last executing test programs: 3m11.278125617s ago: executing program 1 (id=1297): mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x81c0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x81c0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x1, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1, 0x0) r2 = landlock_create_ruleset(&(0x7f0000000140)={0x4000}, 0x18, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r2, 0x1, &(0x7f0000000180)={0x4000, r1}, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) landlock_restrict_self(r2, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x1, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x1, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x1) ftruncate(r3, 0x1) truncate(&(0x7f0000000280)='./file1\x00', 0x1) ftruncate(r0, 0x1) ftruncate(r1, 0x1) ftruncate(r4, 0x1) 3m10.847374049s ago: executing program 1 (id=1299): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_tcp(0x2, 0x1, 0x0) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket$rxrpc(0x21, 0x2, 0xa) r4 = syz_io_uring_setup(0x10d, &(0x7f0000000140)={0x0, 0x7495, 0x0, 0x2, 0x1f7}, &(0x7f0000000340)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r5, r6, &(0x7f00000002c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f00000000c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @private=0xa010102}}, 0x0, 0x0, 0x1}) io_uring_enter(r4, 0x3516, 0x0, 0x0, 0x0, 0x0) 3m9.699859243s ago: executing program 1 (id=1301): r0 = syz_usb_connect(0x2, 0x2d7, &(0x7f0000000600)={{0x12, 0x1, 0x0, 0xed, 0x5, 0x32, 0x8, 0x45e, 0x44f, 0x167e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x2c5, 0x1, 0x0, 0x0, 0x6c80b7b86fb437ab, 0x0, [{{0x9, 0x4, 0xd9, 0x0, 0x7, 0xc9, 0xc4, 0xec, 0x0, [@cdc_ecm={{0x8, 0x24, 0x6, 0x0, 0x0, "8008cb"}, {0x5, 0x24, 0x0, 0x8}, {0xd, 0x24, 0xf, 0x1, 0xffff89eb, 0x1000, 0x5, 0x93}, [@network_terminal={0x7, 0x24, 0xa, 0x4, 0x3, 0x7, 0x8}, @mdlm_detail={0x66, 0x24, 0x13, 0x0, "abe96c02659d5a0d6d91d149ef06c4f9f0ab500bbe3952dd174849371caa90caeb2f38113aee854faff4f552e9b660da7041903f5fcbcb47c687361beb954f6aa2dc6848567691b80c23c6e1d64927c7fc64bdfe0ec574d575728ed5b5a98cb8ef08"}]}], [{{0x9, 0x5, 0x0, 0x4, 0x400, 0x9, 0x9, 0x7f, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0x81, 0x8}]}}, {{0x9, 0x5, 0xd, 0x1, 0x200, 0x2, 0xb2, 0x0, [@generic={0x14, 0x24, "d00ed3fded6e30100bfbcb6b09e1f4bc0b24"}]}}, {{0x9, 0x5, 0x6, 0x0, 0x200, 0xc, 0xfc, 0xa}}, {{0x9, 0x5, 0x1, 0x2, 0x20, 0x2, 0x2, 0xf7, [@generic={0xca, 0x8, "4343a75c10b29b604f73b6f9d6e295090102d0f1e55b3b05277d7fa12ef119cf19843ddc34bcb0d6e5cbfcd0eaad991953a6007df8a68892db99e55350ed360a8411f1f606567bee3f6778a40d0b22fee05d80958758b9783bb2bfb351638ca36c5b946879191968e5baf0626a5d50f37acf67929b360cb17e7b1773e7a9dad4a93aba4767038ba9835beeb2948899d7277832cac4eaadbd923be6a61a98d146206fce24acbe09c6ddd3ac6fd6f4cd94e74a7dfd16da4f1d54b6a740aaac3cf9ac9c1723b407cfbe"}, @generic={0x22, 0x5, "465ee8f0e47a1f258e92646b63c5a9b3c28c6e9e08dc0ad76dbdbf08c93c9221"}]}}, {{0x9, 0x5, 0xa, 0x0, 0x400, 0x4, 0x5, 0x1, [@generic={0xdf, 0x22, "a42ead2fff534921e39279b09f3f3b1eab5ec580754031745b3a938141558e5c60c4a63cdfbcd4b127fbb6d289c07138f76f46259b7cc80f138ea8a671fe98fd423836e71172c92115613fdf8cde9d302d0714d87bdae4e46b42ee0560d927ccb807bc7f5bc6c5de15cdf3992f62cb57c0aed00b254a57be29fa429375bfd6872ed2fe4c6752e68d21f7605728285aa4da69dd693742a11c2ebcce6bd0b7c9db5f1dd06248f2389b8fdf5ff9d8147ab2d6c240ecd9b6ae3c77c1f4045b9fd75d810cb2ee18a7e5c2fa9f3f1b75bd5a5fb1cbe5240e1622b34fe8dd3af0"}, @uac_iso={0x7, 0x25, 0x1, 0x1, 0x2, 0x313}]}}, {{0x9, 0x5, 0x6, 0x3, 0x10, 0x7, 0x4e}}, {{0x9, 0x5, 0xf, 0x0, 0x10, 0x5, 0x7f, 0x2}}]}}]}}]}}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYRES16=r0], 0x128}, 0x40000) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x1000007) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000280)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x2010, 0xffffffffffffffff, 0xffffc000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10) gettid() mq_open(&(0x7f0000000b40)='eth0\x00\xdd\xad4=2k\xf1\x05\x9b\x91y\xe1;F\xa2\x8df\xe9\x04\x00\x00\x00\x00\x0078z=\x8f\xd5F\xa4AR\xc7\x9f.\xdc\xdb\"A\x16\xd8\x19\xf1lZ\xc8\x93\xda\xf2\xc9\xe8h[u8\xc6\xfa\x9ep\xbe\a\xe2\xf5\xa3Y\x9f\xe1\x04gM\x99K$\r\xf1G\xee\xe1\xbd\x1e\xdf\xe1\x9c\x19\xda\xd3\x94EL\xca\x88\x85Q\x02\xd9L\x90\xeb%/\xb1\xeb\x11uP7\x1f\xd9b\xebF\xf8\x88\xf0\xac.\x94\xfc\v\xb1W\xef~+n\xb1\x9b\x02n]xr\xb3\x80\xbc>\xe8XX\xe6\x12\xf3\xc9\xd5\xf8\xd1\x8d\xcb9\xbf\xb0(<\xeb\x92\x8a\x16\xb7\x11^\xb6\xb7n\xd5\xb5\x00[\xdf\x94\x00\r\x95\x17\xa1h\xf8\x00\x00\x00\"\xa0\x05\xcc^\x90c\xc9}\xb8\ny\xf4\xe1\xb4.\xa4\a\x05\xbb}\x91\xf4C\xf5O\xf1a\x12\b\x86\xa16\xbb}C\xc9\x1d\\\xedD\x14\xb1w\x1e\xa0\xc1E\xb5\xf8\xab\xfb\xd9\x93\xb8vJ\x85p\xb5n\x1b\xe4\xd5g\xae\xe4\xeb\xca\xae\x1bs\xd4\xf0\xc0\xdag\x19R4\xd4\xd4\x04\xfc\x04Zb\xf6\xba\xf8B\xf6YU\xcd\xf2\xdb\xb5\xa2\xda\xdf\x8dD\xef`\x13\x15$\xceq\xd7j\xd7\xe3V\xf2\xa2\x95\xcf\x18T\xf1\xb0\xf3\xf8O', 0x1, 0x0, 0x0) mq_unlink(&(0x7f0000000340)='eth0\x00') socket$inet_udp(0x2, 0x2, 0x0) connect(r1, &(0x7f0000000080)=@un=@abs, 0x80) 3m4.968964393s ago: executing program 1 (id=1318): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) syz_init_net_socket$ax25(0x3, 0x2, 0x7) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, 0x0, 0x0, 0x100000, 0x0) r3 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r3, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x262) 3m3.600441725s ago: executing program 1 (id=1321): openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000003980)={0x2020, 0x0, 0x0}, 0x2020) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x7) r2 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r2, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000000)=0x80, 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180)=0x800, 0x4) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000180)="5c00000013006bcd9e3fe3dc4e48aa31086b8703410000004000000000000000040014000d000a00100000009ee517d34460bc08eab556a705251e6182949a3651f60a84c9", 0x45}], 0x1, 0x0, 0x0, 0x1f000801}, 0x0) connect$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) sendmmsg$sock(r3, &(0x7f0000000780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000500)=[{0x0}], 0x1}}], 0x2, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000240)={0x78, 0x0, r1, {0x2000000007, 0x0, 0x0, {0x0, 0x0, 0x55, 0x0, 0x0, 0xfffffffffffffffc, 0x2, 0x0, 0x1ff, 0xa000}}}, 0x78) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 3m2.906378824s ago: executing program 1 (id=1323): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='debugfs\x00', 0x200000, 0x0) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000340)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@xino_on}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) chdir(&(0x7f00000003c0)='./bus\x00') r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r1, &(0x7f0000001fc0)=""/184, 0x20002078) 3m2.772293434s ago: executing program 32 (id=1323): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='debugfs\x00', 0x200000, 0x0) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000340)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@xino_on}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) chdir(&(0x7f00000003c0)='./bus\x00') r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r1, &(0x7f0000001fc0)=""/184, 0x20002078) 4.139913753s ago: executing program 4 (id=2338): r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5", 0x4) r6 = accept4(r5, 0x0, 0x0, 0x80800) sendmmsg$alg(r6, &(0x7f0000000880)=[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22040085}], 0x1, 0x0) recvmsg(r6, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/81, 0x51}], 0x1}, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000001, 0x2052, r0, 0x4b000) syz_clone(0x2c9a4080, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) 3.379347193s ago: executing program 0 (id=2341): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f00000002c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x20, 0x2, 0x3, 0x801, 0x0, 0x0, {0x0, 0x0, 0x1}, [@NFQA_CFG_PARAMS={0x9, 0x2, {0x7, 0x1}}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x400c000) socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x10) r3 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r3, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000000)=0x80, 0x4) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r4, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x401}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) r5 = fsopen(&(0x7f0000000400)='autofs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r5, 0x1, &(0x7f0000001800)='\xd0\x9e^\xa0\xee\xc8\x17T\xe2Q1\xb0\x8f\xe1\xa8\x95\xa0\xcd\fL\xf10x0}) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSIGACCEPT(r8, 0x5607, 0x3) ioctl$VT_ACTIVATE(r8, 0x5606, 0x4) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000840)={0x58, r6, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [{{0x8, 0x1, r7}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffffff9}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x24004000}, 0x24040840) 3.156854258s ago: executing program 3 (id=2344): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="3c000000130001000000000000000000070000", @ANYRES32=r1, @ANYBLOB="00000000000000001c001a8018000580140001800800020000"], 0x3c}}, 0x20000000) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha1\x00'}, 0x58) bpf$MAP_CREATE(0x0, 0x0, 0x48) r4 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r4, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r5 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r5, &(0x7f0000019680)=""/102392, 0x18ff8) socket$nl_route(0x10, 0x3, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c40)={0x8, 0x3, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000001200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r7, 0x6, 0x0, 0x0, 0x0) r8 = fsmount(r7, 0x0, 0x0) r9 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000003c0)={r6, r8}, 0x10) bpf$ITER_CREATE(0x22, &(0x7f0000000040)={r9}, 0x8) 3.140480269s ago: executing program 4 (id=2345): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) syz_clone(0x20366080, 0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) r0 = mq_open(&(0x7f00000000c0)=',):\x00', 0x40, 0xf4, 0x0) lseek(r0, 0x401, 0x4) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = creat(&(0x7f0000000400)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) dup3(r3, r2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=@security={'security\x00', 0xe, 0x4, 0x3d8, 0xffffffff, 0x258, 0x258, 0x198, 0xffffffff, 0xffffffff, 0x340, 0x340, 0x340, 0xffffffff, 0x4, &(0x7f0000000200), {[{{@uncond, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x5, 'system_u:object_r:lirc_device_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@ttl={{0x28}, {0x3, 0x4}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xd}}}, {{@ip={@broadcast, @dev={0xac, 0x14, 0x14, 0x12}, 0xffffffff, 0xff, 'team0\x00', 'sit0\x00', {0xff}, {0xff}, 0x8, 0x3, 0x11}, 0x0, 0xb0, 0xe8, 0x0, {}, [@common=@set={{0x40}, {{0x2, [0x4, 0x3, 0x0, 0x1, 0x4, 0x4], 0x4, 0x2}}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x2, 0x5, 0x4}, {0x0, 0x1, 0x4}, {0x0, 0x4, 0x7}, 0xcf17, 0x2}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x438) ioctl$FBIOPUT_CON2FBMAP(r1, 0x4610, &(0x7f0000000040)={0x9, 0xffffffff}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = eventfd(0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = creat(&(0x7f0000000140)='./file0\x00', 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) sendmsg$nl_route(r7, 0x0, 0x20000000) ioctl$KVM_IRQFD(r5, 0x4020ae76, &(0x7f0000000000)={r6, 0x2, 0x1, r6}) r10 = syz_init_net_socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r10, 0x800442d3, 0x0) 2.948094804s ago: executing program 3 (id=2346): socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x9, 0x18, 0x8, 0x40, 0x42, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOW_IOVAS(r3, 0x3b82, 0x0) ioctl$IOMMU_IOAS_MAP(r3, 0x3b85, &(0x7f00000002c0)={0x28, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2}) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400010bce) read$msr(0xffffffffffffffff, &(0x7f0000019680)=""/102392, 0x18ff8) socket$can_raw(0x1d, 0x3, 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x10, &(0x7f0000001280), 0x4) sendmsg$inet(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000a00)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000840)="f3df20455817daeeea14d1346a5deafb93d315a6ad7f93fc1a8c9e9c8e0478fe5d3260e6453a7dc659554e00a126fc641f53e7275de9680a73b5230047d0730bbe7ecab49bfe58d962ae8f8692b0f1713b57246200bcfd1e4d921270eaa1c4c14f8cf8b36c5862caadada20a692ab577203cf0faf95c94a4d8b88a75ccb72cb4e4cd8ada787192df7546ec62e82a91c8bd9bf767d075168f041e068ed2e55072c8b51f3c71dbb66faf454569d1573930ecd39b377a5ee0c717960b1a22ab4c9f9642ed1529c010df5069ee9d6f8d458c6e1d2e3d", 0xd4}], 0x4}, 0x20000801) recvmsg(r5, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x40002002) 2.799662414s ago: executing program 5 (id=2348): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000140)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x7ff, 0xf83, 0x3}, 0x1c) syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) socket(0x25, 0x5, 0x0) syz_open_dev$dri(&(0x7f00000000c0), 0x1ff, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x7) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x143102) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/sockstat6\x00') pread64(r2, &(0x7f0000000000)=""/15, 0xf, 0x7fff) writev(r1, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) pselect6(0x40, &(0x7f0000000000)={0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x2, 0x7}, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x1be) r4 = socket$kcm(0x10, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r4, 0x8982, &(0x7f0000000400)={0x0, 'batadv0\x00', {0x5}}) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000010008188e6b62aa73f72cc9f0ba1f848140000005e140602000000000e000a000f000000028000001294", 0x2e}], 0x1}, 0x0) 2.466296824s ago: executing program 0 (id=2349): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe, @void, @value}, 0x90) syz_emit_ethernet(0x36, &(0x7f0000000000)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @random="a21428c6c085", @void, {@ipv6={0x86dd, @generic={0x1, 0x6, "bcc1d7", 0x0, 0x6c, 0xff, @loopback, @loopback}}}}, 0x0) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x380, 0x170, 0x1170, 0x1398, 0x0, 0x1170, 0x2b0, 0x1398, 0x1398, 0x2b0, 0x1398, 0x3, 0x0, {[{{@ipv6={@empty, @mcast1, [], [], 'ip6tnl0\x00', 'veth0_to_hsr\x00', {}, {}, 0x6}, 0x0, 0x108, 0x170, 0x0, {}, [@common=@inet=@ecn={{0x28}, {0x21}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz1\x00', 