last executing test programs: 1m4.997503661s ago: executing program 3 (id=1069): openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) close(r0) fcntl$setstatus(r0, 0x4, 0x2c00) r1 = gettid() fcntl$setown(r0, 0x8, r1) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) splice(r2, 0x0, r3, 0x0, 0x10000000000016, 0x0) write$selinux_load(r3, 0x0, 0xffffffffffffffc0) 1m4.112209018s ago: executing program 3 (id=1075): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000000018105e04da0700000000000109022400010000000009040000090300000009210000000122220009058103"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000000)={0x24, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0}, 0x0) 1m3.542175288s ago: executing program 3 (id=1083): mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) (async) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) io_setup(0x9, &(0x7f00000000c0)=0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/profiling', 0x20001, 0x2e) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200130002eb0e00000000000000000105000600200000000a00000040010000000500e50000070000001f00001a000000030000a95a6e870200010000e9ff070040000b00000000050005000000cc580a"], 0x80}}, 0x24000000) io_submit(r1, 0x1, &(0x7f0000000040)=[&(0x7f0000001500)={0x2000000, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000100)='9', 0x20000101}]) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000040)=0x2) (async) r4 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000005d40), 0x2, 0x0) r5 = dup(r4) write$P9_RLERRORu(r5, &(0x7f0000000200)=ANY=[@ANYRESHEX=r1, @ANYRES32=r1, @ANYRES16=r1], 0x6) sendto$inet6(r0, &(0x7f0000000400)="2ae0e710", 0x4, 0x0, &(0x7f0000000000)={0xa, 0x0, 0xfffffff9, @mcast1}, 0x1c) (async) r6 = socket$inet_tcp(0x2, 0x1, 0x0) (async) r7 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r7, 0x29, 0x16, &(0x7f0000000300)=0x9, 0x4) (async) socket$inet6(0xa, 0x80003, 0xff) (async, rerun: 64) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000080)={'pimreg\x00'}) (async, rerun: 64) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r8, 0x0, 0x60, &(0x7f0000000cc0)={'filter\x00', 0x6002, 0x4, 0x3d0, 0xf0, 0x2e8, 0x200, 0x2e8, 0x2e8, 0x2e8, 0x4, 0x0, {[{{@uncond, 0xc0, 0xf0}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x7, 0x0, 0x0, 0x1}}}, {{@arp={@multicast1, @remote, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@dev={'\xaa\xaa\xaa\xaa\xaa', 0x34}}, 0x0, 0x0, 0x0, 0x6171, 0x0, 0xffff, 'veth1_vlan\x00', 'nicvf0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @private, 0x0, 0x1}}}, {{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, 0xffffff, 0xff, 0x6, 0x5, {@empty, {[0x0, 0xff, 0xff, 0x0, 0x0, 0x1c3ae9812108cb68]}}, {@empty, {[0xff, 0x0, 0x0, 0xff, 0x0, 0xff]}}, 0x0, 0x8, 0x46b, 0x1bd, 0x4, 0xc703, 'team_slave_1\x00', 'sit0\x00', {0xff}, {0xff}, 0x0, 0x1}, 0xc0, 0xe8}, @unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3, 0x1, 0x1}}}], {{'\x00', 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffb}}}}, 0x420) (async, rerun: 64) close_range(r6, 0xffffffffffffffff, 0x0) (async, rerun: 64) recvmmsg(r0, &(0x7f0000000d80), 0x4000000000001e9, 0x10162, 0x0) (async) r9 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101201) ioctl$USBDEVFS_CONTROL(r9, 0xc0105500, &(0x7f0000000140)={0x80, 0x6, 0x300, 0xffff, 0x0, 0x0, 0x0}) (async) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x8800) 1m3.386078152s ago: executing program 3 (id=1084): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x56a, 0x27, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x8, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x5, 0x0, {0x9, 0x21, 0x2, 0x6, 0x1, {0x22, 0x3}}, {{{0x9, 0x5, 0x81, 0x3, 0x3ff, 0x11}}}}}]}}]}}, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/pm_test', 0x1a1081, 0x18) write$khugepaged_scan(r1, &(0x7f0000000000), 0x8) (async) syz_usb_control_io$hid(r0, 0x0, 0x0) (async) syz_usb_control_io(r0, &(0x7f0000000040)={0x2c, &(0x7f0000000080)={0x40, 0x1a, 0x5, {0x5, 0x23, "ccc0eb"}}, 0x0, 0x0, 0x0, 0x0}, 0x0) 1m2.868720237s ago: executing program 3 (id=1090): r0 = syz_usb_connect$hid(0x1, 0x36, &(0x7f00000027c0)=ANY=[], 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000140), 0x2, 0x0) ioctl$EVIOCSABS0(r1, 0x401845c0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000040)={0x2c, &(0x7f0000000200)=ANY=[@ANYBLOB="200b4000000028b1"], 0x0, 0x0, 0x0, 0x0}, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x50}, {r1, 0xa1}, {r1, 0x10}], 0x3, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x8) creat(&(0x7f0000000000)='./file0\x00', 0x28) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)=0x10) rmdir(&(0x7f000001f940)='./file0\x00') syz_open_dev$evdev(0x0, 0x40, 0x0) 59.61987293s ago: executing program 3 (id=1122): r0 = syz_open_dev$MSR(&(0x7f0000000100), 0xe671, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) 51.13270988s ago: executing program 1 (id=1186): r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140), 0x1, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x4000)=nil, 0x0, 0x1, 0x20010, r0, 0x0) faccessat2(r0, &(0x7f0000000180)='./file0\x00', 0xc, 0x1100) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f0000000100)={'U+', 0x6}, 0x16, 0x1) r1 = syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x40, 0x172f, 0x501, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x3, 0x0, {0x9, 0x21, 0x1000, 0x1, 0x1, {0x22, 0x7}}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0xd, 0x3}}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io$hid(r1, &(0x7f00000000c0)={0x24, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="049fb1923822ff030000000000"], 0x0}, 0x0) 50.599477677s ago: executing program 0 (id=1191): mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0xd3283d0368e269b3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps_rollup\x00') ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000002600)={0x0, 0x9, 0x5}) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r1 = userfaultfd(0x40000) ioctl$F2FS_IOC_SEC_TRIM_FILE(r1, 0x4018f514, &(0x7f0000000000)={0xbea, 0x6, 0x3}) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) read$FUSE(r0, &(0x7f00000005c0)={0x2020}, 0x2020) 50.428951032s ago: executing program 1 (id=1193): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000000018105e04da0700000000000109022400010000000009040000090300000009210000000122220009058103"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000000)={0x24, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00222200000096192a060100830000000029901700000000b3c83e25031bdde84050387b635e2c2d251f72e556c4353b7f4cd085497eabb88edd877bc86bdca6040211150763799d59e43217aff2b767d5c682381f22aad75ca8193cdef38ac2830966f265bf96011fc86dfa4213f0c96367820c6adbbf823740f618482ab998eaaa9758698c0e260a13e1912e8175746a03f2381dadb77d520793078c2f86bcb5ac3898942710bacbd6aee312"], 0x0}, 0x0) 50.386045736s ago: executing program 0 (id=1194): ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'netdevsim0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bond_slave_1\x00'}) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000240)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0xb, 0x1, 0x1000) ioctl(r1, 0x8916, &(0x7f0000000240)) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 50.160362835s ago: executing program 2 (id=1196): ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x403, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fd4000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000340)="f081550000a000000f0048180045000fbe252e8a094d36420f705626002e660f3a176a4b006665430f38f1287f0f3232420f01c30f5966ba2c0cb8c087678eef66ba470f080ced45c194710a000000058a3bc4827dbcae00c19090f2", 0x5c}], 0x1, 0x18, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text16={0x10, 0x0}], 0x1, 0x69, &(0x7f0000000000)=[@cr4={0x1, 0x9e2}], 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000000)={0x8, 0x0, &(0x7f0000000380)=[@acquire], 0x0, 0x0, 0x0}) r4 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r4, 0x29, 0x21, &(0x7f0000000100)=0xffff, 0x4) sendto$inet6(r4, &(0x7f0000000000)="800037bbfa9ba1ce", 0x8, 0x4050, &(0x7f0000001100)={0xa, 0x0, 0x0, @loopback, 0x6}, 0x1c) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000480)={0x20, 0x0, &(0x7f0000000580)=[@request_death={0x400c630e, 0x0, 0x1000000}, @clear_death], 0x0, 0x1000000, 0x0}) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f0000000180), 0x0) writev(r5, &(0x7f00000000c0)=[{&(0x7f0000000040)="4dff000013001118680907070000000f0000ff3f04000000170a001700000000040014001000030001302564aa58b9a64411f6bbf44dc48f57", 0xff4d}], 0x1) 50.149118706s ago: executing program 0 (id=1197): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='ns\x00') r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000000)={0x6, 0x5, 0x800000000000102}) mknod(&(0x7f0000000000)='./file0\x00', 0x40, 0x2) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x200000, &(0x7f00000001c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}}) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') read$FUSE(r3, &(0x7f0000003480)={0x2020}, 0x2020) fchdir(r0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x1c0) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.impure\x00', 0x0, 0x0, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x4000, 0x0) r4 = memfd_create(&(0x7f0000000000)='\x103q}2\x9a\xce\xaf\x03\xdfy[\xd9\xffR8\xf4\x1c\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xa0\x00\x00\x00\x90+\xd6\x05\r\x84\x87\x1c\b\xdb\xe2\x00\x00A\x90m\xb6&\xd0\x9d\x00\x00\xc5\xb8,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\x00\x00\x00\x00\x00\x00\r\x1b\xd3\xff<\x83z\x80\x8fQ|\xf5d\x10\x10\xd7\x01M\x7fML\x18\'\x1a<\xfee7{l\x16}\xa0I\x7f\xb5)l\xbb\x02\xfa\xb7\xb6\xa0]\xda8\xe0~\x1c \x91\t\x8b\xbd\x1f\xb3834d1i\x9b\x94\xa6\\\x0e\xe2\xfa\xe5!\xd3\xcf\xfc\xce\xba\xe2\x9f\x05xgL5\x14Y+\xb3\x1axi)<\xf7\x98\xc1\xba\xf4|\xe7|\xc4\xd7\x03\x00\x00\x00\x04D\x15E^7%8\x94y\x98\xf0l\xa0\'Q%\xd4\xda\xee\x81}\xcc\xfd\xa2\xe3M~x\x96\xe3]\xd70\xa2\x17\xca\xde\x1b\xaa\xe0l\xfc\x85\x8fc\x1c{|e\x8bs\xb0\x85E\xce;p)\xf8\xa6\xaa&QC4V\x81\x04\xcf\xd2\x81\xdc\xdf\xd7<\x9f\x93\x8bX\xd4\xea\xb2\xff\b\x92\xc7\x00\xef\xff\x00\x93\x1f\x92\xa7dcY\x9c\x9e9O-\xfcF\xbb\xbd{:IR\xea\xd8$\xe2\xa0\xc2\x8b\x1a\xead\xb8\xe1:6\x15M\x1d\xdak\x8c\x909\xd8\xb3\x02\xe0\x04\x9c\xc2\x06|\xf0\x0f\xa6Y&r\x9b\xc7\x1d\xe7jDf\x87@\x8fg\x15RJwe\xe2\xdcunu\xff`\xa40\xce\xffB%\xe4k\xff\x8d\x06\x0e\x89\xd9DC\x9fF\x9c[M=\xe0^\xa8\xed)\xe8Z\xe8\x99&\x87\x04\xa4\t\xaa\xd8\xd6\xd5pG\xcb\xc4\x8b\xf7\xb8#\xcb\xd8|\xa5\xa6S\x8b\x8cv\xb7)\x02k\xf3L\x03\xbb\xfa\xe1\\\xf1\x8cUj\xd5\xa5\x88GL\xe7_\xfd\x17C=G\x0f\xe9u\x1d\xfeg\xfex\xcd\xaa\xad\x906\xd0sy\xc6T\x93\xae\xd5r\xc8G\xc5\xfdS\xff\x04:`\x1e\xe3;l\xcd&\xd4\xf4\x8eum\x04\x00~\xfa\x05\xd7\xe7X\xc7/\xae5\x93wwT\x13\xbd,\xd6\x16\x84\xcd\xd1\xd8\xe1P_\xbf0\xd8\x8d%Yh\xb5\xb4\"\xf5\x93\xdeh\xce\xa5\xe8\xc8\xec\x88\x89\xf07{\x95\xc9\xd0\xee\xe1\x1d\x80\xcc]-\xc2\xa1\x02ELhI\xd9\xf5\xcfk\x8a&i\xc1\xff9T\x8e\xe2rY\xa3\xd2H9\xfe\x0e\x1e\xac\x0f\xc3\xbd{\xd9\xcc\xbe\xa9\x93\xe0\xa4W\x1cn>\xc1\xf1\x9e\"\x93\x19\x19\x1a\xcc\x7fy\xd2~\x05\x99\xe6\x00o\xca\xe0\xc6\xd4\xf5\xa0\xc8P\xd6;\xf3\xc6~E\xacI\xd4\xe9\xa1|>\x91.K\x81\xa9+\xcf\xff\xcb\xfa\x0f\xe7n\x83H\x12\xac\x80\x16\xf8\x87Q\x97Az\n`\xb6\xe13A\xec\x8d(\\D\xec\xa6\t1\xa0h\xfc\x1f\xdd1@-4\xb4:\xf8\xd5wP \x84m\xe2\xd9\xfcb\xa0\xc3\xc9\xe7W\x86\xd7$\xa4ml\xee\x97[\xb7\xfa', 0x2) ftruncate(r4, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xb, 0x2012, r4, 0x0) unshare(0x60000600) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x89f1, &(0x7f0000010640)={'tunl0\x00', &(0x7f00000001c0)=@ethtool_cmd={0x29, 0x5, 0x0, 0x4, 0x7, 0x0, 0x3, 0x28, 0x0, 0xfc, 0x3, 0x9, 0x4, 0xff, 0x0, 0x45}}) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="20000000110001000000000000000000100000e60b"], 0x20}], 0x1}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x19) lseek(r4, 0x80000, 0x3) mount$overlay(0x0, &(0x7f0000000100)='./bus\x00', &(0x7f0000000440), 0x8, &(0x7f0000000200)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file0'}}]}) 50.088087342s ago: executing program 2 (id=1198): socket$inet6(0xa, 0x2, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40a01, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x2, &(0x7f0000000140)=@gcm_256={{0x303, 0x3a}, "03c0000000000500", "9e8ecc7bb535277672a2eff75b24866882519a85ef828f711330ff2bb17b5508", '\x00', "a1034200000102a0"}, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) write$tun(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="001c86dd0700100000002800000060ec97000fc83a00fe8000655800000000000000000000aaff0200"/51], 0xffe) 49.829260154s ago: executing program 2 (id=1199): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x2, 0x70bd2a, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000001c0)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x64, r2, 0x100, 0x70bd28, 0x25dfdbff, {}, [@IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x2}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa0}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r3}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x81}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc, 0x2d, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x3}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x810) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(r4, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x20, r5, 0x4, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="8032147894d9"}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000004}, 0x8004) fsetxattr$trusted_overlay_opaque(r4, &(0x7f0000000440), &(0x7f0000000480), 0x2, 0x3) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000500), r0) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(r0, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x2c, r6, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_MAX_CSMA_BACKOFFS={0x5}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4084}, 0x20000040) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000640), r4) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r4, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0xc7a44dd95a259b14}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x30, r7, 0x2, 0x70bd29, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x2, 0x7b}}}}, [@NL80211_ATTR_FRAME={0xe, 0x33, @ctrl_frame=@cts={{}, {0x5}, @broadcast}}]}, 0x30}, 0x1, 0x0, 0x0, 0x4004005}, 0x4012) r8 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740), 0x0, 0x0) sendmsg$AUDIT_LIST_RULES(r8, &(0x7f0000000840)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, 0x3f5, 0xf23549db037e0a6d, 0x70bd2a, 0x25dfdbff, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4048884}, 0x4811) sendmsg$NL80211_CMD_GET_WIPHY(r4, &(0x7f0000000940)={&(0x7f0000000880), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x28, r7, 0x8, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8, 0x1, 0x43}, @void, @val={0xc, 0x99, {0x2, 0x67}}}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8044}, 0xc000) connect$bt_l2cap(r8, &(0x7f0000000980)={0x1f, 0x6, @any, 0xfffb, 0x2}, 0xe) socketpair(0x2c, 0x800, 0x8, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_HEADER(r9, &(0x7f0000000b00)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x44, 0xc, 0x6, 0x5, 0x0, 0x0, {0xa, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x20000100) r10 = open$dir(&(0x7f0000000b40)='./file0\x00', 0x200800, 0x0) fgetxattr(r10, &(0x7f0000000b80)=@known='trusted.overlay.upper\x00', &(0x7f0000000bc0)=""/165, 0xa5) sendmsg$NL802154_CMD_NEW_INTERFACE(r0, &(0x7f0000000d40)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000d00)={&(0x7f0000000cc0)={0x28, r6, 0x20, 0x70bd26, 0x25dfdbfd, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFTYPE={0x8, 0x5, 0xffffffff}]}, 0x28}, 0x1, 0x0, 0x0, 0x4044015}, 0x20010001) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000000e80)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000e40)={&(0x7f0000000dc0)={0x74, r6, 0x200, 0x70bd28, 0x25dfdbfc, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_SEC_LEVEL={0x4c, 0x2d, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x1}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x8}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x3}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x1}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x6}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x9}]}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x74}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r9, &(0x7f0000001180)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001140)={&(0x7f0000000f00)={0x204, r7, 0x1, 0x70bd25, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_REKEY_DATA={0xd0, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="7381ccdbf062232e9e1221a3d5f4e1f8"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "ceb5c23264091917"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="912d08cd3c426a166f16c06256d645a0cb52e48fc32c4c9ab74be1f1febb0d26"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="890784f13f4d67f6ea71f5d3ac156466aecc59397aa2995785f1d29b156d01db"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="0f3c45f478e1613e466558bff212c1ca"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x8948}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "c9361b4a0c24d5d6"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "c559d46cd9c8e6c7"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="ffe3621ca7f2064e9274fd899fe0adec"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="10ab1df7be804f0a0cd31a166f951c70aa0b1076d753ab16"}]}, @NL80211_ATTR_REKEY_DATA={0x9c, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "085e565d54906966"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "92fec8e2f913c965"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x401}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="85ccb7689d9a5a65540f1c5a635dcdaba57f6062ef276fac"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="34330c5af1c8788d7e87ce9c9010b03b"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="5612460d29dfe65e7df78d131968ead9"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="b004aaba985709a3ba30185dac14729c"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "d31fffab6d748cdf"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="00cdd652665e5cceb54aee1a953eb173"}]}, @NL80211_ATTR_REKEY_DATA={0x7c, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="4893d654b8ee8ee2ef39489cac6ea9657ee0c17ab4f7ad2b02d9f452fb8aa4fb"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x1}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="f6966e434b23d73310ca993e8afd326fc7755dfaab4216e4"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="bd6b6aa8c56b66a4b8be62e1bd07d5ab75c9d0565d5bf265e631c791a8caec84"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "35bda7aaa35eac96"}]}]}, 