last executing test programs: 40.448292609s ago: executing program 4 (id=3477): socket$unix(0x1, 0x5, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x24, &(0x7f0000000080)=0x1, 0x4) shutdown(r2, 0x0) recvmmsg(r2, &(0x7f0000001980)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/26, 0x11}}, {{0x0, 0x0, &(0x7f0000001300)=[{&(0x7f00000000c0)=""/47}, {&(0x7f0000000100)=""/224}, {&(0x7f0000000200)=""/4096}, {&(0x7f0000001200)=""/124}, {&(0x7f0000001280)=""/60}]}}, {{&(0x7f0000001380)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x0, &(0x7f0000001840)=[{&(0x7f0000001400)=""/149}, {&(0x7f0000001b00)=""/118}, {&(0x7f0000001540)=""/188}, {&(0x7f0000001600)=""/57}, {&(0x7f0000001640)=""/135}, {&(0x7f00000014c0)=""/101}, {&(0x7f0000001780)=""/171}], 0x0, &(0x7f00000018c0)=""/176}}], 0x15cbc1ab4c0933f, 0x0, 0x0) 29.08692813s ago: executing program 4 (id=3515): r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000100)={0xffffffff, "421ae3753785251500e9e29b00", 0xffffffffffffffff}) io_submit(0x0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 28.933646335s ago: executing program 2 (id=3516): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f0000000100)=0x401, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0xfffffffe, @empty, 0xffffffff}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x14e22, 0xfffffff9, @ipv4}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) listen(r2, 0xa7ba) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r3, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) r7 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r7, &(0x7f00000000c0)=[{&(0x7f0000000200)="580000001400192340834b80040d8c560a0677bc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) (fail_nth: 1) 28.928844304s ago: executing program 4 (id=3517): openat$cuse(0xffffffffffffff9c, &(0x7f0000001800), 0x2, 0x0) 28.883046272s ago: executing program 0 (id=3518): r0 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r0, &(0x7f0000000040), 0x10) listen(r0, 0x5) r1 = socket(0x28, 0x5, 0x0) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000280)={0x200000, 0x200000, 0x0, 0x0, 0x5989}) connect$vsock_stream(r1, &(0x7f0000000080), 0x10) setsockopt$sock_linger(r1, 0x1, 0x3c, &(0x7f00000000c0)={0x1, 0x79e}, 0x8) sendmmsg(r1, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="1b", 0x40000}], 0x1}}], 0x1, 0x24008094) 28.854844595s ago: executing program 0 (id=3519): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000280)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) socket$key(0xf, 0x3, 0x2) syz_usb_connect$hid(0x5, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) r5 = geteuid() r6 = getgid() setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0, r5, r6}, 0xc) connect$inet(r3, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000001580)={{{@in6=@private1, @in=@local, 0x0, 0x0, 0x4e22, 0x0, 0x2, 0x0, 0x20, 0x11}, {0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x10, 0x9}, {}, 0x6, 0x0, 0x1}, {{@in=@rand_addr=0x64010102, 0x4d2, 0x33}, 0x0, @in=@private=0xa010100, 0x3506, 0x0, 0x2, 0xb7, 0x2, 0xfffffff9}}, 0xe8) sendmmsg(r3, &(0x7f0000007fc0), 0x800001d, 0x1c) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) socket$inet6_sctp(0xa, 0x5, 0x84) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000080), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, 0x0) sendto$inet6(r0, &(0x7f00000002c0)="9e", 0x1, 0x41, &(0x7f0000000200)={0xa, 0x4e23, 0x10003, @loopback, 0x7}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x0, 0x10}, 0xc) writev(r0, &(0x7f0000000100)=[{&(0x7f0000001640)="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", 0x766}], 0x1) 28.803360551s ago: executing program 4 (id=3520): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_buf(r2, 0x29, 0x39, &(0x7f0000e86000)="0022040000ffffebfffffffeffffff0700000000ff000207835eeb1317b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2f", 0x68) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000340)={r5, r6, 0x25, 0x0, @val=@iter={0x0, 0xffffffffffffff13}}, 0x20) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r7, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r7, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r8 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x800) ioctl$SG_GET_VERSION_NUM(r8, 0x2284, &(0x7f0000000080)) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r7, 0x11a, 0x1, &(0x7f0000000500)=@gcm_128={{0x303}, "a95972fc5ec50719", "8e083700daf38a6d69e9b5e9c2f133d7", "6a3a05b9", "12772541f8eb02bb"}, 0x28) shutdown(r7, 0x1) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='freezer.state\x00', 0x275a, 0x0) write$cgroup_int(r9, &(0x7f0000000000), 0xffffff6a) sendfile(r7, r9, 0x0, 0xffffffff004) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x10000, 0x3, 0x1, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xfffffffffffffff7}, {0x0, 0x8, 0xfffffffffffffffc, 0x8}, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in6=@empty, 0x2, 0x6c}, 0xa, @in=@empty, 0x0, 0x5, 0x0, 0xb7}}, 0xe8) syz_usb_connect(0x2, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="120100004106cd40cd060f011bd50000000109022400010000800009040bfd02337761000200048140060905870308"], 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r10, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x401, 0xfffffffc, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x71f43, 0x20b}, [@IFLA_MASTER={0x8, 0xa, r11}, @IFLA_LINK={0x8, 0x5, r11}, @IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}]}, 0x44}, 0x1, 0x0, 0x0, 0x2004d808}, 0x0) 27.582944302s ago: executing program 1 (id=3523): openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000004002, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0), 0x8) sendto$inet6(r0, &(0x7f0000000040)='l', 0x1, 0x0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 27.228810218s ago: executing program 2 (id=3524): ioctl$VIDIOC_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, &(0x7f0000000380)={0x0, @bt={0x0, 0x5, 0x0, 0x3, 0x0, 0xb, 0x7ff, 0x0, 0x3, 0x14, 0x1, 0x44f9, 0x5, 0x0, 0x10, 0x4, {0xf, 0x80000001}, 0x7f, 0x6}}) 27.171137071s ago: executing program 2 (id=3525): r0 = landlock_create_ruleset(&(0x7f0000000040)={0x556, 0x2, 0x3}, 0x18, 0x0) landlock_restrict_self(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg(r2, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0xb49, 0x2, 0x8, 0x0, 0x3}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000009a40)={&(0x7f00000003c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x14, 0x0, 0xa, 0x101, 0x0, 0x0, {0x1, 0x0, 0x4}}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x801, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWRULE={0x28, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN_ID={0x8, 0xb, 0x1, 0x0, 0x3}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0x90}}, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r3, &(0x7f0000000cc0)=[{{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000700)}, {&(0x7f0000000d40)="b1f56ee29c433328d3b2a83bd97e37007087acae7568edff43ed556d76770122635aea1dc48755381c71590cd542e796cc2669e2af442a03760c5cdfc691b3da35ad6a8d2ef9c2baa53a8dec36a2e434d46e643a1277b1dd932f3ef2cf46c257d6a19523b8b789ef34b46e461725b5e437323385b88c368f8bb5b933aa9169f5f7b51dd5319b8016623d1863d70581691a79a6678db1e5e7fa1c98c5b9e4a87272e9c4a1bd98dbb2ab76919ba5c1020e80bd0659e82d861dc6fe4c62639134c504aa438689d28748c22ebfe2772d64b64e706d94864d785dcc6b24fff7858b2a4e", 0xe1}, {&(0x7f0000000b80)}], 0x3}}, {{0x0, 0x0, 0x0}}], 0x2, 0xc0) 26.683349676s ago: executing program 1 (id=3526): socket$inet6(0xa, 0x3, 0x4) socket(0x10, 0x80002, 0xfffffffe) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0xfffc, @broadcast}, 0x2}}, 0x2e) prlimit64(0x0, 0xe, &(0x7f0000000000)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$evdev(0x0, 0x1, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) r1 = socket$nl_generic(0x10, 0x3, 0x10) getpgid(0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x14, r2, 0x9c3fa077fa966179, 0x0, 0x0, {{0x7e}, {@void, @void}}}, 0x14}, 0x1, 0x0, 0x0, 0x8}, 0x4040800) r3 = openat$comedi(0xffffff9c, &(0x7f0000000100)='/dev/comedi4\x00', 0x1, 0x0) ioctl$COMEDI_CMDTEST(r3, 0x8040640a, &(0x7f0000000080)={0x0, 0x30000, 0x0, 0x9, 0x20, 0x8, 0x0, 0x7, 0x20, 0xfffffffc, 0xffffffff, 0x0, 0x0, 0x1f, 0x0}) write$6lowpan_enable(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400) syz_emit_vhci(&(0x7f0000000080)=@HCI_EVENT_PKT={0x4, @hci_ev_conn_request={{0x4, 0xa}, {@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, '|P3', 0x1}}}, 0xd) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x20010, 0xffffffffffffffff, 0x0) mlock(&(0x7f00006ee000/0x4000)=nil, 0x4000) syz_emit_ethernet(0xf8, &(0x7f0000000780)=ANY=[], 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1335f0a6) 25.822977023s ago: executing program 3 (id=3527): io_setup(0x5, 0x0) r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000100)={0xffffffff, "421ae3753785251500e9e29b00", 0xffffffffffffffff}) io_submit(0x0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 25.545834886s ago: executing program 1 (id=3528): r0 = socket$inet6(0xa, 0x3, 0x5) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e24, 0x0, @empty}, 0x1c) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) clock_adjtime(0xffffffd3, &(0x7f00000001c0)) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, 0x0, 0x0) setpriority(0x2, 0x0, 0x6) r4 = socket(0x10, 0x80002, 0x0) r5 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[], 0x38}, 0x1, 0x0, 0x0, 0x60042800}, 0x40084c0) sendmmsg$alg(r4, 0x0, 0x0, 0x0) r7 = syz_io_uring_setup(0x497, &(0x7f0000000400)={0x0, 0x3f73, 0x100, 0x0, 0x1a}, &(0x7f0000000340)=0x0, &(0x7f0000000600)=0x0) io_uring_register$IORING_REGISTER_PBUF_RING(r7, 0x16, &(0x7f0000000040)={&(0x7f0000001000)={[{0x0, 0xffffffffffffff3a, 0x3, 0xf4}]}, 0x1, 0x1}, 0x1) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f00000000c0)={'wg0\x00', 0x0}) sendmsg$nl_route_sched(r10, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@getqdisc={0x24, 0x26, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x0, 0x0, r11, {0x5, 0x8}, {0x8, 0x3}, {0xb, 0x2}}}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) syz_memcpy_off$IO_URING_METADATA_GENERIC(r8, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) r12 = socket$inet_mptcp(0x2, 0x1, 0x106) syz_io_uring_submit(r8, r9, &(0x7f00000002c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x20, 0x10, r12, 0x0, 0x0, 0x0, 0x262, 0x1, {0x1}}) io_uring_enter(r7, 0x3516, 0x0, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000100)={0x3c0, 0x300, 0x3c00, 0x1000, 0xbb3a, 0x2, 0x0, 0x100, {0x0, 0x40002000}, {0x0, 0x2, 0x1}, {0x4000000, 0x7}, {0xfe, 0x8, 0x40000}, 0x0, 0x3f0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3}) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1e, 0x0, 0x11) 25.430995312s ago: executing program 4 (id=3529): r0 = socket$inet(0x2, 0x3, 0x5) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x4e20, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1c000000000000000000000007000000830b040a0101027f00000100000000001c0000004100000000000000087bc64c5499e98b2531b8894699aa651f599d235128811c5aea0823e47f6ed81016f086458af02214200000fdd8a0f9ed41b0e3cf4b42aeafc7e6f1c844680ba73dbe30b363259bebb9f9ec74281652ef9c238964831ceebb0f083a345de1424baa9c5eafe761eae5eb6b22708742c0f418a0fd301c5e216e51de9255fb072485643caa0038eeaa0bb2b42b12571dde467f8031bf6c91"], 0x40}, 0x40088c4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000010400000200fddbdf2500000000", @ANYRES32=0x0, @ANYBLOB="0380000080800100492f91d101000000"], 0x34}, 0x1, 0x0, 0x0, 0x240008c4}, 0x4054) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x50, 0x10, 0x40d, 0x70bd2a, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_BC_QUEUE_LEN={0x8, 0x9, 0xb}]}}}, @IFLA_ALT_IFNAME={0x14, 0x35, 'macvlan0\x00'}]}, 0x50}}, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x8001, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000140)={0x2, 0x0, [{0x10, 0x0, 0xfffffffffffffff0}, {0x10, 0x0, 0x3fb}]}) r5 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000500)=ANY=[@ANYBLOB="12010000000000207d1e5a2d00000000000109022400010000000009040000010300000009210000000122080009058103"], 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) syz_usb_control_io$hid(r5, &(0x7f0000000140)={0x24, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="002208000000a2"], 0x0}, 0x0) syz_usb_connect$cdc_ncm(0x4, 0xd1, &(0x7f0000000040)=ANY=[@ANYBLOB="12011003020000182505a1a44000010203010902bf0002010650000900000000020d00000524060001082400a9b30d240f010a0000000300ff000606241a05001407240a050905580c240c00000000a90c0900030424020204240200042406024424"], 0x0) syz_usb_connect(0x3, 0xf5, &(0x7f0000000000)=ANY=[@ANYRES8=r0], 0x0) syz_usb_connect(0x3, 0x36, &(0x7f0000000340)=ANY=[@ANYBLOB="120100001a77aa4094225b4210a2010203010902240001000000000904000002923350000905f402ff030000000905ba"], 0x0) socket$inet(0x2, 0x3, 0x5) (async) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) (async) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x4e20, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1c000000000000000000000007000000830b040a0101027f00000100000000001c0000004100000000000000087bc64c5499e98b2531b8894699aa651f599d235128811c5aea0823e47f6ed81016f086458af02214200000fdd8a0f9ed41b0e3cf4b42aeafc7e6f1c844680ba73dbe30b363259bebb9f9ec74281652ef9c238964831ceebb0f083a345de1424baa9c5eafe761eae5eb6b22708742c0f418a0fd301c5e216e51de9255fb072485643caa0038eeaa0bb2b42b12571dde467f8031bf6c91"], 0x40}, 0x40088c4) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000010400000200fddbdf2500000000", @ANYRES32=0x0, @ANYBLOB="0380000080800100492f91d101000000"], 0x34}, 0x1, 0x0, 0x0, 0x240008c4}, 0x4054) (async) socket$nl_route(0x10, 0x3, 0x0) (async) sendmsg$nl_route(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x50, 0x10, 0x40d, 0x70bd2a, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_BC_QUEUE_LEN={0x8, 0x9, 0xb}]}}}, @IFLA_ALT_IFNAME={0x14, 0x35, 'macvlan0\x00'}]}, 0x50}}, 0x8000) (async) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x8001, 0x0) (async) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) (async) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) (async) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000140)={0x2, 0x0, [{0x10, 0x0, 0xfffffffffffffff0}, {0x10, 0x0, 0x3fb}]}) (async) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000500)=ANY=[@ANYBLOB="12010000000000207d1e5a2d00000000000109022400010000000009040000010300000009210000000122080009058103"], 0x0) (async) syz_usb_control_io$hid(r5, 0x0, 0x0) (async) syz_usb_control_io$hid(r5, &(0x7f0000000140)={0x24, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="002208000000a2"], 0x0}, 0x0) (async) syz_usb_connect$cdc_ncm(0x4, 0xd1, &(0x7f0000000040)=ANY=[@ANYBLOB="12011003020000182505a1a44000010203010902bf0002010650000900000000020d00000524060001082400a9b30d240f010a0000000300ff000606241a05001407240a050905580c240c00000000a90c0900030424020204240200042406024424"], 0x0) (async) syz_usb_connect(0x3, 0xf5, &(0x7f0000000000)=ANY=[@ANYRES8=r0], 0x0) (async) syz_usb_connect(0x3, 0x36, &(0x7f0000000340)=ANY=[@ANYBLOB="120100001a77aa4094225b4210a2010203010902240001000000000904000002923350000905f402ff030000000905ba"], 0x0) (async) 25.299562512s ago: executing program 3 (id=3530): syz_open_dev$loop(0x0, 0x47ffffa, 0x62800) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0xa4, 0x30, 0x1, 0x0, 0x0, {}, [{0x90, 0x1, [@m_ct={0x44, 0x2, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x9d, 0x11e41e7a, 0x20000000, 0x0, 0xf}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x1}}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x804}, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) r4 = socket$netlink(0x10, 0x3, 0x1) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000001140)=ANY=[@ANYRESDEC=r2], 0x38}, 0x1, 0x0, 0x0, 0x854}, 0x0) connect$inet(r3, 0x0, 0x0) unshare(0x22020600) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r5 = fsmount(0xffffffffffffffff, 0x0, 0x80) openat$cgroup_ro(r5, &(0x7f0000001100)='pids.events\x00', 0x5000000, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000000)=0x655e, 0x4) 25.183173076s ago: executing program 0 (id=3531): creat(&(0x7f0000001dc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1ab) 24.899054972s ago: executing program 2 (id=3532): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) io_cancel(0x0, 0xfffffffffffffffe, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x2121) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}, 0x3a}], [], 0x2f}) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r4, 0x4028700f, &(0x7f0000000c80)={0x3, 0x1, {0x30, 0x1, 0xd, 0xa, 0xffffffe, 0x64, 0x3fffffc, 0xe7, 0x1}}) getdents(r3, &(0x7f0000000500)=""/184, 0xb8) 24.775800262s ago: executing program 0 (id=3533): madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0xd, &(0x7f0000000080)=ANY=[@ANYBLOB="1802000000000000000000000000000085100000010000009500000000000000180000000001000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000028850000007000000095"], &(0x7f0000000000)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0xa}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='mm_page_free_batched\x00', r0}, 0x18) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) 23.923720158s ago: executing program 3 (id=3534): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ptrace$ARCH_SET_CPUID(0x1e, 0x0, 0x0, 