'syz1\x00'}}}, {{@ipv6={@empty, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, [], [], 'geneve1\x00', 'veth1_vlan\x00'}, 0x0, 0xf8, 0x140, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$NL80211_CMD_NEW_MPATH(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r4, &(0x7f0000000040)={0xa, 0x7, 0x0, @dev={0xfe, 0x80, '\x00', 0xb}, 0x8}, 0x20) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000dc0)=""/72, 0x0) r5 = accept$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r5, 0x0, 0x0, 0x200008c0) syz_emit_ethernet(0x6e, &(0x7f0000000080)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x38, 0x3a, 0x0, @local, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x7d0, {0x0, 0x6, "8cb02b", 0x0, 0x2f, 0x0, @loopback, @local, [@routing={0x1d, 0x0, 0x0, 0x7}]}}}}}}}, 0x0) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, 0xffffffffffffffff, 0x0) 2.464907324s ago: executing program 4 (id=2350): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000240)={0x3, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x6, 0x0, 0x0, 0xffffefff}, {0x6, 0x0, 0x0, 0x6}]}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000039c0)=ANY=[@ANYBLOB="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"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x7, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r1, r2}) sendmsg$rds(r3, &(0x7f0000002940)={0x0, 0x0, &(0x7f0000002800)=[{&(0x7f0000001640)=""/4099, 0x1003}], 0x1, 0x0, 0x0, 0x81}, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet6(0xa, 0x3, 0x8000000003c) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_subtree(r5, 0x0, 0x32600) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r5, 0x0) r6 = epoll_create1(0x0) epoll_wait(r6, &(0x7f0000002a80)=[{}], 0x1, 0xfffeffff) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) epoll_pwait(r6, &(0x7f0000000040), 0x0, 0xea1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r7, &(0x7f0000000080)={0x9d32f4b220c65367}) sendmsg(r4, 0x0, 0x44004) close(r3) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000280)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, @void, @value, @void, @value}, 0x50) 2.335808617s ago: executing program 5 (id=2351): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYRES16], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = syz_open_dev$dri(&(0x7f0000000080), 0x1, 0x0) openat$vmci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0xffffffffffffffff, 0x9) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000600)={'tunl0\x00', 0x0, 0x40, 0x8000, 0x5, 0x5, {{0x6, 0x4, 0x1, 0x6, 0x18, 0x68, 0x0, 0xb, 0x29, 0x0, @rand_addr=0x64010101, @multicast1, {[@timestamp_prespec={0x44, 0x4, 0xb6, 0x3, 0x4}]}}}}}) syz_open_dev$usbfs(&(0x7f0000000000), 0x204, 0x2) keyctl$KEYCTL_WATCH_KEY(0x1d, 0x0, 0xffffffffffffffff, 0xfffffffdffffffff) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000000)={0x3, 0x2}) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r1, 0xc01064bd, &(0x7f00000004c0)={&(0x7f00000000c0)='q', 0x1, 0x0}) ioctl$DRM_IOCTL_MODE_ATOMIC(r1, 0xc03864bc, &(0x7f0000000600)={0x100, 0x1, &(0x7f0000000140)=[r3], 0x0, 0x0, 0x0, 0x0, 0x1}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000540)={0x6, 0x8, {0xffffffffffffffff}, {0xee01}, 0x9, 0x4}) r5 = syz_open_procfs(r4, &(0x7f0000000500)='net/rt6_stats\x00') sendmsg$IPSET_CMD_CREATE(r5, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x58}, 0x1, 0x0, 0x0, 0x44}, 0x4000) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x40}) ioctl$EXT4_IOC_GETFSUUID(0xffffffffffffffff, 0x8008662c, 0x0) writev(r5, &(0x7f00000002c0)=[{&(0x7f0000000200)="0cdabfe5bd6bfe442732ccd81f8df1283c52105873692d0d5dad6db423670d035cfd7f7b2590c2d95be97d4741183d0249ff6584b2fdef733a33f410b9c6e02cf28f5ea59dd40c27944d3a3a4f2324a82b56a1", 0x53}, {&(0x7f0000000080)="5765a12c9c772aa44109d58f06f14a6848198fd79b809b8e8d34fcec6fcb4708775d9f7e6476f5fc5039225542cd334e7909c1cfb3ef662cf7e1fe", 0x3b}, {&(0x7f0000000280)="d123cd9d1f96784b761afbb765f84dd55a93ea1d4ed7985a0d9d867d90e378403d10bb26c3c035eb7f3338", 0x2b}], 0x3) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2.302572966s ago: executing program 0 (id=2352): socket$nl_route(0x10, 0x3, 0x0) r0 = syz_io_uring_setup(0x10c, &(0x7f00000000c0)={0x0, 0x6d89, 0x400, 0x40000, 0x115}, &(0x7f0000000400)=0x0, &(0x7f0000000040)=0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x4, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="1802000000000000000300000000000085000000610000009500000000000000b13c72a8e5448b672a776f927b51d189445eddb76e6d2cec55614a60b4c93ac0832753008e9af83d2856636bef5df9222a79190ceaa90fa8c579"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) syz_emit_ethernet(0x4e, &(0x7f0000000880)={@link_local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "051f20", 0x18, 0x3a, 0xff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, '\x00', @loopback}}}}}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x9) r7 = syz_open_dev$vcsn(&(0x7f0000000240), 0xb, 0x2000) read$FUSE(r7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f00000004c0)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r8, 0x0, 0x0}) io_uring_enter(r0, 0x8aa, 0x0, 0x0, 0x0, 0x0) 2.240515537s ago: executing program 5 (id=2353): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0xa4, 0x30, 0x1, 0x70bd2b, 0x0, {}, [{0x90, 0x1, [@m_ct={0x44, 0x2, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x9d, 0x11e41e7b, 0x20000000, 0x0, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x804}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000841, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty}, 0x1c) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) open(&(0x7f00000003c0)='./file0\x00', 0x10241, 0x0) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c00000002060104db406e3e0004000200000000100003006269746d61703a706f72740005000400000000000900020073797a32000000000500050000006c000500010006000000240007800800"], 0x6c}}, 0x0) r5 = add_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) setreuid(0xffffffffffffffff, 0xee00) keyctl$setperm(0x5, r5, 0x220c) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0xfffffe00, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x52ba, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000400), &(0x7f0000000440)={'fscrypt:', @desc3}, &(0x7f0000000480)={0x0, "6035ae1e0fe721441705322225930e6c1e3e2a51a92fd796bc34d7cf6e0236805b4377f7ab1a9b01c103a4c6a7ef54e6763fd7264c39ea00c508ba6062696138"}, 0x48, 0xfffffffffffffffe) 2.16807791s ago: executing program 0 (id=2354): r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/74, 0x328000, 0x1000, 0x0, 0x2}, 0x20) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000001) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000001c0)="39000000140081ae0000dc676f97daf01e2357f9ffffffffffffff0521018701546fabca1b4e8a06a6580e88370200c54c1960b89c40ebb373", 0x39}], 0x1}, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0xffffffff}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x7fa960bffff5, 0x10, r3, 0x0) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000001980)=0x100, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f0000000580)={'batadv_slave_0\x00'}) socket$inet6_sctp(0xa, 0x801, 0x84) syz_open_procfs(0x0, &(0x7f0000000300)='net/softnet_stat\x00') fchdir(r4) getpid() r5 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000105509147200ed0000000109022400010000000009040000030300000009210000000122050009058103"], 0x0) syz_usb_control_io(r5, 0x0, 0x0) r6 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000001400010000000000000000c903000080080002"], 0x1c}], 0x1, 0x0, 0x0, 0x100}, 0x0) 2.167035039s ago: executing program 2 (id=2355): prlimit64(0x0, 0xe, &(0x7f0000000080)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000480)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) socket$inet_sctp(0x2, 0x5, 0x84) socket$inet_smc(0x2b, 0x1, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = syz_open_dev$video(&(0x7f0000000080), 0x3, 0x80) ioctl$VIDIOC_QUERYCTRL(r4, 0xc0445624, &(0x7f00000000c0)={0x8000004, 0x101, "679c2e845e3ede57000000000000000000000000000000004000", 0x8, 0x0, 0x0, 0x1, 0x8}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000ffffffff00000000000000"], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x1, 0x40, 0x40, 0x41, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, 0x0, &(0x7f0000000080), 0x800, r5}, 0x38) ioctl$SNDCTL_DSP_CHANNELS(0xffffffffffffffff, 0xc0045006, 0x0) read$dsp(0xffffffffffffffff, &(0x7f00000002c0)=""/59, 0x17d) 2.054866838s ago: executing program 5 (id=2356): socket$packet(0x11, 0x3, 0x300) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000300)=@isofs={0x14, 0x1, {0xfffffff0, 0xea19, 0x755, 0x1, 0xb8, 0xffffffff}}, 0x101000) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r4, 0xc004743e, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r5 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000080)={[{0x2b, 'cpuset'}]}, 0x8) 1.799911979s ago: executing program 3 (id=2357): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff017f000e0800395032303030"], 0x15) r3 = dup(r2) write$FUSE_BMAP(r3, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="b0"], 0xb0) write$FUSE_GETXATTR(r3, &(0x7f00000004c0)={0x18}, 0x18) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_INIT(r3, &(0x7f0000000200)={0x50, 0x0, 0x0, {0x7, 0x29, 0x20200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}}, 0x50) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080), 0x4000000, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB]) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, 0x0) getpid() ioctl$TCSETS(r0, 0x40045431, 0x0) r4 = syz_open_pts(r0, 0x141601) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xa) write(r4, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 1.708849482s ago: executing program 3 (id=2358): r0 = syz_open_procfs(0x0, &(0x7f0000000040)='syscall\x00') socket$inet6_sctp(0xa, 0x801, 0x84) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000a40)={0x8, 0x4000008b}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x4e23, @broadcast}, {0x2, 0x0, @remote}, {0x2, 0x4e21, @empty}, 0x107, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x2000000000, 0xfffe}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x4e24, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x4e23, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000001c0)={'sit0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newqdisc={0x34, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, r7, {0x0, 0x6}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}, @TCA_RATE={0x6}]}, 0x34}, 0x1, 0x0, 0x0, 0x48801}, 0x0) pread64(r0, &(0x7f0000000080)=""/102356, 0x18fd4, 0xc2a) 1.55531276s ago: executing program 0 (id=2359): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x50, 0x0, &(0x7f0000000040)=0x54) socket$l2tp6(0xa, 0x2, 0x73) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x1}, 0x2) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) mremap(&(0x7f000054e000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f000022c000/0x3000)=nil) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) socket$nl_xfrm(0x10, 0x3, 0x6) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(r2, 0x0) 1.475875372s ago: executing program 2 (id=2360): syz_open_procfs(0x0, 0x0) socket(0x1d, 0x2, 0x6) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000001180)=0x408000000000002) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x5, 0x0, 0x8, 0x7995}, 0x8, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x0}) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000000)='tmpfs\x00', 0x0, &(0x7f00000007c0)='usrquota') chdir(&(0x7f0000000100)='./file1\x00') r1 = open(0x0, 0x400141042, 0x766c618eb221465a) quotactl_fd$Q_SETINFO(r1, 0xffffffff80000600, 0x0, &(0x7f00000001c0)={0x1, 0xfffffffffffffffc, 0x0, 0x6}) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = io_uring_setup(0x2237, &(0x7f0000000880)={0x0, 0xfffffffc, 0x3018}) io_uring_register$IORING_REGISTER_FILES_UPDATE2(r2, 0xd, &(0x7f0000000140)={0x7, 0x0, 0x0, 0x0}, 0x20) io_uring_register$IORING_REGISTER_FILES_UPDATE2(r2, 0xe, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000000040)=[{0x0, 0xffffffff00000000}], &(0x7f0000000100), 0x7}, 0x20) io_uring_register$IORING_REGISTER_FILES_UPDATE2(r2, 0xe, &(0x7f0000000980)={0x1, 0x0, 0x0, 0x0}, 0x20) r3 = syz_io_uring_setup(0x1da3, &(0x7f00000000c0)={0x0, 0xd133, 0x10, 0x1ffffff, 0x800a0d}, &(0x7f0000000280), &(0x7f0000000080)) io_uring_register$IORING_REGISTER_PBUF_RING(r3, 0x22, 0x0, 0x1) 1.44768593s ago: executing program 4 (id=2361): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) sendto$inet6(r0, &(0x7f0000000500)="f415078807f6d8e5d630008956beb76bb69d8aae5ee308748adc607af549c702a83b4e2c6d42bac509bb61603783667f4af91eb3b9cfa4eeb06d4aa5c05e48b51e143c50256f9500866d2abb5ad49d65869cef56edd0f8d76af4035859583e756da45b432d606a72e43c202565388f843619e08fd0876e", 0x77, 0x48004, &(0x7f0000000180)={0xa, 0x4e20, 0xc, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x7}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0xa4, 0x30, 0x1, 0x0, 0x0, {}, [{0x90, 0x1, [@m_ct={0x44, 0x2, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x9d, 0x11e41e7a, 0x20000000, 0x0, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x804}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/asound/seq/clients\x00', 0x0, 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x802, 0x0) ioctl$SNAPSHOT_UNFREEZE(r4, 0x3302) ioctl$UI_DEV_CREATE(r5, 0x5501) syz_open_dev$evdev(&(0x7f0000000340), 0xaa54, 0x0) ioctl$UI_DEV_DESTROY(r5, 0x5502) lseek(r4, 0x9, 0x0) 1.034623358s ago: executing program 4 (id=2362): set_mempolicy(0x4005, &(0x7f0000000040)=0x1001, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x0, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) fsconfig$FSCONFIG_SET_STRING(0xffffffffffffffff, 0x1, &(0x7f0000000040)='fd', &(0x7f0000000200)='\xa0\x87\x06\x00\x00\x00\x00\x00\x00\x00\nx\xed\x7f\x05\t', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/73, 0x49, 0x400000000000000) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket(0x2, 0x80805, 0x0) r5 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000040)={0x84, @rand_addr=0x64010101, 0x4e20, 0x3, 'rr\x00', 0x16, 0x2, 0x6f}, 0x2c) setsockopt$IP_VS_SO_SET_ADDDEST(r4, 0x0, 0x487, &(0x7f0000000000)={{0x84, @private=0xa010101, 0x4e21, 0x3, 'lc\x00', 0x4, 0x83, 0x77}, {@rand_addr=0x64010102, 0x4e23, 0x2, 0xcd, 0x12d5f, 0x3}}, 0x44) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='sample_threshold\x00'}, 0x18) 960.131357ms ago: executing program 2 (id=2363): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x5, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x400000bce) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f0000002000)=""/102400, 0x19000) syz_open_dev$dmmidi(0x0, 0x2, 0x8901) r2 = syz_open_dev$vim2m(&(0x7f00000002c0), 0x2000000f5, 0x2) ioctl$vim2m_VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f0000000300)={0xf0f002, 0x1}) socket$inet_smc(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_open_dev$dri(&(0x7f0000000080), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r3, 0xc04064a0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000440)=[0x0], 0x0, 0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[0x0, 0x0], &(0x7f0000000540), 0x0, 0x2, 0x0, 0x0, r4}) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r3, 0xc01064ab, 0x0) mq_open(&(0x7f0000001140)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xd3\xa7\xd8J\xfd\x94#KT\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\x88N\xb8\xde\xeb)\xcd\xc56m\n\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88|0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc\x02\xea\x91\xe8\xd8\x01YZy\xe6!