0x204}, 0x1, 0x0, 0x0, 0x20000800}, 0x4044) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000001200)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000001300)={&(0x7f00000011c0)={0x10, 0x0, 0x0, 0x10200801}, 0xc, &(0x7f00000012c0)={&(0x7f0000001240)={0x60, r2, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r11}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r3}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x20004010}, 0x4000855) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r0, &(0x7f0000001440)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001400)={&(0x7f0000001380)={0x4c, r2, 0x8, 0x70bd26, 0x25dfdbfe, {}, [@IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x5}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0x8}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x7}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0xb}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0x1}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0x10}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40840}, 0x40800) sendmsg$TIPC_NL_MON_SET(r9, &(0x7f00000015c0)={&(0x7f0000001480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001580)={&(0x7f00000014c0)={0x9c, 0x0, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x70, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'eth', 0x3a, 'bond0\x00'}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x20, 0x2, @in6={0xa, 0x3, 0x5, @remote, 0x7}}}}]}, @TIPC_NLA_MEDIA={0x18, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000810) sendmsg$NL802154_CMD_SET_CCA_MODE(0xffffffffffffffff, &(0x7f0000001700)={&(0x7f0000001600), 0xc, &(0x7f00000016c0)={&(0x7f0000001640)={0x54, r6, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_CCA_OPT={0x8, 0xd, 0x1}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r11}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_CCA_OPT={0x8, 0xd, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x54}}, 0x40) 49.796104937s ago: executing program 1 (id=1200): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/power/resume_offset', 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), r1) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)={0x14, r2, 0x211, 0x70bd2d, 0x25dfdb7d}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x800) r3 = socket$igmp(0x2, 0x3, 0x2) sendmsg$inet(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x2, 0x4e22, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000640)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x3}}], 0x18}, 0x80c0) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x2a, &(0x7f00000002c0), 0x4) shutdown(r4, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) ppoll(&(0x7f0000000240)=[{r0, 0x8}, {r0, 0x88}], 0x2, 0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x3, &(0x7f0000000000)=0x89, 0x4) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x51) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r6, &(0x7f0000000440)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000780)=ANY=[@ANYBLOB="440100000002010100000000000000000a0000080800094000000006600002800c000280050001003a00000006000340000300002c00018014000300ff01000000000000000000000000000114000400fe80000000000000000000000000000f140001800800010000000000080002000a01010006000340000000002c0003800c0002800500010084000000060003400000000006000340000000000c0002800500010001000000840003800c0002800500010084000000060003400004000014000180080001006401010108120200e00000010c00028005000100210000000c00028005000100110000002c0001801400030000000000000000000000ffff0000000014000400ff0200000000000000000000000000010c000280050001002f0000000600034000020000080004400000000608000540000000030600074000010000"], 0x144}, 0x1, 0x0, 0x0, 0x20040000}, 0x851) sendmsg$NL80211_CMD_NEW_STATION(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x74, r5, 0x100, 0x70bd26, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x4, 0xf}}}}, [@NL80211_ATTR_STA_FLAGS={0x8, 0x11, 0x0, 0x1, [@NL80211_STA_FLAG_SHORT_PREAMBLE={0x4}]}, @NL80211_ATTR_STA_AID={0x6, 0x10, 0xaa}, @NL80211_ATTR_STA_FLAGS={0x18, 0x11, 0x0, 0x1, [@NL80211_STA_FLAG_TDLS_PEER={0x4}, @NL80211_STA_FLAG_AUTHORIZED={0x4}, @NL80211_STA_FLAG_SHORT_PREAMBLE={0x4}, @NL80211_STA_FLAG_SHORT_PREAMBLE={0x4}, @NL80211_STA_FLAG_ASSOCIATED={0x4}]}, @NL80211_ATTR_AIRTIME_WEIGHT={0x6, 0x112, 0x7fff}, @NL80211_ATTR_STA_CAPABILITY={0x6, 0xab, 0x4}, @NL80211_ATTR_STA_WME={0xc, 0x81, [@NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0xf7}]}, @NL80211_ATTR_STA_TX_POWER_SETTING={0x5}, @NL80211_ATTR_STA_CAPABILITY={0x6, 0xab, 0x3}]}, 0x74}, 0x1, 0x0, 0x0, 0x4004000}, 0x4c081) r7 = socket(0x1e, 0x2, 0x0) r8 = epoll_create1(0x80000) r9 = socket(0x840000000002, 0x3, 0xff) connect$inet(r9, &(0x7f0000000540)={0x2, 0x4e60, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) sendmmsg$inet(r9, &(0x7f0000001400)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="1000537e74e500000400000000000000"], 0x10}}], 0x2, 0x401eb94) epoll_ctl$EPOLL_CTL_ADD(r8, 0x1, r7, &(0x7f0000000500)={0xe000200c}) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x1000000, &(0x7f0000000900)=ANY=[@ANYBLOB="66643daf5423a95646d5077c25ea4de7553610f3ad76922edd4950438eece44468322719d4150606ad22bcb75ae70a120f1faca30f96b51bf8a0bb81f4ceb487ce464737f55cec36f1f2bdbebb31dcaeda9b77a2af47d45a4975fb3c0967d869dcda0f40339cb7b2b97fcba1ec60bbc5eb827db2e957f68e001a634223ee3036bf50d56b29d3b259d30daeac6a6eb1fdb4137a77e2c8", @ANYRESHEX=r10, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',blksize=0x0000000000001000,\x00']) write$P9_RMKNOD(r0, &(0x7f0000000480)={0x14, 0x13, 0x2, {0x0, 0x1}}, 0x14) r11 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000400)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r11, 0xc0306201, &(0x7f0000000300)={0xc, 0x0, &(0x7f0000000140)=[@dead_binder_done], 0x0, 0x0, 0x0}) 49.722357273s ago: executing program 2 (id=1201): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') write$UHID_DESTROY(r1, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000002030104000000000000005b65b400090900020000000001300000000800010001"], 0x28}, 0x1, 0x0, 0x0, 0x8040}, 0x4004000) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000009c00)={0x0, 0x0, &(0x7f0000009bc0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200000000203010200000000000000000a00000909"], 0x20}, 0x1, 0x0, 0x0, 0x40008d5}, 0x10) 49.617538503s ago: executing program 1 (id=1202): r0 = syz_open_procfs$pagemap(0x0, &(0x7f0000001080)) ioctl$PAGEMAP_SCAN(r0, 0xc0606610, &(0x7f00000001c0)={0x60, 0x0, &(0x7f0000001000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, 0x6, &(0x7f00000000c0)=[{0x7, 0x9, 0xb187}, {0xfffffffffffff000, 0x80000001, 0x4}], 0x2, 0x3, 0x1, 0x0, 0x85, 0x5c}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000340)={'tunl0\x00', 0x0}) recvfrom$inet(r1, &(0x7f0000000180)=""/28, 0x1c, 0x40002000, &(0x7f0000000240)={0x2, 0x4e21, @broadcast}, 0x10) r2 = syz_usb_connect$printer(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000000030020f003176c400000000001090224725100000000090400001207010300090501020000000000090582020002"], 0x0) close_range(r0, r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_int(r3, 0x1, 0x6, 0x0, &(0x7f0000000280)) r4 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r4, 0x107, 0x8, 0x0, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xf, 0x4000010, 0xffffffffffffffff, 0x1c5e9000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x19) r5 = userfaultfd(0x80001) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r5, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r6 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r6, 0x11b, 0x4, &(0x7f0000000340)={&(0x7f0000000000)=""/59, 0x304000, 0x800, 0x0, 0x3}, 0x20) ioctl$UFFDIO_COPY(r5, 0xc028aa05, &(0x7f0000000100)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000013000/0x4000)=nil, 0x3000, 0x3}) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xc) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) syz_usb_disconnect(r2) r7 = syz_usb_connect(0x0, 0x24, &(0x7f00000001c0)=ANY=[], 0x0) syz_usb_control_io$hid(r7, 0x0, 0x0) r8 = socket$unix(0x1, 0x2, 0x0) listen(r8, 0x0) syz_usb_disconnect(0xffffffffffffffff) r9 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) r10 = fcntl$dupfd(r9, 0x406, r9) ppoll(&(0x7f0000000380)=[{r9}, {r10, 0x4}, {r10, 0x404}, {0xffffffffffffffff, 0x522}], 0x4, &(0x7f0000000140), 0x0, 0x0) 49.615989543s ago: executing program 0 (id=1203): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x47) (async) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) (async) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) (async) read$snapshot(0xffffffffffffffff, 0x0, 0x0) (async) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000340)=[@mss={0x2, 0x1}, @sack_perm, @mss={0x2, 0x3}, @window={0x3, 0x0, 0x4}, @window={0x3, 0x8, 0x6}, @sack_perm, @window={0x3, 0xfffe}, @timestamp], 0x2000000000000133) sendto(r0, &(0x7f0000000000)="c9", 0x1, 0x20040, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0), 0x4) (async) sendto$inet(r0, &(0x7f00000004c0)='<', 0x381, 0x805, 0x0, 0x0) 48.705282782s ago: executing program 0 (id=1204): r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000080)={{0x12, 0x1, 0x141, 0xa, 0x11, 0x79, 0x20, 0x7b4, 0x10a, 0x102, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x10, 0x0, [{{0x9, 0x4, 0xde, 0x7, 0x2, 0x85, 0x78, 0xa1, 0x0, [], [{{0x9, 0x5, 0x6, 0x2, 0x200, 0xd, 0x0, 0x6}}, {{0x9, 0x5, 0x82, 0x2, 0x200, 0x0, 0x1, 0x10}}]}}]}}]}}, 0x0) socket$netlink(0x10, 0x3, 0x7) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x17) syz_clone3(0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x60, &(0x7f0000000080)={'filter\x00', 0x4, [{0x11}, {0x0, 0x100000000000000}]}, 0x68) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r2 = gettid() process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8) madvise(&(0x7f000063d000/0x3000)=nil, 0x3000, 0xa) syz_usb_control_io$uac1(r0, 0x0, 0x0) 48.590772642s ago: executing program 2 (id=1205): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_usb_connect(0x2, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000751c0110e60f00989ad1010203010902240001000000000904290202b48cbb0009050402100000fa000905820240"], 0x0) syz_usb_connect(0x0, 0x24, &(0x7f0000000200)=ANY=[@ANYBLOB="120100008859f1108205e600064e010203010902120001000000000904000000ffe2"], 0x0) syz_usb_control_io$printer(r1, 0x0, 0x0) syz_usb_control_io$lan78xx(r1, 0x0, 0x0) syz_usb_control_io$uac1(r1, 0x0, &(0x7f0000000500)={0x44, &(0x7f0000000480)=ANY=[@ANYBLOB="201019"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$uac1(r1, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r1, 0x0, &(0x7f00000003c0)={0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x20, 0x89, 0x2, 0x1}}) syz_usb_control_io$hid(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000240)=0x9, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x31, &(0x7f0000001600), 0x4) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000300)={0x58, 0x0, &(0x7f00000008c0)=[@enter_looper, @release={0x40046306, 0x1}, @transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400}], 0x0, 0x0, 0x0}) syz_clone(0x80842111, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x3ff, &(0x7f0000000500)=0x0) io_submit(r4, 0xf000, &(0x7f0000000300)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f00000001c0)='m', 0xfffffdfc}]) r5 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r5, &(0x7f0000000180)=[{&(0x7f00000001c0)="580000001500add427323b472545b4560a117fffffff81000e220e227f000008925aa80013007b00090080007f000001e809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee000000deff0000000200000000", 0x58}], 0x1) 47.344564401s ago: executing program 1 (id=1206): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$F2FS_IOC_GET_COMPRESS_OPTION(r0, 0x8002f515, &(0x7f0000000040)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x75f, 0xa382) r2 = memfd_create(0x0, 0x1) pwritev(r2, 0x0, 0x0, 0x800000, 0x0) ioprio_set$pid(0x2, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sendfile(r1, r1, 0x0, 0x24002de8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000001c0)={0xa, 0x4e23, 0x84b, @private0={0xfc, 0x0, '\x00', 0x1}, 0x68}, 0x1c) bind$inet6(r3, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) 44.938406601s ago: executing program 0 (id=1207): socket$inet6(0xa, 0x2, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40a01, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x2, &(0x7f0000000140)=@gcm_256={{0x303, 0x3a}, "03c0000000000500", "9e8ecc7bb535277672a2eff75b24866882519a85ef828f711330ff2bb17b5508", '\x00', "a1034200000102a0"}, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) write$tun(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="001c86dd0700100000002800000060ec97000fc83a00fe8000586500000000000000000000aaff0200"/51], 0xffe) 41.570336294s ago: executing program 32 (id=1122): r0 = syz_open_dev$MSR(&(0x7f0000000100), 0xe671, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) 29.985033325s ago: executing program 1 (id=1209): r0 = syz_open_procfs(0x0, &(0x7f0000000840)='net/dev_snmp6\x00') lseek(r0, 0x43, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r1, 0x0, 0x40, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r2, &(0x7f0000002080)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000000c0)='dctcp', 0x5) sendto$inet(r2, 0x0, 0x0, 0x2000c7fd, &(0x7f0000002340)={0x2, 0x4e23, @empty}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000000100)=ANY=[@ANYBLOB="2c00000010008100000000000080000000000000", @ANYRES32=0x0, @ANYBLOB="0a043cbf", @ANYRES32, @ANYBLOB="0a001b"], 0x2c}], 0x1}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000080)='scalable', 0x8) sendto$inet(r2, &(0x7f0000000f00)="8995b3c271bab84f6e841cd28301f2e02519276836b2ab14ba300f39a71758d74d011771db342aa6df71dc54faabe6ccc2dae1fdf17d4c74618af0933c8c800ec3ce49bd4af9b8cf0b15e8ad756f12238f6649d204a1065dad7cffef082a59ee2b21eb73656d3dc03547888735", 0x6d, 0x4c840, 0x0, 0x0) getdents(r0, 0x0, 0x51) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT_OLD(r0, 0x28, 0x6, &(0x7f0000000100)={r4, r5/1000+60000}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) memfd_create(&(0x7f0000000180)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\xd2q#\xc6\xca\x97\x9d\xcb\x1e\x80\xd6\xd5%N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xecz\xabq\x95t*T9\xa9\b X \x04\"\x17\xbf\xcb\xccF\xda\xcf\xdd^\xa0\x15\xc0\xcb^h>\x1b\xb5d\xc7\x7f0\x9a&\xb0\x12#\x9c`\xa6\xed\x05\x95g\a\xccYb\xaf\xe9\xb6G?\x9f\xf5\xfe\xc1\xc0JJ\xc8\xd9d\x80\x13\x8fX\xb4\x19\xc4\\\xcb\x89-)\x90\x01\v\xac^\xdbBQ|\xaej;\x92\\\xf8u\x19Y\xee\x99EI\xf1t\xadn<\x9b\xc9\x87\xd0\xa7\x1a\x81\xb9\xc87sq\xd7\x15\xd6\x91O\x9c\x99!9>\xff\xa8\xfa\xe6=d\xcf\xca\xa9\xc61!\xc6P\x13\xd0\x88gZ\xbe\xdfl\xfa\xff\xb0m;d07tx\xbb\xabd\xe5\x16\xc4\xae\xf0', 0x0) r6 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000006c0)="5500000020007fafb72d13b2a4a2719302000000030b43016c26236925001400fe7f0000bd2dca8a9848a3c728f138d509000000000100005ae583de0dd7d8319f98af84fda542e718f94b929ade5b175c0a9b2ccc", 0x55}], 0x1}, 0x80040c4) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r7 = socket(0x10, 0x3, 0x0) syz_usb_connect$uac1(0x3, 0xdc, &(0x7f0000000180)=ANY=[@ANYBLOB="12010000000000106b1d01014000010203010902ca0003010070000904000000010100000a24010800000201020d24060000030800000000000000240803960c03112d9cd2ce0c240208000103000000ff000924060506020100000924030003030005490c240206", @ANYRES8=0x0, @ANYRES16=r7], 0x0) 27.97378035s ago: executing program 2 (id=1210): r0 = socket$inet_udp(0x2, 0x2, 0x0) (async) r1 = socket$key(0xf, 0x3, 0x2) (async) r2 = socket$inet_tcp(0x2, 0x1, 0x0) (async) syz_clone(0x80842111, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_RTHDR(r3, 0x29, 0x39, &(0x7f00000011c0)=ANY=[@ANYBLOB="8704040000000000fc02000000619cc069610000000000000003"], 0x28) (async) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeeb, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600722, 0x19) mremap(&(0x7f0000064000/0x3000)=nil, 0x3000, 0x600000, 0x3, &(0x7f0000a00000/0x600000)=nil) (async) madvise(&(0x7f0000523000/0x3000)=nil, 0x3000, 0x14) (async) r6 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r6}, &(0x7f0000bbdffc)) (async) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xb, 0x31, 0xffffffffffffffff, 0x0) (async) io_setup(0x3ff, &(0x7f0000000500)=0x0) io_submit(r7, 0xf000, &(0x7f0000000300)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r4, 0x0}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f00000001c0)='m', 0xfffffdfc}]) (async) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r8, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080), 0x3) (async) r9 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r10 = ioctl$KVM_CREATE_VM(r9, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r10, 0x4008ae48, &(0x7f0000000080)=0xd5d56000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r11, 0xae03, 0x7b) (async) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020500030a00000000000000fcdbdf25030006000000000002004e23ac1414bb0000000000000000020001000000000008806102010000a0030005003200000002004e23640101010000000000000000a1245eda42592ebf7c6474a0fcb037b33758314edab51c8ad35a3fd9381136024ab8e3e60bff6bc5a8a6e9818699e7bd660e3153f47fba055fb1747f1406817febfbeefa3be0697130d35c7becb55b5f1ce5c614901ff339376c3e958702f847cac2cc"], 0x50}}, 0x0) (async) r12 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/power/wake_unlock', 0x242002, 0x1e3) write$FUSE_NOTIFY_RETRIEVE(r12, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x4, 0x1, 0x7}}, 0x30) setsockopt$inet_int(r0, 0x0, 0x16, 0x0, 0x0) 27.332206927s ago: executing program 33 (id=1207): socket$inet6(0xa, 0x2, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40a01, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x2, &(0x7f0000000140)=@gcm_256={{0x303, 0x3a}, "03c0000000000500", "9e8ecc7bb535277672a2eff75b24866882519a85ef828f711330ff2bb17b5508", '\x00', "a1034200000102a0"}, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) write$tun(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="001c86dd0700100000002800000060ec97000fc83a00fe8000586500000000000000000000aaff0200"/51], 0xffe) 2.63361747s ago: executing program 34 (id=1209): r0 = syz_open_procfs(0x0, &(0x7f0000000840)='net/dev_snmp6\x00') lseek(r0, 0x43, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r1, 0x0, 0x40, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r2, &(0x7f0000002080)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000000c0)='dctcp', 0x5) sendto$inet(r2, 0x0, 0x0, 0x2000c7fd, &(0x7f0000002340)={0x2, 0x4e23, @empty}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000000100)=ANY=[@ANYBLOB="2c00000010008100000000000080000000000000", @ANYRES32=0x0, @ANYBLOB="0a043cbf", @ANYRES32, @ANYBLOB="0a001b"], 0x2c}], 0x1}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000080)='scalable', 0x8) sendto$inet(r2, &(0x7f0000000f00)="8995b3c271bab84f6e841cd28301f2e02519276836b2ab14ba300f39a71758d74d011771db342aa6df71dc54faabe6ccc2dae1fdf17d4c74618af0933c8c800ec3ce49bd4af9b8cf0b15e8ad756f12238f6649d204a1065dad7cffef082a59ee2b21eb73656d3dc03547888735", 0x6d, 0x4c840, 0x0, 0x0) getdents(r0, 0x0, 0x51) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT_OLD(r0, 0x28, 0x6, &(0x7f0000000100)={r4, r5/1000+60000}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) memfd_create(&(0x7f0000000180)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\xd2q#\xc6\xca\x97\x9d\xcb\x1e\x80\xd6\xd5%N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xecz\xabq\x95t*T9\xa9\b X \x04\"\x17\xbf\xcb\xccF\xda\xcf\xdd^\xa0\x15\xc0\xcb^h>\x1b\xb5d\xc7\x7f0\x9a&\xb0\x12#\x9c`\xa6\xed\x05\x95g\a\xccYb\xaf\xe9\xb6G?