0x1012) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0500000003f01f00810000007f00000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2, 0x0, 0x0) syz_kvm_add_vcpu$x86(0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000100)=0x1800, 0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000001ac0)={&(0x7f0000000000)={0x20, 0x2d, 0x1, 0x70bd26, 0x25dfdbfc, {0x4}, [@typed={0xc, 0xc, 0x0, 0x0, @u64=0x100000001}]}, 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x4000804) 23.235592645s ago: executing program 2 (id=3535): ioctl$VIDIOC_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, &(0x7f0000000380)={0x0, @bt={0x0, 0x5, 0x0, 0x3, 0x0, 0xb, 0x7ff, 0x0, 0x3, 0x14, 0x1, 0x44f9, 0x5, 0x0, 0x10, 0x4, {0xf, 0x80000001}, 0x7f, 0x6}}) 22.732865169s ago: executing program 2 (id=3536): r0 = syz_init_net_socket$ax25(0x3, 0x5, 0xcb) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2e, 0x0, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)=@in={0x2, 0x4e21, @local}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x804c040}, 0x4040814) r3 = socket$inet6(0xa, 0x3, 0x3e) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000002100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000090a010400000000000000000a0000040900010073797a310000000008000540000000040900020073797a310000000008000a40fffffffc200011800e000100636f6e6e6c696d69740000000c00028008000140fffff27414000000110001"], 0x84}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x5000, 0x0, @loopback, 0x5}, 0x1c) writev(r3, &(0x7f00000000c0)=[{&(0x7f0000000100)=',', 0xffdf}], 0x1) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x40000000040201, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0), 0xa8202, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x4040040) close_range(r5, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bind$ax25(r0, &(0x7f0000000540)={{0x3, @bcast, 0x1}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) syz_genetlink_get_family_id$nl80211(&(0x7f00000006c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) 22.532208666s ago: executing program 0 (id=3537): mlockall(0x6) 16.977565496s ago: executing program 1 (id=3538): io_setup(0x5, &(0x7f0000000180)=0x0) r1 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r1, 0xc0285700, &(0x7f0000000100)={0xffffffff, "421ae3753785251500e9e29b00", 0xffffffffffffffff}) io_submit(r0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) 16.867548428s ago: executing program 0 (id=3539): socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x80000, 0xd74) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) syz_open_dev$vim2m(&(0x7f0000000000), 0x8000000000, 0x2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './mnt\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000140), 0x10) r4 = syz_io_uring_setup(0x835, &(0x7f00000000c0)={0x0, 0x679d, 0x400, 0x2000006, 0x3ce}, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x10c, &(0x7f0000000080)=0xa, 0x0, 0x4) r7 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x40e02, 0x0) write$rfkill(r7, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) connect$unix(r8, &(0x7f0000000440)=@abs={0x0, 0x0, 0x4e22}, 0x6e) recvmmsg(r8, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_io_uring_setup(0x65e9, &(0x7f0000000180)={0x0, 0x79af, 0x200, 0x3, 0x40024e}, &(0x7f0000000340)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r9, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) r11 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r9, r10, &(0x7f00000002c0)=@IORING_OP_SHUTDOWN={0x22, 0x0, 0x0, r8, 0x0, 0x0, 0x1, 0x0, 0x1, {0x0, r11}}) syz_io_uring_submit(r5, r6, &(0x7f00000002c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x42, 0x2000, @fd=r7, 0xed19, 0x0, 0x0, 0x1f, 0x1, {0x0, r11}}) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000002c0)='rxrpc_receive\x00', r12, 0x0, 0x8}, 0x18) socket(0xa, 0x3, 0x3a) r13 = openat$kvm(0x0, &(0x7f0000000040), 0x0, 0x0) r14 = ioctl$KVM_CREATE_VM(r13, 0xae01, 0x0) r15 = ioctl$KVM_CREATE_VCPU(r14, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r15, 0xc048aeca, &(0x7f0000000280)) 16.188718855s ago: executing program 3 (id=3540): io_setup(0x5, 0x0) r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000100)={0xffffffff, "421ae3753785251500e9e29b00", 0xffffffffffffffff}) io_submit(0x0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 16.01208969s ago: executing program 3 (id=3541): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = dup(r0) r2 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x2000) mmap$qrtrtun(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000003, 0x40010, r2, 0xfffffffffffffffe) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0x6, @loopback, 0x3}], 0x1c) sendmsg$inet6(r0, &(0x7f0000000800)={&(0x7f0000000080)={0xa, 0x4e24, 0x8, @loopback, 0x4}, 0x1c, &(0x7f0000000380)=[{&(0x7f00000000c0)="88", 0x1}], 0x1}, 0x4048043) add_key(&(0x7f00000006c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000680)={0x0, 0xffff7fff}, 0x55) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[], 0x7c}}, 0x40054) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r4 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r4, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) openat(0xffffffffffffff9c, 0x0, 0x20842, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e22}, 0x21) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) r6 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r6}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r5, 0x0, r7, 0x0, 0xae6, 0x4) 15.900740214s ago: executing program 4 (id=3542): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1342, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000540)="89e7ee0c7cdad9b4b47380c988cafbe863ca", 0x12}, {&(0x7f0000000100)}], 0x2) 14.925029544s ago: executing program 3 (id=3543): r0 = socket$inet6(0xa, 0x3, 0x5) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000080)={0x1d, r2, 0x10000000000, {0x2, 0xff, 0x3}, 0xfe}, 0x18) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280), 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0xc002, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r6, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) removexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)=@known='system.posix_acl_default\x00') bind$can_j1939(r4, &(0x7f0000000340)={0x1d, r5, 0x0, {0x2, 0x0, 0x6}, 0xfe}, 0x18) setsockopt$sock_int(r4, 0x1, 0x6, &(0x7f0000000040)=0x1, 0x4) sendmsg$inet(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="81b641f1f3843704b6", 0x9}], 0x1}, 0x4048090) userfaultfd(0x80801) sendmsg$nl_route_sched(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@newtfilter={0x24, 0x11, 0x1, 0x70bd28, 0x0, {0x0, 0x0, 0x74, r5, {0xfffd, 0xffeb}, {0x1, 0x1}, {0xfff2, 0xd}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x4012}, 0x850) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x800, 0x0, 0x3, 0x9}, 0x20) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000100)={'veth0_to_hsr\x00', {0x2, 0x0, @loopback}}) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0xffffffc3, 0x4) sendmmsg(r0, &(0x7f0000000500)=[{{&(0x7f0000000040)=@l2tp6={0xa, 0x0, 0x7080000, @private2, 0x4, 0x4}, 0x80, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000ebffffff000000006bc9000000a6000000200000008d9a7bc232fe05066e06e5e1cfc3ee6544de6dfbc61217c07f09f87a7de9a4d814f55ae1ca48568fe375f353ef85fec3f4b5596f73d636beec25c8b3f850022072bd000000000000"], 0x18}}], 0x1, 0x4000000) 14.862738724s ago: executing program 1 (id=3544): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x3, 0x3, &(0x7f0000000300)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (fail_nth: 1) 13.905007532s ago: executing program 1 (id=3545): socket$alg(0x26, 0x5, 0x0) socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = eventfd(0x5) r2 = socket$can_bcm(0x1d, 0x2, 0x2) r3 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) r4 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r4, 0x3b81, &(0x7f0000000380)={0xc, 0x0, 0x0}) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN_FLAGS(r4, 0x3ba0, &(0x7f0000000200)={0x48, 0x2, r5, 0x0, 0x0, 0x0, 0x0}) ioctl$IOMMU_IOAS_ALLOC(r4, 0x3b81, &(0x7f0000000140)={0xc, 0x0, 0x0}) ioctl$IOMMU_HWPT_ALLOC$TEST(r4, 0x3b89, &(0x7f00000002c0)={0x28, 0x3, r6, r7, 0x0, 0x0, 0xdead, 0x0, 0x0}) ioctl$IOMMU_HWPT_ALLOC$NONE(r4, 0x3b89, &(0x7f0000000100)={0x28, 0x0, r6, r5, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f0000000180)={0xc, 0x0, 0x0}) ioctl$IOMMU_HWPT_ALLOC$NONE(r3, 0x3b89, &(0x7f00000001c0)={0x28, 0x2, r6, r8, 0x0, 0x0, 0x0, 0x86, &(0x7f0000000300)="e5e538bd7b0fdb85d7aabdf0291ac6d28792ac6825e77df78487c6eb2300443610974a86e24d719b28cc515c0a4a5c0cc0cd29619503a06d529835cd42cd2a0ee1ac53e14d8c2e584bcdb7b9a921d06e35d3a5ee92ce45af7ce92fad5909624431058f8a5168f1507cbb3b2f430d9de6ba5fc13f2ef140d113aa0fb68a9f56c8182fae6b4d62"}) connect$can_bcm(r2, &(0x7f0000000140), 0x10) prlimit64(0x0, 0x1, &(0x7f00000001c0)={0x7, 0x400}, 0x0) r9 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) write$binfmt_script(r9, &(0x7f00000002c0)={'#! ', '', [{0x20, '\x0f\x10\t'}]}, 0x8) close(r9) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r10 = syz_io_uring_setup(0x835, &(0x7f00000000c0)={0x0, 0x679a, 0x400, 0x2000006, 0x3ce}, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r11, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r11, r12, &(0x7f00000002c0)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r2, 0x0, &(0x7f0000000240)="144024aeae8b2b5d63f7449a372e1406d4defe495b5744eed6801d1d51e1d3fcdcf25bdf4a5f2ef4b45d6898757795c858f0c3d4b26bd644", 0x38, 0x2400c0c7, 0x1}) r13 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r13, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c0000003e000701fefeffff00000000017c0000040042800c00018006000600800a000008000280040017"], 0x2c}, 0x1, 0x0, 0x0, 0xc000}, 0xc000) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r14, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNGETFILTER(r14, 0x801054db, 0x0) io_uring_enter(r10, 0x3516, 0x0, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000240)=r1) 0s ago: executing program 32 (id=3536): r0 = syz_init_net_socket$ax25(0x3, 0x5, 0xcb) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2e, 0x0, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)=@in={0x2, 0x4e21, @local}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x804c040}, 0x4040814) r3 = socket$inet6(0xa, 0x3, 0x3e) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000002100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000090a010400000000000000000a0000040900010073797a310000000008000540000000040900020073797a310000000008000a40fffffffc200011800e000100636f6e6e6c696d69740000000c00028008000140fffff27414000000110001"], 0x84}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x5000, 0x0, @loopback, 0x5}, 0x1c) writev(r3, &(0x7f00000000c0)=[{&(0x7f0000000100)=',', 0xffdf}], 0x1) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x40000000040201, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0), 0xa8202, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x4040040) close_range(r5, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bind$ax25(r0, &(0x7f0000000540)={{0x3, @bcast, 0x1}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) syz_genetlink_get_family_id$nl80211(&(0x7f00000006c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) kernel console output (not intermixed with test programs): o_register_clone_buffers+0xca/0x1010 [ 1063.751387][T18265] ? __pfx_io_register_clone_buffers+0x10/0x10 [ 1063.751412][T18265] ? proc_fail_nth_write+0x9f/0x220 [ 1063.751437][T18265] ? __pfx___mutex_trylock_common+0x10/0x10 [ 1063.751468][T18265] __io_uring_register+0x1735/0x2440 [ 1063.751489][T18265] ? trace_contention_end+0xdd/0x130 [ 1063.751505][T18265] ? __pfx___io_uring_register+0x10/0x10 [ 1063.751530][T18265] ? __pfx___mutex_lock+0x10/0x10 [ 1063.751558][T18265] ? __fget_files+0x20e/0x3c0 [ 1063.751582][T18265] __x64_sys_io_uring_register+0x169/0x280 [ 1063.751606][T18265] do_syscall_64+0xcd/0x4e0 [ 1063.751630][T18265] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1063.751647][T18265] RIP: 0033:0x7f75fa98eba9 [ 1063.751660][T18265] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1063.751675][T18265] RSP: 002b:00007f75fb8dd038 EFLAGS: 00000246 ORIG_RAX: 00000000000001ab [ 1063.751691][T18265] RAX: ffffffffffffffda RBX: 00007f75fabd5fa0 RCX: 00007f75fa98eba9 [ 1063.751703][T18265] RDX: 0000200000000280 RSI: 000000000000001e RDI: 0000000000000004 [ 1063.751712][T18265] RBP: 00007f75fb8dd090 R08: 0000000000000000 R09: 0000000000000000 [ 1063.751722][T18265] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000001 [ 1063.751731][T18265] R13: 00007f75fabd6038 R14: 00007f75fabd5fa0 R15: 00007fffefbd54f8 [ 1063.751753][T18265] [ 1064.279591][ T30] audit: type=1400 audit(1758254057.170:4079): avc: denied { create } for pid=18266 comm="syz.0.3257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1064.441645][ T30] audit: type=1400 audit(1758254057.320:4080): avc: denied { mounton } for pid=18272 comm="syz.4.3258" path="/proc/80/task" dev="proc" ino=70236 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1064.592695][T18282] netlink: 'syz.1.3261': attribute type 3 has an invalid length. [ 1064.617619][T18282] netlink: 'syz.1.3261': attribute type 1 has an invalid length. [ 1064.635120][T18282] netlink: 212 bytes leftover after parsing attributes in process `syz.1.3261'. [ 1064.931467][T14576] usb 3-1: new high-speed USB device number 38 using dummy_hcd [ 1065.045858][ T30] audit: type=1400 audit(1758254057.950:4081): avc: denied { read } for pid=18291 comm="syz.3.3264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1065.104002][T14576] usb 3-1: Using ep0 maxpacket: 32 [ 1065.111105][T14576] usb 3-1: config 0 has an invalid interface number: 152 but max is 0 [ 1065.119328][T14576] usb 3-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1065.130761][T14576] usb 3-1: config 0 has no interface number 0 [ 1065.136885][T14576] usb 3-1: config 0 interface 152 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1065.183251][ T30] audit: type=1400 audit(1758254058.060:4082): avc: denied { setopt } for pid=18291 comm="syz.3.3264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1065.333761][T14576] usb 3-1: config 0 interface 152 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 11 [ 1065.364304][T14576] usb 3-1: New USB device found, idVendor=1943, idProduct=2255, bcdDevice= 6.d2 [ 1065.391431][T14576] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1065.411592][T14576] usb 3-1: config 0 descriptor?? [ 1065.530126][T14576] s2255 3-1:0.152: Could not find bulk-in endpoint [ 1065.973250][ T30] audit: type=1400 audit(1758254058.630:4083): avc: denied { create } for pid=18287 comm="syz.2.3262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1066.027164][ T30] audit: type=1400 audit(1758254058.900:4084): avc: denied { write } for pid=18287 comm="syz.2.3262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1066.041473][T14576] Sensoray 2255 driver load failed: 0xfffffff4 [ 1066.101425][T14576] s2255 3-1:0.152: probe with driver s2255 failed with error -12 [ 1066.531800][T14576] usb 3-1: USB disconnect, device number 38 [ 1066.646430][T18306] openvswitch: netlink: Key 0 has unexpected len 20 expected 0 [ 1067.582027][T18319] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 1068.073595][ T30] audit: type=1400 audit(1758254060.980:4085): avc: denied { create } for pid=18316 comm="syz.2.3270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 1068.127271][ T30] audit: type=1400 audit(1758254060.980:4086): avc: denied { write } for pid=18316 comm="syz.2.3270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 1068.174944][ T30] audit: type=1400 audit(1758254060.980:4087): avc: denied { create } for pid=18316 comm="syz.2.3270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 1068.241836][ T30] audit: type=1400 audit(1758254061.120:4088): avc: denied { unmount } for pid=17323 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1068.699268][T18329] fuse: Unknown parameter '18446744073709551615ÿ' [ 1068.730123][T18331] netlink: 148 bytes leftover after parsing attributes in process `syz.0.3274'. [ 1068.742106][T18333] FAULT_INJECTION: forcing a failure. [ 1068.742106][T18333] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1068.791299][T18331] A link change request failed with some changes committed already. Interface ip6_vti0 may have been left with an inconsistent configuration, please check. [ 1068.872930][T18333] CPU: 0 UID: 0 PID: 18333 Comm: syz.4.3275 Not tainted syzkaller #0 PREEMPT(full) [ 1068.872954][T18333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1068.872965][T18333] Call Trace: [ 1068.872970][T18333] [ 1068.872977][T18333] dump_stack_lvl+0x16c/0x1f0 [ 1068.873004][T18333] should_fail_ex+0x512/0x640 [ 1068.873036][T18333] _copy_from_user+0x2e/0xd0 [ 1068.873061][T18333] copy_msghdr_from_user+0x98/0x160 [ 1068.873084][T18333] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1068.873118][T18333] ___sys_sendmsg+0xfe/0x1d0 [ 1068.873141][T18333] ? __pfx____sys_sendmsg+0x10/0x10 [ 1068.873192][T18333] __sys_sendmsg+0x16d/0x220 [ 1068.873214][T18333] ? __pfx___sys_sendmsg+0x10/0x10 [ 1068.873251][T18333] do_syscall_64+0xcd/0x4e0 [ 1068.873276][T18333] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1068.873293][T18333] RIP: 0033:0x7f740098eba9 [ 