\x89\x9c\xd1\xa6\x167\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1[\x84\x10aF\x9b\xda\xeb\xc4*\x02q\xb2\x92\x00\x8cv\xac AN\xb9\xaa\xe0\x9d\x97Te\x81\x98L\xfe\x97+u\xd3^\xb1\xf0\xe0\x1f\xbd\a\xbb\xe5\x18\x9ds\x12ha\x00\xeb\x84\x99\xc6\x0f\xf1\xd5LD\xa87\xa0DQ\x8a2\x16!8,\xbc%$\xf1\xf2\xd6\x9cy\xecK\xda\xc5\xdc\xfa\xdd\xf6\b\xc6\xb4\x14\x16\x9c\x7f\x92\x85\xb0\xa2%:\xf0\xf4\x150\x0f\xb4\xa6d\xb4\xe4L\x19W\xd5\x90\xf7l\x1b\xfe\xde\vh\x97=m\x82.\xac\vh\xfe\x84Q}\x838/\x83\xebP\xbe\xd6+:\xceE\\\x95\xd4\xac\x92\x87\xd7\x98\x97\xe3\xec\xad\xd5\xac\x80C\x84R\x88r^g\xbaQ(\x9a>\xe2\xba\xa8=\x17\f04\x8f\x1f\xf2\x88*@v\xe7\xd1\xee\xb3\xc2\x8dT\xda\x81g\xd9\x1a:hzW6s)x\x06\xae\x11\xf2\x1e\xcd\v\xe5L\x19\x96s\xbc\x9e\xf4\x10$\r\xa4\xd8\xa2\xa2\xfcM\xc5R3~$\xc0\xa5n\x9a W\xb1e\xcc<$\xdf\x15\f]\x15\xf5#G\xce\xaf\x88U\xfa\x80\xf24\xf6\xb5\xef\xe2z\xcf\x9eN\x92\xac\x81{\xe6\xbd\xd7\x16\xe6F\xe2\x9e\x91%\x94\v\xb9\xdc\xd6\x87\x8f\xcd\xc1\xb05\x81\x81\xf8\xe9X\xe8Kt9@\xf4\xe1\xa6=\xc9\xe1:p4\nP[f\x1d\xfd\xfa\x839\x8d\x0e\xd1\xf9\xa0\xd2^E\xe5\xedo.\xaa\xf2\xb4\xcdn\x14\f\xcd\x83_yk\xda\xc5\x89\xf0Z\xea\x1d\xbd\xc00\v\xa3\xb3\xbe\xe6\x8b\x18/\xa8\xaaY\xf2\x89\x0f\x9enOOr\x00\xb2\x01\x1f:Z\xb8\xee;\xe3;\x8aPV\xce\xee\xf8[\x16\n\xe6:z\xb8\x1dvk\a{\xc1\x14\xd9+\xdb\t\x11\x90y\xe8\\\xe6\xfc\xca\xb4\xcbC\xd6\xd0\xbeC\xce\xc0L\xdb\xcd\xb3\x907c\xb4\xa6\xce\xdb[\xce\x122N\xa3\xc7Q<\x1a\xa5\xb3)\xc5\x98\x84\x8a\x82\x19\xb0\t\xac\x10\\\x8c\xbe\xcb\raIYe[\xa8\xc4\xac\x0e\xbb\x0f\b^\xdag\xe2\xa9\"\xf5h\'\xcf\xd9\x1b\xef\xe3\xe7y\x82\x1e\xca\x7f\x02 \xcf\x9e\xe0\xd9TM\xb9\n\xa9\xad3\x91\xa5\xe6!\xcd\xa2\xa4\x14\x12\xf9\xbf\xa8b\xcec:\xd7\'\f\f\x957\xc9}\r\xa6\xaa\x0f\xca\x96\xeb', 0x42, 0x1f0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000000)={'wg1\x00'}) 913.94673ms ago: executing program 5 (id=2364): openat$sndseq(0xffffffffffffff9c, 0x0, 0x22803) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x85}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) socket$inet6_mptcp(0xa, 0x1, 0x106) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file5\x00', 0x0, &(0x7f0000000940)={'U+', 0x3}, 0x16, 0x0) r3 = socket$rxrpc(0x21, 0x2, 0xa) r4 = syz_io_uring_setup(0x10d, &(0x7f0000000140)={0x0, 0x7495, 0x0, 0x2, 0x1f7}, &(0x7f0000000340)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r5, r6, &(0x7f00000002c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f00000000c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @private=0xa010102}}, 0x0, 0x0, 0x1}) io_uring_enter(r4, 0x3516, 0x0, 0x0, 0x0, 0x0) 868.328808ms ago: executing program 2 (id=2365): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='debugfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000004c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}, 0x3a}], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@euid_eq}, {@subj_role={'subj_role', 0x3d, '/dev/cpu/#/msr\x00'}}], 0x2f}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x44) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r3, 0xc0285700, &(0x7f0000000200)={0x4, "abacd211119ca94c63377526aeb5ab2c7b9ca5fa07558139ede6dc06270ee042"}) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x420, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(0xffffffffffffffff, 0xc0285700, &(0x7f0000000f40)={0x8, "b546baa5cc590d3033de259c2996817bb959ebab028deda525e19bdeffafde25"}) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 804.004695ms ago: executing program 2 (id=2366): r0 = creat(&(0x7f00000002c0)='./file0\x00', 0x60) write$binfmt_script(r0, &(0x7f0000000980)={'#! ', './file0', [{0x20, '\x00{aU<7*g\xa0W\x110\xba\'\xd8\xad\xe4\x87\x0f\xbd\x0f\x1d\xfd\xbf]8\x0e\x1d\t\x12\xa2L\xb6i\x03\r\bYK8\xc9c\x99S\xc9\xed\x8b|\xc8r\n\x80\x04!\x80j\x9f\xb6s\xed1\x96\xc5\x16\x0f|h\xa8\xc9]\xfc\x1c\x97\x1bQMP\xf8\xc7\xea\xcf\x90\xad\xbf\xc1:\x96\xa1\x8a\xb7)m\x9e\xc81\x85qL\x06\x81\xa0\x1d\xd2\xc7\xe9\xe8V\xc4\x88I\xdb\xdd\xb1\x98yC\v\x9d\x1e\xad\xcbQA\x83\xd2e\xfekH\xe2\x86\x01;+\xea,a\x94\xce\xb0hJ\xd6\xc4]\xca\xf1\x8f}|\xf5Z\x9c\xc9\x1f\xd9P'}, {0x20, 'ro\x00'}, {0x20, ':\xf8@\xa5\xd1\xf7\x89md\x1d\x92\x8b\x12\xda\xce\x17a6\xeb`\xd8\xaa\xbc\xed\xcf\xe8\xa0>\xe9I\xe4\x87\x0f8\xfc\x02\x1d\xa5\xfd\xe9\xb4\xa6F\xd8yp7\x85\x9fqj0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) listen(0xffffffffffffffff, 0x4) r4 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) open_tree(0xffffffffffffffff, 0x0, 0xc0100) add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) r5 = syz_open_dev$video4linux(&(0x7f00000000c0), 0xff, 0x101000) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r5, 0x4020565b, &(0x7f0000000040)={0x2}) socket$igmp(0x2, 0x3, 0x2) 801.93845ms ago: executing program 0 (id=2367): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="a40000000002010400000000000000000a000000180001801400018008000100f78a6823be2c51d92856677441ffffffff08000200ac14143669c90ae03662b0b7050000fc00000000000000000000000000000414000400fe8000000004000000bb3c0002800c00028005000100000000002c00018014000300fc02000000000000000000000000000014000400fe8000"/164], 0xa4}}, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000440), 0x81, 0x2a82) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="240000002000010327bd7000ffdbde2502000000000000001e000000080011004e"], 0x24}, 0x1, 0x0, 0x0, 0x240480d4}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuset.effective_cpus\x00', 0x275a, 0x0) prlimit64(0x0, 0x5, &(0x7f0000000040)={0x0, 0x4000000000008}, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x4004) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000b00)=ANY=[@ANYRESDEC=r3, @ANYRES8=0x0, @ANYBLOB="b7990dc279013cdab29214a22e3943c6164199cf41f102e0b1b0b06ba5697a7385fdb1135f7676742f03c73395c93b5e91ddb063fada9782ecd0efb577c932c1b486a45711dd6584c0cdc51d606b558a4e398ff6b6924661314814aab12a2fb9432f6809f2f707ddb88bf57da9b81caf9428b7485ab76e2812473ba125d98d2219aaa17dc6a45c506725ecd607eabb854fc0877724df705f3589862902dc2db2149f7427afb064e81a333926a28a7f15d784e0322da3ad4b2f9ee5d66e6604f0f6dcdbc03e7d9ffd06", @ANYRESOCT, @ANYRES32], 0xb8}}, 0x4000000) ioctl$LOOP_CONFIGURE(r1, 0x4c0a, &(0x7f00000005c0)={r2, 0x800, {0x2a00, 0x80010000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x1c, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd6447a4b4e00d9683dda1af1ea09de2b7fb0a0100000000000000000300", "2809e8dbe10859891d875397bab22d0000b420a9c81f40f45f819e01177d3d458dac00000000000000000000003b00", "90be8b1c5511406c7f00000000000000d500000000020100018000", [0x4, 0x40000000000000]}}) syz_open_dev$loop(&(0x7f0000000000), 0x6d04, 0x143800) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0xbeb7, 0xe45}]}) connect$unix(r4, &(0x7f0000000300)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000000000049500"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r6}, 0x10) r7 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) close_range(r7, 0xffffffffffffffff, 0x0) 715.970175ms ago: executing program 2 (id=2368): r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) fsmount(r0, 0x1, 0x5) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffff}, 0x0) r3 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) r4 = fsmount(r3, 0x0, 0x0) fchdir(r4) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) chdir(&(0x7f0000000200)='./file0\x00') openat$binderfs(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs/binder0\x00', 0x0, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r5, 0x90009427, &(0x7f0000000180)) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x101080, 0x0) read$FUSE(r6, 0x0, 0x0) r7 = open(&(0x7f0000000040)='./file1\x00', 0x80242, 0x0) write$FUSE_CREATE_OPEN(r7, &(0x7f0000000240)={0xa0, 0xfffffffffffffffe, 0x0, {{0x7, 0x1, 0x5, 0x6, 0x5, 0x1, {0x1, 0x180, 0xff, 0x5, 0x100, 0xd615, 0x5, 0x800001, 0xfffffffe, 0x8000, 0x0, 0xee00, 0x0, 0x3fe, 0x3}}, {0x0, 0x11}}}, 0xa0) sendfile(r7, r7, &(0x7f0000000080), 0x7f03) 715.473705ms ago: executing program 3 (id=2369): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, 0x0, 0xc004008) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000003c0)=0x2) readv(r4, &(0x7f00000008c0)=[{&(0x7f00000002c0)=""/156, 0x9c}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x3) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r5 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r5, &(0x7f0000019680)=""/102392, 0x18ff8) sendmsg$unix(0xffffffffffffffff, 0x0, 0x24000884) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCVHANGUP(r4, 0x5437, 0x2) close(r3) bpf$BPF_GET_PROG_INFO(0x1c, &(0x7f00000003c0)={r0, 0x0, 0x0}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000280), 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000140)={r3, r2}, 0x6) 287.136767ms ago: executing program 3 (id=2370): r0 = socket(0xa, 0x1, 0x0) fgetxattr(r0, &(0x7f00000000c0)=@known='security.apparmor\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x100000011, @private=0xa010501, 0x0, 0x0, 'none\x00'}, 0x2c) socket$inet(0x2, 0x800, 0xffffffd3) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x5) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)=0x0) sched_setaffinity(r1, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x100000000004, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x240080e4) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=ANY=[@ANYBLOB="300000001900010000000000000000001c140000fe"], 0x30}}, 0x0) socket$inet6(0xa, 0x3, 0x7) capset(0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = add_key$keyring(0x0, &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) setsockopt$MRT6_TABLE(r0, 0x29, 0xcf, 0x0, 0x0) r5 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000180)=@keyring={'key_or_keyring:', r5}) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x11, @loopback, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0xfffffffc}, 0x2c) syz_usb_control_io$uac1(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="00030700000007"]}, 0x0) 143.850308ms ago: executing program 4 (id=2371): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=@newtaction={0x68, 0x30, 0xffff, 0x70bd2b, 0x0, {0x0, 0x0, 0x1300}, [{0x54, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x45b240d7, 0x4, 0x3, 0x7fff, 0x1}, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x24008844) syz_usb_control_io$cdc_ecm(0xffffffffffffffff, &(0x7f00000015c0)={0x14, 0x0, &(0x7f0000001580)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) shutdown(0xffffffffffffffff, 0x1) socket$pppl2tp(0x18, 0x1, 0x1) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f0000000100)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r4) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFBR(r5, 0x8940, &(0x7f0000000140)=@get={0x1, &(0x7f0000000200)=""/136, 0xb}) 0s ago: executing program 5 (id=2372): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff0000", @ANYBLOB, @ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socket$inet6(0xa, 0x80002, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x6) bind$tipc(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) clock_settime(0x0, &(0x7f0000003c80)={0x77359400}) kernel console output (not intermixed with test programs): igh-speed USB device number 13 using dummy_hcd [ 420.960466][ T5922] usb 3-1: Using ep0 maxpacket: 8 [ 420.971587][ T5922] usb 3-1: config 0 has an invalid interface number: 254 but max is 0 [ 420.979773][ T5922] usb 3-1: config 0 has no interface number 0 [ 420.992270][ T5922] usb 3-1: New USB device found, idVendor=0711, idProduct=0200, bcdDevice=f1.99 [ 421.019048][ T5922] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 421.704401][ T5922] usb 3-1: config 0 descriptor?? [ 422.201981][ T5922] usb 3-1: string descriptor 0 read error: -71 [ 422.209328][ T5922] mct_u232 3-1:0.254: MCT U232 converter detected [ 422.855966][ T5922] mct_u232 ttyUSB0: expected endpoint missing [ 422.909283][ T5922] usb 3-1: USB disconnect, device number 13 [ 422.993880][ T5922] mct_u232 3-1:0.254: device disconnected [ 425.491769][ T9929] netlink: 212408 bytes leftover after parsing attributes in process `syz.0.1066'. [ 425.749904][ T9929] net_ratelimit: 10 callbacks suppressed [ 425.749936][ T9929] netlink: zone id is out of range [ 425.773094][ T9929] netlink: zone id is out of range [ 425.778304][ T9929] netlink: zone id is out of range [ 426.370649][ T9931] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1067'. [ 426.374908][ T9929] netlink: zone id is out of range [ 426.390621][ T9929] netlink: zone id is out of range [ 426.395897][ T9929] netlink: zone id is out of range [ 426.405451][ T9929] netlink: zone id is out of range [ 426.410847][ T9929] netlink: zone id is out of range [ 426.416232][ T9929] netlink: get zone limit has 8 unknown bytes [ 426.420846][ T30] kauditd_printk_skb: 30 callbacks suppressed [ 426.420858][ T30] audit: type=1400 audit(1742778962.832:699): avc: denied { read write } for pid=9941 comm="syz.2.1069" dev="9p" ino=65538 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 426.498740][ T30] audit: type=1400 audit(1742778962.832:700): avc: denied { open } for pid=9941 comm="syz.2.1069" path="/202/file0" dev="9p" ino=65538 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 427.327903][ T9954] hsr0: entered promiscuous mode [ 427.358225][ T9954] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1072'. [ 427.654318][ T30] audit: type=1400 audit(1742778964.062:701): avc: denied { read } for pid=9955 comm="syz.3.1073" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 427.893934][ T9954] hsr_slave_0: left promiscuous mode [ 428.184265][ T9954] hsr_slave_1: left promiscuous mode [ 429.381400][ T9954] hsr0 (unregistering): left promiscuous mode [ 429.442027][ T9961] veth1_macvtap: left promiscuous mode [ 429.447548][ T9961] macsec0: entered promiscuous mode [ 