\x9f\xf5\xfe\xc1\xc0JJ\xc8\xd9d\x80\x13\x8fX\xb4\x19\xc4\\\xcb\x89-)\x90\x01\v\xac^\xdbBQ|\xaej;\x92\\\xf8u\x19Y\xee\x99EI\xf1t\xadn<\x9b\xc9\x87\xd0\xa7\x1a\x81\xb9\xc87sq\xd7\x15\xd6\x91O\x9c\x99!9>\xff\xa8\xfa\xe6=d\xcf\xca\xa9\xc61!\xc6P\x13\xd0\x88gZ\xbe\xdfl\xfa\xff\xb0m;d07tx\xbb\xabd\xe5\x16\xc4\xae\xf0', 0x0) r6 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000006c0)="5500000020007fafb72d13b2a4a2719302000000030b43016c26236925001400fe7f0000bd2dca8a9848a3c728f138d509000000000100005ae583de0dd7d8319f98af84fda542e718f94b929ade5b175c0a9b2ccc", 0x55}], 0x1}, 0x80040c4) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r7 = socket(0x10, 0x3, 0x0) syz_usb_connect$uac1(0x3, 0xdc, &(0x7f0000000180)=ANY=[@ANYBLOB="12010000000000106b1d01014000010203010902ca0003010070000904000000010100000a24010800000201020d24060000030800000000000000240803960c03112d9cd2ce0c240208000103000000ff000924060506020100000924030003030005490c240206", @ANYRES8=0x0, @ANYRES16=r7], 0x0) 0s ago: executing program 35 (id=1210): r0 = socket$inet_udp(0x2, 0x2, 0x0) (async) r1 = socket$key(0xf, 0x3, 0x2) (async) r2 = socket$inet_tcp(0x2, 0x1, 0x0) (async) syz_clone(0x80842111, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_RTHDR(r3, 0x29, 0x39, &(0x7f00000011c0)=ANY=[@ANYBLOB="8704040000000000fc02000000619cc069610000000000000003"], 0x28) (async) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeeb, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600722, 0x19) mremap(&(0x7f0000064000/0x3000)=nil, 0x3000, 0x600000, 0x3, &(0x7f0000a00000/0x600000)=nil) (async) madvise(&(0x7f0000523000/0x3000)=nil, 0x3000, 0x14) (async) r6 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r6}, &(0x7f0000bbdffc)) (async) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xb, 0x31, 0xffffffffffffffff, 0x0) (async) io_setup(0x3ff, &(0x7f0000000500)=0x0) io_submit(r7, 0xf000, &(0x7f0000000300)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r4, 0x0}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f00000001c0)='m', 0xfffffdfc}]) (async) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r8, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080), 0x3) (async) r9 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r10 = ioctl$KVM_CREATE_VM(r9, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r10, 0x4008ae48, &(0x7f0000000080)=0xd5d56000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r11, 0xae03, 0x7b) (async) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020500030a00000000000000fcdbdf25030006000000000002004e23ac1414bb0000000000000000020001000000000008806102010000a0030005003200000002004e23640101010000000000000000a1245eda42592ebf7c6474a0fcb037b33758314edab51c8ad35a3fd9381136024ab8e3e60bff6bc5a8a6e9818699e7bd660e3153f47fba055fb1747f1406817febfbeefa3be0697130d35c7becb55b5f1ce5c614901ff339376c3e958702f847cac2cc"], 0x50}}, 0x0) (async) r12 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/power/wake_unlock', 0x242002, 0x1e3) write$FUSE_NOTIFY_RETRIEVE(r12, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x4, 0x1, 0x7}}, 0x30) setsockopt$inet_int(r0, 0x0, 0x16, 0x0, 0x0) kernel console output (not intermixed with test programs): 340235][ T1920] workingset_refault_anon 5 [ 110.344787][ T1920] workingset_refault_file 289 [ 110.349540][ T1920] swap 127471616 [ 110.353108][ T1920] swapcached 16384 [ 110.356844][ T1920] pgpgin 190522 [ 110.360354][ T1920] pgpgout 113722 [ 110.363929][ T1920] pgfault 37339 [ 110.367441][ T1920] pgmajfault 18 [ 110.371173][ T1920] inactive_anon 151158784 [ 110.375653][ T1920] active_anon 163409920 [ 110.379924][ T1920] inactive_file 0 [ 110.383590][ T1920] active_file 4096 [ 110.387370][ T1920] unevictable 0 [ 110.390857][ T1920] hierarchical_memory_limit 314572800 [ 110.396256][ T1920] hierarchical_memsw_limit 9223372036854771712 [ 110.404275][ T1920] total_cache 314318848 [ 110.408517][ T1920] total_rss 249856 [ 110.412267][ T1920] total_rss_huge 0 [ 110.416011][ T1920] total_shmem 314314752 [ 110.420245][ T1920] total_mapped_file 0 [ 110.425906][ T1920] total_dirty 0 [ 110.429437][ T1920] total_writeback 0 [ 110.433276][ T1920] total_workingset_refault_anon 5 [ 110.438353][ T1920] total_workingset_refault_file 289 [ 110.443793][ T1920] total_swap 127471616 [ 110.448088][ T1920] total_swapcached 16384 [ 110.452344][ T1920] total_pgpgin 190522 [ 110.456338][ T1920] total_pgpgout 113722 [ 110.460455][ T1920] total_pgfault 37339 [ 110.464496][ T1920] total_pgmajfault 18 [ 110.468513][ T1920] total_inactive_anon 151158784 [ 110.473382][ T1920] total_active_anon 163409920 [ 110.478149][ T1920] total_inactive_file 0 [ 110.482424][ T1920] total_active_file 4096 [ 110.486695][ T1920] total_unevictable 0 [ 110.490767][ T1920] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0,oom_memcg=/syz2,task_memcg=/syz2,task=syz.2.506,pid=1921,uid=0 [ 110.505723][ T1920] Memory cgroup out of memory: Killed process 1921 (syz.2.506) total-vm:90428kB, anon-rss:1220kB, file-rss:24688kB, shmem-rss:0kB, UID:0 pgtables:200kB oom_score_adj:1000 [ 110.579062][ T2020] Unsupported ieee802154 address type: 0 [ 110.619075][ T1919] syz.2.506 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 110.657132][ T1919] CPU: 1 UID: 0 PID: 1919 Comm: syz.2.506 Not tainted syzkaller #0 e74179280c147a83e3a201a5967fe5af4e04851c [ 110.657166][ T1919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 110.657179][ T1919] Call Trace: [ 110.657186][ T1919] [ 110.657195][ T1919] __dump_stack+0x21/0x30 [ 110.657232][ T1919] dump_stack_lvl+0x140/0x1c0 [ 110.657259][ T1919] ? __cfi_dump_stack_lvl+0x10/0x10 [ 110.657286][ T1919] ? ___ratelimit+0x40e/0x5b0 [ 110.657311][ T1919] dump_stack+0x19/0x20 [ 110.657336][ T1919] dump_header+0xd6/0x490 [ 110.657360][ T1919] ? __cfi_mem_cgroup_get_max+0x10/0x10 [ 110.657382][ T1919] oom_kill_process+0x35d/0x640 [ 110.657412][ T1919] out_of_memory+0x624/0xa30 [ 110.657443][ T1919] ? __cfi_out_of_memory+0x10/0x10 [ 110.657473][ T1919] ? mutex_lock_killable+0x97/0x1d0 [ 110.657499][ T1919] ? __cfi_mutex_lock_killable+0x10/0x10 [ 110.657528][ T1919] mem_cgroup_out_of_memory+0x2c8/0x390 [ 110.657555][ T1919] ? css_next_descendant_pre+0x202/0x230 [ 110.657577][ T1919] ? drain_obj_stock+0xed0/0xed0 [ 110.657604][ T1919] ? memcg1_oom_prepare+0x2c5/0x3a0 [ 110.657631][ T1919] try_charge_memcg+0x91c/0xe10 [ 110.657654][ T1919] ? __cfi_try_charge_memcg+0x10/0x10 [ 110.657675][ T1919] ? __alloc_pages_noprof+0x35f/0x7e0 [ 110.657698][ T1919] ? folio_unlock+0x137/0x1b0 [ 110.657739][ T1919] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 110.657761][ T1919] __mem_cgroup_charge+0xfc/0x420 [ 110.657785][ T1919] ? __cfi___mem_cgroup_charge+0x10/0x10 [ 110.657814][ T1919] ? do_pte_missing+0x1937/0x44f0 [ 110.657845][ T1919] shmem_alloc_and_add_folio+0x8e6/0x10b0 [ 110.657877][ T1919] ? put_swap_device+0x130/0x130 [ 110.657906][ T1919] ? shmem_huge_global_enabled+0x2da/0x360 [ 110.657936][ T1919] ? shmem_allowable_huge_orders+0x1f7/0x430 [ 110.657964][ T1919] ? __kasan_check_write+0x18/0x20 [ 110.657987][ T1919] ? _raw_spin_lock+0x92/0x120 [ 110.658017][ T1919] shmem_get_folio_gfp+0x607/0x1390 [ 110.658049][ T1919] ? shmem_get_folio+0xc0/0xc0 [ 110.658076][ T1919] ? __kasan_check_write+0x18/0x20 [ 110.658099][ T1919] ? inode_to_bdi+0x6d/0x100 [ 110.658120][ T1919] shmem_write_begin+0xf4/0x270 [ 110.658150][ T1919] generic_perform_write+0x328/0x970 [ 110.658171][ T1919] ? inode_update_timestamps+0x4f0/0x700 [ 110.658193][ T1919] ? __cfi_generic_perform_write+0x10/0x10 [ 110.658214][ T1919] ? down_write+0xee/0x2b0 [ 110.658240][ T1919] ? mnt_get_write_access_file+0x1af/0x3b0 [ 110.658259][ T1919] ? mnt_put_write_access_file+0xc2/0x100 [ 110.658279][ T1919] ? file_update_time+0x1de/0x210 [ 110.658299][ T1919] shmem_file_write_iter+0x105/0x130 [ 110.658321][ T1919] __kernel_write_iter+0x42f/0x8a0 [ 110.658347][ T1919] ? __cfi___kernel_write_iter+0x10/0x10 [ 110.658370][ T1919] ? get_dump_page+0x165/0x220 [ 110.658389][ T1919] ? __asan_memset+0x39/0x50 [ 110.658413][ T1919] ? iov_iter_bvec+0xc0/0x180 [ 110.658438][ T1919] dump_user_range+0xb8b/0xe60 [ 110.658466][ T1919] ? __cfi_dump_user_range+0x10/0x10 [ 110.658491][ T1919] ? elf_coredump_extra_notes_write+0x442/0x4d0 [ 110.658520][ T1919] ? __cfi_elf_coredump_extra_notes_write+0x10/0x10 [ 110.658548][ T1919] ? elf_core_dump+0x24c0/0x3960 [ 110.658578][ T1919] elf_core_dump+0x2e7e/0x3960 [ 110.658612][ T1919] ? __cfi_elf_core_dump+0x10/0x10 [ 110.658647][ T1919] ? dump_interrupted+0xf0/0xf0 [ 110.658670][ T1919] ? filp_open+0x199/0x1f0 [ 110.658689][ T1919] ? 0xffffffffff600000 [ 110.658704][ T1919] ? freezing_slow_path+0x12b/0x170 [ 110.658734][ T1919] do_coredump+0x208d/0x2fe0 [ 110.658760][ T1919] ? __cfi_do_coredump+0x10/0x10 [ 110.658781][ T1919] ? asm_exc_general_protection+0x2b/0x30 [ 110.658828][ T1919] ? __kasan_slab_free+0x6a/0x80 [ 110.658855][ T1919] ? kmem_cache_free+0x1bd/0x4f0 [ 110.658879][ T1919] ? get_signal+0xa74/0x14e0 [ 110.658901][ T1919] get_signal+0x11f8/0x14e0 [ 110.658926][ T1919] arch_do_signal_or_restart+0xbc/0x760 [ 110.658953][ T1919] ? __cfi_arch_do_signal_or_restart+0x10/0x10 [ 110.658985][ T1919] ? fixup_iopl_exception+0xe2/0x2e0 [ 110.659013][ T1919] irqentry_exit_to_user_mode+0x4d/0xb0 [ 110.659040][ T1919] irqentry_exit+0x16/0x60 [ 110.659065][ T1919] exc_general_protection+0x152/0x1e0 [ 110.659085][ T1919] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 110.659108][ T1919] asm_exc_general_protection+0x2b/0x30 [ 110.659138][ T1919] RIP: 0033:0x7fa505f9c631 [ 110.659154][ T1919] Code: 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 110.659170][ T1919] RSP: 002b:00002000000001f0 EFLAGS: 00010217 [ 110.659188][ T1919] RAX: 0000000000000000 RBX: 00007fa506216090 RCX: 00007fa505f9c629 [ 110.659202][ T1919] RDX: 0000200000000000 RSI: 00002000000001f0 RDI: 0000000000000200 [ 110.659216][ T1919] RBP: 00007fa506032b39 R08: 0000200000000240 R09: 0000200000000240 [ 110.659231][ T1919] R10: 0000200000000200 R11: 0000000000000206 R12: 0000000000000000 [ 110.659244][ T1919] R13: 00007fa506216128 R14: 00007fa506216090 R15: 00007ffed1450748 [ 110.659261][ T1919] [ 111.207964][ T1919] memory: usage 299016kB, limit 307200kB, failcnt 20029 [ 111.246220][ T1919] memory+swap: usage 422524kB, limit 9007199254740988kB, failcnt 0 [ 111.267561][ T31] usb 1-1: new full-speed USB device number 56 using dummy_hcd [ 111.282739][ T1919] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 111.305084][ T1919] Memory cgroup stats for /syz2: [ 111.305234][ T1919] cache 310501376 [ 111.326127][ T1919] rss 233472 [ 111.336984][ T1919] rss_huge 0 [ 111.340837][ T1919] shmem 310497280 [ 111.361876][ T1919] mapped_file 0 [ 111.365999][ T1919] dirty 0 [ 111.375538][ T1919] writeback 0 [ 111.382158][ T1919] workingset_refault_anon 5 [ 111.398856][ T1919] workingset_refault_file 289 [ 111.413543][ T1919] swap 126599168 [ 111.419368][ T31] usb 1-1: not running at top speed; connect to a high speed hub [ 111.423716][ T1919] swapcached 888832 [ 111.428859][ T31] usb 1-1: config 3 has an invalid interface number: 87 but max is 3 [ 111.439074][ T31] usb 1-1: config 3 contains an unexpected descriptor of type 0x1, skipping [ 111.447136][ T1919] pgpgin 191878 [ 111.448107][ T31] usb 1-1: config 3 has an invalid interface number: 176 but max is 3 [ 111.459487][ T31] usb 1-1: config 3 contains an unexpected descriptor of type 0x1, skipping [ 111.462175][ T1919] pgpgout 115800 [ 111.468234][ T31] usb 1-1: config 3 has an invalid interface number: 164 but max is 3 [ 111.480008][ T31] usb 1-1: config 3 has an invalid interface number: 108 but max is 3 [ 111.488235][ T31] usb 1-1: config 3 has 5 interfaces, different from the descriptor's value: 4 [ 111.488897][ T1919] pgfault 37339 [ 111.497209][ T31] usb 1-1: config 3 has no interface number 1 [ 111.497234][ T31] usb 1-1: config 3 has no interface number 2 [ 111.512931][ T31] usb 1-1: config 3 has no interface number 3 [ 111.519115][ T31] usb 1-1: config 3 has no interface number 4 [ 111.525247][ T31] usb 1-1: config 3 interface 0 altsetting 149 endpoint 0x1 has invalid maxpacket 1023, setting to 64 [ 111.534143][ T1919] pgmajfault 18 [ 111.536309][ T31] usb 1-1: config 3 interface 0 altsetting 149 endpoint 0xE has invalid maxpacket 512, setting to 64 [ 111.550620][ T31] usb 1-1: config 3 interface 0 altsetting 149 has a duplicate endpoint with address 0xE, skipping [ 111.555612][ T1919] inactive_anon 117972992 [ 111.561378][ T31] usb 1-1: config 3 interface 0 altsetting 149 endpoint 0xD has invalid maxpacket 1023, setting to 64 [ 111.576715][ T31] usb 1-1: config 3 interface 0 altsetting 149 endpoint 0xF has invalid maxpacket 1024, setting to 64 [ 111.587801][ T31] usb 1-1: config 3 interface 0 altsetting 149 has a duplicate endpoint with address 0x1, skipping [ 111.592904][ T1919] active_anon 193499136 [ 111.598550][ T31] usb 1-1: config 3 interface 0 altsetting 149 endpoint 0x5 has invalid maxpacket 512, setting to 64 [ 111.598583][ T31] usb 1-1: config 3 interface 0 altsetting 149 has 10 endpoint descriptors, different from the interface descriptor's value: 14 [ 111.618063][ T1919] inactive_file 0 [ 111.626918][ T31] usb 1-1: config 3 interface 87 altsetting 7 has a duplicate endpoint with address 0xD, skipping [ 111.641225][ T31] usb 1-1: config 3 interface 87 altsetting 7 endpoint 0x3 has invalid maxpacket 1024, setting to 64 [ 111.652187][ T31] usb 1-1: config 3 interface 87 altsetting 7 has a duplicate endpoint with address 0xB, skipping [ 111.662899][ T31] usb 1-1: config 3 interface 87 altsetting 7 has a duplicate endpoint with address 0x4, skipping [ 111.665343][ T1919] active_file 4096 [ 111.675390][ T31] usb 1-1: config 3 interface 87 altsetting 7 has an endpoint descriptor with address 0x94, changing to 0x84 [ 111.677975][ T9] usb 2-1: new high-speed USB device number 40 using dummy_hcd [ 111.688946][ T31] usb 1-1: config 3 interface 87 altsetting 7 has a duplicate endpoint with address 0x84, skipping [ 111.688972][ T31] usb 1-1: config 3 interface 87 altsetting 7 has a duplicate endpoint with address 0x2, skipping [ 111.717878][ T31] usb 1-1: config 3 interface 87 altsetting 7 has a duplicate endpoint with address 0x4, skipping [ 111.728547][ T1919] unevictable 0 [ 111.732039][ T1919] hierarchical_memory_limit 314572800 [ 111.737429][ T1919] hierarchical_memsw_limit 9223372036854771712 [ 111.743650][ T31] usb 1-1: config 3 interface 87 altsetting 7 has a duplicate endpoint with address 0xD, skipping [ 111.754444][ T31] usb 1-1: config 3 interface 87 altsetting 7 has 9 endpoint descriptors, different from the interface descriptor's value: 8 [ 111.767449][ T31] usb 1-1: config 3 interface 176 altsetting 7 has a duplicate endpoint with address 0x1, skipping [ 111.778174][ T1919] total_cache 310501376 [ 111.782344][ T1919] total_rss 233472 [ 111.786087][ T1919] total_rss_huge 0 [ 111.789887][ T31] usb 1-1: config 3 interface 176 altsetting 7 has a duplicate endpoint with address 0x6, skipping [ 111.800616][ T31] usb 1-1: config 3 interface 176 altsetting 7 has an endpoint descriptor with address 0x36, changing to 0x6 [ 111.812257][ T541] usb 3-1: device descriptor read/64, error -110 [ 111.818676][ T31] usb 1-1: config 3 interface 176 altsetting 7 has a duplicate endpoint with address 0x6, skipping [ 111.829413][ T31] usb 1-1: config 3 interface 176 altsetting 7 has a duplicate endpoint with address 0x5, skipping [ 111.840151][ T1919] total_shmem 310497280 [ 111.844325][ T1919] total_mapped_file 0 [ 111.847741][ T9] usb 2-1: Using ep0 maxpacket: 16 [ 111.848356][ T31] usb 1-1: config 3 interface 176 altsetting 