1068.873307][T18333] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1068.873323][T18333] RSP: 002b:00007f7401850038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1068.873340][T18333] RAX: ffffffffffffffda RBX: 00007f7400bd5fa0 RCX: 00007f740098eba9 [ 1068.873351][T18333] RDX: 0000000000000000 RSI: 0000200000000400 RDI: 0000000000000006 [ 1068.873362][T18333] RBP: 00007f7401850090 R08: 0000000000000000 R09: 0000000000000000 [ 1068.873372][T18333] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1068.873382][T18333] R13: 00007f7400bd6038 R14: 00007f7400bd5fa0 R15: 00007ffd46adb3b8 [ 1068.873405][T18333] [ 1069.260829][T18344] netlink: 'syz.2.3277': attribute type 12 has an invalid length. [ 1069.408846][T18349] FAULT_INJECTION: forcing a failure. [ 1069.408846][T18349] name failslab, interval 1, probability 0, space 0, times 0 [ 1069.431649][T18349] CPU: 0 UID: 0 PID: 18349 Comm: syz.3.3279 Not tainted syzkaller #0 PREEMPT(full) [ 1069.431672][T18349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1069.431682][T18349] Call Trace: [ 1069.431687][T18349] [ 1069.431694][T18349] dump_stack_lvl+0x16c/0x1f0 [ 1069.431722][T18349] should_fail_ex+0x512/0x640 [ 1069.431743][T18349] ? fs_reclaim_acquire+0xae/0x150 [ 1069.431768][T18349] ? tomoyo_realpath_from_path+0xc2/0x6e0 [ 1069.431794][T18349] should_failslab+0xc2/0x120 [ 1069.431815][T18349] __kmalloc_noprof+0xd2/0x510 [ 1069.431839][T18349] tomoyo_realpath_from_path+0xc2/0x6e0 [ 1069.431867][T18349] ? tomoyo_profile+0x47/0x60 [ 1069.431886][T18349] tomoyo_path_number_perm+0x245/0x580 [ 1069.431907][T18349] ? tomoyo_path_number_perm+0x237/0x580 [ 1069.431932][T18349] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 1069.431956][T18349] ? find_held_lock+0x2b/0x80 [ 1069.432010][T18349] ? find_held_lock+0x2b/0x80 [ 1069.432030][T18349] ? hook_file_ioctl_common+0x145/0x410 [ 1069.432055][T18349] ? __fget_files+0x20e/0x3c0 [ 1069.432079][T18349] security_file_ioctl+0x9b/0x240 [ 1069.432105][T18349] __x64_sys_ioctl+0xb7/0x210 [ 1069.432133][T18349] do_syscall_64+0xcd/0x4e0 [ 1069.432157][T18349] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1069.432174][T18349] RIP: 0033:0x7fb255b8eba9 [ 1069.432190][T18349] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1069.432206][T18349] RSP: 002b:00007fb256994038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1069.432223][T18349] RAX: ffffffffffffffda RBX: 00007fb255dd5fa0 RCX: 00007fb255b8eba9 [ 1069.432234][T18349] RDX: 0000000000000000 RSI: 00000000000007b0 RDI: 0000000000000003 [ 1069.432245][T18349] RBP: 00007fb256994090 R08: 0000000000000000 R09: 0000000000000000 [ 1069.432254][T18349] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1069.432265][T18349] R13: 00007fb255dd6038 R14: 00007fb255dd5fa0 R15: 00007ffe539e5d28 [ 1069.432287][T18349] [ 1069.432338][T18349] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1069.433154][T18352] netlink: 'syz.0.3282': attribute type 4 has an invalid length. [ 1069.696397][T18352] netlink: 152 bytes leftover after parsing attributes in process `syz.0.3282'. [ 1069.806001][T18352] A link change request failed with some changes committed already. Interface bond0 may have been left with an inconsistent configuration, please check. [ 1070.173109][ T30] audit: type=1400 audit(1758254063.070:4089): avc: denied { create } for pid=18365 comm="syz.0.3287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1070.222195][T18368] 9pnet_fd: Insufficient options for proto=fd [ 1070.229077][T18368] binder: 18365:18368 ioctl c018620c 2000000000c0 returned -1 [ 1070.281719][ T30] audit: type=1400 audit(1758254063.130:4090): avc: denied { ioctl } for pid=18365 comm="syz.0.3287" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1071.839814][ T30] audit: type=1400 audit(1758254063.250:4091): avc: denied { execmem } for pid=18372 comm="syz.1.3288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1072.168154][T18367] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1072.421450][ T1221] usb 2-1: new high-speed USB device number 31 using dummy_hcd [ 1072.491506][T14573] usb 1-1: new high-speed USB device number 51 using dummy_hcd [ 1072.575383][ T1221] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1072.611553][ T1221] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1072.621462][ T1221] usb 2-1: New USB device found, idVendor=256c, idProduct=006d, bcdDevice= 0.00 [ 1072.636922][ T1221] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1072.661437][T14573] usb 1-1: Using ep0 maxpacket: 8 [ 1072.679633][ T1221] usb 2-1: config 0 descriptor?? [ 1072.686021][T14573] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid maxpacket 56832, setting to 1024 [ 1072.706460][T14573] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 1024 [ 1072.732148][T14573] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 1072.749624][T14573] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 1072.791425][T14573] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1a, bcdDevice=61.23 [ 1072.815277][T14573] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1072.872346][T18393] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3294'. [ 1072.907972][T18393] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3294'. [ 1072.918431][T18393] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3294'. [ 1072.928829][T18393] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3294'. [ 1073.079446][T14573] usb 1-1: GET_CAPABILITIES returned 0 [ 1073.089794][T14573] usbtmc 1-1:16.0: can't read capabilities [ 1073.302455][T18384] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1073.323291][T18384] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1073.637560][ C0] usbtmc 1-1:16.0: usbtmc_write_bulk_cb - nonzero write bulk status received: -71 [ 1073.874013][T18402] usbtmc 1-1:16.0: Unable to send data, error -71 [ 1073.919293][ T3091] usb 1-1: USB disconnect, device number 51 [ 1074.088213][ T1221] uclogic 0003:256C:006D.0013: failed retrieving string descriptor #100: -71 [ 1074.111214][ T1221] uclogic 0003:256C:006D.0013: failed retrieving pen parameters: -71 [ 1074.227246][ T1221] uclogic 0003:256C:006D.0013: failed probing pen v1 parameters: -71 [ 1074.252364][ T1221] uclogic 0003:256C:006D.0013: failed probing parameters: -71 [ 1074.280581][ T1221] uclogic 0003:256C:006D.0013: probe with driver uclogic failed with error -71 [ 1074.338888][ T1221] usb 2-1: USB disconnect, device number 31 [ 1075.546684][ T30] audit: type=1400 audit(1758254068.450:4092): avc: denied { create } for pid=18424 comm="syz.2.3303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1075.605358][ T10] usb 2-1: new high-speed USB device number 32 using dummy_hcd [ 1076.127020][ T30] audit: type=1400 audit(1758254068.610:4093): avc: denied { write } for pid=18424 comm="syz.2.3303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1076.176706][ T30] audit: type=1400 audit(1758254068.610:4094): avc: denied { nlmsg_write } for pid=18424 comm="syz.2.3303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1076.182704][ T10] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1076.211147][ T10] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1076.230645][ T10] usb 2-1: New USB device found, idVendor=2006, idProduct=0118, bcdDevice= 0.00 [ 1076.248066][ T10] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1076.269226][ T10] usb 2-1: config 0 descriptor?? [ 1076.841354][ T30] audit: type=1400 audit(1758254069.720:4095): avc: denied { write } for pid=18417 comm="syz.1.3301" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 1076.884072][ T10] hkems 0003:2006:0118.0014: hidraw0: USB HID v0.00 Device [HID 2006:0118] on usb-dummy_hcd.1-1/input0 [ 1076.981492][ T10] hkems 0003:2006:0118.0014: no inputs found [ 1077.035654][ T10] hkems 0003:2006:0118.0014: force feedback init failed [ 1077.452612][T18457] ptrace attach of "./syz-executor exec"[17323] was attempted by "./syz-executor exec"[18457] [ 1078.074629][T18465] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3313'. [ 1078.430786][ T1221] usb 2-1: USB disconnect, device number 32 [ 1078.591583][ T30] audit: type=1400 audit(1758254071.490:4096): avc: denied { write } for pid=18478 comm="syz.0.3319" name="binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1078.776329][T18491] 9pnet_fd: Insufficient options for proto=fd [ 1078.991440][ T10] usb 3-1: new high-speed USB device number 39 using dummy_hcd [ 1079.142996][ T10] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1079.181461][ T10] usb 3-1: New USB device found, idVendor=1532, idProduct=010e, bcdDevice= 0.00 [ 1079.244559][ T10] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1079.310327][T18490] geneve2: entered promiscuous mode [ 1079.348859][T18498] FAULT_INJECTION: forcing a failure. [ 1079.348859][T18498] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1079.353196][ T10] usb 3-1: config 0 descriptor?? [ 1079.396283][T18498] CPU: 1 UID: 0 PID: 18498 Comm: syz.1.3324 Not tainted syzkaller #0 PREEMPT(full) [ 1079.396299][T18498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1079.396306][T18498] Call Trace: [ 1079.396309][T18498] [ 1079.396314][T18498] dump_stack_lvl+0x16c/0x1f0 [ 1079.396331][T18498] should_fail_ex+0x512/0x640 [ 1079.396348][T18498] _copy_from_user+0x2e/0xd0 [ 1079.396364][T18498] copy_msghdr_from_user+0x98/0x160 [ 1079.396379][T18498] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1079.396398][T18498] ___sys_sendmsg+0xfe/0x1d0 [ 1079.396412][T18498] ? __pfx____sys_sendmsg+0x10/0x10 [ 1079.396440][T18498] __sys_sendmsg+0x16d/0x220 [ 1079.396454][T18498] ? __pfx___sys_sendmsg+0x10/0x10 [ 1079.396475][T18498] do_syscall_64+0xcd/0x4e0 [ 1079.396491][T18498] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1079.396502][T18498] RIP: 0033:0x7f677818eba9 [ 1079.396511][T18498] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1079.396522][T18498] RSP: 002b:00007f67790cc038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1079.396532][T18498] RAX: ffffffffffffffda RBX: 00007f67783d6090 RCX: 00007f677818eba9 [ 1079.396539][T18498] RDX: 0000000000000004 RSI: 00002000000000c0 RDI: 0000000000000003 [ 1079.396546][T18498] RBP: 00007f67790cc090 R08: 0000000000000000 R09: 0000000000000000 [ 1079.396552][T18498] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1079.396558][T18498] R13: 00007f67783d6128 R14: 00007f67783d6090 R15: 00007ffc64c0f468 [ 1079.396571][T18498] [ 1080.187288][T18488] libceph: resolve '½@½Ée2²âOAq§¨­cz' (ret=-3): failed [ 1080.765934][ T30] audit: type=1400 audit(1758254073.490:4097): avc: denied { setcheckreqprot } for pid=18504 comm="syz.1.3325" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1081.284998][T18502] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1081.313982][T18502] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1081.571867][ T30] audit: type=1800 audit(1758254073.600:4098): pid=18507 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz.1.3325" name="nullb0" dev="devtmpfs" ino=2841 res=0 errno=0 [ 1081.574847][ T10] razer 0003:1532:010E.0015: unknown main item tag 0x1 [ 1081.627732][T18502] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1081.665258][T18502] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1081.748690][ T10] razer 0003:1532:010E.0015: hidraw0: USB HID v0.00 Device [HID 1532:010e] on usb-dummy_hcd.2-1/input0 [ 1081.761594][ T5864] Bluetooth: hci0: command 0x0406 tx timeout [ 1081.767991][T18502] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1081.779587][T18502] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1082.087985][ T10] usb 3-1: USB disconnect, device number 39 [ 1082.167575][ T30] audit: type=1400 audit(1758254075.070:4099): avc: denied { bind } for pid=18517 comm="syz.3.3328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 1083.459689][T18533] ptrace attach of "./syz-executor exec"[17022] was attempted by "./syz-executor exec"[18533] [ 1083.681144][T18531] Bluetooth: hci0: Opcode 0x0c03 failed: -4 [ 1084.022816][ T30] audit: type=1400 audit(1758254076.920:4100): avc: denied { ioctl } for pid=18539 comm="syz.2.3333" path="socket:[70905]" dev="sockfs" ino=70905 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1084.047641][ C0] vkms_vblank_simulate: vblank timer overrun [ 1084.096300][T18541] netlink: 'syz.2.3333': attribute type 12 has an invalid length. [ 1084.296732][ T10] usb 1-1: new high-speed USB device number 52 using dummy_hcd [ 1084.468285][ T10] usb 1-1: Using ep0 maxpacket: 16 [ 1084.474929][ T10] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1084.513135][ T10] usb 1-1: config 0 interface 0 altsetting 9 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 1084.750595][ T10] usb 1-1: config 0 interface 0 has no altsetting 0 [ 1084.774006][ T10] usb 1-1: New USB device found, idVendor=1e71, idProduct=2009, bcdDevice= 0.00 [ 1084.784168][ T10] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1084.809468][ T10] usb 1-1: config 0 descriptor?? [ 1084.818140][ T10] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 1085.142492][T18563] loop2: detected capacity change from 0 to 7 [ 1085.167690][T18563] loop2: p1 p4 [ 1085.171696][T18563] loop2: partition table partially beyond EOD, truncated [ 1085.243134][T18563] loop2: p1 size 2097152 extends beyond EOD, truncated [ 1085.256145][T18563] loop2: p4 start 2495 is beyond EOD, truncated [ 1085.281945][ T5908] usb 2-1: new high-speed USB device number 33 using dummy_hcd [ 1085.571521][ T5908] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1085.587677][ T5908] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1085.637928][ T5908] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1085.660322][ T5908] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1085.669752][ T5908] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1085.687201][ T5908] usb 2-1: config 0 descriptor?? [ 1086.266278][ T5908] plantronics 0003:047F:FFFF.0016: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.1-1/input0 [ 1086.633677][T18570] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3343'. [ 1086.691657][T14573] usb 2-1: USB disconnect, device number 33 [ 1087.411958][ T912] usb 1-1: USB disconnect, device number 52 [ 1087.456354][T18592] netlink: 124 bytes leftover after parsing attributes in process `syz.2.3347'. [ 1087.468912][ T30] audit: type=1400 audit(1758254080.360:4101): avc: denied { create } for pid=18595 comm="syz.0.3349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 1088.134012][T18601] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3349'. [ 1088.157795][T18597] sctp: [Deprecated]: syz.4.3348 (pid 18597) Use of int in maxseg socket option. [ 1088.157795][T18597] Use struct sctp_assoc_value instead [ 1088.421611][T18611] nfs4: Unknown parameter '@ yg' [ 1088.461093][ T30] audit: type=1400 audit(1758254081.350:4102): avc: denied { connect } for pid=18614 comm="syz.0.3353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 1088.722451][T14573] usb 4-1: new high-speed USB device number 36 using dummy_hcd [ 1088.891695][T14573] usb 4-1: Using ep0 maxpacket: 8 [ 1088.904621][T14573] usb 4-1: New USB device found, idVendor=047d, idProduct=5003, bcdDevice=2f.8c [ 1088.913962][T14573] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1088.935519][T18634] netlink: 1624 bytes leftover after parsing attributes in process `syz.0.3356'. [ 1088.947139][T14573] usb 4-1: Product: syz [ 1088.957230][T14573] usb 4-1: Manufacturer: syz [ 1088.966296][T14573] usb 4-1: SerialNumber: syz [ 1088.986446][T14573] usb 4-1: config 0 descriptor?? [ 1089.003252][T14573] gspca_main: se401-2.14.0 probing 047d:5003 [ 1089.048696][T18643] FAULT_INJECTION: forcing a failure. [ 1089.048696][T18643] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1089.062087][T18643] CPU: 1 UID: 0 PID: 18643 Comm: syz.0.3358 Not tainted syzkaller #0 PREEMPT(full) [ 1089.062110][T18643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1089.062123][T18643] Call Trace: [ 1089.062129][T18643] [ 1089.062136][T18643] dump_stack_lvl+0x16c/0x1f0 [ 1089.062164][T18643] should_fail_ex+0x512/0x640 [ 1089.062191][T18643] _copy_from_user+0x2e/0xd0 [ 1089.062218][T18643] copy_msghdr_from_user+0x98/0x160 [ 1089.062242][T18643] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1089.062276][T18643] ___sys_sendmsg+0xfe/0x1d0 [ 1089.062299][T18643] ? __pfx____sys_sendmsg+0x10/0x10 [ 1089.062351][T18643] __sys_sendmsg+0x16d/0x220 [ 1089.062374][T18643] ? __pfx___sys_sendmsg+0x10/0x10 [ 1089.062411][T18643] do_syscall_64+0xcd/0x4e0 [ 1089.062437][T18643] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1089.062455][T18643] RIP: 0033:0x7febfd18eba9 [ 1089.062470][T18643] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1089.062487][T18643] RSP: 002b:00007febfe0a7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1089.062505][T18643] RAX: ffffffffffffffda RBX: 00007febfd3d5fa0 RCX: 00007febfd18eba9 [ 1089.062516][T18643] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000003 [ 1089.062527][T18643] RBP: 00007febfe0a7090 R08: 0000000000000000 R09: 0000000000000000 [ 1089.062537][T18643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1089.062547][T18643] R13: 00007febfd3d6038 R14: 00007febfd3d5fa0 R15: 00007fffb0211068 [ 1089.062570][T18643] [ 1089.521449][ T1221] usb 1-1: new high-speed USB device number 53 using dummy_hcd [ 1089.730586][ T1221] usb 1-1: New USB device found, idVendor=0bed, idProduct=1100, bcdDevice=ec.c3 [ 1089.854626][ T1221] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1089.937329][ T1221] usb 1-1: config 0 descriptor?? [ 1089.956130][ T1221] cp210x 1-1:0.0: cp210x converter detected [ 1090.133755][ T30] audit: type=1400 audit(1758254083.030:4103): avc: denied { setopt } for pid=18660 comm="syz.1.3361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 1090.353596][ T1221] cp210x 1-1:0.0: failed to get vendor val 0x000e size 3: -32 [ 1090.405819][T18673] FAULT_INJECTION: forcing a failure. [ 1090.405819][T18673] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1090.426638][T18673] CPU: 1 UID: 0 PID: 18673 Comm: syz.4.3365 Not tainted syzkaller #0 PREEMPT(full) [ 1090.426661][T18673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1090.426671][T18673] Call Trace: [ 1090.426677][T18673] [ 1090.426683][T18673] dump_stack_lvl+0x16c/0x1f0 [ 1090.426712][T18673] should_fail_ex+0x512/0x640 [ 1090.426738][T18673] _copy_from_iter+0x29f/0x1720 [ 1090.426764][T18673] ? __lock_acquire+0x62e/0x1ce0 [ 1090.426795][T18673] ? __pfx__copy_from_iter+0x10/0x10 [ 1090.426825][T18673] ? __lock_acquire+0x62e/0x1ce0 [ 1090.426861][T18673] copy_page_from_iter+0xde/0x180 [ 1090.426889][T18673] tun_build_skb.constprop.0+0x2e8/0x1500 [ 1090.426925][T18673] ? __pfx_tun_build_skb.constprop.0+0x10/0x10 [ 1090.426950][T18673] ? unwind_get_return_address+0x59/0xa0 [ 1090.426970][T18673] ? arch_stack_walk+0xa6/0x100 [ 1090.427005][T18673] ? _kstrtoull+0x145/0x200 [ 1090.427023][T18673] ? __pfx__kstrtoull+0x10/0x10 [ 1090.427044][T18673] tun_get_user+0x14ae/0x3ce0 [ 1090.427080][T18673] ? __pfx_tun_get_user+0x10/0x10 [ 1090.427108][T18673] ? __pfx_ref_tracker_alloc+0x10/0x10 [ 1090.427140][T18673] ? find_held_lock+0x2b/0x80 [ 1090.427162][T18673] ? tun_get+0x191/0x370 [ 1090.427191][T18673] tun_chr_write_iter+0xdc/0x210 [ 1090.427219][T18673] vfs_write+0x7d3/0x11d0 [ 1090.427238][T18673] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 1090.427268][T18673] ? __pfx_vfs_write+0x10/0x10 [ 1090.427283][T18673] ? find_held_lock+0x2b/0x80 [ 1090.427320][T18673] ksys_write+0x12a/0x250 [ 1090.427337][T18673] ? __pfx_ksys_write+0x10/0x10 [ 1090.427363][T18673] do_syscall_64+0xcd/0x4e0 [ 1090.427387][T18673] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1090.427405][T18673] RIP: 0033:0x7f740098d65f [ 1090.427419][T18673] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 1090.427436][T18673] RSP: 002b:00007f7401850000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1090.427452][T18673] RAX: ffffffffffffffda RBX: 00007f7400bd5fa0 RCX: 00007f740098d65f [ 1090.427463][T18673] RDX: 0000000000000056 RSI: 00002000000000c0 RDI: 00000000000000c8 [ 1090.427474][T18673] RBP: 00007f7401850090 R08: 0000000000000000 R09: 0000000000000000 [ 1090.427485][T18673] R10: 0000000000000056 R11: 0000000000000293 R12: 0000000000000001 [ 1090.427495][T18673] R13: 00007f7400bd6038 R14: 00007f7400bd5fa0 R15: 00007ffd46adb3b8 [ 1090.427519][T18673] [ 1090.725449][ T1221] cp210x 1-1:0.0: failed to get vendor val 0x370c size 15: -121 [ 1090.733154][ T1221] cp210x 1-1:0.0: GPIO initialisation failed: -121 [ 1090.770690][ T1221] usb 1-1: cp210x converter now attached to ttyUSB0 [ 1090.803128][T14573] input: se401 as /devices/platform/dummy_hcd.3/usb4/4-1/input/input18 [ 1091.025149][T18692] tipc: Started in network mode [ 1091.030098][T18692] tipc: Node identity 0e53e5a7d23a, cluster identity 4711 [ 1091.037972][T18692] tipc: Enabled bearer , priority 0 [ 1091.078597][T18692] syzkaller0: entered promiscuous mode [ 1091.085110][T18692] syzkaller0: entered allmulticast mode [ 1091.091148][T18692] tipc: Resetting bearer [ 1091.104706][T18691] tipc: Resetting bearer [ 1091.491953][T14573] usb 4-1: USB disconnect, device number 36 [ 1092.081355][T18706] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3372'. [ 1092.090477][T18706] netlink: 12 bytes leftover after parsing attributes in process `syz.3.3372'. [ 1092.099513][T11502] tipc: Node number set to 3697927591 [ 1092.183271][ T30] audit: type=1400 audit(1758254085.080:4104): avc: denied { listen } for pid=18707 comm="syz.2.3375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 1092.281218][ T5908] usb 1-1: USB disconnect, device number 53 [ 1092.297870][ T5908] cp210x ttyUSB0: cp210x converter now disconnected from ttyUSB0 [ 1092.318577][ T5908] cp210x 1-1:0.0: device disconnected [ 1092.340354][T18713] FAULT_INJECTION: forcing a failure. [ 1092.340354][T18713] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1092.357164][T18713] CPU: 0 UID: 0 PID: 18713 Comm: syz.4.3376 Not tainted syzkaller #0 PREEMPT(full) [ 1092.357186][T18713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1092.357197][T18713] Call Trace: [ 1092.357203][T18713] [ 1092.357210][T18713] dump_stack_lvl+0x16c/0x1f0 [ 1092.357236][T18713] should_fail_ex+0x512/0x640 [ 1092.357261][T18713] _copy_from_user+0x2e/0xd0 [ 1092.357287][T18713] copy_msghdr_from_user+0x98/0x160 [ 1092.357310][T18713] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1092.357336][T18713] ? __pfx__kstrtoull+0x10/0x10 [ 1092.357359][T18713] ___sys_sendmsg+0xfe/0x1d0 [ 1092.357381][T18713] ? __pfx____sys_sendmsg+0x10/0x10 [ 1092.357414][T18713] ? find_held_lock+0x2b/0x80 [ 1092.357451][T18713] __sys_sendmmsg+0x200/0x420 [ 1092.357475][T18713] ? __pfx___sys_sendmmsg+0x10/0x10 [ 1092.357505][T18713] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 1092.357539][T18713] ? fput+0x9b/0xd0 [ 1092.357562][T18713] ? ksys_write+0x1ac/0x250 [ 1092.357579][T18713] ? __pfx_ksys_write+0x10/0x10 [ 1092.357601][T18713] __x64_sys_sendmmsg+0x9c/0x100 [ 1092.357623][T18713] ? lockdep_hardirqs_on+0x7c/0x110 [ 1092.357645][T18713] do_syscall_64+0xcd/0x4e0 [ 1092.357669][T18713] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1092.357686][T18713] RIP: 0033:0x7f740098eba9 [ 1092.357701][T18713] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1092.357717][T18713] RSP: 002b:00007f740182f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1092.357734][T18713] RAX: ffffffffffffffda RBX: 00007f7400bd6090 RCX: 00007f740098eba9 [ 1092.357746][T18713] RDX: 040000000000009f RSI: 00002000000002c0 RDI: 0000000000000004 [ 1092.357757][T18713] RBP: 00007f740182f090 R08: 0000000000000000 R09: 0000000000000000 [ 1092.357767][T18713] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1092.357778][T18713] R13: 00007f7400bd6128 R14: 00007f7400bd6090 R15: 00007ffd46adb3b8 [ 1092.357800][T18713] [ 1092.551594][ C0] vkms_vblank_simulate: vblank timer overrun [ 1093.451171][T18725] FAULT_INJECTION: forcing a failure. [ 1093.451171][T18725] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1093.464414][T18725] CPU: 1 UID: 0 PID: 18725 Comm: syz.2.3380 Not tainted syzkaller #0 PREEMPT(full) [ 1093.464437][T18725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1093.464448][T18725] Call Trace: [ 1093.464454][T18725] [ 1093.464461][T18725] dump_stack_lvl+0x16c/0x1f0 [ 1093.464489][T18725] should_fail_ex+0x512/0x640 [ 1093.464514][T18725] _copy_from_user+0x2e/0xd0 [ 1093.464540][T18725] copy_msghdr_from_user+0x98/0x160 [ 1093.464564][T18725] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1093.464598][T18725] ___sys_sendmsg+0xfe/0x1d0 [ 1093.464621][T18725] ? __pfx____sys_sendmsg+0x10/0x10 [ 1093.464671][T18725] __sys_sendmsg+0x16d/0x220 [ 1093.464693][T18725] ? __pfx___sys_sendmsg+0x10/0x10 [ 1093.464730][T18725] do_syscall_64+0xcd/0x4e0 [ 1093.464755][T18725] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1093.464772][T18725] RIP: 0033:0x7f75fa98eba9 [ 1093.464787][T18725] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1093.464803][T18725] RSP: 002b:00007f75fb8dd038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1093.464820][T18725] RAX: ffffffffffffffda RBX: 00007f75fabd5fa0 RCX: 00007f75fa98eba9 [ 1093.464832][T18725] RDX: 0000000000000080 RSI: 0000200000000180 RDI: 0000000000000003 [ 1093.464842][T18725] RBP: 00007f75fb8dd090 R08: 0000000000000000 R09: 0000000000000000 [ 1093.464852][T18725] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1093.464862][T18725] R13: 00007f75fabd6038 R14: 00007f75fabd5fa0 R15: 00007fffefbd54f8 [ 1093.464883][T18725] [ 1094.471177][T18727] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1094.908426][T18734] FAULT_INJECTION: forcing a failure. [ 1094.908426][T18734] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1094.924104][T18734] CPU: 0 UID: 0 PID: 18734 Comm: syz.2.3382 Not tainted syzkaller #0 PREEMPT(full) [ 1094.924128][T18734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1094.924138][T18734] Call Trace: [ 1094.924145][T18734] [ 1094.924152][T18734] dump_stack_lvl+0x16c/0x1f0 [ 1094.924178][T18734] should_fail_ex+0x512/0x640 [ 1094.924204][T18734] _copy_from_user+0x2e/0xd0 [ 1094.924229][T18734] copy_msghdr_from_user+0x98/0x160 [ 1094.924251][T18734] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1094.924283][T18734] ___sys_sendmsg+0xfe/0x1d0 [ 1094.924305][T18734] ? __pfx____sys_sendmsg+0x10/0x10 [ 1094.924354][T18734] __sys_sendmsg+0x16d/0x220 [ 1094.924375][T18734] ? __pfx___sys_sendmsg+0x10/0x10 [ 1094.924412][T18734] do_syscall_64+0xcd/0x4e0 [ 1094.924436][T18734] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1094.924454][T18734] RIP: 0033:0x7f75fa98eba9 [ 1094.924468][T18734] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1094.924485][T18734] RSP: 002b:00007f75fb8dd038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1094.924502][T18734] RAX: ffffffffffffffda RBX: 00007f75fabd5fa0 RCX: 00007f75fa98eba9 [ 1094.924514][T18734] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: 0000000000000004 [ 1094.924524][T18734] RBP: 00007f75fb8dd090 R08: 0000000000000000 R09: 0000000000000000 [ 1094.924535][T18734] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1094.924545][T18734] R13: 00007f75fabd6038 R14: 00007f75fabd5fa0 R15: 00007fffefbd54f8 [ 1094.924567][T18734] [ 1095.079628][ C0] vkms_vblank_simulate: vblank timer overrun [ 1095.172805][T18691] tipc: Disabling bearer [ 1096.217204][ T30] audit: type=1400 audit(1758254089.060:4105): avc: denied { firmware_load } for pid=18740 comm="syz.4.3385" path="/lib/firmware/regulatory.db" dev="sda1" ino=448 scontext=system_u:system_r:kernel_t tcontext=system_u:object_r:lib_t tclass=system permissive=1 [ 1096.301616][T14573] usb 4-1: new high-speed USB device number 37 using dummy_hcd [ 1096.309355][T18744] FAULT_INJECTION: forcing a failure. [ 1096.309355][T18744] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1096.309383][T18744] CPU: 0 UID: 0 PID: 18744 Comm: syz.1.3386 Not tainted syzkaller #0 PREEMPT(full) [ 1096.309404][T18744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1096.309415][T18744] Call Trace: [ 1096.309421][T18744] [ 1096.309428][T18744] dump_stack_lvl+0x16c/0x1f0 [ 1096.309455][T18744] should_fail_ex+0x512/0x640 [ 1096.309481][T18744] _copy_from_user+0x2e/0xd0 [ 1096.309508][T18744] copy_msghdr_from_user+0x98/0x160 [ 1096.309531][T18744] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1096.309564][T18744] ___sys_sendmsg+0xfe/0x1d0 [ 1096.309587][T18744] ? __pfx____sys_sendmsg+0x10/0x10 [ 1096.309637][T18744] __sys_sendmsg+0x16d/0x220 [ 1096.309659][T18744] ? __pfx___sys_sendmsg+0x10/0x10 [ 1096.309695][T18744] do_syscall_64+0xcd/0x4e0 [ 1096.309717][T18744] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1096.309733][T18744] RIP: 0033:0x7f677818eba9 [ 1096.309758][T18744] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1096.309773][T18744] RSP: 002b:00007f67790ed038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1096.309788][T18744] RAX: ffffffffffffffda RBX: 00007f67783d5fa0 RCX: 00007f677818eba9 [ 1096.309799][T18744] RDX: 0000000020000800 RSI: 0000200000000280 RDI: 0000000000000004 [ 1096.309808][T18744] RBP: 00007f67790ed090 R08: 0000000000000000 R09: 0000000000000000 [ 1096.309818][T18744] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1096.309827][T18744] R13: 00007f67783d6038 R14: 00007f67783d5fa0 R15: 00007ffc64c0f468 [ 1096.309847][T18744] [ 1096.737353][T18743] syz.4.3385 (18743) used greatest stack depth: 19192 bytes left [ 1096.808227][T14573] usb 4-1: Using ep0 maxpacket: 16 [ 1096.845191][T14573] usb 4-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xF3, changing to 0x83 [ 1097.206325][T14573] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 1097.234117][T14573] usb 4-1: New USB device found, idVendor=2040, idProduct=0264, bcdDevice=4e.d1 [ 1097.255856][T14573] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1097.273347][T14573] usb 4-1: Product: syz [ 1097.279616][T14573] usb 4-1: Manufacturer: syz [ 1097.308307][T14573] usb 4-1: SerialNumber: syz [ 1097.320819][T14573] usb 4-1: config 0 descriptor?? [ 1097.328580][T14573] em28xx 4-1:0.0: New device syz syz @ 480 Mbps (2040:0264, interface 0, class 0) [ 1097.338637][T14573] em28xx 4-1:0.0: Audio interface 0 found (Vendor Class) [ 1097.347967][T18763] ptrace attach of "./syz-executor exec"[16713] was attempted by "./syz-executor exec"[18763] [ 1097.406847][ T30] audit: type=1400 audit(1758254090.310:4106): avc: denied { read } for pid=18761 comm="syz.4.3392" name="file0" dev="fuse" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 1097.488664][ T30] audit: type=1400 audit(1758254090.330:4107): avc: denied { open } for pid=18761 comm="syz.4.3392" path="/54/file0/file0" dev="fuse" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 1097.644143][T18767] FAULT_INJECTION: forcing a failure. [ 1097.644143][T18767] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1097.676718][T18764] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 1097.691543][T18767] CPU: 1 UID: 0 PID: 18767 Comm: syz.0.3393 Not tainted syzkaller #0 PREEMPT(full) [ 1097.691566][T18767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1097.691576][T18767] Call Trace: [ 1097.691583][T18767] [ 1097.691590][T18767] dump_stack_lvl+0x16c/0x1f0 [ 1097.691621][T18767] should_fail_ex+0x512/0x640 [ 1097.691648][T18767] _copy_from_user+0x2e/0xd0 [ 1097.691674][T18767] copy_msghdr_from_user+0x98/0x160 [ 1097.691698][T18767] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1097.691723][T18767] ? __pfx__kstrtoull+0x10/0x10 [ 1097.691746][T18767] ___sys_sendmsg+0xfe/0x1d0 [ 1097.691768][T18767] ? __pfx____sys_sendmsg+0x10/0x10 [ 1097.691800][T18767] ? find_held_lock+0x2b/0x80 [ 1097.691836][T18767] __sys_sendmmsg+0x200/0x420 [ 1097.691861][T18767] ? __pfx___sys_sendmmsg+0x10/0x10 [ 1097.691891][T18767] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 1097.691923][T18767] ? fput+0x9b/0xd0 [ 1097.691945][T18767] ? ksys_write+0x1ac/0x250 [ 1097.691962][T18767] ? __pfx_ksys_write+0x10/0x10 [ 1097.691989][T18767] __x64_sys_sendmmsg+0x9c/0x100 [ 1097.692010][T18767] ? lockdep_hardirqs_on+0x7c/0x110 [ 1097.692032][T18767] do_syscall_64+0xcd/0x4e0 [ 1097.692056][T18767] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1097.692075][T18767] RIP: 0033:0x7febfd18eba9 [ 1097.692091][T18767] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1097.692108][T18767] RSP: 002b:00007febfe0a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1097.692125][T18767] RAX: ffffffffffffffda RBX: 00007febfd3d5fa0 RCX: 00007febfd18eba9 [ 1097.692137][T18767] RDX: 0000000000034000 RSI: 00002000000008c0 RDI: 0000000000000003 [ 1097.692148][T18767] RBP: 00007febfe0a7090 R08: 0000000000000000 R09: 0000000000000000 [ 1097.692159][T18767] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1097.692170][T18767] R13: 00007febfd3d6038 R14: 00007febfd3d5fa0 R15: 00007fffb0211068 [ 1097.692193][T18767] [ 1098.039775][T18764] block device autoloading is deprecated and will be removed. [ 1098.099503][T14573] em28xx 4-1:0.0: unknown em28xx chip ID (0) [ 1098.106593][T14573] em28xx 4-1:0.0: Config register raw data: 0xfffffffb [ 1098.114153][T18771] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3394'. [ 1098.176162][T18771] netlink: 12 bytes leftover after parsing attributes in process `syz.0.3394'. [ 1098.470843][T18776] pimreg3: entered allmulticast mode [ 1098.490181][T18776] lo: entered allmulticast mode [ 1098.717070][T14573] em28xx 4-1:0.0: Unknown AC97 audio processor detected! [ 1098.926123][T14573] em28xx 4-1:0.0: couldn't setup AC97 register 2 [ 1098.951667][T14573] em28xx 4-1:0.0: couldn't setup AC97 register 4 [ 1099.246486][T14573] em28xx 4-1:0.0: couldn't setup AC97 register 6 [ 1099.357062][T14573] em28xx 4-1:0.0: couldn't setup AC97 register 54 [ 1099.928055][T14573] em28xx 4-1:0.0: couldn't setup AC97 register 56 [ 1099.960446][T14573] usb 4-1: USB disconnect, device number 37 [ 1100.152053][T18788] nbd: socks must be embedded in a SOCK_ITEM attr [ 1100.161646][T18788] block nbd0: shutting down sockets [ 1100.190942][T18793] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3400'. [ 1100.268421][ T5922] usb 1-1: new high-speed USB device number 54 using dummy_hcd [ 1100.971662][ T5922] usb 1-1: Using ep0 maxpacket: 8 [ 1101.190975][ T5922] usb 1-1: New USB device found, idVendor=1557, idProduct=7720, bcdDevice=b7.eb [ 1101.255610][ T5922] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1101.283098][ T5922] usb 1-1: config 0 descriptor?? [ 1101.337554][T18805] FAULT_INJECTION: forcing a failure. [ 1101.337554][T18805] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1101.486021][T18808] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 1101.523239][T18805] CPU: 1 UID: 0 PID: 18805 Comm: syz.3.3406 Not tainted syzkaller #0 PREEMPT(full) [ 1101.523263][T18805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1101.523274][T18805] Call Trace: [ 