429.453417][ T9961] macsec0: entered allmulticast mode [ 429.468022][ T9965] veth1_macvtap: entered promiscuous mode [ 429.497582][ T9965] veth1_macvtap: entered allmulticast mode [ 429.503648][ T9965] macsec0: left promiscuous mode [ 429.508829][ T9965] macsec0: left allmulticast mode [ 429.514182][ T9965] veth1_macvtap: left allmulticast mode [ 429.675518][ T30] audit: type=1400 audit(1742778966.082:702): avc: denied { write } for pid=9981 comm="syz.2.1081" name="ptp0" dev="devtmpfs" ino=1265 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 431.849820][ T30] audit: type=1400 audit(1742778967.682:703): avc: denied { setopt } for pid=9991 comm="syz.4.1082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 433.790846][T10015] netlink: 16 bytes leftover after parsing attributes in process `syz.4.1087'. [ 435.334001][ T30] audit: type=1400 audit(1742778971.742:704): avc: denied { shutdown } for pid=10027 comm="syz.0.1092" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 435.497742][ T30] audit: type=1326 audit(1742778971.902:705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10033 comm="syz.2.1094" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd8eb8d169 code=0x7ffc0000 [ 435.522714][ T30] audit: type=1326 audit(1742778971.902:706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10033 comm="syz.2.1094" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd8eb8d169 code=0x7ffc0000 [ 435.606584][ T30] audit: type=1326 audit(1742778971.902:707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10033 comm="syz.2.1094" exe="/root/syz-executor" sig=0 arch=c000003e syscall=334 compat=0 ip=0x7fbd8eb8d169 code=0x7ffc0000 [ 435.656747][ T30] audit: type=1326 audit(1742778971.902:708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10033 comm="syz.2.1094" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd8eb8d169 code=0x7ffc0000 [ 435.692184][ T30] audit: type=1326 audit(1742778971.902:709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10033 comm="syz.2.1094" exe="/root/syz-executor" sig=0 arch=c000003e syscall=105 compat=0 ip=0x7fbd8eb8d169 code=0x7ffc0000 [ 435.740398][ C0] vkms_vblank_simulate: vblank timer overrun [ 435.940520][ T30] audit: type=1326 audit(1742778971.902:710): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10033 comm="syz.2.1094" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd8eb8d169 code=0x7ffc0000 [ 435.967327][ T30] audit: type=1326 audit(1742778971.902:711): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10033 comm="syz.2.1094" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd8eb8d169 code=0x7ffc0000 [ 435.991344][ C0] vkms_vblank_simulate: vblank timer overrun [ 436.144781][ T30] audit: type=1326 audit(1742778971.902:712): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10033 comm="syz.2.1094" exe="/root/syz-executor" sig=0 arch=c000003e syscall=125 compat=0 ip=0x7fbd8eb8d169 code=0x7ffc0000 [ 438.827655][ T30] kauditd_printk_skb: 32 callbacks suppressed [ 438.827673][ T30] audit: type=1400 audit(1742778975.232:745): avc: denied { ioctl } for pid=10053 comm="syz.2.1099" path="socket:[23585]" dev="sockfs" ino=23585 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 438.858768][ C0] vkms_vblank_simulate: vblank timer overrun [ 439.528701][ T30] audit: type=1400 audit(1742778975.232:746): avc: denied { ioctl } for pid=10053 comm="syz.2.1099" path="/dev/usbmon7" dev="devtmpfs" ino=737 ioctlcmd=0x9207 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 439.700554][ T1295] ieee802154 phy0 wpan0: encryption failed: -22 [ 442.767071][ T5868] usb 1-1: new high-speed USB device number 15 using dummy_hcd [ 443.421804][ T5868] usb 1-1: New USB device found, idVendor=0af7, idProduct=0101, bcdDevice=2d.62 [ 443.509605][ T5868] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 445.051263][ T5868] usb 1-1: config 0 descriptor?? [ 445.068718][ T5868] usb 1-1: can't set config #0, error -71 [ 445.845496][ T5868] usb 1-1: USB disconnect, device number 15 [ 447.279731][T10129] netlink: 'syz.3.1120': attribute type 1 has an invalid length. [ 448.257000][ T30] audit: type=1400 audit(1742778984.662:747): avc: denied { write } for pid=10138 comm="syz.3.1125" name="usbmon3" dev="devtmpfs" ino=725 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 448.280416][ C0] vkms_vblank_simulate: vblank timer overrun [ 449.716027][ T30] audit: type=1400 audit(1742778985.852:748): avc: denied { ioctl } for pid=10148 comm="syz.4.1126" path="socket:[23247]" dev="sockfs" ino=23247 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 452.355924][T10175] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 454.265253][T10199] vlan2: entered promiscuous mode [ 454.276821][T10199] hsr_slave_1: entered promiscuous mode [ 454.284944][T10199] vlan2: entered allmulticast mode [ 454.290202][T10199] hsr_slave_1: entered allmulticast mode [ 455.010859][T10199] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1140'. [ 456.158340][T10199] hsr_slave_1 (unregistering): left allmulticast mode [ 456.188212][T10199] hsr_slave_1 (unregistering): left promiscuous mode [ 459.749432][ T30] audit: type=1400 audit(1742778996.152:749): avc: denied { setattr } for pid=10237 comm="syz.0.1149" name="/" dev="9p" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 464.957507][ T30] audit: type=1400 audit(1742779000.912:750): avc: denied { audit_write } for pid=10262 comm="syz.2.1158" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 465.024697][T10277] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 465.081314][ T30] audit: type=1326 audit(1742779001.482:751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10279 comm="syz.2.1162" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fbd8eb8d169 code=0x0 [ 466.536055][T10295] netlink: 'syz.0.1163': attribute type 1 has an invalid length. [ 466.592912][T10295] netlink: 244 bytes leftover after parsing attributes in process `syz.0.1163'. [ 469.340092][T10323] gfs2: gfs2 mount does not exist [ 469.362418][ T30] audit: type=1400 audit(1742779005.742:752): avc: denied { mounton } for pid=10320 comm="syz.1.1171" path="/223/file0" dev="tmpfs" ino=1222 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 469.712080][ T30] audit: type=1400 audit(1742779006.082:753): avc: denied { connect } for pid=10324 comm="syz.4.1172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 471.534663][T10355] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1181'. [ 473.965924][ T30] audit: type=1400 audit(1742779010.362:754): avc: denied { execute } for pid=10361 comm="syz.4.1182" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=23551 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 474.350851][ T5922] usb 3-1: new high-speed USB device number 14 using dummy_hcd [ 474.544244][ T5922] usb 3-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 474.573345][ T5922] usb 3-1: New USB device found, idVendor=0471, idProduct=0304, bcdDevice=e4.df [ 474.582983][ T5922] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 474.603285][ T5922] usb 3-1: config 0 descriptor?? [ 474.637803][ T30] audit: type=1400 audit(1742779011.042:755): avc: denied { read } for pid=10379 comm="syz.3.1188" name="cachefiles" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cachefiles_device_t tclass=chr_file permissive=1 [ 474.643757][ T5922] pwc: Askey VC010 type 2 USB webcam detected. [ 475.202392][ T5922] pwc: recv_control_msg error -32 req 02 val 2b00 [ 475.211202][ T5922] pwc: recv_control_msg error -32 req 02 val 2700 [ 475.218501][ T5922] pwc: recv_control_msg error -32 req 02 val 2c00 [ 475.225588][ T5922] pwc: recv_control_msg error -32 req 04 val 1000 [ 475.232595][ T5922] pwc: recv_control_msg error -32 req 04 val 1300 [ 475.240912][ T5922] pwc: recv_control_msg error -32 req 04 val 1400 [ 475.248968][ T5922] pwc: recv_control_msg error -32 req 02 val 2000 [ 475.291793][ T5922] pwc: recv_control_msg error -32 req 02 val 2100 [ 475.311311][T10395] input: syz0 as /devices/virtual/input/input18 [ 475.370926][ T5922] pwc: recv_control_msg error -32 req 04 val 1500 [ 475.760753][ T5922] pwc: recv_control_msg error -32 req 02 val 2500 [ 475.773212][ T5922] pwc: recv_control_msg error -32 req 02 val 2400 [ 475.781056][ T5922] pwc: recv_control_msg error -32 req 02 val 2600 [ 475.790065][ T5922] pwc: recv_control_msg error -32 req 02 val 2900 [ 477.517819][ T5922] pwc: recv_control_msg error -71 req 04 val 1100 [ 477.531330][ T5922] pwc: recv_control_msg error -71 req 04 val 1200 [ 477.546840][ T5922] pwc: Registered as video103. [ 477.557108][ T5922] input: PWC snapshot button as /devices/platform/dummy_hcd.2/usb3/3-1/input/input19 [ 477.591331][ T5922] usb 3-1: USB disconnect, device number 14 [ 478.759481][T10427] gfs2: gfs2 mount does not exist [ 479.050773][ T30] audit: type=1400 audit(1742779015.372:756): avc: denied { append } for pid=10422 comm="syz.0.1199" name="sg0" dev="devtmpfs" ino=744 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 481.894231][ T6705] Bluetooth: hci5: Frame reassembly failed (-84) [ 483.941275][ T5822] Bluetooth: hci5: Entering manufacturer mode failed (-110) [ 488.432945][ T30] audit: type=1400 audit(1742779024.392:757): avc: denied { map } for pid=10499 comm="syz.4.1217" path="/dev/dri/card0" dev="devtmpfs" ino=627 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 488.897328][ T30] audit: type=1400 audit(1742779024.392:758): avc: denied { execute } for pid=10499 comm="syz.4.1217" path="/dev/dri/card0" dev="devtmpfs" ino=627 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 490.327141][ T30] audit: type=1400 audit(1742779026.732:759): avc: denied { map } for pid=10524 comm="syz.1.1224" path="pipe:[24543]" dev="pipefs" ino=24543 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 492.896338][ T30] audit: type=1400 audit(1742779029.262:760): avc: denied { read } for pid=10543 comm="syz.0.1228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 493.881394][T10557] netlink: 104 bytes leftover after parsing attributes in process `syz.2.1231'. [ 495.135193][T10565] openvswitch: netlink: Unexpected mask (mask=4000040, allowed=10048) [ 497.447722][T10575] Set syz1 is full, maxelem 65536 reached [ 498.472743][T10586] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1239'. [ 498.664086][ T30] audit: type=1400 audit(1742779035.072:761): avc: denied { read } for pid=10590 comm="syz.3.1241" path="socket:[25668]" dev="sockfs" ino=25668 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 499.547796][ T30] audit: type=1400 audit(1742779035.912:762): avc: denied { write } for pid=10588 comm="syz.1.1240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 501.090351][ T30] audit: type=1400 audit(1742779037.482:763): avc: denied { name_bind } for pid=10607 comm="syz.0.1245" src=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 501.148867][ T1295] ieee802154 phy0 wpan0: encryption failed: -22 [ 501.280996][T10615] IPVS: sync thread started: state = MASTER, mcast_ifn = bridge_slave_0, syncid = 0, id = 0 [ 501.570428][ T30] audit: type=1400 audit(1742779037.962:764): avc: denied { execmem } for pid=10613 comm="syz.3.1247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 501.619008][ T30] audit: type=1400 audit(1742779037.972:765): avc: denied { read } for pid=10617 comm="syz.1.1246" laddr=::ffff:127.0.0.1 lport=20000 faddr=::ffff:127.0.0.1 fport=59442 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 501.666811][T10625] dccp_close: ABORT with 64 bytes unread [ 503.513614][T10641] cgroup: Unknown subsys name 'cpuset' [ 503.530076][T10641] vimc link validate: Scaler:src:640x480 (0x33424752, 8, 0, 0, 0) RGB/YUV Capture:snk:640x480 (0x33424752, 8, 0, 0, 0) [ 504.465422][ T30] audit: type=1400 audit(1742779040.872:766): avc: denied { create } for pid=10643 comm="syz.3.1253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 504.553024][T10649] lo speed is unknown, defaulting to 1000 [ 504.561267][T10649] lo speed is unknown, defaulting to 1000 [ 504.575619][T10649] lo speed is unknown, defaulting to 1000 [ 504.604046][T10649] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 504.690989][T10649] infiniband syz2: RDMA CMA: cma_listen_on_dev, error -98 [ 504.893825][T10649] lo speed is unknown, defaulting to 1000 [ 504.905646][ T30] audit: type=1400 audit(1742779041.262:767): avc: denied { create } for pid=10648 comm="syz.0.1254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 504.941165][T10649] lo speed is unknown, defaulting to 1000 [ 504.947995][T10649] lo speed is unknown, defaulting to 1000 [ 504.957035][T10649] lo speed is unknown, defaulting to 1000 [ 504.964522][T10649] lo speed is unknown, defaulting to 1000 [ 505.095463][T10655] netlink: 36 bytes leftover after parsing attributes in process `syz.0.1254'. [ 505.110354][T10655] netlink: 16 bytes leftover after parsing attributes in process `syz.0.1254'. [ 505.144011][T10655] netlink: 36 bytes leftover after parsing attributes in process `syz.0.1254'. [ 505.269826][T10655] netlink: 36 bytes leftover after parsing attributes in process `syz.0.1254'. [ 507.856998][T10683] sp0: Synchronizing with TNC [ 510.031311][ T30] audit: type=1400 audit(1742779046.412:768): avc: denied { mount } for pid=10694 comm="syz.0.1266" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 510.561920][ T30] audit: type=1400 audit(1742779046.422:769): avc: denied { remount } for pid=10694 comm="syz.0.1266" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 510.588224][ T30] audit: type=1400 audit(1742779046.962:770): avc: denied { unmount } for pid=5823 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 510.590401][ T10] usb 2-1: new high-speed USB device number 13 using dummy_hcd [ 510.779617][T10703] ptrace attach of "./syz-executor exec"[5823] was attempted by "./syz-executor exec"[10703] [ 510.784327][T10698] lo speed is unknown, defaulting to 1000 [ 511.001046][ T30] audit: type=1400 audit(1742779047.282:771): avc: denied { ioctl } for pid=10701 comm="syz.0.1268" path="socket:[25889]" dev="sockfs" ino=25889 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 511.412859][T10706] netlink: 'syz.2.1269': attribute type 1 has an invalid length. [ 511.420388][ T10] usb 2-1: Using ep0 maxpacket: 16 [ 511.431630][ T10] usb 2-1: config 0 has an invalid interface number: 41 but max is 0 [ 511.439887][ T10] usb 2-1: config 0 has no interface number 0 [ 511.472836][ T10] usb 2-1: config 0 interface 41 altsetting 2 bulk endpoint 0x4 has invalid maxpacket 16 [ 511.513114][ T10] usb 2-1: config 0 interface 41 altsetting 2 bulk endpoint 0x82 has invalid maxpacket 64 [ 511.557359][ T10] usb 2-1: config 0 interface 41 has no altsetting 0 [ 511.585735][T10709] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1270'. [ 511.605499][T10709] bridge_slave_1: left allmulticast