7 has a duplicate endpoint with address 0x1, skipping [ 111.858786][ T9] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 111.864144][ T31] usb 1-1: config 3 interface 176 altsetting 7 has a duplicate endpoint with address 0x2, skipping [ 111.877601][ T9] usb 2-1: config 0 has 0 interfaces, different from the descriptor's value: 1 [ 111.887701][ T1919] total_dirty 0 [ 111.897482][ T31] usb 1-1: config 3 interface 176 altsetting 7 has a duplicate endpoint with address 0x3, skipping [ 111.901113][ T9] usb 2-1: New USB device found, idVendor=045e, idProduct=07da, bcdDevice= 0.00 [ 111.917676][ T31] usb 1-1: config 3 interface 176 altsetting 7 has an invalid descriptor for endpoint zero, skipping [ 111.920727][ T9] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 111.928803][ T1919] total_writeback 0 [ 111.940699][ T31] usb 1-1: config 3 interface 176 altsetting 7 has a duplicate endpoint with address 0x8, skipping [ 111.949980][ T9] usb 2-1: config 0 descriptor?? [ 111.951729][ T31] usb 1-1: config 3 interface 176 altsetting 7 endpoint 0xC has invalid maxpacket 1024, setting to 64 [ 111.977602][ T31] usb 1-1: config 3 interface 176 altsetting 7 has a duplicate endpoint with address 0x4, skipping [ 111.988413][ T1919] total_workingset_refault_anon 5 [ 111.993460][ T1919] total_workingset_refault_file 289 [ 111.998740][ T31] usb 1-1: config 3 interface 176 altsetting 7 has 13 endpoint descriptors, different from the interface descriptor's value: 12 [ 112.017819][ T31] usb 1-1: config 3 interface 164 altsetting 9 has a duplicate endpoint with address 0xC, skipping [ 112.037675][ T31] usb 1-1: config 3 interface 164 altsetting 9 has a duplicate endpoint with address 0x6, skipping [ 112.048432][ T1919] total_swap 126599168 [ 112.052510][ T1919] total_swapcached 888832 [ 112.056844][ T1919] total_pgpgin 191878 [ 112.060919][ T31] usb 1-1: config 3 interface 164 altsetting 9 has a duplicate endpoint with address 0x5, skipping [ 112.071686][ T31] usb 1-1: config 3 interface 164 altsetting 9 endpoint 0x9 has invalid maxpacket 1536, setting to 64 [ 112.082739][ T541] usb 3-1: device descriptor read/64, error -32 [ 112.089115][ T1919] total_pgpgout 115800 [ 112.093206][ T1919] total_pgfault 37339 [ 112.097203][ T1919] total_pgmajfault 18 [ 112.101302][ T31] usb 1-1: config 3 interface 164 altsetting 9 has an invalid descriptor for endpoint zero, skipping [ 112.112228][ T31] usb 1-1: config 3 interface 164 altsetting 9 has 5 endpoint descriptors, different from the interface descriptor's value: 15 [ 112.125468][ T31] usb 1-1: too many endpoints for config 3 interface 108 altsetting 243: 101, using maximum allowed: 30 [ 112.136662][ T1919] total_inactive_anon 117972992 [ 112.141596][ T31] usb 1-1: config 3 interface 108 altsetting 243 has a duplicate endpoint with address 0xC, skipping [ 112.152566][ T1919] total_active_anon 193499136 [ 112.157262][ T1919] total_inactive_file 0 [ 112.161821][ T31] usb 1-1: config 3 interface 108 altsetting 243 has a duplicate endpoint with address 0xB, skipping [ 112.172790][ T31] usb 1-1: config 3 interface 108 altsetting 243 has a duplicate endpoint with address 0x3, skipping [ 112.184979][ T1919] total_active_file 4096 [ 112.191766][ T31] usb 1-1: config 3 interface 108 altsetting 243 has a duplicate endpoint with address 0x1, skipping [ 112.203240][ T31] usb 1-1: config 3 interface 108 altsetting 243 has a duplicate endpoint with address 0xB, skipping [ 112.211438][ T1919] total_unevictable 0 [ 112.218417][ T31] usb 1-1: config 3 interface 108 altsetting 243 has a duplicate endpoint with address 0x9, skipping [ 112.218445][ T31] usb 1-1: config 3 interface 108 altsetting 243 has a duplicate endpoint with address 0xC, skipping [ 112.241222][ T31] usb 1-1: config 3 interface 108 altsetting 243 has an endpoint descriptor with address 0xF8, changing to 0x88 [ 112.253266][ T31] usb 1-1: config 3 interface 108 altsetting 243 has a duplicate endpoint with address 0x88, skipping [ 112.261744][ T1919] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0,oom_memcg=/syz2,task_memcg= [ 112.264551][ T31] usb 1-1: config 3 interface 108 altsetting 243 has an invalid descriptor for endpoint zero, skipping [ 112.270225][ T1919] /syz2 [ 112.277303][ T31] usb 1-1: config 3 interface 108 altsetting 243 has a duplicate endpoint with address 0x5, skipping [ 112.287601][ T2031] netlink: 104 bytes leftover after parsing attributes in process `syz.3.540'. [ 112.290499][ T31] usb 1-1: config 3 interface 108 altsetting 243 has a duplicate endpoint with address 0xA, skipping [ 112.321182][ T31] usb 1-1: config 3 interface 108 altsetting 243 has 11 endpoint descriptors, different from the interface descriptor's value: 101 [ 112.321549][ T1919] ,task=syz.2.506,pid=1920,uid=0 [ 112.335026][ T541] usb 3-1: new high-speed USB device number 47 using dummy_hcd [ 112.347555][ T1919] Memory cgroup out of memory: Killed process 1920 (syz.2.506) total-vm:90428kB, anon-rss:1220kB, file-rss:24016kB, shmem-rss:0kB, UID:0 pgtables:200kB oom_score_adj:1000 [ 112.357911][ T31] usb 1-1: config 3 interface 0 has no altsetting 0 [ 112.377963][ T31] usb 1-1: config 3 interface 87 has no altsetting 0 [ 112.384750][ T31] usb 1-1: config 3 interface 176 has no altsetting 0 [ 112.397744][ T31] usb 1-1: config 3 interface 164 has no altsetting 0 [ 112.404596][ T31] usb 1-1: config 3 interface 108 has no altsetting 0 [ 112.419244][ T31] usb 1-1: New USB device found, idVendor=05c6, idProduct=9275, bcdDevice=63.66 [ 112.428660][ T31] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 112.436697][ T31] usb 1-1: Product: 憌墘㈤궘⸀鉫顇泱裂黺䡳ꥌ采櫀ᥪﱡè”媾諸à¨ëº¸íŽ€à¦„å†’ßç’寽㸖å¤ïŠ™à¢°ïŠè‹™ç¦¸ë²‡ä „讞擎ç¢ãº¾ïŒ¿ãµ±ì€Ñჱíâ†í’Šî Ÿëªºâ¨Ÿï§´ì²¡ìž†î¬šï³¢ï·’X⃈꠯ﶉ繇䨰ృ猋뒑貪賃㭡♔鞽丩魇îºÇŽá›ë¼­è‹²á½‡ã‘飼湦㱷祽 [ 112.465891][ T31] usb 1-1: Manufacturer: ç‰¤ä§—ì  á°æ¡¼ë˜²å’¿à¶€ã¨¡à§Ÿï¶Œë男濇å´êšæµ–í†·í‘‘å–¹ä²“ã–©áŽšã–§â¶¹æ‰œã€â£…臔蒚黅浬ꖑ顥礋啇ê”᳆﷚凱㆛濻ﷹ춾㖽镃곯้嫖짿膂驳幉숯⡽现㘿ç¿êº®ïƒ€ß˜ï¿ä›¤æŒ–翃넦뫀۹粶çƒá½Žçƒ‚锽‾䈳룚洰ⶬ봓ᲆ廫鯸᮴íŠë´”í…ç­®ã²á¡†ë–„빞ᷣᣀ߾ꅓ榣暆⋸ᑥۡ䄉뇵㫄㥘詵ﴩꯥ [ 112.501124][ T541] usb 3-1: device descriptor read/64, error -32 [ 112.518941][ T31] usb 1-1: SerialNumber: Є [ 112.534766][ T36] audit: type=1400 audit(1771702075.474:360): avc: denied { getopt } for pid=2032 comm="syz.3.541" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 112.549086][ T2021] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 112.581435][ T2021] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 112.734925][ T2045] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 112.757869][ T541] usb 3-1: device descriptor read/64, error -32 [ 112.835795][ T2045] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 112.877940][ T541] usb usb3-port1: attempt power cycle [ 112.883546][ T541] raw-gadget.2 gadget.2: failed to queue reset event [ 112.957863][ T541] raw-gadget.2 gadget.2: failed to queue resume event [ 112.977408][ T541] raw-gadget.2 gadget.2: failed to queue reset event [ 113.027967][ T31] usb 1-1: USB disconnect, device number 56 [ 113.169063][ T2050] SELinux: security_context_str_to_sid () failed with errno=-22 [ 113.198116][ T2051] SELinux: security_context_str_to_sid () failed with errno=-22 [ 113.213773][ T541] raw-gadget.2 gadget.2: failed to queue resume event [ 113.232377][ T2055] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 113.247089][ T2055] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 113.277898][ T541] usb 3-1: new high-speed USB device number 48 using dummy_hcd [ 113.298064][ C1] raw-gadget.2 gadget.2: ignoring, device is not running [ 113.305349][ C1] raw-gadget.2 gadget.2: ignoring, device is not running [ 113.312632][ C1] raw-gadget.2 gadget.2: ignoring, device is not running [ 113.319754][ T541] usb 3-1: device descriptor read/8, error -32 [ 113.448063][ C1] raw-gadget.2 gadget.2: ignoring, device is not running [ 113.455365][ C1] raw-gadget.2 gadget.2: ignoring, device is not running [ 113.462651][ C1] raw-gadget.2 gadget.2: ignoring, device is not running [ 113.469798][ T541] usb 3-1: device descriptor read/8, error -32 [ 113.577983][ T541] raw-gadget.2 gadget.2: failed to queue suspend event [ 113.585073][ T541] raw-gadget.2 gadget.2: failed to queue reset event [ 113.657962][ T541] raw-gadget.2 gadget.2: failed to queue resume event [ 113.717976][ T541] usb 3-1: new high-speed USB device number 49 using dummy_hcd [ 113.748149][ C1] raw-gadget.2 gadget.2: ignoring, device is not running [ 113.766644][ C1] raw-gadget.2 gadget.2: ignoring, device is not running [ 113.773973][ C1] raw-gadget.2 gadget.2: ignoring, device is not running [ 113.778030][ T66] usb 1-1: new high-speed USB device number 57 using dummy_hcd [ 113.781525][ T541] usb 3-1: device descriptor read/8, error -32 [ 113.818048][ T1919] raw-gadget.2 gadget.2: failed to queue suspend event [ 113.838022][ T1919] raw-gadget.2 gadget.2: failed to queue disconnect event [ 113.918645][ T541] usb 3-1: device descriptor read/8, error -71 [ 113.939072][ T66] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 113.949322][ T66] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 113.966868][ T66] usb 1-1: New USB device found, idVendor=08b7, idProduct=0000, bcdDevice= 0.00 [ 113.976252][ T66] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=3 [ 113.984813][ T66] usb 1-1: SerialNumber: syz [ 114.031421][ T541] usb usb3-port1: unable to enumerate USB device [ 114.145952][ T2078] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 114.155144][ T2078] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 114.270967][ T66] usb 1-1: 0:2 : does not exist [ 114.281183][ T66] usb 1-1: USB disconnect, device number 57 [ 114.403159][ T45] usb 2-1: USB disconnect, device number 40 [ 114.420002][ T2087] fuse: Unknown parameter 'Òn' [ 114.468118][ T541] usb 3-1: new high-speed USB device number 50 using dummy_hcd [ 114.508097][ T613] usb 4-1: device descriptor read/64, error -110 [ 114.618266][ T541] usb 3-1: Using ep0 maxpacket: 16 [ 114.624616][ T541] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 114.635591][ T541] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 114.645392][ T541] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 114.658284][ T541] usb 3-1: New USB device found, idVendor=045e, idProduct=07da, bcdDevice= 0.00 [ 114.667389][ T541] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 114.678391][ T541] usb 3-1: config 0 descriptor?? [ 114.723909][ T2092] kvm: kvm [2091]: vcpu0, guest rIP: 0x9136 Unhandled WRMSR(0xc1) = 0x60000000 [ 114.733016][ T2092] kvm: kvm [2091]: vcpu0, guest rIP: 0x9136 Unhandled WRMSR(0xc2) = 0x60000000 [ 114.744241][ T2092] kvm: kvm [2091]: vcpu0, guest rIP: 0x9136 Unhandled WRMSR(0x11e) = 0x60000000 [ 114.755784][ T2092] kvm: kvm [2091]: vcpu0, guest rIP: 0x9136 Unhandled WRMSR(0x186) = 0x60000000 [ 114.758240][ T613] usb 4-1: device descriptor read/64, error -32 [ 114.765034][ T2092] kvm: kvm [2091]: vcpu0, guest rIP: 0x9136 Unhandled WRMSR(0x187) = 0x60000000 [ 114.886736][ T541] microsoft 0003:045E:07DA.0019: invalid report_count -2142031715 [ 114.895360][ T541] microsoft 0003:045E:07DA.0019: item 0 4 1 9 parsing failed [ 114.908215][ T541] microsoft 0003:045E:07DA.0019: parse failed [ 114.914569][ T541] microsoft 0003:045E:07DA.0019: probe with driver microsoft failed with error -22 [ 114.916397][ T36] audit: type=1400 audit(1771702077.873:361): avc: denied { create } for pid=2103 comm="syz.3.563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 115.008239][ T613] usb 4-1: new high-speed USB device number 42 using dummy_hcd [ 115.080705][ T36] audit: type=1400 audit(1771702078.043:362): avc: denied { watch_reads } for pid=2108 comm="syz.3.565" path="/165/file1" dev="tmpfs" ino=903 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 115.107660][ T541] usb 3-1: USB disconnect, device number 50 [ 115.143174][ T613] usb 4-1: device descriptor read/64, error -32 [ 115.388256][ T613] usb 4-1: device descriptor read/64, error -32 [ 115.498344][ T613] usb usb4-port1: attempt power cycle [ 115.504129][ T613] raw-gadget.6 gadget.3: failed to queue reset event [ 115.578327][ T613] raw-gadget.6 gadget.3: failed to queue resume event [ 115.585360][ T613] raw-gadget.6 gadget.3: failed to queue reset event [ 115.618293][ T66] usb 1-1: new high-speed USB device number 58 using dummy_hcd [ 115.658300][ T541] usb 2-1: new high-speed USB device number 41 using dummy_hcd [ 115.768310][ T66] usb 1-1: Using ep0 maxpacket: 16 [ 115.774612][ T66] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 115.784772][ T66] usb 1-1: config 0 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 9 [ 115.797693][ T66] usb 1-1: New USB device found, idVendor=045e, idProduct=07da, bcdDevice= 0.00 [ 115.806781][ T613] raw-gadget.6 gadget.3: failed to queue resume event [ 115.813650][ T66] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 115.818314][ T541] usb 2-1: Using ep0 maxpacket: 8 [ 115.826146][ T66] usb 1-1: config 0 descriptor?? [ 115.833800][ T66] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 115.834115][ T541] usb 2-1: unable to get BOS descriptor or descriptor too short [ 115.849693][ T541] usb 2-1: config 1 interface 0 has no altsetting 0 [ 115.857648][ T541] usb 2-1: New USB device found, idVendor=12ba, idProduct=074b, bcdDevice= 0.40 [ 115.866802][ T45] usb 3-1: new high-speed USB device number 51 using dummy_hcd [ 115.874448][ T541] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 115.882571][ T541] usb 2-1: Product: syz [ 115.886812][ T541] usb 2-1: Manufacturer: ဉ [ 115.888426][ T613] usb 4-1: new high-speed USB device number 43 using dummy_hcd [ 115.891931][ T541] usb 2-1: SerialNumber: syz [ 115.918514][ C0] raw-gadget.6 gadget.3: ignoring, device is not running [ 115.925851][ C0] raw-gadget.6 gadget.3: ignoring, device is not running [ 115.933143][ C0] raw-gadget.6 gadget.3: ignoring, device is not running [ 115.940355][ T613] usb 4-1: device descriptor read/8, error -32 [ 116.038380][ T45] usb 3-1: Using ep0 maxpacket: 16 [ 116.045523][ T45] usb 3-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 116.055913][ T45] usb 3-1: New USB device found, idVendor=0e8d, idProduct=0003, bcdDevice= 0.00 [ 116.065178][ T45] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 116.074521][ T45] usb 3-1: config 0 descriptor?? [ 116.078569][ C0] raw-gadget.6 gadget.3: ignoring, device is not running [ 116.088126][ C0] raw-gadget.6 gadget.3: ignoring, device is not running [ 116.095401][ C0] raw-gadget.6 gadget.3: ignoring, device is not running [ 116.102531][ T613] usb 4-1: device descriptor read/8, error -32 [ 116.142730][ T541] usbhid 2-1:1.0: can't add hid device: -71 [ 116.148769][ T541] usbhid 2-1:1.0: probe with driver usbhid failed with error -71 [ 116.157557][ T541] usb 2-1: USB disconnect, device number 41 [ 116.219105][ T613] raw-gadget.6 gadget.3: failed to queue suspend event [ 116.226097][ T613] raw-gadget.6 gadget.3: failed to queue reset event [ 116.282280][ T66] usb 3-1: USB disconnect, device number 51 [ 116.298671][ T613] raw-gadget.6 gadget.3: failed to queue resume event [ 116.358454][ T613] usb 4-1: new high-speed USB device number 44 using dummy_hcd [ 116.379245][ C0] raw-gadget.6 gadget.3: ignoring, device is not running [ 116.386526][ C0] raw-gadget.6 gadget.3: ignoring, device is not running [ 116.393987][ C0] raw-gadget.6 gadget.3: ignoring, device is not running [ 116.401070][ T613] usb 4-1: device descriptor read/8, error -32 [ 116.528576][ C0] raw-gadget.6 gadget.3: ignoring, device is not running [ 116.535890][ C0] raw-gadget.6 gadget.3: ignoring, device is not running [ 116.543428][ C0] raw-gadget.6 gadget.3: ignoring, device is not running [ 116.550685][ T613] usb 4-1: device descriptor read/8, error -32 [ 116.668414][ T613] raw-gadget.6 gadget.3: failed to queue suspend event [ 116.675406][ T613] usb usb4-port1: unable to enumerate USB device [ 116.798895][ T36] audit: type=1400 audit(1771702079.763:363): avc: denied { mount } for pid=2142 comm="syz.2.575" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 116.821060][ T36] audit: type=1400 audit(1771702079.763:364): avc: denied { mounton } for pid=2142 comm="syz.2.575" path="/27/file0" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=dir permissive=1 [ 116.846450][ T36] audit: type=1400 audit(1771702079.803:365): avc: denied { unmount } for pid=1820 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 116.864052][ T2145] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 116.876110][ T2145] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 117.228520][ T45] usb 3-1: new high-speed USB device number 52 using dummy_hcd [ 117.378471][ T45] usb 3-1: Using ep0 maxpacket: 32 [ 117.384846][ T45] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 117.395949][ T45] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 117.405738][ T45] usb 3-1: New USB device found, idVendor=046d, idProduct=c31c, bcdDevice= 0.40 [ 117.414795][ T45] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 117.423483][ T45] usb 3-1: config 0 descriptor?? [ 117.430872][ T45] hub 3-1:0.0: USB hub found [ 117.830582][ T45] hub 3-1:0.0: config failed, can't read hub descriptor (err -22) [ 117.839905][ T45] usbhid 3-1:0.0: can't add hid device: -71 [ 117.845888][ T45] usbhid 3-1:0.0: probe with driver usbhid failed with error -71 [ 117.868900][ T45] usb 3-1: USB disconnect, device number 52 [ 118.398115][ T613] usb 1-1: USB disconnect, device number 58 [ 118.551909][ T36] audit: type=1400 audit(1771702081.513:366): avc: denied { create } for pid=2196 comm="syz.0.591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 118.599517][ T2203] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 118.608158][ T2203] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 118.808680][ T613] usb 3-1: new high-speed USB device number 53 using dummy_hcd [ 118.888662][ T541] usb 1-1: new high-speed USB device number 59 using dummy_hcd [ 118.938689][ T613] usb 3-1: device descriptor read/64, error -71 [ 119.038707][ T541] usb 1-1: Using ep0 maxpacket: 16 [ 119.045007][ T541] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 119.055175][ T541] usb 1-1: config 0 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 9 [ 119.068096][ T541] usb 1-1: New USB device found, idVendor=045e, idProduct=07da, bcdDevice= 0.00 [ 119.077176][ T541] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 119.085822][ T541] usb 1-1: config 0 descriptor?? [ 119.092026][ T541] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 119.151830][ T36] audit: type=1400 audit(1771702082.113:367): avc: denied { mounton } for pid=2215 comm="syz.3.598" path="/177/file0" dev="tmpfs" ino=967 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 119.162875][ T2217] fuse: Bad value for 'fd' [ 119.174794][ T36] audit: type=1400 audit(1771702082.123:368): avc: denied { mounton } for pid=2215 comm="syz.3.598" path="/177/file0" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=file permissive=1 [ 119.208717][ T613] usb 3-1: device descriptor read/64, error -71 [ 119.303024][ T2223] netlink: 4 bytes leftover after parsing attributes in process `syz.3.600'. [ 119.442232][ T2227] kvm: kvm [2224]: vcpu0, guest rIP: 0x9134 Unhandled WRMSR(0x11e) = 0xbe702111 [ 119.458897][ T613] usb 3-1: new high-speed USB device number 54 using dummy_hcd [ 119.483039][ T2229] rust_binder: BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 [ 119.598745][ T613] usb 3-1: device descriptor read/64, error -71 [ 119.838779][ T613] usb 3-1: device descriptor read/64, error -71 [ 119.958941][ T613] usb usb3-port1: attempt power cycle [ 120.168812][ T541] usb 2-1: new high-speed USB device number 42 using dummy_hcd [ 120.303283][ T2238] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 120.308901][ T613] usb 3-1: new high-speed USB device number 55 using dummy_hcd [ 120.312964][ T2238] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 120.328181][ T541] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 120.330696][ T36] audit: type=1400 audit(1771702083.293:369): avc: granted { setsecparam } for pid=2237 comm="syz.3.605" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 120.339374][ T541] usb 2-1: New USB device found, idVendor=04dd, idProduct=9032, bcdDevice=fd.0b [ 120.361206][ T613] usb 3-1: device descriptor read/8, error -71 [ 120.366749][ T541] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 120.381224][ T541] usb 2-1: config 0 descriptor?? [ 120.387309][ T541] usb 2-1: unsupported MDLM descriptors [ 120.499935][ T613] usb 3-1: device descriptor read/8, error -71 [ 120.639773][ T2239] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 120.648339][ T2239] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 120.656694][ T9] usb 2-1: USB disconnect, device number 42 [ 120.738896][ T613] usb 3-1: new high-speed USB device number 56 using dummy_hcd [ 120.759892][ T613] usb 3-1: device descriptor read/8, error -71 [ 120.890038][ T613] usb 3-1: device descriptor read/8, error -71 [ 120.914122][ T36] audit: type=1404 audit(1771702083.872:370): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 120.929912][ T36] audit: type=1400 audit(1771702083.892:371): avc: denied { getattr } for pid=2244 comm="syz.3.608" path="socket:[21746]" dev="sockfs" ino=21746 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 120.954626][ T36] audit: type=1400 audit(1771702083.892:372): avc: denied { read write } for pid=2244 comm="syz.3.608" dev="anon_inodefs" ino=21745 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 120.977619][ T36] audit: type=1400 audit(1771702083.892:373): avc: denied { read } for pid=2244 comm="syz.3.608" dev="anon_inodefs" ino=21745 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 121.000350][ T613] usb usb3-port1: unable to enumerate USB device [ 121.006786][ T36] audit: type=1400 audit(1771702083.892:374): avc: denied { execmem } for pid=2244 comm="syz.3.608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 121.027349][ T36] audit: type=1400 audit(1771702083.912:375): avc: denied { ioctl } for pid=2244 comm="syz.3.608" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=21745 ioctlcmd=0xaa00 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 121.196911][ T2249] syzkaller1: entered promiscuous mode [ 121.202481][ T2249] syzkaller1: entered allmulticast mode [ 121.609666][ T2256] veth1_macvtap: left promiscuous mode [ 121.615212][ T2256] macsec0: entered allmulticast mode [ 121.624175][ T2256] macsec0: entered promiscuous mode [ 121.629903][ T2256] macsec0: left allmulticast mode [ 121.661603][ T613] usb 1-1: USB disconnect, device number 59 [ 121.704402][ T2261] bridge0: port 3(veth1_to_bridge) entered blocking state [ 121.711667][ T2261] bridge0: port 3(veth1_to_bridge) entered disabled state [ 121.718899][ T2261] veth1_to_bridge: entered allmulticast mode [ 121.727144][ T2261] veth1_to_bridge: entered promiscuous mode [ 121.733979][ T2261] bridge0: adding interface veth1_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 121.755049][ T2261] bridge0: port 3(veth1_to_bridge) entered blocking state [ 121.762213][ T2261] bridge0: port 3(veth1_to_bridge) entered forwarding state [ 121.829800][ T2273] netlink: 'syz.0.617': attribute type 2 has an invalid length. [ 121.837531][ T2273] netlink: 8 bytes leftover after parsing attributes in process `syz.0.617'. [ 122.933034][ T2333] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2333 comm=syz.0.638 [ 123.451681][ T2356] netlink: 12 bytes leftover after parsing attributes in process `syz.3.646'. [ 123.567636][ T36] kauditd_printk_skb: 152 callbacks suppressed [ 123.567654][ T36] audit: type=1400 audit(1771702086.522:528): avc: denied { read } for pid=2363 comm="syz.3.649" dev="nsfs" ino=4026532429 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 123.614772][ T36] audit: type=1400 audit(1771702086.522:529): avc: denied { create } for pid=2363 comm="syz.3.649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 123.636007][ T36] audit: type=1400 audit(1771702086.572:530): avc: denied { read write } for pid=292 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 123.674298][ T36] audit: type=1400 audit(1771702086.632:531): avc: denied { sys_module } for pid=2365 comm="syz.1.651" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 123.712460][ T36] audit: type=1400 audit(1771702086.672:532): avc: denied { create } for pid=2367 comm="syz.3.652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 123.754207][ T36] audit: type=1400 audit(1771702086.692:533): avc: denied { read write } for pid=2367 comm="syz.3.652" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 123.777680][ T36] audit: type=1400 audit(1771702086.692:534): avc: denied { create } for pid=2369 comm="syz.1.653" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 123.797251][ T36] audit: type=1400 audit(1771702086.702:535): avc: denied { read write } for pid=2367 comm="syz.3.652" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 123.821566][ T36] audit: type=1400 audit(1771702086.702:536): avc: denied { read write } for pid=2367 comm="syz.3.652" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 123.845023][ T36] audit: type=1400 audit(1771702086.712:537): avc: denied { read } for pid=2369 comm="syz.1.653" dev="nsfs" ino=4026532303 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 125.134368][ T2406] netlink: 'syz.3.664': attribute type 1 has an invalid length. [ 125.142096][ T2406] netlink: 'syz.3.664': attribute type 2 has an invalid length. [ 125.151694][ T2407] netlink: 'syz.3.664': attribute type 1 has an invalid length. [ 125.159418][ T2407] netlink: 'syz.3.664': attribute type 2 has an invalid length. [ 125.897367][ T2438] netlink: 4 bytes leftover after parsing attributes in process `syz.1.675'. [ 126.441703][ T330] Bluetooth: hci0: Frame reassembly failed (-84) [ 126.448138][ T13] Bluetooth: hci0: Frame reassembly failed (-84) [ 126.988329][ T2472] netlink: 16 bytes leftover after parsing attributes in process `syz.3.687'. [ 127.494584][ T2492] netlink: 'syz.2.692': attribute type 4 has an invalid length. [ 128.459472][ T55] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 128.465819][ T413] Bluetooth: hci0: command 0x1003 tx timeout [ 128.927785][ T36] kauditd_printk_skb: 359 callbacks suppressed [ 128.927804][ T36] audit: type=1400 audit(1771702091.882:897): avc: denied { read write } for pid=290 comm="syz-executor" name="loop0" dev="devtmpfs" ino=773 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 128.999492][ T36] audit: type=1400 audit(1771702091.922:898): avc: denied { create } for pid=2506 comm="syz.0.698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 129.049003][ T36] audit: type=1400 audit(1771702091.932:899): avc: denied { read write } for pid=1820 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 129.073949][ T36] audit: type=1400 audit(1771702091.942:900): avc: denied { read write } for pid=290 comm="syz-executor" name="loop0" dev="devtmpfs" ino=773 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 129.101444][ T36] audit: type=1400 audit(1771702091.952:901): avc: denied { create } for pid=2508 comm="syz.0.700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 129.121878][ T36] audit: type=1400 audit(1771702091.982:902): avc: denied { read write } for pid=2508 comm="syz.0.700" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 129.147562][ T36] audit: type=1400 audit(1771702091.982:903): avc: denied { mounton } for pid=2508 comm="syz.0.700" path="/147/file0" dev="tmpfs" ino=793 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 129.171503][ T36] audit: type=1400 audit(1771702091.992:904): avc: denied { read write } for pid=290 comm="syz-executor" name="loop0" dev="devtmpfs" ino=773 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 129.196870][ T36] audit: type=1400 audit(1771702092.002:905): avc: denied { create } for pid=2512 comm="syz.1.701" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 129.217919][ T36] audit: type=1400 audit(1771702092.062:906): avc: denied { create } for pid=2514 comm="syz.0.702" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 129.959420][ T2546] netlink: 12 bytes leftover after parsing attributes in process `syz.0.715'. [ 129.972238][ T2547] netlink: 12 bytes leftover after parsing attributes in process `syz.0.715'. [ 130.204552][ T2572] netlink: 56 bytes leftover after parsing attributes in process `syz.2.725'. [ 132.223922][ T2675] netlink: 'syz.2.754': attribute type 22 has an invalid length. [ 132.805683][ T2697] netlink: 'syz.2.761': attribute type 22 has an invalid length. [ 133.518366][ T2712] mmap: syz.2.765 (2712) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 133.931027][ T36] kauditd_printk_skb: 274 callbacks suppressed [ 133.931045][ T36] audit: type=1400 audit(1771702096.892:1181): avc: denied { create } for pid=2724 comm="syz.0.770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 133.958693][ T36] audit: type=1400 audit(1771702096.892:1182): avc: denied { create } for pid=2724 comm="syz.0.770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 133.978860][ T36] audit: type=1400 audit(1771702096.892:1183): avc: denied { create } for pid=2724 comm="syz.0.770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 133.999014][ T36] audit: type=1400 audit(1771702096.942:1184): avc: denied { read write } for pid=290 comm="syz-executor" name="loop0" dev="devtmpfs" ino=773 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 134.059741][ T36] audit: type=1400 audit(1771702096.992:1185): avc: denied { read write } for pid=290 comm="syz-executor" name="loop0" dev="devtmpfs" ino=773 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 134.109709][ T36] audit: type=1400 audit(1771702097.012:1186): avc: denied { create } for pid=2728 comm="syz.0.772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 134.130282][ T36] audit: type=1400 audit(1771702097.052:1187): avc: denied { read write } for pid=290 comm="syz-executor" name="loop0" dev="devtmpfs" ino=773 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 134.155150][ T36] audit: type=1400 audit(1771702097.072:1188): avc: denied { read write } for pid=2730 comm="syz.0.774" name="uinput" dev="devtmpfs" ino=194 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=0 [ 134.179560][ T36] audit: type=1400 audit(1771702097.072:1189): avc: denied { read write } for pid=2730 comm="syz.0.774" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 134.203794][ T36] audit: type=1400 audit(1771702097.072:1190): avc: denied { create } for pid=2730 comm="syz.0.774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 135.394444][ T2768] netlink: 68 bytes leftover after parsing attributes in process `syz.1.787'. [ 138.994447][ T36] kauditd_printk_skb: 204 callbacks suppressed [ 138.994467][ T36] audit: type=1400 audit(1771702101.951:1395): avc: denied { read write } for pid=290 comm="syz-executor" name="loop0" dev="devtmpfs" ino=773 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 139.033466][ T36] audit: type=1400 audit(1771702101.991:1396): avc: denied { name_bind } for pid=2858 comm="syz.0.819" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=0 [ 139.069933][ T36] audit: type=1400 audit(1771702102.021:1397): avc: denied { read write } for pid=290 comm="syz-executor" name="loop0" dev="devtmpfs" ino=773 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 139.101990][ T36] audit: type=1400 audit(1771702102.021:1398): avc: denied { read write } for pid=1820 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 139.126410][ T36] audit: type=1400 audit(1771702102.061:1399): avc: denied { read write } for pid=2863 comm="syz.2.821" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 139.149957][ T36] audit: type=1400 audit(1771702102.061:1400): avc: denied { create } for pid=2864 comm="syz.0.820" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 139.170156][ T36] audit: type=1400 audit(1771702102.061:1401): avc: denied { create } for pid=2864 comm="syz.0.820" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 139.189585][ T36] audit: type=1400 audit(1771702102.061:1402): avc: denied { read write } for pid=2864 comm="syz.0.820" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 139.354758][ T36] audit: type=1400 audit(1771702102.311:1403): avc: denied { read write } for pid=292 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 139.388404][ T2868] netlink: 9 bytes leftover after parsing attributes in process `syz.3.822'. [ 139.397513][ T2868] gretap0: entered promiscuous mode [ 139.404438][ T36] audit: type=1400 audit(1771702102.361:1404): avc: denied { read } for pid=2867 comm="syz.3.822" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 140.614638][ T2921] netlink: 'syz.1.841': attribute type 12 has an invalid length. [ 140.624494][ T2921] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2562 sclass=netlink_route_socket pid=2921 comm=syz.1.841 [ 141.728546][ T2976] netlink: 'syz.0.863': attribute type 5 has an invalid length. [ 141.947278][ T2982] netlink: 51 bytes leftover after parsing attributes in process `syz.3.866'. [ 142.905066][ T3002] syzkaller0: entered allmulticast mode [ 143.413495][ T3026] bridge: RTM_NEWNEIGH with invalid state 0x0 [ 143.505548][ T3031] netlink: 'syz.3.883': attribute type 10 has an invalid length. [ 143.513395][ T3031] netlink: 17 bytes leftover after parsing attributes in process `syz.3.883'. [ 144.088376][ T36] kauditd_printk_skb: 293 callbacks suppressed [ 144.088396][ T36] audit: type=1400 audit(1771702107.041:1698): avc: denied { read write } for pid=1820 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 144.142151][ T36] audit: type=1400 audit(1771702107.101:1699): avc: denied { execmem } for pid=3052 comm="syz.1.891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 144.161410][ T36] audit: type=1400 audit(1771702107.101:1700): avc: denied { create } for pid=3052 comm="syz.1.891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 144.202219][ T36] audit: type=1400 audit(1771702107.101:1701): avc: denied { nlmsg_tty_audit } for pid=3052 comm="syz.1.891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=0 [ 144.225616][ T36] audit: type=1400 audit(1771702107.111:1702): avc: denied { create } for pid=3052 comm="syz.1.891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 144.246577][ T3051] veth0_to_bond: entered promiscuous mode [ 144.252409][ T36] audit: type=1400 audit(1771702107.111:1703): avc: denied { create } for pid=3052 comm="syz.1.891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 144.296891][ T36] audit: type=1400 audit(1771702107.141:1704): avc: denied { relabelfrom } for pid=3052 comm="syz.1.891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=0 [ 144.327524][ T36] audit: type=1400 audit(1771702107.151:1705): avc: denied { read write } for pid=290 comm="syz-executor" name="loop0" dev="devtmpfs" ino=773 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 144.356031][ T36] audit: type=1400 audit(1771702107.161:1706): avc: denied { block_suspend } for pid=3050 comm="syz.2.890" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 144.377850][ T36] audit: type=1400 audit(1771702107.231:1707): avc: denied { read write } for pid=3050 comm="syz.2.890" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 144.987394][ T3083] syz.0.903 uses obsolete (PF_INET,SOCK_PACKET) [ 144.996352][ T3084] netlink: 'syz.0.903': attribute type 4 has an invalid length. [ 145.005466][ T3083] netlink: 'syz.0.903': attribute type 4 has an invalid length. [ 145.092770][ T3092] netlink: 4 bytes leftover after parsing attributes in process `syz.3.905'. [ 145.517074][ T3111] netlink: 'syz.2.913': attribute type 16 has an invalid length. [ 146.091459][ T3128] netlink: 'syz.1.920': attribute type 4 has an invalid length. [ 146.584781][ T3144] netlink: 'syz.0.927': attribute type 27 has an invalid length. [ 146.594046][ T3144] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 146.773915][ T3148] netlink: 104 bytes leftover after parsing attributes in process `syz.3.929'. [ 147.979422][ T3204] sit0: entered promiscuous mode [ 147.986066][ T3204] netlink: 'syz.2.949': attribute type 1 has an invalid length. [ 148.000320][ T3204] netlink: 1 bytes leftover after parsing