbacks suppressed [ 476.987847][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 476.988013][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.993913][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 477.006016][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 477.017878][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 477.029926][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 477.041606][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 477.053726][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 477.065559][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 477.077564][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 477.235436][ T36] audit: type=1400 audit(2000000193.510:91833): avc: denied { sys_module } for pid=6683 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 477.892539][ T36] audit: type=1400 audit(2000000193.660:91834): avc: denied { sys_module } for pid=6684 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 478.818773][ T36] audit: type=1400 audit(2000000193.800:91835): avc: denied { sys_module } for pid=6684 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 481.449617][ T36] audit: type=1400 audit(2000000193.970:91836): avc: denied { read } for pid=6700 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 481.820070][ T36] audit: type=1400 audit(2000000193.970:91837): avc: denied { read open } for pid=6700 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 481.997804][ C0] net_ratelimit: 133212 callbacks suppressed [ 481.997825][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 481.997871][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.003944][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 482.016069][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.027928][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 482.040103][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.051801][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 482.064007][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.075822][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 482.087809][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.930062][ T36] audit: type=1400 audit(2000000193.970:91838): avc: denied { mounton } for pid=6700 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 483.879538][ T36] audit: type=1400 audit(2000000195.500:91839): avc: denied { sys_module } for pid=6700 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 484.380608][ T36] audit: type=1400 audit(2000000202.480:91840): avc: denied { sys_module } for pid=6683 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 484.559441][ T36] audit: type=1400 audit(2000000202.540:91841): avc: denied { execmem } for pid=6701 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 484.908538][ T36] audit: type=1400 audit(2000000203.220:91842): avc: denied { sys_module } for pid=6700 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 485.498563][ T36] audit: type=1400 audit(2000000203.230:91843): avc: denied { sys_module } for pid=6700 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 486.080791][ T36] audit: type=1400 audit(2000000203.240:91844): avc: denied { sys_module } for pid=6700 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 487.007817][ C1] net_ratelimit: 129905 callbacks suppressed [ 487.007838][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 487.007853][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 487.007919][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 487.018928][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 487.030922][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 487.043080][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 487.055264][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 487.067219][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 487.078953][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 487.091010][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 