mode [ 511.617669][T10709] bridge_slave_1: left promiscuous mode [ 511.617716][ T10] usb 2-1: New USB device found, idVendor=0fe6, idProduct=9700, bcdDevice=d1.9a [ 511.637083][ T10] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 511.645463][T10709] bridge0: port 2(bridge_slave_1) entered disabled state [ 511.673887][T10709] bridge_slave_0: left allmulticast mode [ 511.679552][T10709] bridge_slave_0: left promiscuous mode [ 511.685392][ T10] usb 2-1: Product: syz [ 511.689557][ T10] usb 2-1: Manufacturer: syz [ 511.694512][T10709] bridge0: port 1(bridge_slave_0) entered disabled state [ 511.713503][ T10] usb 2-1: SerialNumber: syz [ 511.720820][T10719] vcan0: tx drop: invalid da for name 0x00000000000000f5 [ 511.724700][ T10] usb 2-1: config 0 descriptor?? [ 511.752211][T10697] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 511.759549][T10697] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 511.934968][ T5866] usb 1-1: new high-speed USB device number 16 using dummy_hcd [ 511.966336][ T30] audit: type=1400 audit(1742779048.342:772): avc: denied { getopt } for pid=10721 comm="syz.3.1273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 512.650874][T10697] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 512.658149][T10697] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 512.725685][ T5866] usb 1-1: Using ep0 maxpacket: 32 [ 512.741591][ T5866] usb 1-1: config 0 has an invalid interface number: 16 but max is 0 [ 512.756728][ T5866] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 512.878332][ T5866] usb 1-1: config 0 has no interface number 0 [ 513.127979][ T5866] usb 1-1: config 0 interface 16 altsetting 0 bulk endpoint 0x6 has invalid maxpacket 1023 [ 513.140759][ T5866] usb 1-1: config 0 interface 16 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 513.143264][T10729] ip6gretap0: entered promiscuous mode [ 513.180435][ T5866] usb 1-1: New USB device found, idVendor=0499, idProduct=102a, bcdDevice=85.2d [ 513.189629][T10729] vlan0: entered promiscuous mode [ 513.200446][ T5866] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 513.208923][T10729] ip6gretap0: left promiscuous mode [ 513.209539][ T5866] usb 1-1: Product: syz [ 513.229175][ T5866] usb 1-1: Manufacturer: syz [ 513.239300][ T5866] usb 1-1: SerialNumber: syz [ 513.251484][ T5866] usb 1-1: config 0 descriptor?? [ 513.264674][T10715] raw-gadget.1 gadget.0: fail, usb_ep_enable returned -22 [ 513.315573][ T5866] usb 1-1: Quirk or no altset; falling back to MIDI 1.0 [ 513.322796][ T10] Error reading MAC address [ 513.330044][T10697] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 513.370818][T10733] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1276'. [ 513.396132][T10697] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 513.423455][ T5866] usb 1-1: invalid MIDI in EP 0 [ 513.724196][ T5866] snd-usb-audio 1-1:0.16: probe with driver snd-usb-audio failed with error -22 [ 513.753126][ T5866] usb 1-1: USB disconnect, device number 16 [ 514.114322][ T10] sr9700 2-1:0.41 eth1: register 'sr9700' at usb-dummy_hcd.1-1, CoreChip SR9700 USB Ethernet, ae:2f:c6:6e:11:c1 [ 514.700057][ T10] usb 2-1: USB disconnect, device number 13 [ 514.706854][ T10] sr9700 2-1:0.41 eth1: unregister 'sr9700' usb-dummy_hcd.1-1, CoreChip SR9700 USB Ethernet [ 514.887431][ T30] audit: type=1326 audit(1742779051.292:773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10745 comm="syz.0.1281" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f708618d169 code=0x7ffc0000 [ 515.062225][ T30] audit: type=1326 audit(1742779051.292:774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10745 comm="syz.0.1281" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f708618d169 code=0x7ffc0000 [ 515.087090][ T30] audit: type=1326 audit(1742779051.292:775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10745 comm="syz.0.1281" exe="/root/syz-executor" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f708618d169 code=0x7ffc0000 [ 515.121345][ T30] audit: type=1326 audit(1742779051.302:776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10745 comm="syz.0.1281" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f708618d169 code=0x7ffc0000 [ 515.719976][ T30] audit: type=1326 audit(1742779051.302:777): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10745 comm="syz.0.1281" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f708618d169 code=0x7ffc0000 [ 515.828618][ T30] audit: type=1400 audit(1742779051.612:778): avc: denied { bind } for pid=10747 comm="syz.2.1280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 516.510638][ T30] audit: type=1326 audit(1742779052.912:779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10745 comm="syz.0.1281" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f708618d169 code=0x7ffc0000 [ 517.120461][ T30] audit: type=1326 audit(1742779052.912:780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10745 comm="syz.0.1281" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f708618d169 code=0x7ffc0000 [ 517.236814][ T30] audit: type=1326 audit(1742779052.932:781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10745 comm="syz.0.1281" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f708618d169 code=0x7ffc0000 [ 517.273388][ T30] audit: type=1326 audit(1742779052.932:782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10745 comm="syz.0.1281" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f708618d169 code=0x7ffc0000 [ 517.661217][ T30] audit: type=1326 audit(1742779052.932:783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10745 comm="syz.0.1281" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f708618d169 code=0x7ffc0000 [ 519.692443][ T5827] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 520.667358][ T30] kauditd_printk_skb: 13 callbacks suppressed [ 520.667371][ T30] audit: type=1400 audit(1742779056.572:797): avc: denied { getopt } for pid=10790 comm="syz.0.1291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 522.855626][T10812] bond2: left allmulticast mode [ 522.866380][T10812] bridge3: left allmulticast mode [ 524.470552][ T5869] usb 2-1: new full-speed USB device number 14 using dummy_hcd [ 525.224460][ T5869] usb 2-1: config 0 has an invalid interface number: 217 but max is 0 [ 525.299076][ T5869] usb 2-1: config 0 has no interface number 0 [ 525.332273][ T5869] usb 2-1: config 0 interface 217 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 525.362869][ T5869] usb 2-1: config 0 interface 217 altsetting 0 endpoint 0x6 has invalid maxpacket 512, setting to 64 [ 525.397704][ T5869] usb 2-1: config 0 interface 217 altsetting 0 has an endpoint descriptor with address 0x46, changing to 0x6 [ 526.120341][ T5869] usb 2-1: config 0 interface 217 altsetting 0 has a duplicate endpoint with address 0x6, skipping [ 526.150058][ T5869] usb 2-1: config 0 interface 217 altsetting 0 endpoint 0xA has invalid maxpacket 1024, setting to 64 [ 526.407593][ T5869] usb 2-1: config 0 interface 217 altsetting 0 has a duplicate endpoint with address 0x6, skipping [ 526.466353][ T5869] usb 2-1: config 0 interface 217 altsetting 0 has 8 endpoint descriptors, different from the interface descriptor's value: 7 [ 526.559454][ T5869] usb 2-1: New USB device found, idVendor=045e, idProduct=044f, bcdDevice=16.7e [ 526.568771][ T5869] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 526.601138][ T5869] usb 2-1: config 0 descriptor?? [ 526.707040][T10823] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 528.204111][ T12] Bluetooth: hci5: Frame reassembly failed (-84) [ 528.217676][ T12] Bluetooth: hci5: Frame reassembly failed (-84) [ 528.457359][ T971] usb 4-1: new high-speed USB device number 14 using dummy_hcd [ 528.583858][ T30] audit: type=1400 audit(1742779064.992:798): avc: denied { lock } for pid=10882 comm="syz.2.1316" path="socket:[25199]" dev="sockfs" ino=25199 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 528.631675][ T971] usb 4-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 528.642955][ T971] usb 4-1: config 0 has no interfaces? [ 528.648751][ T971] usb 4-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 528.658747][ T971] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 528.669970][ T971] usb 4-1: config 0 descriptor?? [ 528.724434][ T5866] usb 2-1: USB disconnect, device number 14 [ 530.260487][ T5822] Bluetooth: hci5: Entering manufacturer mode failed (-110) [ 530.261784][ T5827] Bluetooth: hci5: command 0xfc11 tx timeout [ 530.269447][ T30] audit: type=1400 audit(1742779066.662:799): avc: denied { ioctl } for pid=10897 comm="syz.2.1319" path="/dev/btrfs-control" dev="devtmpfs" ino=1311 ioctlcmd=0x9427 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:lvm_control_t tclass=chr_file permissive=1 [ 530.552065][ T30] audit: type=1326 audit(1742779066.962:800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10901 comm="syz.0.1320" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f708618d169 code=0x7ffc0000 [ 530.607567][ T30] audit: type=1326 audit(1742779066.962:801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10901 comm="syz.0.1320" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f708618d169 code=0x7ffc0000 [ 530.731146][ T30] audit: type=1326 audit(1742779066.992:802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10901 comm="syz.0.1320" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f708618d169 code=0x7ffc0000 [ 530.757901][ T30] audit: type=1326 audit(1742779066.992:803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10901 comm="syz.0.1320" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f708618d169 code=0x7ffc0000 [ 530.789660][ T30] audit: type=1326 audit(1742779066.992:804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10901 comm="syz.0.1320" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f708618d169 code=0x7ffc0000 [ 530.819911][ T30] audit: type=1326 audit(1742779066.992:805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10901 comm="syz.0.1320" exe="/root/syz-executor" sig=0 arch=c000003e syscall=239 compat=0 ip=0x7f708618d169 code=0x7ffc0000 [ 530.879467][ T30] audit: type=1326 audit(1742779066.992:806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10901 comm="syz.0.1320" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f708618d169 code=0x7ffc0000 [ 530.925079][ T6686] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 530.935869][ T30] audit: type=1326 audit(1742779066.992:807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10901 comm="syz.0.1320" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f708618d169 code=0x7ffc0000 [ 531.025242][ T6686] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 531.106754][ T6686] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 531.113540][T10453] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 531.125118][ T971] usb 3-1: new high-speed USB device number 15 using dummy_hcd [ 531.135002][T10453] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 531.144905][T10453] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 531.154639][T10453] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 531.163036][T10453] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 531.172720][T10453] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 531.196044][ T5822] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 531.205273][ T5822] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 531.206215][ T6686] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 531.223154][ T5822] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 531.234898][ T5822] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 531.243206][ T5822] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 531.251088][ T5822] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 531.289331][ T5866] usb 4-1: USB disconnect, device number 14 [ 531.290367][ T971] usb 3-1: Using ep0 maxpacket: 8 [ 531.301892][ T971] usb 3-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 531.312314][ T971] usb 3-1: config 0 has no interfaces? [ 531.332761][ T971] usb 3-1: New USB device found, idVendor=046d, idProduct=08ae, bcdDevice=11.58 [ 531.344814][ T971] usb 3-1: New USB device strings: Mfr=241, Product=1, SerialNumber=3 [ 531.353173][ T971] usb 3-1: Product: syz [ 531.357448][ T971] usb 3-1: Manufacturer: syz [ 531.362250][ T971] usb 3-1: SerialNumber: syz [ 531.424259][ T971] usb 3-1: config 0 descriptor?? [ 531.597990][ T6686] bridge_slave_1: left allmulticast mode [ 531.618559][ T6686] bridge_slave_1: left promiscuous mode [ 531.642183][ T6686] bridge0: port 2(bridge_slave_1) entered disabled state [ 531.847924][ T6686] bridge_slave_0: left allmulticast mode [ 531.854847][T10907] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 532.081569][T10907] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 532.081749][ T6686] bridge_slave_0: left promiscuous mode [ 532.210468][ T6686] bridge0: port 1(bridge_slave_0) entered disabled state [ 532.601800][T10927] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 532.610760][T10927] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 532.629166][T10927] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 532.639029][T10927] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 532.682981][ T974] usb 1-1: new high-speed USB device number 17 using dummy_hcd [ 533.396510][ T5822] Bluetooth: hci4: command tx timeout [ 533.642986][ T974] usb 1-1: Using ep0 maxpacket: 16 [ 533.695275][ T974] usb 1-1: New USB device found, idVendor=061d, idProduct=c020, bcdDevice=9c.15 [ 533.723585][ T974] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 533.752782][ T974] usb 1-1: Product: syz [ 533.775800][ T974] usb 1-1: Manufacturer: syz [ 533.788936][ T974] usb 1-1: SerialNumber: syz [ 533.809759][ T974] usb 1-1: config 0 descriptor?? [ 533.824697][ T974] ssu100 1-1:0.0: Quatech SSU-100 USB to Serial Driver converter detected [ 533.838564][ T6686] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 533.854520][ T6686] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 533.868871][ T6686] bond0 (unregistering): Released all slaves [ 534.059285][ T6686] bond1 (unregistering): Released all slaves [ 534.069867][ T974] ssu100 1-1:0.0: probe with driver ssu100 failed with error -32 [ 534.093615][T10909] lo speed is unknown, defaulting to 1000 [ 534.152792][ T5922] usb 1-1: USB disconnect, device number 17 [ 535.376498][ T30] kauditd_printk_skb: 45 callbacks suppressed [ 535.376509][ T30] audit: type=1400 audit(1742779071.782:853): avc: denied { getopt } for pid=10941 comm="syz.3.1334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 535.475960][T10453] Bluetooth: hci4: command tx timeout [ 535.511867][ T5922] usb 3-1: USB disconnect, device number 15 [ 535.677253][T10909] chnl_net:caif_netlink_parms(): no