attributes in process `syz.2.949'. [ 148.041122][ T3212] syzkaller1: entered promiscuous mode [ 148.046768][ T3212] syzkaller1: entered allmulticast mode [ 148.783263][ T3240] netlink: 4 bytes leftover after parsing attributes in process `syz.2.964'. [ 149.342719][ T36] kauditd_printk_skb: 402 callbacks suppressed [ 149.342738][ T36] audit: type=1400 audit(1771702112.053:2110): avc: denied { read write } for pid=3256 comm="syz.0.969" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 149.372513][ T36] audit: type=1400 audit(1771702112.053:2111): avc: denied { read write } for pid=3256 comm="syz.0.969" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 149.396015][ T36] audit: type=1400 audit(1771702112.053:2112): avc: denied { read write } for pid=3256 comm="syz.0.969" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 149.419528][ T36] audit: type=1400 audit(1771702112.053:2113): avc: denied { read write } for pid=3256 comm="syz.0.969" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 149.443118][ T36] audit: type=1400 audit(1771702112.053:2114): avc: denied { read write } for pid=3256 comm="syz.0.969" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 149.466713][ T36] audit: type=1400 audit(1771702112.062:2115): avc: denied { read write } for pid=3256 comm="syz.0.969" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 149.490234][ T36] audit: type=1400 audit(1771702112.062:2116): avc: denied { read write } for pid=3256 comm="syz.0.969" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 149.513892][ T36] audit: type=1400 audit(1771702112.062:2117): avc: denied { read write } for pid=3256 comm="syz.0.969" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 149.538897][ T36] audit: type=1400 audit(1771702112.062:2118): avc: denied { read write } for pid=3256 comm="syz.0.969" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 149.562533][ T36] audit: type=1400 audit(1771702112.062:2119): avc: denied { read write } for pid=3256 comm="syz.0.969" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 149.929821][ T3279] netlink: 8 bytes leftover after parsing attributes in process `syz.0.976'. [ 149.939495][ T3279] netlink: 8 bytes leftover after parsing attributes in process `syz.0.976'. [ 151.119860][ T3335] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 151.205672][ T3343] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1001'. [ 152.091174][ T3375] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3375 comm=syz.0.1011 [ 154.178137][ T3442] netlink: 'syz.3.1033': attribute type 13 has an invalid length. [ 154.827191][ T36] kauditd_printk_skb: 311 callbacks suppressed [ 154.827210][ T36] audit: type=1400 audit(1771702117.176:2431): avc: denied { read write } for pid=292 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 154.865488][ T36] audit: type=1400 audit(1771702117.214:2432): avc: denied { create } for pid=3455 comm="syz.3.1039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 154.885616][ T36] audit: type=1400 audit(1771702117.223:2433): avc: denied { create } for pid=3455 comm="syz.3.1039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 154.906011][ T36] audit: type=1400 audit(1771702117.232:2434): avc: denied { create } for pid=3455 comm="syz.3.1039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 154.926899][ T36] audit: type=1400 audit(1771702117.260:2435): avc: denied { read write } for pid=292 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 154.960740][ T36] audit: type=1400 audit(1771702117.298:2436): avc: denied { read write } for pid=3457 comm="syz.3.1040" name="vhost-vsock" dev="devtmpfs" ino=200 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=0 [ 154.985243][ T36] audit: type=1400 audit(1771702117.298:2437): avc: denied { create } for pid=3457 comm="syz.3.1040" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 155.019478][ T36] audit: type=1400 audit(1771702117.354:2438): avc: denied { read write } for pid=290 comm="syz-executor" name="loop0" dev="devtmpfs" ino=773 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 155.046479][ T36] audit: type=1400 audit(1771702117.382:2439): avc: denied { read write } for pid=1820 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 155.114929][ T3461] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1042'. [ 155.144155][ T36] audit: type=1400 audit(1771702117.438:2440): avc: denied { read } for pid=3460 comm="syz.2.1042" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 155.188774][ T3462] netlink: 'syz.0.1041': attribute type 4 has an invalid length. [ 155.197756][ T3462] netlink: 17 bytes leftover after parsing attributes in process `syz.0.1041'. [ 155.214997][ T3458] netlink: 'syz.3.1040': attribute type 11 has an invalid length. [ 155.222891][ T3458] netlink: 'syz.3.1040': attribute type 2 has an invalid length. [ 155.239927][ T3458] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3458 comm=syz.3.1040 [ 155.941675][ T3488] syzkaller1: entered promiscuous mode [ 155.947328][ T3488] syzkaller1: entered allmulticast mode [ 155.984650][ T3490] pim6reg1: tun_chr_ioctl cmd 1074025677 [ 155.990414][ T3490] pim6reg1: linktype set to 517 [ 156.595698][ T3535] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1068'. [ 156.637654][ T3539] netlink: 'syz.2.1070': attribute type 29 has an invalid length. [ 156.648118][ T3539] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1070'. [ 158.103503][ T3583] kernel profiling enabled (shift: 9) [ 159.019535][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 159.031617][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 159.043873][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 159.056214][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 159.068350][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 159.080597][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 159.092742][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 159.104776][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 159.116897][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 159.129006][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 159.218570][ T3613] netlink: 9 bytes leftover after parsing attributes in process `syz.2.1093'. [ 159.238264][ T3613] z00ªX¹¦: renamed from gretap0 (while UP) [ 159.256111][ T3613] z00ªX¹¦: entered allmulticast mode [ 159.268759][ T3614] netlink: 9 bytes leftover after parsing attributes in process `syz.2.1093'. [ 159.290679][ T3614] z01ªX¹¦: renamed from z00ªX¹¦ (while UP) [ 160.199531][ T36] kauditd_printk_skb: 217 callbacks suppressed [ 160.199550][ T36] audit: type=1326 audit(1771702122.197:2658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3653 comm="syz.0.1106" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fa0f6b9c629 code=0x0 [ 160.291451][ T36] audit: type=1400 audit(1771702122.291:2659): avc: denied { name_bind } for pid=3653 comm="syz.0.1106" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 160.314691][ T36] audit: type=1400 audit(1771702122.309:2660): avc: denied { create } for pid=3653 comm="syz.0.1106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 160.365626][ T36] audit: type=1400 audit(1771702122.347:2661): avc: denied { read write } for pid=1820 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 160.416652][ T36] audit: type=1400 audit(1771702122.403:2662): avc: denied { map } for pid=3656 comm="syz.2.1107" path="socket:[26931]" dev="sockfs" ino=26931 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=0 [ 160.488671][ T36] audit: type=1400 audit(1771702122.450:2663): avc: denied { read write } for pid=1820 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 160.555351][ T36] audit: type=1400 audit(1771702122.515:2664): avc: denied { read write } for pid=3659 comm="syz.1.1108" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 160.588208][ T36] audit: type=1400 audit(1771702122.562:2665): avc: denied { create } for pid=3658 comm="syz.2.1109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 160.608669][ T36] audit: type=1400 audit(1771702122.562:2666): avc: denied { create } for pid=3658 comm="syz.2.1109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 160.630733][ T36] audit: type=1400 audit(1771702122.562:2667): avc: denied { create } for pid=3658 comm="syz.2.1109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 161.544669][ T3675] syzkaller1: entered allmulticast mode [ 164.376346][ C1] net_ratelimit: 110713 callbacks suppressed [ 164.376368][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 164.394537][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 164.406578][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 164.418672][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 164.430783][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 164.442802][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 164.454914][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 164.467040][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 164.479072][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 164.491174][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 165.253146][ T3775] x_tables: arp_tables: NFLOG.0 target: invalid size 80 (kernel) != (user) 0 [ 165.846619][ T36] kauditd_printk_skb: 143 callbacks suppressed [ 165.846654][ T36] audit: type=1400 audit(1771702127.480:2811): avc: denied { read write } for pid=1820 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 165.974480][ T36] audit: type=1400 audit(1771702127.527:2812): avc: denied { read write } for pid=290 comm="syz-executor" name="loop0" dev="devtmpfs" ino=773 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 166.085512][ T36] audit: type=1400 audit(1771702127.592:2813): avc: denied { read write } for pid=3780 comm="syz.2.1152" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 166.170752][ T36] audit: type=1400 audit(1771702127.592:2814): avc: denied { create } for pid=3780 comm="syz.2.1152" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 166.246893][ T36] audit: type=1400 audit(1771702127.630:2815): avc: denied { read write } for pid=3782 comm="syz.0.1153" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 166.301465][ T36] audit: type=1400 audit(1771702127.639:2816): avc: denied { read } for pid=3782 comm="syz.0.1153" name="binder1" dev="binder" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 166.345899][ T36] audit: type=1400 audit(1771702127.648:2817): avc: denied { read write } for pid=1820 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 166.397714][ T36] audit: type=1400 audit(1771702127.658:2818): avc: denied { read } for pid=3782 comm="syz.0.1153" dev="nsfs" ino=4026532308 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 166.440551][ T36] audit: type=1400 audit(1771702127.667:2819): avc: denied { read } for pid=3782 comm="syz.0.1153" dev="nsfs" ino=4026532308 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 166.483285][ T36] audit: type=1400 audit(1771702127.686:2820): avc: denied { read } for pid=3784 comm="syz.1.1154" dev="nsfs" ino=4026532303 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 167.540052][ T3802] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1161'. [ 169.734647][ C1] net_ratelimit: 98902 callbacks suppressed [ 169.734668][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 169.752700][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 169.764798][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 169.776815][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 169.788935][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 169.801045][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 169.813075][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 169.825169][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 169.837272][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 169.849269][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 170.929228][ T3876] netlink: 'syz.2.1190': attribute type 10 has an invalid length. [ 170.967941][ T3877] netlink: 'syz.2.1190': attribute type 28 has an invalid length. [ 171.201081][ T36] kauditd_printk_skb: 143 callbacks suppressed [ 171.201101][ T36] audit: type=1400 audit(1771702132.492:2964): avc: denied { read write } for pid=3883 comm="syz.2.1192" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 171.280198][ T36] audit: type=1400 audit(1771702132.520:2965): avc: denied { read write } for pid=3884 comm="syz.1.1193" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 171.320040][ T3891] netlink: 'syz.0.1194': attribute type 4 has an invalid length. [ 171.353408][ T3891] netlink: 'syz.0.1194': attribute type 17 has an invalid length. [ 171.363184][ T36] audit: type=1400 audit(1771702132.520:2966): avc: denied { mounton } for pid=3883 comm="syz.2.1192" path="/212/file0" dev="tmpfs" ino=1154 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 171.429147][ T36] audit: type=1400 audit(1771702132.520:2967): avc: denied { remount } for pid=3883 comm="syz.2.1192" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 171.470077][ T3895] netlink: 45349 bytes leftover after parsing attributes in process `syz.2.1196'. [ 171.488638][ T36] audit: type=1400 audit(1771702132.520:2968): avc: denied { map } for pid=3883 comm="syz.2.1192" path="socket:[27536]" dev="sockfs" ino=27536 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=0 [ 171.512003][ T3895] 0ªX¹¦Dö»: renamed from z01ªX¹¦ (while UP) [ 171.542099][ T36] audit: type=1400 audit(1771702132.520:2969): avc: denied { name_bind } for pid=3883 comm="syz.2.1192" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 171.582715][ T36] audit: type=1400 audit(1771702132.585:2970): avc: denied { read write } for pid=1820 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 171.633266][ T36] audit: type=1400 audit(1771702132.604:2971): avc: denied { create } for pid=3890 comm="syz.0.1194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 171.681200][ T36] audit: type=1400 audit(1771702132.632:2972): avc: denied { create } for pid=3890 comm="syz.0.1194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=0 [ 171.752528][ T36] audit: type=1400 audit(1771702132.679:2973): avc: denied { read write } for pid=1820 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 175.092891][ C1] net_ratelimit: 137041 callbacks suppressed [ 175.092911][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 175.092916][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 175.093102][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 175.099190][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 175.111096][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 175.122979][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 175.134979][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 175.146809][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 175.158736][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 175.170685][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 178.079584][ T36] kauditd_printk_skb: 42 callbacks suppressed [ 178.079603][ T36] audit: type=1400 audit(1771702138.915:3016): avc: denied { read write } for pid=290 comm="syz-executor" name="loop0" dev="devtmpfs" ino=773 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 179.200552][ T36] audit: type=1400 audit(1771702138.952:3017): avc: denied { read write } for pid=3916 comm="syz.2.1205" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 180.451170][ C0] net_ratelimit: 132952 callbacks suppressed [ 180.451195][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 180.451278][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 180.457436][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 180.469350][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 180.481339][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 180.493153][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 180.505133][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 180.516973][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 180.528954][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 180.541199][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 181.405312][ T36] audit: type=1400 audit(1771702138.952:3018): avc: denied { read write } for pid=3916 comm="syz.2.1205" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 185.809461][ C1] net_ratelimit: 134198 callbacks suppressed [ 185.809484][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 185.809508][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 185.815726][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 185.827660][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 185.839561][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 185.851587][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 185.863935][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 185.875510][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 185.887543][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 185.899489][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 187.012702][ C1] sched: DL replenish lagged too much [ 187.435715][ T36] audit: type=1400 audit(1771702139.588:3019): avc: denied { name_bind } for pid=3916 comm="syz.2.1205" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=0 [ 187.612638][ T1999] raw-gadget.6 gadget.3: failed to queue disconnect event [ 191.167745][ C0] net_ratelimit: 136849 callbacks suppressed [ 191.167769][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 191.167926][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 191.174026][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 191.186000][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 191.197912][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 191.209819][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 191.221680][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 191.233528][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 191.245563][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 191.257834][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 