488.019853][ T36] audit: type=1400 audit(2000000203.370:91845): avc: denied { sys_module } for pid=6683 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 488.979323][ T36] audit: type=1400 audit(2000000204.570:91846): avc: denied { sys_module } for pid=6683 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 489.458729][ T36] audit: type=1400 audit(2000000208.050:91847): avc: denied { read } for pid=6703 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 492.017802][ C0] net_ratelimit: 129213 callbacks suppressed [ 492.017823][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 492.017944][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 492.023898][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 492.036038][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 492.047809][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 492.059844][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 492.071974][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 492.084055][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 492.095874][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 492.107832][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 492.619906][ T36] audit: type=1400 audit(2000000208.050:91848): avc: denied { read open } for pid=6703 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 493.958797][ T36] audit: type=1400 audit(2000000208.050:91849): avc: denied { mounton } for pid=6703 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 494.451847][ T36] audit: type=1400 audit(2000000208.100:91850): avc: denied { sys_module } for pid=6703 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 497.027805][ C0] net_ratelimit: 139124 callbacks suppressed [ 497.027826][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 497.027873][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 497.034167][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 497.046372][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 497.058363][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 497.070452][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 497.082379][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 497.094356][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 497.106190][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 497.118275][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 497.439530][ T36] audit: type=1400 audit(2000000208.120:91851): avc: denied { execmem } for pid=6702 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 497.899792][ T36] audit: type=1400 audit(2000000212.820:91852): avc: denied { execmem } for pid=6704 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 500.368966][ T36] audit: type=1400 audit(2000000213.030:91853): avc: denied { sys_module } for pid=6703 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 501.489820][ T36] audit: type=1400 audit(2000000213.610:91854): avc: denied { sys_module } for pid=6703 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 501.688681][ T36] audit: type=1400 audit(2000000213.650:91855): avc: denied { sys_module } for pid=6703 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 501.907100][ T36] audit: type=1400 audit(2000000220.610:91856): avc: denied { read } for pid=6705 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 502.037818][ C0] net_ratelimit: 146388 callbacks suppressed [ 502.037839][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 502.037859][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 502.043883][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 502.056030][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 502.067945][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 502.079953][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 502.091759][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 502.103874][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 