params data found [ 535.920704][T10909] bridge0: port 1(bridge_slave_0) entered blocking state [ 535.929732][T10909] bridge0: port 1(bridge_slave_0) entered disabled state [ 536.379077][T10909] bridge_slave_0: entered allmulticast mode [ 536.386014][T10909] bridge_slave_0: entered promiscuous mode [ 536.418906][ T6686] hsr_slave_0: left promiscuous mode [ 536.424811][ T6686] hsr_slave_1: left promiscuous mode [ 536.430720][ T6686] batman_adv: batadv0: Interface deactivated: dummy0 [ 536.437623][ T6686] batman_adv: batadv0: Removing interface: dummy0 [ 536.450667][ T6686] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 536.460365][ T6686] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 536.476480][T10964] netlink: 88 bytes leftover after parsing attributes in process `syz.0.1337'. [ 536.477779][ T6686] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 536.540709][ T6686] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 536.599337][ T6686] veth1_macvtap: left promiscuous mode [ 536.628786][ T6686] veth0_macvtap: left promiscuous mode [ 536.640452][ T6686] veth1_vlan: left promiscuous mode [ 536.742979][ T6686] veth0_vlan: left promiscuous mode [ 537.530473][T10453] Bluetooth: hci4: command tx timeout [ 537.535951][T10967] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 538.111326][ T6686] team0 (unregistering): Port device team_slave_1 removed [ 538.161976][ T6686] team0 (unregistering): Port device team_slave_0 removed [ 538.670528][T10985] input: syz0 as /devices/virtual/input/input20 [ 539.458727][T10909] bridge0: port 2(bridge_slave_1) entered blocking state [ 539.472306][T10909] bridge0: port 2(bridge_slave_1) entered disabled state [ 539.479986][T10909] bridge_slave_1: entered allmulticast mode [ 539.534944][T10909] bridge_slave_1: entered promiscuous mode [ 539.611669][T10453] Bluetooth: hci4: command tx timeout [ 539.622553][T10989] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1343'. [ 540.059545][T10909] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 540.112355][T10909] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 540.297051][T10909] team0: Port device team_slave_0 added [ 540.312538][T10909] team0: Port device team_slave_1 added [ 542.035178][T10909] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 542.045628][T10909] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 542.229709][T10909] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 542.242310][T10909] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 542.249270][T10909] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 542.276042][T10909] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 542.317013][T10909] hsr_slave_0: entered promiscuous mode [ 542.629642][T11009] netlink: 312 bytes leftover after parsing attributes in process `syz.3.1349'. [ 542.643487][T10909] hsr_slave_1: entered promiscuous mode [ 542.997206][T10909] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 543.305912][T10909] Cannot create hsr debugfs directory [ 544.488787][T11026] syz.4.1352: attempt to access beyond end of device [ 544.488787][T11026] nbd4: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 544.504304][T11026] SQUASHFS error: Failed to read block 0x0: -5 [ 544.510968][T11026] unable to read squashfs_super_block [ 545.201584][ T6686] IPVS: stop unused estimator thread 0... [ 545.217251][T10909] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 545.832367][T10909] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 545.910932][T10909] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 546.012752][T10909] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 546.135098][T10909] 8021q: adding VLAN 0 to HW filter on device bond0 [ 546.168004][T10909] 8021q: adding VLAN 0 to HW filter on device team0 [ 546.326522][T10837] bridge0: port 1(bridge_slave_0) entered blocking state [ 546.333632][T10837] bridge0: port 1(bridge_slave_0) entered forwarding state [ 546.476966][T10837] bridge0: port 2(bridge_slave_1) entered blocking state [ 546.484043][T10837] bridge0: port 2(bridge_slave_1) entered forwarding state [ 546.706747][ T30] audit: type=1400 audit(1742779083.102:854): avc: denied { setcurrent } for pid=11050 comm="syz.3.1359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 547.325629][T10909] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 547.338653][T11061] vlan0: entered promiscuous mode [ 547.347315][T11061] vlan0: entered allmulticast mode [ 547.352680][T11061] hsr_slave_1: entered allmulticast mode [ 547.594407][T11067] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1360'. [ 548.087031][ T30] audit: type=1400 audit(1742779084.492:855): avc: denied { bind } for pid=11063 comm="syz.0.1355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 548.320387][T11067] hsr_slave_1 (unregistering): left allmulticast mode [ 548.536809][T11067] hsr_slave_1 (unregistering): left promiscuous mode [ 548.649353][ T30] audit: type=1400 audit(1742779084.962:856): avc: denied { connect } for pid=11075 comm="syz.0.1363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 549.938510][ T30] audit: type=1400 audit(1742779086.342:857): avc: denied { read } for pid=11088 comm="syz.0.1365" path="socket:[26731]" dev="sockfs" ino=26731 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 550.545269][T10909] veth0_vlan: entered promiscuous mode [ 550.563921][T10909] veth1_vlan: entered promiscuous mode [ 550.662787][T10909] veth0_macvtap: entered promiscuous mode [ 550.791782][T10909] veth1_macvtap: entered promiscuous mode [ 550.829809][T10909] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 550.858657][T10909] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 550.885998][T10909] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 550.903855][T10909] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 550.931335][T10909] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 550.941183][T10909] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 551.158499][T10909] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 551.188991][T10909] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 551.210853][T10909] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 551.259218][T10909] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 551.273588][T10909] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 551.310316][T10909] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 551.329337][T10909] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 551.346942][T10909] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 551.368111][T10409] IPVS: starting estimator thread 0... [ 551.406344][T11108] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 551.489771][T11119] IPVS: using max 31 ests per chain, 74400 per kthread [ 551.531695][ T6705] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 551.544459][ T6705] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 551.643730][ T6686] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 551.675440][ T6686] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 551.708030][ T30] audit: type=1400 audit(1742779088.112:858): avc: denied { mounton } for pid=10909 comm="syz-executor" path="/root/syzkaller.DHc99e/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 551.886025][ T30] audit: type=1400 audit(1742779088.282:859): avc: denied { mounton } for pid=10909 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 552.158684][T11122] kvm: kvm [11121]: vcpu0, guest rIP: 0x1be Unhandled WRMSR(0xc2) = 0x4000 [ 553.230347][ T30] audit: type=1400 audit(1742779089.432:860): avc: denied { write } for pid=11130 comm="syz.3.1373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 553.391503][ T30] audit: type=1400 audit(1742779089.762:861): avc: denied { map } for pid=11135 comm="syz.5.1375" path="/dev/zero" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 [ 554.154994][ T30] audit: type=1400 audit(1742779090.562:862): avc: denied { ioctl } for pid=11139 comm="syz.2.1376" path="/dev/sg0" dev="devtmpfs" ino=744 ioctlcmd=0x2275 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 555.171084][ T30] audit: type=1400 audit(1742779091.582:863): avc: denied { map } for pid=11143 comm="syz.3.1378" path="socket:[27126]" dev="sockfs" ino=27126 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 555.294795][T11150] lo speed is unknown, defaulting to 1000 [ 555.379194][T11157] tipc: New replicast peer: 255.255.255.255 [ 555.390978][T11157] tipc: Enabled bearer , priority 10 [ 556.658477][ T30] audit: type=1400 audit(1742779092.932:864): avc: denied { write } for pid=11171 comm="syz.5.1385" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 556.804389][T10409] tipc: Node number set to 43690 [ 556.822348][ T30] audit: type=1400 audit(1742779092.932:865): avc: denied { setattr } for pid=11171 comm="syz.5.1385" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 559.603445][T11197] input input21: cannot allocate more than FF_MAX_EFFECTS effects [ 560.561218][T11205] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present [ 562.574193][ T1295] ieee802154 phy0 wpan0: encryption failed: -22 [ 562.965464][T11222] openvswitch: netlink: VXLAN extension message has 4 unknown bytes. [ 563.230861][ T10] usb 5-1: new high-speed USB device number 11 using dummy_hcd [ 563.380404][ T10] usb 5-1: Using ep0 maxpacket: 8 [ 563.531734][ T5866] usb 1-1: new full-speed USB device number 18 using dummy_hcd [ 563.566172][ T10] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 563.577267][ T10] usb 5-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 563.603826][ T10] usb 5-1: New USB device found, idVendor=056a, idProduct=0026, bcdDevice= 0.00 [ 563.612981][ T10] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 564.258324][ T10] usb 5-1: config 0 descriptor?? [ 564.277061][ T5866] usb 1-1: not running at top speed; connect to a high speed hub [ 564.321043][ T5866] usb 1-1: config 1 interface 0 has no altsetting 0 [ 564.338971][ T5866] usb 1-1: New USB device found, idVendor=05ac, idProduct=0230, bcdDevice= 0.40 [ 564.364263][ T5866] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 564.385912][ T5866] usb 1-1: Product: syz [ 564.390124][ T5866] usb 1-1: Manufacturer: syz [ 564.416215][ T5866] usb 1-1: SerialNumber: syz [ 564.479146][ T10] usbhid 5-1:0.0: can't add hid device: -71 [ 565.282076][ T10] usbhid 5-1:0.0: probe with driver usbhid failed with error -71 [ 565.291644][ T10] usb 5-1: USB disconnect, device number 11 [ 565.632841][ T5866] input: bcm5974 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:1.0/input/input22 [ 566.208268][ T5180] bcm5974 1-1:1.0: could not read from device [ 566.298117][ T5180] bcm5974 1-1:1.0: could not read from device [ 566.332862][ T5866] usb 1-1: USB disconnect, device number 18 [ 566.371450][ T5180] bcm5974 1-1:1.0: could not read from device [ 566.510717][ T5180] bcm5974 1-1:1.0: could not read from device [ 567.689233][ T30] audit: type=1400 audit(1742779104.092:866): avc: denied { listen } for pid=11258 comm="syz.5.1409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 568.236102][ T30] audit: type=1400 audit(1742779104.122:867): avc: denied { accept } for pid=11258 comm="syz.5.1409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 572.795883][ T30] audit: type=1404 audit(1742779109.202:868): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 572.914933][ T30] audit: type=1400 audit(1742779109.262:869): avc: denied { read write } for pid=5817 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 572.984010][ T30] audit: type=1400 audit(1742779109.262:870): avc: denied { read write } for pid=10909 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 573.065429][T11315] CUSE: unknown device info "ÿ" [ 573.092096][ T30] audit: type=1400 audit(1742779109.322:871): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 573.110689][T11315] CUSE: zero length info key specified [ 573.116569][ T30] audit: type=1400 audit(1742779109.322:872): avc: denied { read } for pid=11304 comm="syz.4.1422" dev="nsfs" ino=4026533232 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 573.143205][ T30] audit: type=1400 audit(1742779109.322:873): avc: denied { ioctl } for pid=11304 comm="syz.4.1422" path="socket:[28560]" dev="sockfs" ino=28560 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 573.256652][ T30] audit: type=1400 audit(1742779109.322:874): avc: denied { write } for pid=11304 comm="syz.4.1422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 573.282016][ T30] audit: type=1400 audit(1742779109.352:875): avc: denied { read } for pid=11304 comm="syz.4.1422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 573.306572][ T30] audit: type=1400 audit(1742779109.392:876): avc: denied { execmem } for pid=11308 comm="syz.5.1424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 573.329045][ T30] audit: type=1400 audit(1742779109.392:877): avc: denied { read } for pid=11309 comm="syz.3.1423" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 576.953069][T11366] ceph: No mds server is up or the cluster is laggy [ 576.985911][T11370] ceph: No mds server is up or the cluster is laggy [ 577.120558][ T5866] libceph: mon0 (1)[c::]:6789 socket closed (con state V1_BANNER) [ 577.129415][ T5866] libceph: mon0 (1)[c::]:6789 socket closed (con state V1_BANNER) [ 577.848274][ T30] kauditd_printk_skb: 140 callbacks suppressed [ 577.848291][ T30] audit: type=1400 audit(1742779114.252:1018): avc: denied { create } for pid=11405 comm="syz.2.1454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 577.891791][ T30] audit: type=1400 audit(1742779114.282:1019): avc: denied { create } for pid=11405 comm="syz.2.1454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 578.004869][ T30] audit: type=1400 audit(1742779114.402:1020): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 578.074051][ T30] audit: type=1400 audit(1742779114.472:1021): avc: denied { create } for pid=11409 comm="syz.0.1455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 578.123460][ T30] audit: type=1400 audit(1742779114.472:1022): avc: denied { execmem } for pid=11409 comm="syz.0.1455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 578.233932][ T30] audit: type=1400 audit(1742779114.642:1023): avc: denied { read write } for pid=5817 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 578.297843][ T30] audit: type=1400 audit(1742779114.672:1024): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 578.350066][ T30] audit: type=1400 audit(1742779114.682:1025): avc: denied { execmem } for pid=11412 comm="syz.3.1456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 578.399024][ T30] audit: type=1400 audit(1742779114.752:1026): avc: denied { read } for pid=11412 comm="syz.3.1456" name="card1" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=0 [ 578.445235][ T30] audit: type=1400 audit(1742779114.762:1027): avc: denied { create } for pid=11412 comm="syz.3.1456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 582.956970][ T30] kauditd_printk_skb: 119 callbacks suppressed [ 582.956986][ T30] audit: type=1400 audit(1742779119.362:1147): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 582.987933][ T30] audit: type=1400 audit(1742779119.392:1148): avc: denied { prog_load } for pid=11494 comm="syz.5.1484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 583.033117][ T30] audit: type=1400 audit(1742779119.442:1149): avc: denied { read write } for pid=10909 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 583.079632][ T30] audit: type=1400 audit(1742779119.482:1150): avc: denied { create } for pid=11498 comm="syz.5.1486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 583.131255][ T30] audit: type=1400 audit(1742779119.482:1151): avc: denied { execmem } for pid=11497 comm="syz.0.1485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 583.190777][ T30] audit: type=1400 audit(1742779119.522:1152): avc: denied { execmem } for pid=11498 comm="syz.5.1486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 583.212788][ T30] audit: type=1400 audit(1742779119.572:1153): avc: denied { create } for pid=11497 comm="syz.0.1485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 583.234412][ T30] audit: type=1400 audit(1742779119.572:1154): avc: denied { watch } for pid=11497 comm="syz.0.1485" path="/287/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" dev="tmpfs" ino=1506 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 583.348074][ T30] audit: type=1400 audit(1742779119.722:1155): avc: denied { read write } for pid=10909 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 583.378866][ T30] audit: type=1400 audit(1742779119.722:1156): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 584.039046][T11510] lo speed is unknown, defaulting to 1000 [ 588.013366][ T30] kauditd_printk_skb: 105 callbacks suppressed [ 588.013380][ T30] audit: type=1400 audit(1742779124.422:1262): avc: denied { read write } for pid=10909 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 588.081118][ T30] audit: type=1400 audit(1742779124.492:1263): avc: denied { create } for pid=11579 comm="syz.5.1512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 588.110368][ T30] audit: type=1400 audit(1742779124.492:1264): avc: denied { create } for pid=11579 comm="syz.5.1512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 588.139114][ T30] audit: type=1400 audit(1742779124.492:1265): avc: denied { prog_load } for pid=11579 comm="syz.5.1512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 588.201580][ T30] audit: type=1400 audit(1742779124.492:1266): avc: denied { execmem } for pid=11579 comm="syz.5.1512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 588.231183][ T30] audit: type=1400 audit(1742779124.542:1267): avc: denied { read } for pid=11579 comm="syz.5.1512" name="card0" dev="devtmpfs" ino=627 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=0 [ 588.270412][ T30] audit: type=1400 audit(1742779124.582:1268): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 588.304909][ T30] audit: type=1400 audit(1742779124.642:1269): avc: denied { create } for pid=11582 comm="syz.2.1513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 588.523400][ T30] audit: type=1400 audit(1742779124.662:1270): avc: denied { prog_load } for pid=11582 comm="syz.2.1513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 588.770658][ T30] audit: type=1400 audit(1742779124.662:1271): avc: denied { prog_load } for pid=11582 comm="syz.2.1513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 592.609458][T11659] snd_dummy snd_dummy.0: control 1:-1:0:syz0:-3 is already present [ 593.416752][ T30] kauditd_printk_skb: 145 callbacks suppressed [ 593.416768][ T30] audit: type=1400 audit(1742779129.562:1417): avc: denied { create } for pid=11660 comm="syz.2.1539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 593.472522][ T30] audit: type=1400 audit(1742779129.562:1418): avc: denied { read } for pid=11660 comm="syz.2.1539" dev="nsfs" ino=4026532915 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 593.570143][ T30] audit: type=1400 audit(1742779129.832:1419): avc: denied { prog_load } for pid=11671 comm="syz.3.1542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 593.855475][ T30] audit: type=1400 audit(1742779129.832:1420): avc: denied { execmem } for pid=11671 comm="syz.3.1542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 593.929539][ T30] audit: type=1400 audit(1742779129.902:1421): avc: denied { read write } for pid=10909 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 593.977764][ T30] audit: type=1400 audit(1742779129.952:1422): avc: denied { read } for pid=11674 comm="syz.5.1543" dev="nsfs" ino=4026533616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 593.999383][ T30] audit: type=1400 audit(1742779129.962:1423): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 594.077781][ T30] audit: type=1400 audit(1742779129.972:1424): avc: denied { create } for pid=11671 comm="syz.3.1542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 594.137678][ T30] audit: type=1400 audit(1742779129.972:1425): avc: denied { mounton } for pid=11671 comm="syz.3.1542" path="/334/file0" dev="tmpfs" ino=1746 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 594.214776][ T30] audit: type=1400 audit(1742779129.972:1426): avc: denied { remount } for pid=11671 comm="syz.3.1542" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 595.137495][T11712] SELinux: syz.5.1556 (11712) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 595.947451][T11723] xt_CHECKSUM: unsupported CHECKSUM operation 68 [ 598.424900][ T30] kauditd_printk_skb: 146 callbacks suppressed [ 598.424916][ T30] audit: type=1400 audit(1742779134.832:1573): avc: denied { create } for pid=11779 comm="syz.5.1579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 598.874046][ T30] audit: type=1400 audit(1742779135.282:1574): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 598.962003][ T30] audit: type=1400 audit(1742779135.312:1575): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 599.015129][ T30] audit: type=1400 audit(1742779135.322:1576): avc: denied { read write } for pid=5817 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 599.071105][ T5922] libceph: connect (1)[c::]:6789 error -101 [ 599.077422][ T5922] libceph: mon0 (1)[c::]:6789 connect error [ 599.092157][ T30] audit: type=1400 audit(1742779135.322:1577): avc: denied { create } for pid=11782 comm="syz.2.1580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 599.114820][ T30] audit: type=1400 audit(1742779135.332:1578): avc: denied { execmem } for pid=11782 comm="syz.2.1580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 599.137444][ T30] audit: type=1400 audit(1742779135.332:1579): avc: denied { create } for pid=11782 comm="syz.2.1580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 599.137642][T11790] ceph: No mds server is up or the cluster is laggy [ 599.168860][ T30] audit: type=1400 audit(1742779135.352:1580): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 599.365716][ T30] audit: type=1400 audit(1742779135.372:1581): avc: denied { execmem } for pid=11784 comm="syz.0.1581" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 599.460403][ T30] audit: type=1400 audit(1742779135.452:1582): avc: denied { create } for pid=11787 comm="syz.3.1582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 601.294847][T11824] lo speed is unknown, defaulting to 1000 [ 603.468652][ T30] kauditd_printk_skb: 125 callbacks suppressed [ 603.468668][ T30] audit: type=1400 audit(1742779139.872:1708): avc: denied { prog_load } for pid=11863 comm="syz.0.1607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 603.505253][ T30] audit: type=1400 audit(1742779139.882:1709): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 603.583432][ T30] audit: type=1400 audit(1742779139.962:1710): avc: denied { read write } for pid=10909 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 603.640363][ T30] audit: type=1400 audit(1742779139.962:1711): avc: denied { execmem } for pid=11870 comm="syz.4.1610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 603.697143][ T30] audit: type=1400 audit(1742779139.972:1712): avc: denied { create } for pid=11872 comm="syz.2.1609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 603.750350][ T30] audit: type=1400 audit(1742779139.982:1713): avc: denied { create } for pid=11863 comm="syz.0.1607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 603.821667][ T30] audit: type=1400 audit(1742779139.982:1714): avc: denied { create } for pid=11863 comm="syz.0.1607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=0 [ 603.880759][ T30] audit: type=1400 audit(1742779139.982:1715): avc: denied { prog_load } for pid=11872 comm="syz.2.1609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 603.927381][ T30] audit: type=1400 audit(1742779139.982:1716): avc: denied { prog_load } for pid=11872 comm="syz.2.1609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 603.998590][ T30] audit: type=1400 audit(1742779139.982:1717): avc: denied { read } for pid=11872 comm="syz.2.1609" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 604.297503][T11884] lo speed is unknown, defaulting to 1000 [ 607.662545][T11946] trusted_key: encrypted_key: master key parameter 'àH' is invalid [ 608.564820][ T30] kauditd_printk_skb: 133 callbacks suppressed [ 608.564837][ T30] audit: type=1400 audit(1742779144.972:1851): avc: denied { prog_load } for pid=11960 comm="syz.0.1638" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 608.750285][ T30] audit: type=1400 audit(1742779145.152:1852): avc: denied { read write } for pid=10909 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 608.884859][ T30] audit: type=1400 audit(1742779145.292:1853): avc: denied { create } for pid=11962 comm="syz.5.1639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 608.957063][ T30] audit: type=1400 audit(1742779145.322:1854): avc: denied { create } for pid=11962 comm="syz.5.1639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 609.004700][ T30] audit: type=1400 audit(1742779145.322:1855): avc: denied { execmem } for pid=11962 comm="syz.5.1639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 609.058844][ T30] audit: type=1400 audit(1742779145.362:1856): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 609.120193][ T30] audit: type=1400 audit(1742779145.382:1857): avc: denied { read } for pid=11962 comm="syz.5.1639" dev="nsfs" ino=4026533616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 609.146072][ T30] audit: type=1400 audit(1742779145.382:1858): avc: denied { create } for pid=11962 comm="syz.5.1639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 609.456538][ T30] audit: type=1400 audit(1742779145.382:1859): avc: denied { create } for pid=11962 comm="syz.5.1639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 609.489178][ T30] audit: type=1400 audit(1742779145.382:1860): avc: denied { create } for pid=11962 comm="syz.5.1639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 609.924941][T11988] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11988 comm=syz.3.1649 [ 611.801126][ T5922] libceph: connect (1)[c::]:6789 error -101 [ 611.807475][ T5922] libceph: mon0 (1)[c::]:6789 connect error [ 611.816355][ T5922] libceph: connect (1)[c::]:6789 error -101 [ 611.824697][ T5922] libceph: mon0 (1)[c::]:6789 connect error [ 612.090728][ T5922] libceph: connect (1)[c::]:6789 error -101 [ 612.096850][ T5922] libceph: mon0 (1)[c::]:6789 connect error [ 612.552946][T12036] ceph: No mds server is up or the cluster is laggy [ 612.610782][ T5922] libceph: connect (1)[c::]:6789 error -101 [ 612.619734][ T5922] libceph: mon0 (1)[c::]:6789 connect error [ 612.902054][T12066] xt_hashlimit: max too large, truncated to 1048576 [ 613.583350][ T30] kauditd_printk_skb: 231 callbacks suppressed [ 613.583366][ T30] audit: type=1400 audit(1742779149.992:2092): avc: denied { read write } for pid=12078 comm="syz.2.1681" name="userio" dev="devtmpfs" ino=914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 613.688555][ T30] audit: type=1400 audit(1742779150.022:2093): avc: denied { create } for pid=12078 comm="syz.2.1681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=0 [ 613.792724][ T30] audit: type=1400 audit(1742779150.202:2094): avc: denied { read write } for pid=5817 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 613.874058][ T30] audit: type=1400 audit(1742779150.282:2095): avc: denied { map_create } for pid=12084 comm="syz.3.1682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 614.030357][ T30] audit: type=1400 audit(1742779150.282:2096): avc: denied { prog_load } for pid=12084 comm="syz.3.1682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 614.070685][ T30] audit: type=1400 audit(1742779150.282:2097): avc: denied { read } for pid=12084 comm="syz.3.1682" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 614.103970][ T30] audit: type=1400 audit(1742779150.282:2098): avc: denied { read write } for pid=12084 comm="syz.3.1682" name="video7" dev="devtmpfs" ino=949 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 [ 614.168234][ T30] audit: type=1400 audit(1742779150.282:2099): avc: denied { read write } for pid=12084 comm="syz.3.1682" name="video9" dev="devtmpfs" ino=957 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 [ 614.224933][ T30] audit: type=1400 audit(1742779150.332:2100): avc: denied { read write } for pid=5817 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 614.332726][ T30] audit: type=1400 audit(1742779150.432:2101): avc: denied { prog_load } for pid=12086 comm="syz.3.1683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 616.546977][ T5822] Bluetooth: hci5: sending frame failed (-49) [ 616.554259][T10453] Bluetooth: hci5: Opcode 0x1003 failed: -49 [ 617.907568][T12147] x_tables: ip_tables: osf match: only valid for protocol 6 [ 618.602113][ T30] kauditd_printk_skb: 129 callbacks suppressed [ 618.602129][ T30] audit: type=1400 audit(1742779155.012:2231): avc: denied { map_create } for pid=12161 comm="syz.5.1707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 618.656471][ T30] audit: type=1400 audit(1742779155.032:2232): avc: denied { create } for pid=12161 comm="syz.5.1707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=0 [ 618.746022][ T30] audit: type=1400 audit(1742779155.042:2233): avc: denied { read } for pid=12161 comm="syz.5.1707" dev="nsfs" ino=4026533616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 618.800520][ T30] audit: type=1400 audit(1742779155.102:2234): avc: denied { read