192.506246][ T36] audit: type=1400 audit(1771702140.738:3020): avc: denied { read } for pid=3920 comm="syz.1.1206" name="loop-control" dev="devtmpfs" ino=48 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=0 [ 194.378777][ T36] audit: type=1400 audit(1771702141.823:3021): avc: denied { read write } for pid=1820 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 195.329965][ T36] audit: type=1400 audit(1771702141.823:3022): avc: denied { read write } for pid=3920 comm="syz.1.1206" name="loop7" dev="devtmpfs" ino=56 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 196.526081][ C1] net_ratelimit: 130287 callbacks suppressed [ 196.526103][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 196.526214][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 196.532583][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 196.544360][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 196.556202][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 196.568161][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 196.580129][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 196.592003][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 196.603878][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 196.615960][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 197.023243][ T36] audit: type=1400 audit(1771702141.823:3023): avc: denied { name_bind } for pid=3920 comm="syz.1.1206" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 197.276981][ T36] audit: type=1400 audit(1771702141.823:3024): avc: denied { name_bind } for pid=3920 comm="syz.1.1206" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 197.719370][ T3930] netlink: 'syz.1.1209': attribute type 27 has an invalid length. [ 198.142092][ T36] audit: type=1400 audit(1771702154.212:3025): avc: denied { execmem } for pid=3923 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 200.383703][ T36] audit: type=1400 audit(1771702156.605:3026): avc: denied { execmem } for pid=3924 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 201.884348][ C1] net_ratelimit: 126630 callbacks suppressed [ 201.884372][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 201.884386][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 201.884600][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 201.891156][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 201.902707][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 201.914563][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 201.926576][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 201.938445][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 201.950492][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 201.962333][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 202.551741][ T36] audit: type=1400 audit(1771702156.830:3027): avc: denied { execmem } for pid=3926 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 207.169091][ T36] audit: type=1400 audit(1771702156.886:3028): avc: denied { execmem } for pid=3928 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 207.242623][ C1] net_ratelimit: 131972 callbacks suppressed [ 207.242643][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 207.242644][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 207.242922][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 207.248852][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 207.260836][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 207.272660][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 207.284733][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 207.296568][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 207.308579][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 207.320847][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 210.481369][ T36] audit: type=1400 audit(1771702157.204:3029): avc: denied { create } for pid=3929 comm="syz.1.1209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 212.600919][ C1] net_ratelimit: 120788 callbacks suppressed [ 212.600941][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 212.601085][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 212.607227][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 212.619214][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 212.631161][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 212.643177][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 212.655507][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 212.667209][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 212.678967][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 212.691023][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 214.687111][ T36] audit: type=1400 audit(1771702157.213:3030): avc: denied { name_bind } for pid=3929 comm="syz.1.1209" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 217.179992][ T36] audit: type=1400 audit(1771702157.241:3031): avc: denied { create } for pid=3929 comm="syz.1.1209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 217.959208][ C0] net_ratelimit: 129137 callbacks suppressed [ 217.959231][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 217.959238][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 217.959388][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 217.965543][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 217.977810][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 217.989511][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 218.001455][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 218.013463][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 218.025294][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 218.037281][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 219.179774][ T36] audit: type=1400 audit(1771702158.026:3032): avc: denied { create } for pid=3929 comm="syz.1.1209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 219.607876][ T36] audit: type=1400 audit(1771702159.719:3033): avc: denied { write } for pid=3929 comm="syz.1.1209" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=0 [ 220.881077][ T36] audit: type=1400 audit(1771702159.719:3034): avc: denied { create } for pid=3929 comm="syz.1.1209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 221.850181][ T36] audit: type=1400 audit(1771702159.803:3035): avc: denied { execmem } for pid=3933 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 223.317492][ C1] net_ratelimit: 123882 callbacks suppressed [ 223.317514][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 223.317523][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.317746][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.324055][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 223.335800][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.347674][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.359588][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.371549][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.383540][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.395424][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 223.586920][ T36] audit: type=1400 audit(1771702159.812:3036): avc: denied { create } for pid=3934 comm="syz.2.1210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 224.378957][ T36] audit: type=1400 audit(1771702159.822:3037): avc: denied { execmem } for pid=3931 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 227.427585][ T36] audit: type=1400 audit(1771702160.186:3038): avc: denied { read write } for pid=3929 comm="syz.1.1209" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 228.675789][ C1] net_ratelimit: 129198 callbacks suppressed [ 228.675812][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 228.675945][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.682069][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.694045][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.706025][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.717902][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.729947][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 228.741764][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.754329][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 228.765810][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 229.003735][ T36] audit: type=1400 audit(1771702162.926:3039): avc: denied { execmem } for pid=3940 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 229.308192][ T36] audit: type=1400 audit(1771702168.545:3040): avc: denied { execmem } for pid=3941 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 232.365705][ T36] audit: type=1400 audit(1771702169.181:3041): avc: denied { read write } for pid=1820 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 233.821904][ T36] audit: type=1400 audit(1771702179.092:3042): avc: denied { execmem } for pid=3943 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 234.034119][ C1] net_ratelimit: 128109 callbacks suppressed [ 234.034143][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 234.034212][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 234.040810][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 234.052435][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 234.064372][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 234.076324][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 234.088128][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 234.100074][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 234.112013][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 234.124047][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 237.736188][ T36] audit: type=1400 audit(1771702179.672:3043): avc: denied { execmem } for pid=3944 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 239.392376][ C1] net_ratelimit: 129864 callbacks suppressed [ 239.392399][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 239.392400][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 239.392716][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 239.398649][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 239.410743][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 239.422634][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 239.434623][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 239.446452][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 239.458699][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 239.471053][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 239.597088][ T36] audit: type=1400 audit(1771702182.131:3044): avc: denied { execmem } for pid=3946 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 241.480056][ T36] audit: type=1400 audit(1771702182.159:3045): avc: denied { execmem } for pid=3947 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 244.750654][ C1] net_ratelimit: 129448 callbacks suppressed [ 244.750677][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 244.750678][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 244.750899][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 244.756881][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 244.768919][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 244.781336][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 244.792819][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 244.804738][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 244.816678][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 244.828545][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 249.918953][ T36] audit: type=1400 audit(1771702198.147:3046): avc: denied { execmem } for pid=3948 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 250.108931][ C0] net_ratelimit: 131916 callbacks suppressed [ 250.108952][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.108958][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.109123][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 250.115185][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.127570][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 250.139143][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.151141][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.163092][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.175052][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.187097][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.993730][ T36] audit: type=1400 audit(1771702207.086:3047): avc: denied { execmem } for pid=3949 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 255.467249][ C0] net_ratelimit: 127251 callbacks suppressed [ 255.467271][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.467542][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 255.473529][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.485539][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.497619][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.509453][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.521341][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.533200][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 255.545398][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.557826][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 256.281725][ T3930] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.288980][ T3930] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.588157][ T36] audit: type=1400 audit(1771702212.322:3048): avc: denied { execmem } for pid=3951 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 259.987567][ T36] audit: type=1400 audit(1771702215.501:3049): avc: denied { execmem } for pid=3952 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 260.825526][ C0] net_ratelimit: 126312 callbacks suppressed [ 260.825547][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 260.826035][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 260.831922][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 260.846920][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 260.855769][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 260.867684][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 260.879595][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 260.891561][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 260.903433][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 260.915981][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 261.549484][ T36] audit: type=1400 audit(1771702216.959:3050): avc: denied { execmem } for pid=3953 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 266.183800][ C1] net_ratelimit: 126625 callbacks suppressed [ 266.183822][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 266.183829][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.184071][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.190445][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 266.202146][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.213970][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.226003][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.237841][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.249792][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.261614][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 268.366733][ T3930] veth1: left promiscuous mode [ 268.892923][ T36] audit: type=1400 audit(1771702223.654:3051): avc: denied { execmem } for pid=3954 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 270.471471][ T36] audit: type=1400 audit(1771702225.300:3052): avc: denied { execmem } for pid=3955 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 271.542121][ C0] net_ratelimit: 126276 callbacks suppressed [ 271.542141][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.543346][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.548387][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.560337][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.572308][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.584231][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 271.596236][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.608626][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 271.620150][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.632037][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.793972][ T36] audit: type=1400 audit(1771702226.506:3053): avc: denied { execmem } for pid=3956 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 275.224306][ T36] audit: type=1400 audit(1771702229.750:3054): avc: denied { execmem } for pid=3957 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 275.496805][ T36] audit: type=1400 audit(1771702230.003:3055): avc: denied { execmem } for pid=3958 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 276.334601][ T36] audit: type=1400 audit(1771702230.751:3056): avc: denied { execmem } for pid=3959 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 276.900441][ C0] net_ratelimit: 132430 callbacks suppressed [ 276.900462][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.900574][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 276.906753][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.918712][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.930672][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.942526][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.954540][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.966336][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 276.978424][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.990713][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 278.135482][ T36] audit: type=1400 audit(1771702230.760:3057): avc: denied { execmem } for pid=3960 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 278.259499][ T36] audit: type=1400 audit(1771702231.312:3058): avc: denied { execmem } for pid=3961 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 278.312731][ T36] audit: type=1400 audit(1771702231.695:3059): avc: denied { execmem } for pid=3962 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 