502.115758][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 502.127637][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 502.174116][ T36] audit: type=1400 audit(2000000220.640:91857): avc: denied { read open } for pid=6705 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 502.228640][ T36] audit: type=1400 audit(2000000220.640:91858): avc: denied { mounton } for pid=6705 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 502.278580][ T36] audit: type=1400 audit(2000000220.660:91859): avc: denied { sys_module } for pid=6705 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 502.328144][ T36] audit: type=1400 audit(2000000220.700:91860): avc: denied { read } for pid=6706 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 502.378503][ T36] audit: type=1400 audit(2000000220.700:91861): avc: denied { read open } for pid=6706 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 502.438684][ T36] audit: type=1400 audit(2000000220.700:91862): avc: denied { mounton } for pid=6706 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 507.047812][ C0] net_ratelimit: 154949 callbacks suppressed [ 507.047835][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 507.047921][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 507.053916][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 507.065847][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 507.077805][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 507.089830][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 507.102064][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 507.114038][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 507.125878][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 507.138073][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 512.057817][ C0] net_ratelimit: 152035 callbacks suppressed [ 512.057839][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 512.057848][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 512.057995][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 512.063912][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 512.076006][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 512.087916][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 512.099774][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 512.111631][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 512.123811][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 512.135760][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 517.067804][ C0] net_ratelimit: 143157 callbacks suppressed [ 517.067826][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 517.067846][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 517.073934][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 517.086025][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 517.098031][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 517.110263][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 517.122425][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 517.134483][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 517.146300][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 517.158432][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.039652][ T37] INFO: task syz.1.795:2958 blocked for more than 124 seconds. [ 518.047258][ T37] Not tainted syzkaller #0 [ 518.108996][ T37] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 518.117722][ T37] task:syz.1.795 state:D stack:0 pid:2958 tgid:2958 ppid:450 flags:0x00004006 [ 518.140002][ T37] Call Trace: [ 518.143300][ T37] [ 518.146342][ T37] __schedule+0x134f/0x1ea0 [ 518.150919][ T37] ? __sched_text_start+0x10/0x10 [ 518.155949][ T37] ? __mutex_add_waiter+0xd0/0x2a0 [ 518.161164][ T37] ? __kasan_check_write+0x18/0x20 [ 518.166463][ T37] ? trace_contention_begin+0xc0/0xc0 [ 518.172174][ T37] schedule+0xc5/0x240 [ 518.176254][ T37] schedule_preempt_disabled+0x14/0x30 [ 518.181989][ T37] __mutex_lock+0x960/0x1bb0 [ 518.186582][ T37] ? __ww_mutex_lock_interruptible_slowpath+0x30/0x30 [ 518.193363][ T37] ? __kasan_check_write+0x18/0x20 [ 518.198536][ T37] ? _raw_spin_lock+0x92/0x120 [ 518.203385][ T37] ? __kasan_check_write+0x18/0x20 [ 518.208498][ T37] ? wake_up_q+0x10f/0x1c0 [ 518.212910][ T37] ? __mutex_unlock_slowpath+0x4b7/0x780 [ 518.218641][ T37] ? mutex_unlock+0x240/0x240 [ 518.223403][ T37] __mutex_lock_slowpath+0xe/0x20 [ 518.228440][ T37] mutex_lock+0x113/0x1d0 [ 518.232767][ T37] ? __cfi_mutex_lock+0x10/0x10 [ 518.237613][ T37] rcu_barrier+0x4d/0x540 [ 518.241988][ T37] ? __kasan_slab_free+0x6a/0x80 [ 518.247095][ T37] netdev_run_todo+0x118/0xce0 [ 518.251963][ T37] ? kvfree+0x39/0x50 [ 518.255966][ T37] ? netdev_state_change+0xaa/0x240 [ 518.261273][ T37] ? __cfi_netdev_run_todo+0x10/0x10 [ 518.266560][ T37] rtnl_unlock+0x12/0x20 [ 518.270818][ T37] tun_chr_close+0xc5/0x150 [ 518.275317][ T37] ? __cfi_tun_chr_close+0x10/0x10 [ 518.280867][ T37] __fput+0x1fb/0xa00 [ 518.284905][ T37] ? call_rcu+0x14/0x20 [ 518.289508][ T37] ____fput+0x20/0x30 [ 518.293573][ T37] task_work_run+0x1e5/0x260 [ 518.298168][ T37] ? __cfi_task_work_run+0x10/0x10 [ 518.303712][ T37] ? free_nsproxy+0x223/0x290 [ 518.308574][ T37] do_exit+0x9e3/0x2650 [ 518.312726][ T37] ? __cfi_do_exit+0x10/0x10 [ 518.317310][ T37] ? __kasan_check_write+0x18/0x20 [ 518.322519][ T37] ? _raw_spin_lock_irq+0x93/0x120 [ 518.327627][ T37] ? __kasan_check_read+0x15/0x20 [ 518.332673][ T37] ? cgroup_update_frozen+0x160/0x970 [ 518.338222][ T37] do_group_exit+0x229/0x2f0 [ 518.342805][ T37] ? cgroup_leave_frozen+0x16b/0x2b0 [ 518.348094][ T37] get_signal+0x1398/0x14e0 [ 518.352597][ T37] arch_do_signal_or_restart+0xbc/0x760 [ 518.358419][ T37] ? common_nsleep+0x93/0xb0 [ 518.363031][ T37] ? __cfi_arch_do_signal_or_restart+0x10/0x10 [ 518.369402][ T37] ? __se_sys_clock_nanosleep+0x31e/0x3b0 [ 518.375300][ T37] ? __kasan_check_read+0x15/0x20 [ 518.380347][ T37] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 518.386445][ T37] syscall_exit_to_user_mode+0x57/0xb0 [ 518.392018][ T37] do_syscall_64+0x63/0xf0 [ 518.396430][ T37] ? clear_bhb_loop+0x50/0xa0 [ 518.401117][ T37] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 518.407185][ T37] RIP: 0033:0x7f2c1195c84e [ 518.411796][ T37] RSP: 002b:00007f2c128e6f58 EFLAGS: 00000246 ORIG_RAX: 00000000000000e6 [ 518.420307][ T37] RAX: fffffffffffffdfc RBX: 00007f2c128e76c0 RCX: 00007f2c1195c84e [ 518.428900][ T37] RDX: 00007f2c128e6fb0 RSI: 0000000000000000 RDI: 0000000000000000 [ 518.437038][ T37] RBP: 00007f2c11a327e0 R08: 0000000000000000 R09: 0000000000000000 [ 518.445011][ T37] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 518.453079][ T37] R13: 00007f2c11c16128 R14: 00007f2c11c16090 R15: 00007ffe96f6fda8 [ 518.461065][ T37] [ 518.478259][ T36] kauditd_printk_skb: 1 callbacks suppressed [ 518.478278][ T36] audit: type=1400 audit(2000000236.860:91864): avc: denied { write } for pid=282 comm="syz-executor" path="pipe:[2861]" dev="pipefs" ino=2861 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 518.479548][ T37] INFO: task syz-executor:6300 blocked for more than 125 seconds. [ 518.484408][ T36] audit: type=1400 audit(2000000236.860:91865): avc: denied { write } for pid=282 comm="syz-executor" path="pipe:[2861]" dev="pipefs" ino=2861 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 519.043787][ T36] audit: type=1400 audit(2000000237.170:91866): avc: denied { write } for pid=282 comm="syz-executor" path="pipe:[2861]" dev="pipefs" ino=2861 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 519.168778][ T37] Not tainted syzkaller #0 [ 519.173787][ T37] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 519.680637][ T37] NMI backtrace for cpu 0 [ 519.680665][ T37] CPU: 0 UID: 0 PID: 37 Comm: khungtaskd Not tainted syzkaller #0 a14c28d9e62c02dc866229d1d178db2aa7df2752 [ 519.680694][ T37] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 519.680706][ T37] Call Trace: [ 519.680713][ T37] [ 