1101.523281][T18805] [ 1101.523288][T18805] dump_stack_lvl+0x16c/0x1f0 [ 1101.523320][T18805] should_fail_ex+0x512/0x640 [ 1101.523347][T18805] _copy_from_user+0x2e/0xd0 [ 1101.523373][T18805] copy_msghdr_from_user+0x98/0x160 [ 1101.523397][T18805] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1101.523425][T18805] ? __lock_acquire+0x62e/0x1ce0 [ 1101.523458][T18805] ___sys_recvmsg+0xdb/0x1a0 [ 1101.523480][T18805] ? __pfx____sys_recvmsg+0x10/0x10 [ 1101.523505][T18805] ? find_held_lock+0x2b/0x80 [ 1101.523542][T18805] do_recvmmsg+0x2fe/0x750 [ 1101.523569][T18805] ? __pfx_do_recvmmsg+0x10/0x10 [ 1101.523596][T18805] ? __mutex_unlock_slowpath+0x161/0x7b0 [ 1101.523629][T18805] ? __fget_files+0x20e/0x3c0 [ 1101.523654][T18805] __x64_sys_recvmmsg+0x22a/0x280 [ 1101.523679][T18805] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 1101.523711][T18805] do_syscall_64+0xcd/0x4e0 [ 1101.523737][T18805] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1101.523754][T18805] RIP: 0033:0x7fb255b8eba9 [ 1101.523770][T18805] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1101.523787][T18805] RSP: 002b:00007fb256994038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1101.523804][T18805] RAX: ffffffffffffffda RBX: 00007fb255dd5fa0 RCX: 00007fb255b8eba9 [ 1101.523816][T18805] RDX: 0000000000000001 RSI: 0000200000000840 RDI: 0000000000000003 [ 1101.523827][T18805] RBP: 00007fb256994090 R08: 0000000000000000 R09: 0000000000000000 [ 1101.523838][T18805] R10: 0000000000000060 R11: 0000000000000246 R12: 0000000000000001 [ 1101.523849][T18805] R13: 00007fb255dd6038 R14: 00007fb255dd5fa0 R15: 00007ffe539e5d28 [ 1101.523872][T18805] [ 1101.732788][ T5922] asix 1-1:0.0 (unnamed net_device) (uninitialized): invalid hw address, using random [ 1102.211338][ T5864] Bluetooth: hci2: command 0x0406 tx timeout [ 1102.506837][ T5922] asix 1-1:0.0 (unnamed net_device) (uninitialized): Failed to write reg index 0x0000: -71 [ 1103.151412][ T5922] asix 1-1:0.0 (unnamed net_device) (uninitialized): Failed to write GPIO value 0x00b0: ffffffb9 [ 1103.260495][T18811] block nbd3: shutting down sockets [ 1103.309530][ T5922] asix 1-1:0.0: probe with driver asix failed with error -71 [ 1103.492221][ T5922] usb 1-1: USB disconnect, device number 54 [ 1103.508728][T18822] ptrace attach of "./syz-executor exec"[16713] was attempted by "./syz-executor exec"[18822] [ 1105.043964][T18829] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(6) [ 1105.050471][T18829] vhci_hcd vhci_hcd.0: devid(0) speed(6) speed_str(super-speed-plus) [ 1105.106457][T18829] vhci_hcd vhci_hcd.0: Device attached [ 1105.297177][T18832] vhci_hcd: connection closed [ 1105.297828][ T2939] vhci_hcd: stop threads [ 1105.312473][ T2939] vhci_hcd: release socket [ 1105.339207][ T2939] vhci_hcd: disconnect device [ 1105.391457][T14573] usb 42-1: enqueue for inactive port 0 [ 1105.448887][T18842] FAULT_INJECTION: forcing a failure. [ 1105.448887][T18842] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1105.466108][T18842] CPU: 0 UID: 0 PID: 18842 Comm: syz.3.3416 Not tainted syzkaller #0 PREEMPT(full) [ 1105.466131][T18842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1105.466140][T18842] Call Trace: [ 1105.466146][T18842] [ 1105.466153][T18842] dump_stack_lvl+0x16c/0x1f0 [ 1105.466182][T18842] should_fail_ex+0x512/0x640 [ 1105.466209][T18842] _copy_from_user+0x2e/0xd0 [ 1105.466235][T18842] copy_msghdr_from_user+0x98/0x160 [ 1105.466258][T18842] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1105.466292][T18842] ___sys_sendmsg+0xfe/0x1d0 [ 1105.466316][T18842] ? __pfx____sys_sendmsg+0x10/0x10 [ 1105.466368][T18842] __sys_sendmsg+0x16d/0x220 [ 1105.466391][T18842] ? __pfx___sys_sendmsg+0x10/0x10 [ 1105.466430][T18842] do_syscall_64+0xcd/0x4e0 [ 1105.466455][T18842] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1105.466474][T18842] RIP: 0033:0x7fb255b8eba9 [ 1105.466488][T18842] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1105.466505][T18842] RSP: 002b:00007fb256994038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1105.466522][T18842] RAX: ffffffffffffffda RBX: 00007fb255dd5fa0 RCX: 00007fb255b8eba9 [ 1105.466534][T18842] RDX: 0000000010044009 RSI: 0000200000000000 RDI: 0000000000000003 [ 1105.466546][T18842] RBP: 00007fb256994090 R08: 0000000000000000 R09: 0000000000000000 [ 1105.466557][T18842] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1105.466567][T18842] R13: 00007fb255dd6038 R14: 00007fb255dd5fa0 R15: 00007ffe539e5d28 [ 1105.466592][T18842] [ 1105.769588][ T30] audit: type=1400 audit(1758254098.670:4108): avc: denied { connect } for pid=18852 comm="syz.0.3420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1105.790446][ C1] vkms_vblank_simulate: vblank timer overrun [ 1105.912361][T14573] usb usb42-port1: attempt power cycle [ 1106.620205][T14573] usb usb42-port1: unable to enumerate USB device [ 1106.655037][T18653] usb 4-1: new high-speed USB device number 38 using dummy_hcd [ 1106.673358][ T5922] usb 2-1: new high-speed USB device number 34 using dummy_hcd [ 1106.841421][T18653] usb 4-1: Using ep0 maxpacket: 8 [ 1106.847940][ T5922] usb 2-1: config 0 interface 0 has no altsetting 0 [ 1106.862263][ T5922] usb 2-1: New USB device found, idVendor=1ea7, idProduct=0907, bcdDevice= 0.00 [ 1106.882124][T18653] usb 4-1: config index 0 descriptor too short (expected 301, got 45) [ 1106.913853][T18653] usb 4-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 1106.923683][ T5922] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1106.947505][T18653] usb 4-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 1107.071916][T18653] usb 4-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 1107.129094][ T5922] usb 2-1: config 0 descriptor?? [ 1107.140178][T18653] usb 4-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 1107.155694][ T30] audit: type=1800 audit(1758254100.040:4109): pid=18874 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed comm="syz.0.3425" name="memory.events" dev="tmpfs" ino=323 res=0 errno=0 [ 1107.177224][ C1] vkms_vblank_simulate: vblank timer overrun [ 1107.201446][T18653] usb 4-1: New USB device found, idVendor=ee8d, idProduct=db1e, bcdDevice=61.23 [ 1107.215680][T18653] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1107.461433][T18653] usb 4-1: GET_CAPABILITIES returned 0 [ 1107.466994][T18653] usbtmc 4-1:16.0: can't read capabilities [ 1107.545082][ T5922] semitek 0003:1EA7:0907.0017: unknown main item tag 0x0 [ 1107.552579][T18880] FAULT_INJECTION: forcing a failure. [ 1107.552579][T18880] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1107.552699][ T5922] semitek 0003:1EA7:0907.0017: item fetching failed at offset 3/5 [ 1107.593815][T18880] CPU: 0 UID: 0 PID: 18880 Comm: syz.4.3428 Not tainted syzkaller #0 PREEMPT(full) [ 1107.593837][T18880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1107.593847][T18880] Call Trace: [ 1107.593853][T18880] [ 1107.593860][T18880] dump_stack_lvl+0x16c/0x1f0 [ 1107.593892][T18880] should_fail_ex+0x512/0x640 [ 1107.593919][T18880] should_fail_alloc_page+0xe7/0x130 [ 1107.593942][T18880] prepare_alloc_pages+0x3c2/0x610 [ 1107.593970][T18880] __alloc_frozen_pages_noprof+0x18b/0x23f0 [ 1107.593996][T18880] ? find_held_lock+0x2b/0x80 [ 1107.594020][T18880] ? is_bpf_text_address+0x8a/0x1a0 [ 1107.594040][T18880] ? bpf_ksym_find+0x127/0x1c0 [ 1107.594061][T18880] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1107.594081][T18880] ? is_bpf_text_address+0x94/0x1a0 [ 1107.594101][T18880] ? kernel_text_address+0x8d/0x100 [ 1107.594121][T18880] ? __kernel_text_address+0xd/0x40 [ 1107.594150][T18880] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1107.594173][T18880] ? policy_nodemask+0xea/0x4e0 [ 1107.594195][T18880] alloc_pages_mpol+0x1fb/0x550 [ 1107.594216][T18880] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1107.594240][T18880] ? __lock_acquire+0x62e/0x1ce0 [ 1107.594269][T18880] folio_alloc_mpol_noprof+0x36/0x2f0 [ 1107.594294][T18880] vma_alloc_folio_noprof+0xed/0x1e0 [ 1107.594317][T18880] ? __pfx_vma_alloc_folio_noprof+0x10/0x10 [ 1107.594348][T18880] do_pte_missing+0x2230/0x3ba0 [ 1107.594376][T18880] ? find_held_lock+0x2b/0x80 [ 1107.594403][T18880] __handle_mm_fault+0x152a/0x2a50 [ 1107.594436][T18880] ? __pfx___handle_mm_fault+0x10/0x10 [ 1107.594466][T18880] ? lock_vma_under_rcu+0x1eb/0x530 [ 1107.594501][T18880] ? __pfx_lock_vma_under_rcu+0x10/0x10 [ 1107.594533][T18880] handle_mm_fault+0x589/0xd10 [ 1107.594562][T18880] ? trace_raw_output_exceptions+0x131/0x150 [ 1107.594593][T18880] do_user_addr_fault+0x60c/0x1370 [ 1107.594613][T18880] ? rcu_is_watching+0x12/0xc0 [ 1107.594638][T18880] exc_page_fault+0x5c/0xb0 [ 1107.594661][T18880] asm_exc_page_fault+0x26/0x30 [ 1107.594678][T18880] RIP: 0033:0x7f740085a5ab [ 1107.594692][T18880] Code: 00 00 00 48 8d 3d 3d 3a 19 00 48 89 c1 31 c0 e8 4b 3c ff ff eb d2 66 0f 1f 84 00 00 00 00 00 55 31 c0 53 48 81 ec 68 10 00 00 <48> 89 7c 24 08 48 8d 3d 71 3a 19 00 48 89 34 24 48 8b 14 24 48 8b [ 1107.594708][T18880] RSP: 002b:00007f740184efb0 EFLAGS: 00010202 [ 1107.594723][T18880] RAX: 0000000000000000 RBX: 00007f7400bd5fa0 RCX: 0000000000000000 [ 1107.594734][T18880] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000200000000480 [ 1107.594745][T18880] RBP: 00007f7401850090 R08: 0000000000000000 R09: 0000000000000000 [ 1107.594755][T18880] R10: 0000200000000480 R11: 0000000000000000 R12: 0000000000000001 [ 1107.594765][T18880] R13: 00007f7400bd6038 R14: 00007f7400bd5fa0 R15: 00007ffd46adb3b8 [ 1107.594789][T18880] [ 1107.594960][T18880] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 1107.601904][ T5922] semitek 0003:1EA7:0907.0017: probe with driver semitek failed with error -22 [ 1107.766676][T18851] usbtmc 4-1:16.0: usb_control_msg returned -71 [ 1107.911442][ T5908] usb 4-1: USB disconnect, device number 38 [ 1107.985774][ T5922] usb 2-1: USB disconnect, device number 34 [ 1108.040769][T18893] /dev/nullb0: Can't lookup blockdev [ 1108.334773][ T10] usb 1-1: new high-speed USB device number 55 using dummy_hcd [ 1108.350592][T18901] FAULT_INJECTION: forcing a failure. [ 1108.350592][T18901] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1108.364306][T18901] CPU: 1 UID: 0 PID: 18901 Comm: syz.4.3434 Not tainted syzkaller #0 PREEMPT(full) [ 1108.364321][T18901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1108.364327][T18901] Call Trace: [ 1108.364331][T18901] [ 1108.364336][T18901] dump_stack_lvl+0x16c/0x1f0 [ 1108.364354][T18901] should_fail_ex+0x512/0x640 [ 1108.364371][T18901] _copy_from_user+0x2e/0xd0 [ 1108.364388][T18901] copy_from_sockptr_offset.constprop.0+0x153/0x1a0 [ 1108.364403][T18901] ? __pfx_copy_from_sockptr_offset.constprop.0+0x10/0x10 [ 1108.364420][T18901] do_ipv6_setsockopt+0x86e/0x4470 [ 1108.364435][T18901] ? __pfx_do_ipv6_setsockopt+0x10/0x10 [ 1108.364447][T18901] ? avc_has_perm_noaudit+0x117/0x3b0 [ 1108.364461][T18901] ? avc_has_perm_noaudit+0x149/0x3b0 [ 1108.364475][T18901] ? avc_has_perm+0x144/0x1f0 [ 1108.364486][T18901] ? __pfx_avc_has_perm+0x10/0x10 [ 1108.364498][T18901] ? get_pid_task+0x106/0x250 [ 1108.364509][T18901] ? proc_fail_nth_write+0x9f/0x220 [ 1108.364525][T18901] ? sock_has_perm+0x259/0x2f0 [ 1108.364539][T18901] ? __pfx_sock_has_perm+0x10/0x10 [ 1108.364552][T18901] ? selinux_netlbl_socket_setsockopt+0x183/0x470 [ 1108.364570][T18901] ? __pfx_selinux_netlbl_socket_setsockopt+0x10/0x10 [ 1108.364590][T18901] ? ipv6_setsockopt+0xcb/0x170 [ 1108.364602][T18901] ipv6_setsockopt+0xcb/0x170 [ 1108.364615][T18901] tcp_setsockopt+0xa7/0x100 [ 1108.364634][T18901] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 1108.364652][T18901] do_sock_setsockopt+0xf3/0x1d0 [ 1108.364669][T18901] __sys_setsockopt+0x1a0/0x230 [ 1108.364685][T18901] __x64_sys_setsockopt+0xbd/0x160 [ 1108.364697][T18901] ? do_syscall_64+0x91/0x4e0 [ 1108.364712][T18901] ? lockdep_hardirqs_on+0x7c/0x110 [ 1108.364726][T18901] do_syscall_64+0xcd/0x4e0 [ 1108.364741][T18901] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1108.364752][T18901] RIP: 0033:0x7f740098eba9 [ 1108.364762][T18901] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1108.364773][T18901] RSP: 002b:00007f7401850038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1108.364783][T18901] RAX: ffffffffffffffda RBX: 00007f7400bd5fa0 RCX: 00007f740098eba9 [ 1108.364790][T18901] RDX: 0000000000000030 RSI: 0000000000000029 RDI: 0000000000000003 [ 1108.364797][T18901] RBP: 00007f7401850090 R08: 0000000000000090 R09: 0000000000000000 [ 1108.364804][T18901] R10: 0000200000000900 R11: 0000000000000246 R12: 0000000000000001 [ 1108.364810][T18901] R13: 00007f7400bd6038 R14: 00007f7400bd5fa0 R15: 00007ffd46adb3b8 [ 1108.364824][T18901] [ 1108.617688][ C1] vkms_vblank_simulate: vblank timer overrun [ 1108.701473][ T10] usb 1-1: Using ep0 maxpacket: 16 [ 1108.888546][ T10] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1108.909691][ T10] usb 1-1: New USB device found, idVendor=04d8, idProduct=00dd, bcdDevice= 0.00 [ 1108.918914][ T10] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1108.943523][ T10] usb 1-1: config 0 descriptor?? [ 1109.142034][T11502] usb 2-1: new high-speed USB device number 35 using dummy_hcd [ 1109.302950][T11502] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 1109.327931][T11502] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1109.346814][T11502] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1109.358024][T11502] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1109.368670][T11502] usb 2-1: Product: syz [ 1109.374573][ T10] mcp2221 0003:04D8:00DD.0018: USB HID v0.05 Device [HID 04d8:00dd] on usb-dummy_hcd.0-1/input0 [ 1109.385116][T11502] usb 2-1: Manufacturer: syz [ 1109.389774][T11502] usb 2-1: SerialNumber: syz [ 1109.425678][T11502] cdc_acm 2-1:1.0: probe with driver cdc_acm failed with error -22 [ 1109.535753][ T30] audit: type=1400 audit(1758254102.440:4110): avc: denied { read } for pid=18912 comm="syz.3.3439" dev="sockfs" ino=71592 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1109.557049][ C1] vkms_vblank_simulate: vblank timer overrun [ 1109.717422][T18920] netlink: 1752 bytes leftover after parsing attributes in process `syz.3.3442'. [ 1109.745655][T18921] netlink: 168 bytes leftover after parsing attributes in process `syz.1.3436'. [ 1109.754776][T18921] netlink: 168 bytes leftover after parsing attributes in process `syz.1.3436'. [ 1110.100759][ T30] audit: type=1400 audit(1758254103.000:4111): avc: denied { bind } for pid=18924 comm="syz.3.3444" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 1110.594606][ T10] usb 1-1: USB disconnect, device number 55 [ 1110.641726][T18936] netlink: 'syz.0.3445': attribute type 12 has an invalid length. [ 1111.071500][ T30] audit: type=1326 audit(1758254103.950:4112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18938 comm="syz.2.3446" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f75fa98eba9 code=0x7ffc0000 [ 1111.141448][ T30] audit: type=1326 audit(1758254103.950:4113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18938 comm="syz.2.3446" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f75fa98eba9 code=0x7ffc0000 [ 1111.744108][T18945] FAULT_INJECTION: forcing a failure. [ 1111.744108][T18945] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1111.759616][T18945] CPU: 0 UID: 0 PID: 18945 Comm: syz.2.3448 Not tainted syzkaller #0 PREEMPT(full) [ 1111.759640][T18945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1111.759651][T18945] Call Trace: [ 1111.759658][T18945] [ 1111.759665][T18945] dump_stack_lvl+0x16c/0x1f0 [ 1111.759692][T18945] should_fail_ex+0x512/0x640 [ 1111.759719][T18945] _copy_from_user+0x2e/0xd0 [ 1111.759747][T18945] __sys_bpf+0x21d/0x4de0 [ 1111.759776][T18945] ? __pfx___sys_bpf+0x10/0x10 [ 1111.759800][T18945] ? ksys_write+0x190/0x250 [ 1111.759823][T18945] ? __mutex_unlock_slowpath+0x161/0x7b0 [ 1111.759861][T18945] ? fput+0x9b/0xd0 [ 1111.759884][T18945] ? ksys_write+0x1ac/0x250 [ 1111.759903][T18945] ? __pfx_ksys_write+0x10/0x10 [ 1111.759926][T18945] __x64_sys_bpf+0x78/0xc0 [ 1111.759949][T18945] ? lockdep_hardirqs_on+0x7c/0x110 [ 1111.759971][T18945] do_syscall_64+0xcd/0x4e0 [ 1111.759996][T18945] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1111.760015][T18945] RIP: 0033:0x7f75fa98eba9 [ 1111.760030][T18945] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1111.760048][T18945] RSP: 002b:00007f75fb8dd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1111.760066][T18945] RAX: ffffffffffffffda RBX: 00007f75fabd5fa0 RCX: 00007f75fa98eba9 [ 1111.760080][T18945] RDX: 0000000000000028 RSI: 0000200000000140 RDI: 0000000000000012 [ 1111.760092][T18945] RBP: 00007f75fb8dd090 R08: 0000000000000000 R09: 0000000000000000 [ 1111.760104][T18945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1111.760115][T18945] R13: 00007f75fabd6038 R14: 00007f75fabd5fa0 R15: 00007fffefbd54f8 [ 1111.760140][T18945] [ 1111.927769][ C0] vkms_vblank_simulate: vblank timer overrun [ 1112.043917][ T10] usb 2-1: USB disconnect, device number 35 [ 1113.290006][T18968] netlink: 'syz.0.3454': attribute type 12 has an invalid length. [ 1113.691503][ T30] audit: type=1400 audit(1758254106.550:4114): avc: denied { bind } for pid=18965 comm="syz.4.3455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1113.794802][T18970] wireguard0: entered promiscuous mode [ 1113.800264][T18970] wireguard0: entered allmulticast mode [ 1113.834426][ T30] audit: type=1400 audit(1758254106.550:4115): avc: denied { listen } for pid=18965 comm="syz.4.3455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1114.781483][T18653] usb 3-1: new high-speed USB device number 40 using dummy_hcd [ 1115.312390][T18653] usb 3-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1115.322557][T18653] usb 3-1: config 0 has no interfaces? [ 1115.328566][T18653] usb 3-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1115.337850][T18653] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1115.372385][T18653] usb 3-1: config 0 descriptor?? [ 1115.421686][T14573] usb 4-1: new high-speed USB device number 39 using dummy_hcd [ 1115.444466][ T1297] ieee802154 phy0 wpan0: encryption failed: -22 [ 1115.450831][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 [ 1115.554380][T18996] bridge0: port 3(veth0_to_bridge) entered blocking state [ 1115.597711][T18976] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1115.606527][T18976] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1115.737411][T18993] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1115.763434][T18996] bridge0: port 3(veth0_to_bridge) entered disabled state [ 1115.781434][T14573] usb 4-1: Using ep0 maxpacket: 8 [ 1115.796032][T14573] usb 4-1: config index 0 descriptor too short (expected 301, got 45) [ 1115.805234][T14573] usb 4-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 1115.856336][T18996] veth0_to_bridge: entered allmulticast mode [ 1115.862671][T14573] usb 4-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 1115.869113][T19002] sock: sock_set_timeout: `syz.1.3464' (pid 19002) tries to set negative timeout [ 1115.881648][T14573] usb 4-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 1115.881677][T14573] usb 4-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 1115.881717][T14573] usb 4-1: New USB device found, idVendor=ee8d, idProduct=db1e, bcdDevice=61.23 [ 1115.970711][T18996] veth0_to_bridge: entered promiscuous mode [ 1115.981190][T18996] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1115.995359][T14573] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1116.003595][ T30] audit: type=1400 audit(1758254108.900:4116): avc: denied { wake_alarm } for pid=18995 comm="syz.0.3462" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1116.025118][T18996] bridge0: port 3(veth0_to_bridge) entered blocking state [ 1116.032519][T18996] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 1116.111435][ T30] audit: type=1400 audit(1758254108.960:4117): avc: denied { execute } for pid=18995 comm="syz.0.3462" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=72807 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 1116.259585][T14573] usb 4-1: GET_CAPABILITIES returned 0 [ 1116.265372][T14573] usbtmc 4-1:16.0: can't read capabilities [ 1116.436715][T19013] FAULT_INJECTION: forcing a failure. [ 1116.436715][T19013] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1116.451004][T19013] CPU: 1 UID: 0 PID: 19013 Comm: syz.0.3468 Not tainted syzkaller #0 PREEMPT(full) [ 1116.451018][T19013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1116.451025][T19013] Call Trace: [ 1116.451029][T19013] [ 1116.451033][T19013] dump_stack_lvl+0x16c/0x1f0 [ 1116.451053][T19013] should_fail_ex+0x512/0x640 [ 1116.451070][T19013] _copy_from_user+0x2e/0xd0 [ 1116.451087][T19013] copy_msghdr_from_user+0x98/0x160 [ 1116.451102][T19013] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1116.451123][T19013] ___sys_sendmsg+0xfe/0x1d0 [ 1116.451137][T19013] ? __pfx____sys_sendmsg+0x10/0x10 [ 1116.451167][T19013] __sys_sendmsg+0x16d/0x220 [ 1116.451182][T19013] ? __pfx___sys_sendmsg+0x10/0x10 [ 1116.451201][T19013] ? fput+0x9b/0xd0 [ 1116.451218][T19013] do_syscall_64+0xcd/0x4e0 [ 1116.451235][T19013] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1116.451246][T19013] RIP: 0033:0x7febfd18eba9 [ 1116.451256][T19013] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1116.451266][T19013] RSP: 002b:00007febfe0a7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1116.451278][T19013] RAX: ffffffffffffffda RBX: 00007febfd3d5fa0 RCX: 00007febfd18eba9 [ 1116.451285][T19013] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000000000000003 [ 1116.451292][T19013] RBP: 00007febfe0a7090 R08: 0000000000000000 R09: 0000000000000000 [ 1116.451298][T19013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1116.451305][T19013] R13: 00007febfd3d6038 R14: 00007febfd3d5fa0 R15: 00007fffb0211068 [ 1116.451318][T19013] [ 1116.621492][ T10] usb 2-1: new high-speed USB device number 36 using dummy_hcd [ 1116.771487][ T10] usb 2-1: Using ep0 maxpacket: 8 [ 1116.777735][ T10] usb 2-1: config 0 interface 0 has no altsetting 0 [ 1116.784849][ T10] usb 2-1: New USB device found, idVendor=28bd, idProduct=0042, bcdDevice= 0.00 [ 1116.794948][ T10] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1116.805385][ T10] usb 2-1: config 0 descriptor?? [ 1117.033489][T14573] usb 3-1: USB disconnect, device number 40 [ 1117.493280][ T10] uclogic 0003:28BD:0042.0019: interface is invalid, ignoring [ 1117.708837][T11502] usb 2-1: USB disconnect, device number 36 [ 1118.175972][T19033] FAULT_INJECTION: forcing a failure. [ 1118.175972][T19033] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1118.193240][T19033] CPU: 1 UID: 0 PID: 19033 Comm: syz.4.3474 Not tainted syzkaller #0 PREEMPT(full) [ 1118.193256][T19033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1118.193263][T19033] Call Trace: [ 1118.193267][T19033] [ 1118.193272][T19033] dump_stack_lvl+0x16c/0x1f0 [ 1118.193290][T19033] should_fail_ex+0x512/0x640 [ 1118.193308][T19033] _copy_from_user+0x2e/0xd0 [ 1118.193325][T19033] do_sock_getsockopt+0x3ca/0x440 [ 1118.193343][T19033] ? __pfx_do_sock_getsockopt+0x10/0x10 [ 1118.193359][T19033] ? __fget_files+0x204/0x3c0 [ 1118.193379][T19033] __sys_getsockopt+0x12f/0x260 [ 1118.193395][T19033] __x64_sys_getsockopt+0xbd/0x160 [ 1118.193408][T19033] ? do_syscall_64+0x91/0x4e0 [ 1118.193422][T19033] ? lockdep_hardirqs_on+0x7c/0x110 [ 1118.193437][T19033] do_syscall_64+0xcd/0x4e0 [ 1118.193452][T19033] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1118.193464][T19033] RIP: 0033:0x7f740098eba9 [ 1118.193473][T19033] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1118.193484][T19033] RSP: 002b:00007f7401850038 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 1118.193495][T19033] RAX: ffffffffffffffda RBX: 00007f7400bd5fa0 RCX: 00007f740098eba9 [ 1118.193502][T19033] RDX: 0000000000000036 RSI: 0000000000000084 RDI: 0000000000000003 [ 1118.193509][T19033] RBP: 00007f7401850090 R08: 0000200000000000 R09: 0000000000000000 [ 1118.193516][T19033] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1118.193522][T19033] R13: 00007f7400bd6038 R14: 00007f7400bd5fa0 R15: 00007ffd46adb3b8 [ 1118.193536][T19033] [ 1118.410783][T14573] usb 4-1: USB disconnect, device number 39 [ 1118.793018][ T30] audit: type=1400 audit(1758254111.700:4118): avc: denied { setopt } for pid=19036 comm="syz.3.3476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1118.887292][T19048] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3478'. [ 1119.263162][T19038] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.3476'. [ 1120.408584][T19058] netlink: 12 bytes leftover after parsing attributes in process `syz.1.3482'. [ 1120.425694][ T30] audit: type=1804 audit(1758254113.310:4119): pid=19058 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz.1.3482" name="/newroot/99/file0" dev="tmpfs" ino=525 res=1 errno=0 [ 1120.643074][T19058] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1120.841892][T19061] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1120.848830][T19061] bond1: (slave vcan1): The slave device specified does not support setting the MAC address [ 1120.969261][T19061] bond1: (slave vcan1): Error -95 calling set_mac_address [ 1122.307402][T19080] FAULT_INJECTION: forcing a failure. [ 1122.307402][T19080] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1122.321467][T19080] CPU: 1 UID: 0 PID: 19080 Comm: syz.1.3487 Not tainted syzkaller #0 PREEMPT(full) [ 1122.321497][T19080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1122.321507][T19080] Call Trace: [ 1122.321513][T19080] [ 1122.321520][T19080] dump_stack_lvl+0x16c/0x1f0 [ 1122.321548][T19080] should_fail_ex+0x512/0x640 [ 1122.321575][T19080] _copy_from_user+0x2e/0xd0 [ 1122.321601][T19080] do_sock_getsockopt+0x3ca/0x440 [ 1122.321629][T19080] ? __pfx_do_sock_getsockopt+0x10/0x10 [ 1122.321652][T19080] ? __fget_files+0x204/0x3c0 [ 1122.321684][T19080] __sys_getsockopt+0x12f/0x260 [ 1122.321711][T19080] __x64_sys_getsockopt+0xbd/0x160 [ 1122.321731][T19080] ? do_syscall_64+0x91/0x4e0 [ 1122.321754][T19080] ? lockdep_hardirqs_on+0x7c/0x110 [ 1122.321775][T19080] do_syscall_64+0xcd/0x4e0 [ 1122.321800][T19080] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1122.321817][T19080] RIP: 0033:0x7f677818eba9 [ 1122.321832][T19080] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1122.321849][T19080] RSP: 002b:00007f67790ed038 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 1122.321867][T19080] RAX: ffffffffffffffda RBX: 00007f67783d5fa0 RCX: 00007f677818eba9 [ 1122.321879][T19080] RDX: 000000000000000e RSI: 0000000000000084 RDI: 0000000000000003 [ 1122.321890][T19080] RBP: 00007f67790ed090 R08: 0000200000000300 R09: 0000000000000000 [ 1122.321901][T19080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1122.321911][T19080] R13: 00007f67783d6038 R14: 00007f67783d5fa0 R15: 00007ffc64c0f468 [ 1122.321936][T19080] [ 1122.533634][T19085] openvswitch: netlink: ct_state flags 8007002c unsupported [ 1122.651499][ T5864] Bluetooth: hci3: command 0x0406 tx timeout [ 1122.710990][T19090] FAULT_INJECTION: forcing a failure. [ 1122.710990][T19090] name failslab, interval 1, probability 0, space 0, times 0 [ 1122.740360][T19090] CPU: 1 UID: 0 PID: 19090 Comm: syz.1.3493 Not tainted syzkaller #0 PREEMPT(full) [ 1122.740375][T19090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1122.740382][T19090] Call Trace: [ 1122.740386][T19090] [ 1122.740391][T19090] dump_stack_lvl+0x16c/0x1f0 [ 1122.740409][T19090] should_fail_ex+0x512/0x640 [ 1122.740423][T19090] ? fs_reclaim_acquire+0xae/0x150 [ 1122.740439][T19090] ? tomoyo_realpath_from_path+0xc2/0x6e0 [ 1122.740456][T19090] should_failslab+0xc2/0x120 [ 1122.740470][T19090] __kmalloc_noprof+0xd2/0x510 [ 1122.740485][T19090] tomoyo_realpath_from_path+0xc2/0x6e0 [ 1122.740503][T19090] ? tomoyo_profile+0x47/0x60 [ 1122.740516][T19090] tomoyo_path_number_perm+0x245/0x580 [ 1122.740529][T19090] ? tomoyo_path_number_perm+0x237/0x580 [ 1122.740545][T19090] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 1122.740561][T19090] ? find_held_lock+0x2b/0x80 [ 1122.740586][T19090] ? find_held_lock+0x2b/0x80 [ 1122.740599][T19090] ? hook_file_ioctl_common+0x145/0x410 [ 1122.740614][T19090] ? __fget_files+0x20e/0x3c0 [ 1122.740629][T19090] security_file_ioctl+0x9b/0x240 [ 1122.740646][T19090] __x64_sys_ioctl+0xb7/0x210 [ 1122.740665][T19090] do_syscall_64+0xcd/0x4e0 [ 1122.740681][T19090] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1122.740692][T19090] RIP: 0033:0x7f677818eba9 [ 1122.740702][T19090] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1122.740713][T19090] RSP: 002b:00007f67790ed038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1122.740723][T19090] RAX: ffffffffffffffda RBX: 00007f67783d5fa0 RCX: 00007f677818eba9 [ 1122.740731][T19090] RDX: 0000200000000a40 RSI: 0000000000003ba0 RDI: 0000000000000003 [ 1122.740742][T19090] RBP: 00007f67790ed090 R08: 0000000000000000 R09: 0000000000000000 [ 1122.740749][T19090] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1122.740755][T19090] R13: 00007f67783d6038 R14: 00007f67783d5fa0 R15: 00007ffc64c0f468 [ 1122.740769][T19090] [ 1123.043591][T19090] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1124.018443][T19108] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3498'. [ 1124.662569][T19112] netlink: 'syz.0.3497': attribute type 2 has an invalid length. [ 1124.725292][T19112] netlink: 68 bytes leftover after parsing attributes in process `syz.0.3497'. [ 1129.030457][T19164] FAULT_INJECTION: forcing a failure. [ 1129.030457][T19164] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1129.045339][T19164] CPU: 0 UID: 0 PID: 19164 Comm: syz.0.3509 Not tainted syzkaller #0 PREEMPT(full) [ 1129.045355][T19164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1129.045362][T19164] Call Trace: [ 1129.045366][T19164] [ 1129.045370][T19164] dump_stack_lvl+0x16c/0x1f0 [ 1129.045388][T19164] should_fail_ex+0x512/0x640 [ 1129.045405][T19164] _copy_from_user+0x2e/0xd0 [ 1129.045422][T19164] copy_msghdr_from_user+0x98/0x160 [ 1129.045441][T19164] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1129.045458][T19164] ? __lock_acquire+0x62e/0x1ce0 [ 1129.045478][T19164] ___sys_recvmsg+0xdb/0x1a0 [ 1129.045492][T19164] ? __pfx____sys_recvmsg+0x10/0x10 [ 1129.045507][T19164] ? find_held_lock+0x2b/0x80 [ 1129.045529][T19164] do_recvmmsg+0x2fe/0x750 [ 1129.045545][T19164] ? __pfx_do_recvmmsg+0x10/0x10 [ 1129.045562][T19164] ? __mutex_unlock_slowpath+0x161/0x7b0 [ 1129.045581][T19164] ? __fget_files+0x20e/0x3c0 [ 1129.045597][T19164] __x64_sys_recvmmsg+0x22a/0x280 [ 1129.045613][T19164] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 1129.045631][T19164] do_syscall_64+0xcd/0x4e0 [ 1129.045648][T19164] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1129.045659][T19164] RIP: 0033:0x7febfd18eba9 [ 1129.045668][T19164] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1129.045679][T19164] RSP: 002b:00007febfe065038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1129.045690][T19164] RAX: ffffffffffffffda RBX: 00007febfd3d6180 RCX: 00007febfd18eba9 [ 1129.045698][T19164] RDX: 03ffffffffffff67 RSI: 0000200000002440 RDI: 0000000000000006 [ 1129.045704][T19164] RBP: 00007febfe065090 R08: 0000000000000000 R09: 0000000000000000 [ 1129.045711][T19164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1129.045718][T19164] R13: 00007febfd3d6218 R14: 00007febfd3d6180 R15: 00007fffb0211068 [ 1129.045731][T19164] [ 1129.640650][ T30] audit: type=1400 audit(1758254122.540:4120): avc: denied { ioctl } for pid=19168 comm="syz.3.3511" path="socket:[73156]" dev="sockfs" ino=73156 ioctlcmd=0x89e1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 1130.264071][T19193] FAULT_INJECTION: forcing a failure. [ 1130.264071][T19193] name failslab, interval 1, probability 0, space 0, times 0 [ 1130.277509][T19193] CPU: 0 UID: 0 PID: 19193 Comm: syz.2.3516 Not tainted syzkaller #0 PREEMPT(full) [ 1130.277533][T19193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1130.277544][T19193] Call Trace: [ 1130.277550][T19193] [ 1130.277558][T19193] dump_stack_lvl+0x16c/0x1f0 [ 1130.277585][T19193] should_fail_ex+0x512/0x640 [ 1130.277608][T19193] ? kmem_cache_alloc_node_noprof+0x5e/0x3b0 [ 1130.277631][T19193] should_failslab+0xc2/0x120 [ 1130.277652][T19193] kmem_cache_alloc_node_noprof+0x71/0x3b0 [ 1130.277670][T19193] ? __alloc_skb+0x2b2/0x380 [ 1130.277695][T19193] __alloc_skb+0x2b2/0x380 [ 1130.277715][T19193] ? __pfx___alloc_skb+0x10/0x10 [ 1130.277737][T19193] ? __pfx_netlink_autobind.isra.0+0x10/0x10 [ 1130.277766][T19193] netlink_alloc_large_skb+0x69/0x130 [ 1130.277790][T19193] netlink_sendmsg+0x6a1/0xdd0 [ 1130.277818][T19193] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1130.277851][T19193] sock_write_iter+0x4fc/0x5b0 [ 1130.277878][T19193] ? __pfx_sock_write_iter+0x10/0x10 [ 1130.277915][T19193] ? __pfx_file_has_perm+0x10/0x10 [ 1130.277940][T19193] do_iter_readv_writev+0x65f/0x9e0 [ 1130.277971][T19193] ? __pfx_do_iter_readv_writev+0x10/0x10 [ 1130.277999][T19193] ? selinux_file_permission+0x126/0x660 [ 1130.278028][T19193] ? bpf_lsm_file_permission+0x9/0x10 [ 1130.278050][T19193] ? security_file_permission+0x71/0x210 [ 1130.278077][T19193] ? rw_verify_area+0xcf/0x6c0 [ 1130.278105][T19193] vfs_writev+0x35f/0xde0 [ 1130.278125][T19193] ? __lock_acquire+0x62e/0x1ce0 [ 1130.278154][T19193] ? __pfx_vfs_writev+0x10/0x10 [ 1130.278188][T19193] ? __fget_files+0x20e/0x3c0 [ 1130.278207][T19193] ? __fget_files+0x190/0x3c0 [ 1130.278232][T19193] ? do_writev+0x28c/0x340 [ 1130.278246][T19193] do_writev+0x28c/0x340 [ 1130.278263][T19193] ? __pfx_do_writev+0x10/0x10 [ 1130.278287][T19193] do_syscall_64+0xcd/0x4e0 [ 1130.278312][T19193] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1130.278330][T19193] RIP: 0033:0x7f75fa98eba9 [ 1130.278344][T19193] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1130.278361][T19193] RSP: 002b:00007f75fb8bc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 1130.278378][T19193] RAX: ffffffffffffffda RBX: 00007f75fabd6090 RCX: 00007f75fa98eba9 [ 1130.278390][T19193] RDX: 0000000000000001 RSI: 00002000000000c0 RDI: 000000000000000b [ 1130.278401][T19193] RBP: 00007f75fb8bc090 R08: 0000000000000000 R09: 0000000000000000 [ 1130.278412][T19193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1130.278427][T19193] R13: 00007f75fabd6128 R14: 00007f75fabd6090 R15: 00007fffefbd54f8 [ 1130.278455][T19193] [ 1130.883454][ T5857] Bluetooth: hci2: command 0x0406 tx timeout [ 1131.383116][ T912] usb 4-1: new high-speed USB device number 40 using dummy_hcd [ 1131.868541][ T912] usb 4-1: Using ep0 maxpacket: 8 [ 1131.961452][ T10] usb 5-1: new full-speed USB device number 31 using dummy_hcd [ 1132.324987][ T912] usb 4-1: New USB device found, idVendor=0ccd, idProduct=0039, bcdDevice=90.7b [ 1132.334189][ T912] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1132.528450][ T10] usb 5-1: config 0 has an invalid interface number: 11 but max is 0 [ 1132.536719][ T10] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1132.544389][ T912] pvrusb2: Hardware description: Terratec Grabster AV400 [ 1132.577726][ T10] usb 5-1: config 0 has no interface number 0 [ 1132.681519][ T912] pvrusb2: ********** [ 1132.711469][ T912] pvrusb2: ***WARNING*** Support for this device (Terratec Grabster AV400) is experimental. [ 1132.736255][ T10] usb 5-1: config 0 interface 11 altsetting 253 endpoint 0x87 has an invalid bInterval 0, changing to 10 [ 1132.753839][ T912] pvrusb2: Important functionality might not be entirely working. [ 1133.023166][ T10] usb 5-1: config 0 interface 11 altsetting 253 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 1133.036282][ T10] usb 5-1: config 0 interface 11 has no altsetting 0 [ 1133.077621][ T912] pvrusb2: Please consider contacting the driver author to help with further stabilization of the driver. [ 1133.088054][ T10] usb 5-1: New USB device found, idVendor=06cd, idProduct=010f, bcdDevice=d5.1b [ 1133.122519][ T912] pvrusb2: ********** [ 1133.130926][ T10] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1133.178337][ T2327] pvrusb2: Invalid write control endpoint [ 1133.191306][ T912] usb 4-1: USB disconnect, device number 40 [ 1133.210411][ T10] usb 5-1: config 0 descriptor?? [ 1133.439793][ T2327] pvrusb2: Invalid write control endpoint [ 1133.484986][ T2327] pvrusb2: ***WARNING*** Detected a wedged cx25840 chip; the device will not work. [ 1133.562667][ T10] usb 5-1: can't set config #0, error -71 [ 1133.588761][ T2327] pvrusb2: ***WARNING*** Try power cycling the pvrusb2 device. [ 1133.606714][ T10] usb 5-1: USB disconnect, device number 31 [ 1133.626610][ T2327] pvrusb2: ***WARNING*** Disabling further access to the device to prevent other foul-ups. [ 1133.792509][ T2327] pvrusb2: Device being rendered inoperable [ 1133.825326][ T2327] cx25840 1-0044: Unable to detect h/w, assuming cx23887 [ 1133.931737][ T2327] cx25840 1-0044: cx23887 A/V decoder found @ 0x88 (pvrusb2_a) [ 1134.098306][ T2327] pvrusb2: Attached sub-driver cx25840 [ 1134.121584][ T2327] pvrusb2: ***WARNING*** pvrusb2 device hardware appears to be jammed and I can't clear it. [ 1134.621152][ T2327] pvrusb2: You might need to power cycle the pvrusb2 device in order to recover. [ 1135.841453][T18653] usb 5-1: new high-speed USB device number 32 using dummy_hcd [ 1135.922884][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1135.935021][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1135.947208][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1135.959245][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1135.971320][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1135.983497][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1135.995714][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1135.996007][T19284] netlink: 'syz.3.3534': attribute type 12 has an invalid length. [ 1136.007959][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1136.020839][T18653] usb 5-1: Using ep0 maxpacket: 32 [ 1136.027817][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1136.044925][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1136.088065][T18653] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1136.119324][T18653] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1136.192442][T18653] usb 5-1: New USB device found, idVendor=1e7d, idProduct=2d5a, bcdDevice= 0.00 [ 1136.871449][T18653] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1137.139050][T18653] usb 5-1: config 0 descriptor?? [ 1140.931491][ C0] net_ratelimit: 33920 callbacks suppressed [ 1140.931504][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1140.949594][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1140.961724][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1140.973752][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1140.985815][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1140.997830][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1141.009892][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1141.021926][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1141.033990][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1141.046018][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1141.628077][T18653] usb 5-1: can't set config #0, error -71 [ 1142.020302][T18653] usb 5-1: USB disconnect, device number 32 [ 1143.888269][ T5857] Bluetooth: hci1: command 0x0406 tx timeout [ 1144.695530][T19306] FAULT_INJECTION: forcing a failure. [ 1144.695530][T19306] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1144.709657][T19303] tipc: Started in network mode [ 1144.722581][T19303] tipc: Node identity 86a3610d4de6, cluster identity 4711 [ 1144.814357][T19306] CPU: 1 UID: 0 PID: 19306 Comm: syz.1.3544 Not tainted syzkaller #0 PREEMPT(full) [ 1144.814381][T19306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1144.814392][T19306] Call Trace: [ 1144.814398][T19306] [ 1144.814406][T19306] dump_stack_lvl+0x16c/0x1f0 [ 1144.814434][T19306] should_fail_ex+0x512/0x640 [ 1144.814463][T19306] _copy_from_user+0x2e/0xd0 [ 1144.814489][T19306] __sys_bpf+0x21d/0x4de0 [ 1144.814512][T19306] ? __bpf_ringbuf_reserve+0x723/0x960 [ 1144.814537][T19306] ? lockdep_hardirqs_on+0x7c/0x110 [ 1144.814559][T19306] ? __bpf_ringbuf_reserve+0x4f0/0x960 [ 1144.814578][T19306] ? __pfx___sys_bpf+0x10/0x10 [ 1144.814604][T19306] ? __pfx___bpf_ringbuf_reserve+0x10/0x10 [ 1144.814626][T19306] ? bpf_ringbuf_commit+0x14f/0x1d0 [ 1144.814657][T19306] ? __might_fault+0xe3/0x190 [ 1144.814675][T19306] ? __might_fault+0x13b/0x190 [ 1144.814692][T19306] ? find_held_lock+0x2b/0x80 [ 1144.814715][T19306] ? syscall_trace_enter+0x1cb/0x240 [ 1144.814740][T19306] __x64_sys_bpf+0x78/0xc0 [ 1144.814765][T19306] do_syscall_64+0xcd/0x4e0 [ 1144.814791][T19306] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1144.814809][T19306] RIP: 0033:0x7f677818eba9 [ 1144.814824][T19306] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1144.814842][T19306] RSP: 002b:00007f67790ed038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1144.814860][T19306] RAX: ffffffffffffffda RBX: 00007f67783d5fa0 RCX: 00007f677818eba9 [ 1144.814872][T19306] RDX: 0000000000000094 RSI: 0000200000000540 RDI: 0000000000000005 [ 1144.814884][T19306] RBP: 00007f67790ed090 R08: 0000000000000000 R09: 0000000000000000 [ 1144.814895][T19306] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1144.814906][T19306] R13: 00007f67783d6038 R14: 00007f67783d5fa0 R15: 00007ffc64c0f468 [ 1144.814931][T19306] [ 1144.815169][T19303] tipc: Enabled bearer , priority 0 [ 1145.035466][T19310] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3543'. [ 1145.346965][T19313] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1145.937149][ T10] tipc: Node number set to 3410321677 [ 1145.942599][ C0] net_ratelimit: 30235 callbacks suppressed [ 1145.942608][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1145.942755][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1145.942926][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1145.943062][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1145.943232][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1145.943364][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1145.943542][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1145.943669][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1145.943838][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1145.943973][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1150.951410][ C0] net_ratelimit: 18306 callbacks suppressed [ 1150.951429][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1150.969552][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1150.981747][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1150.993941][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1151.006129][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1151.018357][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1151.030551][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1151.042742][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1151.054927][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1151.067121][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1151.511371][ C1] sched: DL replenish lagged too much [ 1155.961509][ C0] net_ratelimit: 23388 callbacks suppressed [ 1155.961528][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1155.971404][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1155.979612][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1155.992240][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1156.003368][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1156.015968][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1156.027188][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1156.039813][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1156.050990][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1156.063596][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1160.971518][ C1] net_ratelimit: 23657 callbacks suppressed [ 1160.971538][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1160.971553][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1160.978293][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1160.989590][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1161.002109][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1161.013388][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1161.025945][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1161.037243][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1161.049668][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1161.060936][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1165.981490][ C0] net_ratelimit: 22683 callbacks suppressed [ 1165.981511][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1165.981668][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1165.987615][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1166.000118][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1166.011542][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1166.023858][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1166.035226][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1166.047685][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1166.059005][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1166.071520][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1170.991385][ C0] net_ratelimit: 21525 callbacks suppressed [ 1170.991406][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1170.991423][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1170.997615][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1171.010005][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1171.021314][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1171.033849][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1171.045104][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1171.057601][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1171.068980][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1171.081362][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1176.001445][ C0] net_ratelimit: 22336 callbacks suppressed [ 1176.001465][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1176.001879][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1176.007595][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1176.020187][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1176.031511][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1176.043950][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1176.055186][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1176.067760][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1176.078981][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1176.091580][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1178.282729][ T1297] ieee802154 phy0 wpan0: encryption failed: -22 [ 1178.297149][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 [ 1181.011635][ C0] net_ratelimit: 22694 callbacks suppressed [ 1181.011654][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1181.011910][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1181.017788][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1181.030295][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1181.041677][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1181.053999][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1181.065387][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1181.077852][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1181.089164][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1181.102026][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1186.021512][ C1] net_ratelimit: 20465 callbacks suppressed [ 1186.021526][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1186.031410][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1186.040074][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1186.051454][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1186.063844][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1186.075232][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1186.087554][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1186.099012][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1186.111781][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1186.122793][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1191.031493][ C1] net_ratelimit: 19544 callbacks suppressed [ 1191.031495][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1191.031510][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1191.037671][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1191.050200][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1191.061474][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1191.073948][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1191.085337][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1191.097712][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1191.109080][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1191.121524][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1196.041481][ C0] net_ratelimit: 19807 callbacks suppressed [ 1196.041499][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1196.041919][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1196.047665][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1196.060166][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1196.071480][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1196.083965][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1196.095364][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1196.107683][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1196.119066][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1196.131581][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1201.051626][ C0] net_ratelimit: 19431 callbacks suppressed [ 1201.051645][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1201.051862][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1201.057808][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1201.070308][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1201.081609][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1201.094095][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1201.105490][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1201.117828][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1201.129200][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1201.141664][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1206.061501][ C0] net_ratelimit: 19527 callbacks suppressed [ 1206.061509][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1206.061519][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1206.061787][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1206.068166][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1206.079528][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1206.092032][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1206.103491][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1206.115827][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1206.127191][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1206.139539][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1211.071458][ C1] net_ratelimit: 19590 callbacks suppressed [ 1211.071475][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1211.071477][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1211.072239][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1211.077669][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1211.090023][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1211.101410][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1211.113742][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1211.125162][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1211.137557][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1211.149048][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1216.081565][ C0] net_ratelimit: 19355 callbacks suppressed [ 