279.406411][ T36] audit: type=1400 audit(1771702233.659:3060): avc: denied { execmem } for pid=3963 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 282.258680][ C1] net_ratelimit: 126421 callbacks suppressed [ 282.258701][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.258809][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.264900][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.276849][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.288778][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 282.300838][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.313039][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 282.324686][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.336645][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.348606][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 283.692536][ T36] audit: type=1400 audit(1771702237.660:3061): avc: denied { execmem } for pid=3964 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 285.425914][ T36] audit: type=1400 audit(1771702239.278:3062): avc: denied { execmem } for pid=3965 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 287.616965][ C0] net_ratelimit: 130790 callbacks suppressed [ 287.616986][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.616999][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.617171][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 287.623232][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.638136][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 287.647232][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.659209][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.671154][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.683081][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.695033][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.845944][ T36] audit: type=1400 audit(1771702246.216:3063): avc: denied { execmem } for pid=3966 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 292.975265][ C0] net_ratelimit: 133365 callbacks suppressed [ 292.975285][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.975317][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.981644][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.993579][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 293.005539][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 293.017423][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 293.029459][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 293.041822][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 293.053276][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 293.065240][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.333542][ C0] net_ratelimit: 131573 callbacks suppressed [ 298.333562][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.333583][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.339844][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.351770][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.363733][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.375836][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 298.387655][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.399486][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.411503][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.423387][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.553915][ T36] audit: type=1400 audit(1771702251.564:3064): avc: denied { execmem } for pid=3967 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 303.691851][ C0] net_ratelimit: 139254 callbacks suppressed [ 303.691872][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.691909][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.698150][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.710105][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.722066][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.734020][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 303.746170][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.758349][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.770148][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.782015][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 305.031706][ T36] audit: type=1400 audit(1771702257.567:3065): avc: denied { execmem } for pid=3968 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 305.968904][ T36] audit: type=1400 audit(1771702257.585:3066): avc: denied { execmem } for pid=3969 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 306.688485][ T36] audit: type=1400 audit(1771702258.464:3067): avc: denied { execmem } for pid=3970 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 307.137191][ T36] audit: type=1400 audit(1771702258.810:3068): avc: denied { execmem } for pid=3971 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 309.050111][ C0] net_ratelimit: 137597 callbacks suppressed [ 309.050150][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.050525][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 309.056415][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.068567][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.080552][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.092441][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.104295][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.116138][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 309.128219][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.140141][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 309.908868][ T36] audit: type=1400 audit(1771702259.624:3069): avc: denied { execmem } for pid=3972 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 310.495631][ T36] audit: type=1400 audit(1771702262.690:3070): avc: denied { execmem } for pid=3973 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 314.408413][ C0] net_ratelimit: 144116 callbacks suppressed [ 314.408434][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.408468][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.414671][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.426636][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 314.438643][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.450613][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 314.462620][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.474904][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.486627][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.498532][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.043984][ T36] audit: type=1400 audit(1771702268.843:3071): avc: denied { execmem } for pid=3974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 318.784494][ T36] audit: type=1400 audit(1771702270.432:3072): avc: denied { execmem } for pid=3976 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 319.724661][ T36] audit: type=1400 audit(1771702270.441:3073): avc: denied { execmem } for pid=3975 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 319.766728][ C1] net_ratelimit: 137791 callbacks suppressed [ 319.766748][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 319.766767][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.773030][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.784913][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.796900][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.808817][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.821000][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 319.832815][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.844689][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 319.856749][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 324.552861][ T36] audit: type=1400 audit(1771702275.874:3074): avc: denied { execmem } for pid=3977 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 325.124980][ C0] net_ratelimit: 143588 callbacks suppressed [ 325.125000][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 325.125025][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 325.131297][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 325.143242][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 325.155141][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 325.167253][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 325.179055][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 325.190952][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 325.202962][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 325.214804][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 325.351852][ T37] INFO: task kworker/u8:4:330 blocked for more than 123 seconds. [ 325.372273][ T37] Not tainted syzkaller #0 [ 325.377265][ T37] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 325.398035][ T37] task:kworker/u8:4 state:D stack:0 pid:330 tgid:330 ppid:2 flags:0x00004000 [ 325.408273][ T37] Workqueue: netns cleanup_net [ 325.413095][ T37] Call Trace: [ 325.416411][ T37] [ 325.419358][ T37] __schedule+0x134f/0x1ea0 [ 325.423882][ T37] ? __sched_text_start+0x10/0x10 [ 325.428943][ T37] ? rcu_segcblist_entrain+0x69/0x2b0 [ 325.434339][ T37] ? _raw_spin_unlock+0x45/0x60 [ 325.439215][ T37] ? kthread_data+0x54/0xc0 [ 325.443756][ T37] ? wq_worker_sleeping+0x69/0x260 [ 325.448918][ T37] schedule+0xc5/0x240 [ 325.453016][ T37] schedule_timeout+0xc7/0x3b0 [ 325.457834][ T37] ? __cfi_schedule_timeout+0x10/0x10 [ 325.463256][ T37] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 325.468845][ T37] ? rcu_barrier_handler+0x9b/0xe0 [ 325.473986][ T37] ? generic_exec_single+0x206/0x500 [ 325.479318][ T37] wait_for_common+0x369/0x650 [ 325.484112][ T37] ? wait_for_completion+0x40/0x40 [ 325.489257][ T37] ? _raw_spin_lock_irqsave+0xc1/0x160 [ 325.494755][ T37] ? __kasan_check_write+0x18/0x20 [ 325.499912][ T37] wait_for_completion+0x1c/0x40 [ 325.504870][ T37] rcu_barrier+0x415/0x540 [ 325.509313][ T37] netdev_run_todo+0x118/0xce0 [ 325.514143][ T37] ? __kasan_check_read+0x15/0x20 [ 325.519208][ T37] ? __cfi_netdev_run_todo+0x10/0x10 [ 325.524526][ T37] ? unregister_netdevice_queue+0x1b4/0x390 [ 325.530446][ T37] rtnl_unlock+0x12/0x20 [ 325.534758][ T37] default_device_exit_batch+0x82d/0x8c0 [ 325.540429][ T37] ? __cfi_netdev_run_todo+0x10/0x10 [ 325.545768][ T37] ? mutex_lock+0x97/0x1d0 [ 325.550234][ T37] ? __cfi_mutex_lock+0x10/0x10 [ 325.555155][ T37] ? __cfi_default_device_exit_batch+0x10/0x10 [ 325.561358][ T37] ? rtnl_unlock+0x12/0x20 [ 325.565833][ T37] ? __cfi_default_device_exit_batch+0x10/0x10 [ 325.572020][ T37] cleanup_net+0x747/0xc90 [ 325.576467][ T37] ? __cfi_cleanup_net+0x10/0x10 [ 325.581421][ T37] ? __schedule+0x1357/0x1ea0 [ 325.586154][ T37] ? kick_pool+0xb9/0x550 [ 325.590512][ T37] process_scheduled_works+0x7d4/0x1020 [ 325.596113][ T37] worker_thread+0xc70/0x10b0 [ 325.600828][ T37] ? __cfi_try_to_wake_up+0x10/0x10 [ 325.606064][ T37] kthread+0x2c9/0x370 [ 325.610178][ T37] ? __cfi_worker_thread+0x10/0x10 [ 325.615352][ T37] ? __cfi_kthread+0x10/0x10 [ 325.619977][ T37] ret_from_fork+0x67/0xa0 [ 325.624416][ T37] ? __cfi_kthread+0x10/0x10 [ 325.629034][ T37] ret_from_fork_asm+0x1a/0x30 [ 325.633835][ T37] [ 326.622834][ T37] NMI backtrace for cpu 1 [ 326.622855][ T37] CPU: 1 UID: 0 PID: 37 Comm: khungtaskd Not tainted syzkaller #0 e74179280c147a83e3a201a5967fe5af4e04851c [ 326.622881][ T37] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 326.622895][ T37] Call Trace: [ 326.622903][ T37] [ 326.622912][ T37] __dump_stack+0x21/0x30 [ 326.622942][ T37] dump_stack_lvl+0x140/0x1c0 [ 326.622967][ T37] ? __cfi_dump_stack_lvl+0x10/0x10 [ 326.623004][ T37] dump_stack+0x19/0x20 [ 326.623026][ T37] nmi_cpu_backtrace+0x2ba/0x2d0 [ 326.623054][ T37] ? rcu_read_unlock_special+0xb7/0x420 [ 326.623078][ T37] ? __cfi_nmi_cpu_backtrace+0x10/0x10 [ 326.623106][ T37] ? sched_show_task+0x371/0x530 [ 326.623128][ T37] ? __rcu_read_unlock+0xc0/0xc0 [ 326.623150][ T37] ? __cfi_nmi_raise_cpu_backtrace+0x10/0x10 [ 326.623173][ T37] ? __cfi_nmi_raise_cpu_backtrace+0x10/0x10 [ 326.623195][ T37] nmi_trigger_cpumask_backtrace+0x142/0x2c0 [ 326.623241][ T37] arch_trigger_cpumask_backtrace+0x14/0x20 [ 326.623265][ T37] watchdog+0xdad/0xf00 [ 326.623299][ T37] ? __kasan_check_write+0x18/0x20 [ 326.623339][ T37] ? __cfi_watchdog+0x10/0x10 [ 326.623364][ T37] ? __kasan_check_read+0x15/0x20 [ 326.623385][ T37] ? __kthread_parkme+0x137/0x180 [ 326.623411][ T37] ? schedule+0xc5/0x240 [ 326.623430][ T37] kthread+0x2c9/0x370 [ 326.623447][ T37] ? __cfi_watchdog+0x10/0x10 [ 326.623473][ T37] ? __cfi_kthread+0x10/0x10 [ 326.623490][ T37] ret_from_fork+0x67/0xa0 [ 326.623514][ T37] ? __cfi_kthread+0x10/0x10 [ 326.623531][ T37] ret_from_fork_asm+0x1a/0x30 [ 326.623559][ T37] [ 326.623567][ T37] Sending NMI from CPU 1 to CPUs 0: [ 326.821542][ C0] NMI backtrace for cpu 0 [ 326.821559][ C0] CPU: 0 UID: 0 PID: 3978 Comm: syz-executor Not tainted syzkaller #0 e74179280c147a83e3a201a5967fe5af4e04851c [ 326.821577][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 326.821586][ C0] RIP: 0010:qlist_free_all+0x8b/0x130 [ 326.821611][ C0] Code: 48 8b 4c 18 08 f6 c1 01 75 55 48 01 d8 0f b6 48 33 c1 e1 18 81 f9 00 00 00 f5 b9 00 00 00 00 48 0f 45 c1 4c 8b 60 08 4d 8b 2f <49> 63 84 24 ec 00 00 00 49 29 c7 4c 89 e7 4c 89 fe e8 8f e5 ff ff [ 326.821623][ C0] RSP: 0018:ffffc900109071f8 EFLAGS: 00000246 [ 326.821637][ C0] RAX: ffffea0006377800 RBX: ffffea0000000000 RCX: 0000000000000000 [ 326.821648][ C0] RDX: 00000000000c0001 RSI: 0000000000000a06 RDI: ffff888104e56800 [ 326.821658][ C0] RBP: ffffc90010907228 R08: ffff88818dddf140 R09: 00000000000c0000 [ 326.821668][ C0] R10: ffff88818dddf640 R11: fffff52002120e18 R12: ffff888104e55780 [ 326.821678][ C0] R13: ffff88818dde0780 R14: 0000000000000000 R15: ffff88818dde03c0 [ 326.821688][ C0] FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 326.821700][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 326.821709][ C0] CR2: 00007fb3f614a9e0 CR3: 000000018b4a8000 CR4: 00000000003526b0 [ 326.821722][ C0] DR0: 00000000e0006acd DR1: 0000000000000000 DR2: 0000000000000000 [ 326.821731][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [ 326.821740][ C0] Call Trace: [ 326.821745][ C0] [ 326.821751][ C0] kasan_quarantine_reduce+0x14f/0x180 [ 326.821770][ C0] __kasan_slab_alloc+0x28/0x90 [ 326.821789][ C0] kmem_cache_alloc_noprof+0x1bf/0x410 [ 326.821806][ C0] ? mas_alloc_nodes+0x254/0x9d0 [ 326.821825][ C0] mas_alloc_nodes+0x254/0x9d0 [ 326.821843][ C0] mas_preallocate+0x783/0xcb0 [ 326.821860][ C0] ? __cfi_mas_preallocate+0x10/0x10 [ 326.821878][ C0] vma_shrink+0x2d9/0x6f0 [ 326.821895][ C0] ? __cfi_vma_shrink+0x10/0x10 [ 326.821914][ C0] relocate_vma_down+0x478/0x530 [ 326.821933][ C0] ? __cfi_relocate_vma_down+0x10/0x10 [ 326.821951][ C0] ? __cfi_chacha_block_generic+0x10/0x10 [ 326.821967][ C0] ? __asan_memset+0x39/0x50 [ 326.821984][ C0] ? tlb_finish_mmu+0x178/0x1d0 [ 326.822004][ C0] setup_arg_pages+0x725/0xcf0 [ 326.822020][ C0] ? __cfi_setup_arg_pages+0x10/0x10 [ 326.822033][ C0] ? get_random_u64+0x2f5/0x4a0 [ 326.822051][ C0] ? __kasan_check_write+0x18/0x20 [ 326.822067][ C0] ? mutex_unlock+0x90/0x240 [ 326.822084][ C0] ? __kasan_check_read+0x15/0x20 [ 326.822099][ C0] load_elf_binary+0xa06/0x2b80 [ 326.822120][ C0] ? __cfi___kernel_read+0x10/0x10 [ 326.822138][ C0] ? __kasan_check_write+0x18/0x20 [ 326.822153][ C0] ? _raw_read_unlock+0x16/0x40 [ 326.822165][ C0] ? __cfi_load_elf_binary+0x10/0x10 [ 326.822184][ C0] ? bpf_lsm_file_permission+0xd/0x20 [ 326.822198][ C0] bprm_execve+0x6f9/0x1390 [ 326.822214][ C0] ? alloc_bprm+0xb30/0xb30 [ 326.822228][ C0] do_execveat_common+0x928/0xa80 [ 326.822244][ C0] __x64_sys_execve+0x96/0xb0 [ 326.822263][ C0] x64_sys_call+0x12c4/0x2ee0 [ 326.822282][ C0] do_syscall_64+0x57/0xf0 [ 326.822294][ C0] ? clear_bhb_loop+0x50/0xa0 [ 326.822307][ C0] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 326.822328][ C0] RIP: 0033:0x7f47847c5197 [ 326.822347][ C0] Code: Unable to access opcode bytes at 0x7f47847c516d. [ 326.822355][ C0] RSP: 002b:00007f4785600de8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b [ 326.822368][ C0] RAX: ffffffffffffffda RBX: 00007ffdb604fef3 RCX: 00007f47847c5197 [ 326.822379][ C0] RDX: 00007ffdb604df90 RSI: 00007ffdb604e1d0 RDI: 00007ffdb604fef3 [ 326.822389][ C0] RBP: 00007f4785600e60 R08: 00007ffdb604dd60 R09: 0000000000000000 [ 326.822399][ C0] R10: 0000000000000008 R11: 0000000000000202 R12: 00007ffdb604e1d0 [ 326.822408][ C0] R13: 00007ffdb604df90 R14: 0000000000000000 R15: 0000000000000000 [ 326.822419][ C0] [ 327.949671][ T36] audit: type=1400 audit(1771702279.053:3075): avc: denied { write } for pid=283 comm="syz-executor" path="pipe:[2824]" dev="pipefs" ino=2824 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 328.271601][ T36] audit: type=1400 audit(1771702279.072:3076): avc: denied { write } for pid=283 comm="syz-executor" path="pipe:[2824]" dev="pipefs" ino=2824 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 328.434381][ T36] audit: type=1400 audit(1771702279.072:3077): avc: denied { write } for pid=283 comm="syz-executor" path="pipe:[2824]" dev="pipefs" ino=2824 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 328.645706][ T36] audit: type=1400 audit(1771702279.296:3078): avc: denied { execmem } for pid=3978 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 330.483282][ C0] net_ratelimit: 129433 callbacks suppressed [ 330.483302][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.483325][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.489535][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.501413][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 330.513489][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.525443][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 330.537426][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.549263][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:56:0a:24:39:4a:78, vlan:0) [ 330.561314][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.573393][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)