519.680722][ T37] __dump_stack+0x21/0x30 [ 519.680751][ T37] dump_stack_lvl+0x140/0x1c0 [ 519.680771][ T37] ? __cfi_dump_stack_lvl+0x10/0x10 [ 519.680795][ T37] dump_stack+0x19/0x20 [ 519.680815][ T37] nmi_cpu_backtrace+0x2ba/0x2d0 [ 519.680841][ T37] ? rcu_read_unlock_special+0xb7/0x420 [ 519.680863][ T37] ? __cfi_nmi_cpu_backtrace+0x10/0x10 [ 519.680888][ T37] ? sched_show_task+0x85/0x530 [ 519.680910][ T37] ? __rcu_read_unlock+0xc0/0xc0 [ 519.680930][ T37] ? __cfi_nmi_raise_cpu_backtrace+0x10/0x10 [ 519.680953][ T37] ? __cfi_nmi_raise_cpu_backtrace+0x10/0x10 [ 519.680973][ T37] nmi_trigger_cpumask_backtrace+0x142/0x2c0 [ 519.681000][ T37] arch_trigger_cpumask_backtrace+0x14/0x20 [ 519.681029][ T37] watchdog+0xdad/0xf00 [ 519.681052][ T37] ? __kasan_check_write+0x18/0x20 [ 519.681077][ T37] ? __cfi_watchdog+0x10/0x10 [ 519.681101][ T37] ? __kasan_check_read+0x15/0x20 [ 519.681123][ T37] ? __kthread_parkme+0x137/0x180 [ 519.681147][ T37] ? schedule+0xc5/0x240 [ 519.681166][ T37] kthread+0x2c9/0x370 [ 519.681183][ T37] ? __cfi_watchdog+0x10/0x10 [ 519.681208][ T37] ? __cfi_kthread+0x10/0x10 [ 519.681225][ T37] ret_from_fork+0x67/0xa0 [ 519.681247][ T37] ? __cfi_kthread+0x10/0x10 [ 519.681265][ T37] ret_from_fork_asm+0x1a/0x30 [ 519.681291][ T37] [ 519.681299][ T37] Sending NMI from CPU 0 to CPUs 1: [ 519.876572][ C1] NMI backtrace for cpu 1 [ 519.876592][ C1] CPU: 1 UID: 0 PID: 20 Comm: rcuop/0 Not tainted syzkaller #0 a14c28d9e62c02dc866229d1d178db2aa7df2752 [ 519.876613][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 519.876622][ C1] RIP: 0010:veth_xmit+0x186/0xb20 [ 519.876642][ C1] Code: b0 01 00 00 48 89 d8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 80 3c 08 00 74 08 48 89 df e8 21 9c 6a fe 4d 01 e5 48 83 3b 00 <0f> 84 8c 00 00 00 48 8b 45 c8 48 8d 98 b8 00 00 00 48 89 d8 48 c1 [ 519.876653][ C1] RSP: 0018:ffffc90000230138 EFLAGS: 00000246 [ 519.876668][ C1] RAX: 1ffff11022c642a6 RBX: ffff888116321530 RCX: dffffc0000000000 [ 519.876679][ C1] RDX: ffff888103663900 RSI: 0000000000000001 RDI: 0000000000000002 [ 519.876690][ C1] RBP: ffffc900002301c0 R08: ffff888103663900 R09: 0000000000000002 [ 519.876700][ C1] R10: 0000000000000000 R11: ffffffff8374d8f0 R12: 0000000000000380 [ 519.876711][ C1] R13: ffff888116321380 R14: ffff8881169e3000 R15: ffff88813dcc4000 [ 519.876723][ C1] FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 519.876735][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 519.876746][ C1] CR2: 000055e47191a1f0 CR3: 000000010cb9a000 CR4: 00000000003526b0 [ 519.876764][ C1] Call Trace: [ 519.876770][ C1] [ 519.876778][ C1] dev_hard_start_xmit+0x21b/0x760 [ 519.876800][ C1] __dev_queue_xmit+0x1905/0x3690 [ 519.876817][ C1] ? __dev_queue_xmit+0x267/0x3690 [ 519.876835][ C1] ? kasan_save_track+0x4f/0x80 [ 519.876853][ C1] ? kasan_save_alloc_info+0x40/0x50 [ 519.876868][ C1] ? __kasan_slab_alloc+0x73/0x90 [ 519.876886][ C1] ? kmem_cache_alloc_noprof+0x1bf/0x410 [ 519.876903][ C1] ? skb_clone+0x229/0x460 [ 519.876930][ C1] ? br_flood+0x4ed/0x730 [ 519.876949][ C1] ? br_handle_frame_finish+0x12f9/0x1760 [ 519.876963][ C1] ? br_handle_frame+0x5a6/0xba0 [ 519.876976][ C1] ? __netif_receive_skb_core+0xfb1/0x3ab0 [ 519.876994][ C1] ? __cfi___dev_queue_xmit+0x10/0x10 [ 519.877010][ C1] ? __do_softirq+0xf/0x16 [ 519.877025][ C1] ? do_softirq+0xb8/0x110 [ 519.877044][ C1] ? __local_bh_enable_ip+0x74/0x80 [ 519.877061][ C1] ? rcu_do_batch+0x5d9/0xd40 [ 519.877078][ C1] ? rcu_nocb_cb_kthread+0x524/0xb30 [ 519.877096][ C1] ? kthread+0x2c9/0x370 [ 519.877110][ C1] ? ret_from_fork+0x67/0xa0 [ 519.877126][ C1] ? ret_from_fork_asm+0x1a/0x30 [ 519.877149][ C1] br_dev_queue_push_xmit+0x55c/0x700 [ 519.877169][ C1] ? __cfi_br_dev_queue_push_xmit+0x10/0x10 [ 519.877188][ C1] ? __skb_clone+0x47a/0x7a0 [ 519.877206][ C1] __br_forward+0x25c/0x390 [ 519.877225][ C1] br_flood+0x50e/0x730 [ 519.877245][ C1] br_handle_frame_finish+0x12f9/0x1760 [ 519.877261][ C1] ? __cfi_br_handle_frame_finish+0x10/0x10 [ 519.877277][ C1] br_handle_frame+0x5a6/0xba0 [ 519.877291][ C1] ? __cfi_br_handle_frame+0x10/0x10 [ 519.877305][ C1] __netif_receive_skb_core+0xfb1/0x3ab0 [ 519.877322][ C1] ? ip6_mc_input+0x516/0x6c0 [ 519.877340][ C1] ? sk_skb_reason_drop+0xd8/0x310 [ 519.877358][ C1] ? __cfi_ip6_mc_input+0x10/0x10 [ 519.877376][ C1] ? qdisc_run_end+0x120/0x120 [ 519.877392][ C1] ? ip6_rcv_finish+0x360/0x3e0 [ 519.877409][ C1] ? ipv6_rcv+0xf1/0x240 [ 519.877425][ C1] ? __cfi_ipv6_rcv+0x10/0x10 [ 519.877441][ C1] ? __cfi_ip6_rcv_finish+0x10/0x10 [ 519.877457][ C1] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 519.877472][ C1] process_backlog+0x3e5/0xad0 [ 519.877492][ C1] __napi_poll+0xd0/0x610 [ 519.877508][ C1] net_rx_action+0x5ea/0xd80 [ 519.877527][ C1] ? __cfi_net_rx_action+0x10/0x10 [ 519.877549][ C1] ? sched_clock+0x44/0x60 [ 519.877564][ C1] ? __cfi_sched_clock_cpu+0x10/0x10 [ 519.877581][ C1] ? irqtime_account_irq+0x51/0x1c0 [ 519.877597][ C1] handle_softirqs+0x1aa/0x630 [ 519.877616][ C1] __do_softirq+0xf/0x16 [ 519.877630][ C1] do_softirq+0xb8/0x110 [ 519.877647][ C1] [ 519.877652][ C1] [ 519.877658][ C1] ? __cfi_do_softirq+0x10/0x10 [ 519.877677][ C1] ? kernfs_free_rcu+0xf1/0x110 [ 519.877695][ C1] ? __cfi_kernfs_free_rcu+0x10/0x10 [ 519.877713][ C1] __local_bh_enable_ip+0x74/0x80 [ 519.877730][ C1] rcu_do_batch+0x5d9/0xd40 [ 519.877749][ C1] ? rcu_core+0xd30/0xd30 [ 519.877766][ C1] ? __kasan_check_write+0x18/0x20 [ 519.877784][ C1] ? _raw_spin_trylock+0xb5/0x140 [ 519.877799][ C1] ? __kasan_check_read+0x15/0x20 [ 519.877815][ C1] ? rcu_nocb_cb_kthread+0x50f/0xb30 [ 519.877836][ C1] rcu_nocb_cb_kthread+0x524/0xb30 [ 519.877861][ C1] ? __cfi_rcu_nocb_cb_kthread+0x10/0x10 [ 519.877882][ C1] ? __kasan_check_write+0x18/0x20 [ 519.877902][ C1] ? _raw_spin_lock_irqsave+0xc1/0x160 [ 519.877925][ C1] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 519.877941][ C1] ? _raw_spin_lock_irqsave+0xc1/0x160 [ 519.877959][ C1] ? set_cpus_allowed_ptr+0xa1/0xf0 [ 519.877984][ C1] ? __cfi_set_cpus_allowed_ptr+0x10/0x10 [ 519.878008][ C1] ? __kasan_check_read+0x15/0x20 [ 519.878027][ C1] ? __kthread_parkme+0x137/0x180 [ 519.878050][ C1] ? schedule+0xc5/0x240 [ 519.878069][ C1] kthread+0x2c9/0x370 [ 519.878085][ C1] ? __cfi_rcu_nocb_cb_kthread+0x10/0x10 [ 519.878109][ C1] ? __cfi_kthread+0x10/0x10 [ 519.878125][ C1] ret_from_fork+0x67/0xa0 [ 519.878145][ C1] ? __cfi_kthread+0x10/0x10 [ 519.878162][ C1] ret_from_fork_asm+0x1a/0x30 [ 519.878186][ C1] [ 522.077810][ C1] net_ratelimit: 126359 callbacks suppressed [ 522.077832][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.077862][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 522.084058][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.095958][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 522.107996][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.120017][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 522.131987][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.143954][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 522.156172][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.168027][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 527.087821][ C0] net_ratelimit: 154672 callbacks suppressed [ 527.087844][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 527.087878][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 527.093919][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 527.106156][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 527.118182][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 527.130476][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 527.142456][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 527.154611][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 527.166486][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:23:94:1a:ea:33, vlan:0) [ 527.178484][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)