1216.081584][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1216.082103][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1216.087771][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1216.100244][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1216.111554][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1216.124046][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1216.135451][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1216.147775][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1216.159148][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1216.171603][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1221.091391][ C1] net_ratelimit: 19493 callbacks suppressed [ 1221.091411][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1221.091433][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1221.098084][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1221.109471][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1221.121928][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1221.133241][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1221.145743][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1221.157131][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1221.169457][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1221.180833][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1226.101585][ C0] net_ratelimit: 19586 callbacks suppressed [ 1226.101603][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1226.101921][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1226.107733][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1226.120230][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1226.131643][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1226.143972][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1226.155340][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1226.167766][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1226.179131][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1226.191639][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1231.111485][ C0] net_ratelimit: 19733 callbacks suppressed [ 1231.111504][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1231.111508][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1231.112253][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1231.117756][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1231.130222][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1231.141548][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1231.153967][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1231.165432][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1231.177770][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1231.189126][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1236.121603][ C1] net_ratelimit: 19569 callbacks suppressed [ 1236.121615][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1236.131391][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1236.140132][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1236.151527][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1236.163855][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1236.175303][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1236.187664][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1236.199073][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1236.211504][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1236.222875][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1241.131764][ C1] net_ratelimit: 19471 callbacks suppressed [ 1241.131778][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1241.141420][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1241.150275][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1241.161725][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1241.174105][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1241.185507][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1241.197922][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1241.209318][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1241.221646][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1241.233103][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1246.141603][ C1] net_ratelimit: 19564 callbacks suppressed [ 1246.141623][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1246.151472][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1246.160171][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1246.171590][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1246.183945][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1246.195393][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1246.207763][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1246.219170][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1246.231518][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1246.242951][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1251.151636][ C1] net_ratelimit: 19628 callbacks suppressed [ 1251.151649][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1251.161383][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1251.170192][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1251.181615][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1251.193965][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1251.205387][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1251.217751][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1251.229183][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1251.241942][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1251.252980][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1256.161501][ C0] net_ratelimit: 19572 callbacks suppressed [ 1256.161520][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1256.161683][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1256.167739][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1256.180100][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1256.191461][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1256.203900][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1256.215226][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1256.227729][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1256.239115][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1256.251483][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1261.171566][ C0] net_ratelimit: 19637 callbacks suppressed [ 1261.171584][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1261.171760][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1261.177768][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1261.190225][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1261.201543][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1261.214030][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1261.225428][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1261.237927][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1261.249179][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1261.261686][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1266.181402][ C1] net_ratelimit: 19577 callbacks suppressed [ 1266.181418][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1266.181422][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1266.182176][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1266.187559][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1266.200046][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1266.211460][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1266.223748][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1266.235097][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1266.247505][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1266.258999][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1271.191384][ C1] net_ratelimit: 19450 callbacks suppressed [ 1271.191404][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1271.191484][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1271.198079][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1271.209481][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1271.221867][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1271.233184][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1271.245608][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1271.256959][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1271.269452][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1271.280856][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1273.341329][ C0] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 1273.348295][ C0] rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P19313/1:b..l [ 1273.356715][ C0] rcu: (detected by 0, t=10502 jiffies, g=93825, q=554 ncpus=2) [ 1273.364427][ C0] task:syz.1.3545 state:R running task stack:27672 pid:19313 tgid:19312 ppid:16713 task_flags:0x400040 flags:0x00004006 [ 1273.378763][ C0] Call Trace: [ 1273.382041][ C0] [ 1273.384967][ C0] __schedule+0x1190/0x5de0 [ 1273.389468][ C0] ? is_bpf_text_address+0x8a/0x1a0 [ 1273.394663][ C0] ? kernel_text_address+0x8d/0x100 [ 1273.399860][ C0] ? __pfx___schedule+0x10/0x10 [ 1273.404712][ C0] ? mark_held_locks+0x49/0x80 [ 1273.409475][ C0] preempt_schedule_irq+0x51/0x90 [ 1273.414494][ C0] irqentry_exit+0x36/0x90 [ 1273.418904][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1273.424872][ C0] RIP: 0010:__sanitizer_cov_trace_pc+0x56/0x70 [ 1273.431017][ C0] Code: 00 f0 00 75 35 8b 82 3c 16 00 00 85 c0 74 2b 8b 82 18 16 00 00 83 f8 02 75 20 48 8b 8a 20 16 00 00 8b 92 1c 16 00 00 48 8b 01 <48> 83 c0 01 48 39 d0 73 07 48 89 01 48 89 34 c1 c3 cc cc cc cc 0f [ 1273.450622][ C0] RSP: 0018:ffffc9000d0c7948 EFLAGS: 00000246 [ 1273.456677][ C0] RAX: 0000000000070f03 RBX: ffff88801e505900 RCX: ffffc9001eb71000 [ 1273.464637][ C0] RDX: 0000000000080000 RSI: ffffffff822c210f RDI: 0000000000000007 [ 1273.472596][ C0] RBP: 0000000000000000 R08: 0000000000000007 R09: 0000000000000000 [ 1273.480553][ C0] R10: 0000000000003451 R11: 0000000000000000 R12: 0000000002b80578 [ 1273.488510][ C0] R13: 0000000000000001 R14: 0000000000053451 R15: 0000000000003451 [ 1273.496478][ C0] ? __update_page_owner_free_handle.constprop.0+0xdf/0x4a0 [ 1273.503757][ C0] __update_page_owner_free_handle.constprop.0+0xdf/0x4a0 [ 1273.510866][ C0] __reset_page_owner+0x93/0x1a0 [ 1273.515797][ C0] __free_frozen_pages+0x7d5/0x10f0 [ 1273.521000][ C0] __put_partials+0x165/0x1c0 [ 1273.525682][ C0] qlist_free_all+0x4d/0x120 [ 1273.530263][ C0] ? _iommufd_object_alloc+0x23/0x1a0 [ 1273.535631][ C0] kasan_quarantine_reduce+0x195/0x1e0 [ 1273.541079][ C0] __kasan_kmalloc+0x8a/0xb0 [ 1273.545662][ C0] __kmalloc_noprof+0x223/0x510 [ 1273.550521][ C0] _iommufd_object_alloc+0x23/0x1a0 [ 1273.555727][ C0] iommufd_device_bind+0x4ea/0x890 [ 1273.560839][ C0] iommufd_test+0x1620/0x61d0 [ 1273.565515][ C0] ? __pfx_iommufd_test+0x10/0x10 [ 1273.570531][ C0] ? find_held_lock+0x2b/0x80 [ 1273.575198][ C0] ? __might_fault+0xe3/0x190 [ 1273.579877][ C0] iommufd_fops_ioctl+0x34d/0x540 [ 1273.584901][ C0] ? __pfx_iommufd_fops_ioctl+0x10/0x10 [ 1273.590444][ C0] ? hook_file_ioctl_common+0x145/0x410 [ 1273.595986][ C0] ? selinux_file_ioctl+0x180/0x270 [ 1273.601188][ C0] ? selinux_file_ioctl+0xb4/0x270 [ 1273.606297][ C0] ? __pfx_iommufd_fops_ioctl+0x10/0x10 [ 1273.611841][ C0] __x64_sys_ioctl+0x18e/0x210 [ 1273.616614][ C0] do_syscall_64+0xcd/0x4e0 [ 1273.621120][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1273.627005][ C0] RIP: 0033:0x7f677818eba9 [ 1273.631412][ C0] RSP: 002b:00007f67790ed038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1273.639814][ C0] RAX: ffffffffffffffda RBX: 00007f67783d5fa0 RCX: 00007f677818eba9 [ 1273.647774][ C0] RDX: 0000200000000200 RSI: 0000000000003ba0 RDI: 000000000000000a [ 1273.655733][ C0] RBP: 00007f6778211e19 R08: 0000000000000000 R09: 0000000000000000 [ 1273.663691][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1273.671652][ C0] R13: 00007f67783d6038 R14: 00007f67783d5fa0 R15: 00007ffc64c0f468 [ 1273.679628][ C0] [ 1273.682639][ C0] rcu: rcu_preempt kthread starved for 8079 jiffies! g93825 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 [ 1273.693737][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 1273.703692][ C0] rcu: RCU grace-period kthread stack dump: [ 1273.709559][ C0] task:rcu_preempt state:R running task stack:27672 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00004000 [ 1273.723039][ C0] Call Trace: [ 1273.726304][ C0] [ 1273.729225][ C0] __schedule+0x1190/0x5de0 [ 1273.733743][ C0] ? __pfx___schedule+0x10/0x10 [ 1273.738591][ C0] ? find_held_lock+0x2b/0x80 [ 1273.743267][ C0] ? schedule+0x2d7/0x3a0 [ 1273.747596][ C0] schedule+0xe7/0x3a0 [ 1273.751656][ C0] schedule_timeout+0x123/0x290 [ 1273.756497][ C0] ? __pfx_schedule_timeout+0x10/0x10 [ 1273.761857][ C0] ? __pfx_process_timeout+0x10/0x10 [ 1273.767141][ C0] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 1273.772938][ C0] ? prepare_to_swait_event+0xf5/0x480 [ 1273.778399][ C0] rcu_gp_fqs_loop+0x1ea/0xb00 [ 1273.783153][ C0] ? __pfx_rcu_gp_fqs_loop+0x10/0x10 [ 1273.788429][ C0] ? lockdep_hardirqs_on+0x7c/0x110 [ 1273.793622][ C0] ? __pfx_rcu_gp_init+0x10/0x10 [ 1273.798549][ C0] ? rcu_gp_cleanup+0x7c1/0xd90 [ 1273.803397][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 1273.809208][ C0] rcu_gp_kthread+0x270/0x380 [ 1273.813876][ C0] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 1273.819061][ C0] ? rcu_is_watching+0x12/0xc0 [ 1273.823825][ C0] ? lockdep_hardirqs_on+0x7c/0x110 [ 1273.829024][ C0] ? __kthread_parkme+0x19e/0x250 [ 1273.834046][ C0] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 1273.839235][ C0] kthread+0x3c2/0x780 [ 1273.843303][ C0] ? __pfx_kthread+0x10/0x10 [ 1273.847893][ C0] ? rcu_is_watching+0x12/0xc0 [ 1273.852653][ C0] ? __pfx_kthread+0x10/0x10 [ 1273.857240][ C0] ret_from_fork+0x56a/0x730 [ 1273.861820][ C0] ? __pfx_kthread+0x10/0x10 [ 1273.866400][ C0] ret_from_fork_asm+0x1a/0x30 [ 1273.871171][ C0] [ 1273.874180][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 1273.880488][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted syzkaller #0 PREEMPT(full) [ 1273.889412][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1273.899456][ C0] RIP: 0010:pv_native_safe_halt+0xf/0x20 [ 1273.905082][ C0] Code: 6d 61 02 c3 cc cc cc cc 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d d3 46 15 00 fb f4 cc 09 03 00 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 [ 1273.924679][ C0] RSP: 0018:ffffffff8e207e08 EFLAGS: 000002c2 [ 1273.930736][ C0] RAX: 0000000003860767 RBX: 0000000000000000 RCX: ffffffff8b94cb49 [ 1273.938694][ C0] RDX: 0000000000000000 RSI: ffffffff8de52d31 RDI: ffffffff8c163380 [ 1273.946657][ C0] RBP: fffffbfff1c52ef8 R08: 0000000000000001 R09: ffffed1017086655 [ 1273.954617][ C0] R10: ffff8880b84332ab R11: 0000000000000000 R12: 0000000000000000 [ 1273.962575][ C0] R13: ffffffff8e2977c0 R14: ffffffff90ab7490 R15: 0000000000000000 [ 1273.970537][ C0] FS: 0000000000000000(0000) GS:ffff8881246b2000(0000) knlGS:0000000000000000 [ 1273.979457][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1273.986036][ C0] CR2: 00002000002d7030 CR3: 00000000743e8000 CR4: 00000000003526f0 [ 1273.994003][ C0] Call Trace: [ 1273.997274][ C0] [ 1274.000192][ C0] default_idle+0x13/0x20 [ 1274.004525][ C0] default_idle_call+0x6d/0xb0 [ 1274.009287][ C0] do_idle+0x391/0x510 [ 1274.013353][ C0] ? __pfx_do_idle+0x10/0x10 [ 1274.017934][ C0] ? trace_sched_exit_tp+0x2f/0x120 [ 1274.023122][ C0] ? do_idle+0x12/0x510 [ 1274.027273][ C0] cpu_startup_entry+0x4f/0x60 [ 1274.032032][ C0] rest_init+0x16b/0x2b0 [ 1274.036261][ C0] ? acpi_subsystem_init+0x133/0x180 [ 1274.041538][ C0] ? __pfx_x86_late_time_init+0x10/0x10 [ 1274.047080][ C0] start_kernel+0x3ee/0x4d0 [ 1274.051578][ C0] x86_64_start_reservations+0x18/0x30 [ 1274.057036][ C0] x86_64_start_kernel+0x130/0x190 [ 1274.062142][ C0] common_startup_64+0x13e/0x148 [ 1274.067084][ C0] [ 1274.479173][ T1297] ieee802154 phy0 wpan0: encryption failed: -22 [ 1274.494099][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 [ 1276.201359][ C0] net_ratelimit: 19145 callbacks suppressed [ 1276.201378][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1276.201908][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1276.207473][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1276.220005][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1276.231404][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1276.243734][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1276.255040][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1276.267549][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1276.278924][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1276.291337][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1281.211344][ C0] net_ratelimit: 24164 callbacks suppressed [ 1281.211364][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:13:15:50:76:cc, vlan:0) [ 1281.211373][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1281.212151][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1281.217466][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1281.230033][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1281.241407][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1281.253735][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1281.265082][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1281.277486][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1281.288859][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)