write } for pid=5817 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 618.843518][ T30] audit: type=1400 audit(1742779155.122:2235): avc: denied { create } for pid=12166 comm="syz.2.1709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 618.864332][ T30] audit: type=1400 audit(1742779155.132:2236): avc: denied { execmem } for pid=12168 comm="syz.3.1710" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 618.886556][ T30] audit: type=1400 audit(1742779155.152:2237): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 618.914915][ T30] audit: type=1400 audit(1742779155.162:2238): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 618.941851][ T30] audit: type=1400 audit(1742779155.192:2239): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 618.971583][ T30] audit: type=1400 audit(1742779155.202:2240): avc: denied { create } for pid=12168 comm="syz.3.1710" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 621.219637][T12223] syz.0.1730 (12223): drop_caches: 2 [ 621.226968][T12223] syz.0.1730 (12223): drop_caches: 2 [ 622.685852][T12253] xt_l2tp: invalid flags combination: c [ 623.789075][ T30] kauditd_printk_skb: 200 callbacks suppressed [ 623.789090][ T30] audit: type=1400 audit(1742779160.192:2441): avc: denied { read write } for pid=10909 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 623.895487][ T30] audit: type=1400 audit(1742779160.302:2442): avc: denied { create } for pid=12275 comm="syz.5.1749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 623.962598][ T30] audit: type=1400 audit(1742779160.342:2443): avc: denied { create } for pid=12275 comm="syz.5.1749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 624.016085][ T1295] ieee802154 phy0 wpan0: encryption failed: -22 [ 624.025895][ T30] audit: type=1400 audit(1742779160.342:2444): avc: denied { read } for pid=12275 comm="syz.5.1749" dev="nsfs" ino=4026533616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 624.047081][ C0] vkms_vblank_simulate: vblank timer overrun [ 624.056353][ T30] audit: type=1400 audit(1742779160.342:2445): avc: denied { read } for pid=12275 comm="syz.5.1749" dev="nsfs" ino=4026533616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 624.081892][ T30] audit: type=1400 audit(1742779160.342:2446): avc: denied { create } for pid=12275 comm="syz.5.1749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 624.154586][ T30] audit: type=1400 audit(1742779160.342:2447): avc: denied { read } for pid=12275 comm="syz.5.1749" dev="nsfs" ino=4026533616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 624.229199][ T30] audit: type=1400 audit(1742779160.342:2448): avc: denied { read } for pid=12275 comm="syz.5.1749" dev="nsfs" ino=4026533616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 624.271276][T10453] Bluetooth: hci4: Ignoring HCI_Connection_Complete for existing connection [ 624.297273][ T30] audit: type=1400 audit(1742779160.342:2449): avc: denied { create } for pid=12275 comm="syz.5.1749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 624.324760][ T30] audit: type=1400 audit(1742779160.342:2450): avc: denied { create } for pid=12275 comm="syz.5.1749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 626.200563][T12318] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1764'. [ 626.270613][T12318] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1764'. [ 626.630652][T12316] mmap: syz.0.1762 (12316) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 626.919716][T12341] netdevsim netdevsim5: loading /lib/firmware/. failed with error -22 [ 626.969862][T12341] netdevsim netdevsim5: Direct firmware load for . failed with error -22 [ 627.012943][T12341] netdevsim netdevsim5: Falling back to sysfs fallback for: . [ 628.794671][ T30] kauditd_printk_skb: 180 callbacks suppressed [ 628.794686][ T30] audit: type=1400 audit(1742779165.202:2631): avc: denied { read } for pid=12380 comm="syz.4.1787" name="iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 628.826872][ T30] audit: type=1400 audit(1742779165.232:2632): avc: denied { write } for pid=12380 comm="syz.4.1787" name="event2" dev="devtmpfs" ino=922 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=0 [ 628.856329][ T30] audit: type=1400 audit(1742779165.262:2633): avc: denied { read } for pid=12380 comm="syz.4.1787" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 629.045107][ T30] audit: type=1400 audit(1742779165.452:2634): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 629.076656][ T30] audit: type=1400 audit(1742779165.482:2635): avc: denied { create } for pid=12383 comm="syz.4.1788" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 629.097138][ T30] audit: type=1400 audit(1742779165.482:2636): avc: denied { create } for pid=12383 comm="syz.4.1788" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 629.119223][ T30] audit: type=1400 audit(1742779165.482:2637): avc: denied { prog_load } for pid=12383 comm="syz.4.1788" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 629.161396][ T30] audit: type=1400 audit(1742779165.482:2638): avc: denied { execmem } for pid=12383 comm="syz.4.1788" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 629.223946][ T30] audit: type=1400 audit(1742779165.552:2639): avc: denied { map_create } for pid=12383 comm="syz.4.1788" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 629.243501][ T30] audit: type=1400 audit(1742779165.552:2640): avc: denied { map_create } for pid=12383 comm="syz.4.1788" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 630.112180][T12404] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 630.624412][T12414] lo speed is unknown, defaulting to 1000 [ 631.195031][T12420] lo speed is unknown, defaulting to 1000 [ 632.587896][T12444] ptrace attach of "./syz-executor exec"[5818] was attempted by "./syz-executor exec"[12444] [ 633.804065][ T30] kauditd_printk_skb: 137 callbacks suppressed [ 633.804112][ T30] audit: type=1400 audit(1742779170.212:2778): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 633.887468][ T30] audit: type=1400 audit(1742779170.252:2779): avc: denied { read write } for pid=10909 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 633.920344][ T30] audit: type=1400 audit(1742779170.292:2780): avc: denied { create } for pid=12465 comm="syz.5.1815" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 633.960375][ T30] audit: type=1400 audit(1742779170.292:2781): avc: denied { create } for pid=12465 comm="syz.5.1815" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 634.000284][ T30] audit: type=1400 audit(1742779170.402:2782): avc: denied { execmem } for pid=12465 comm="syz.5.1815" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 634.092588][ T30] audit: type=1400 audit(1742779170.402:2783): avc: denied { read } for pid=12464 comm="syz.2.1814" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 634.140394][ T30] audit: type=1400 audit(1742779170.402:2784): avc: denied { prog_load } for pid=12464 comm="syz.2.1814" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 634.350367][ T30] audit: type=1400 audit(1742779170.402:2785): avc: denied { execmem } for pid=12464 comm="syz.2.1814" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 634.390412][ T30] audit: type=1400 audit(1742779170.402:2786): avc: denied { block_suspend } for pid=12464 comm="syz.2.1814" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 634.432593][ T30] audit: type=1400 audit(1742779170.502:2787): avc: denied { create } for pid=12464 comm="syz.2.1814" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 636.939366][T12526] netdevsim netdevsim3: loading /lib/firmware/. failed with error -22 [ 636.966362][T12526] netdevsim netdevsim3: Direct firmware load for . failed with error -22 [ 636.975420][T12526] netdevsim netdevsim3: Falling back to sysfs fallback for: . [ 637.259090][T12533] mkiss: ax0: crc mode is auto. [ 638.819653][ T30] kauditd_printk_skb: 194 callbacks suppressed [ 638.819667][ T30] audit: type=1400 audit(1742779628.217:2982): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 638.867159][ T30] audit: type=1400 audit(1742779628.267:2983): avc: denied { prog_load } for pid=12567 comm="syz.2.1852" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 638.899962][ T30] audit: type=1400 audit(1742779628.297:2984): avc: denied { read } for pid=12570 comm="syz.4.1853" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 638.933635][ T30] audit: type=1400 audit(1742779628.337:2985): avc: denied { mounton } for pid=12570 comm="syz.4.1853" path="/379/file0" dev="tmpfs" ino=2018 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 638.967422][ T30] audit: type=1400 audit(1742779628.357:2986): avc: denied { read write } for pid=12570 comm="syz.4.1853" name="vbi9" dev="devtmpfs" ino=1005 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 [ 639.048642][ T30] audit: type=1400 audit(1742779628.367:2987): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 639.075636][ T30] audit: type=1400 audit(1742779628.397:2988): avc: denied { read write } for pid=12572 comm="syz.4.1854" name="nullb0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 639.099125][ T30] audit: type=1400 audit(1742779628.407:2989): avc: denied { execmem } for pid=12572 comm="syz.4.1854" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 639.118648][ T30] audit: type=1400 audit(1742779628.407:2990): avc: denied { create } for pid=12572 comm="syz.4.1854" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 639.147698][ T30] audit: type=1400 audit(1742779628.407:2991): avc: denied { read append } for pid=12572 comm="syz.4.1854" name="loop6" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 640.170730][ T5822] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 643.978540][ T30] kauditd_printk_skb: 130 callbacks suppressed [ 643.978556][ T30] audit: type=1400 audit(1742779633.377:3122): avc: denied { read write } for pid=10909 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 644.182623][ T30] audit: type=1400 audit(1742779633.587:3123): avc: denied { create } for pid=12671 comm="syz.5.1887" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 644.550321][ T30] audit: type=1400 audit(1742779633.947:3124): avc: denied { execute } for pid=12671 comm="syz.5.1887" name="file0" dev="tmpfs" ino=559 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 644.656134][ T30] audit: type=1400 audit(1742779633.997:3125): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 644.719654][ T30] audit: type=1400 audit(1742779634.057:3126): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 644.746734][ T30] audit: type=1400 audit(1742779634.057:3127): avc: denied { create } for pid=12677 comm="syz.2.1888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 644.770105][ T30] audit: type=1400 audit(1742779634.057:3128): avc: denied { create } for pid=12677 comm="syz.2.1888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 644.792684][ T30] audit: type=1400 audit(1742779634.057:3129): avc: denied { read } for pid=12677 comm="syz.2.1888" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 644.817635][ T30] audit: type=1400 audit(1742779634.097:3130): avc: denied { create } for pid=12677 comm="syz.2.1888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 644.842369][ T30] audit: type=1400 audit(1742779634.117:3131): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 644.867157][ T5922] IPVS: starting estimator thread 0... [ 644.974630][T12681] IPVS: using max 51 ests per chain, 122400 per kthread [ 645.393057][T12701] ceph: No mds server is up or the cluster is laggy [ 645.775648][ T6716] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 646.828011][T12731] lo speed is unknown, defaulting to 1000 [ 647.985403][T12752] lo speed is unknown, defaulting to 1000 [ 648.331528][ T12] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 648.987310][ T30] kauditd_printk_skb: 186 callbacks suppressed [ 648.987327][ T30] audit: type=1400 audit(1742779638.387:3318): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 649.048427][ T30] audit: type=1400 audit(1742779638.437:3319): avc: denied { execmem } for pid=12786 comm="syz.4.1928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 649.104568][ T30] audit: type=1400 audit(1742779638.437:3320): avc: denied { map } for pid=12786 comm="syz.4.1928" path="socket:[33983]" dev="sockfs" ino=33983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=0 [ 649.132166][ T30] audit: type=1400 audit(1742779638.497:3321): avc: denied { read } for pid=12786 comm="syz.4.1928" dev="nsfs" ino=4026533232 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 649.196508][ T30] audit: type=1400 audit(1742779638.507:3322): avc: denied { read write } for pid=12786 comm="syz.4.1928" name="radio9" dev="devtmpfs" ino=1008 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 [ 649.263315][ T30] audit: type=1400 audit(1742779638.577:3323): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 649.454272][ T30] audit: type=1400 audit(1742779638.647:3324): avc: denied { read write } for pid=5817 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 649.485971][ T30] audit: type=1400 audit(1742779638.647:3325): avc: denied { read write } for pid=12791 comm="syz.2.1930" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 649.512902][ T30] audit: type=1400 audit(1742779638.657:3326): avc: denied { read write } for pid=12791 comm="syz.2.1930" name="nullb0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 649.569419][ T30] audit: type=1400 audit(1742779638.657:3327): avc: denied { prog_load } for pid=12791 comm="syz.2.1930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 650.463027][T12798] lo speed is unknown, defaulting to 1000 [ 651.547400][ T6686] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 652.266763][T12832] lo speed is unknown, defaulting to 1000 [ 652.955545][T12859] lo speed is unknown, defaulting to 1000 [ 654.063636][ T30] kauditd_printk_skb: 169 callbacks suppressed [ 654.063653][ T30] audit: type=1400 audit(1742779643.467:3497): avc: denied { create } for pid=12891 comm="syz.0.1961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 654.091761][T10481] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 654.111595][T12892] trusted_key: encrypted_key: key description must be 16 hexadecimal characters long [ 654.168626][ T30] audit: type=1400 audit(1742779643.517:3498): avc: denied { read } for pid=12891 comm="syz.0.1961" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 654.191318][ C0] vkms_vblank_simulate: vblank timer overrun [ 654.432895][ T30] audit: type=1400 audit(1742779643.837:3499): avc: denied { read write } for pid=5817 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 654.457065][ C0] vkms_vblank_simulate: vblank timer overrun [ 654.514359][ T30] audit: type=1400 audit(1742779643.887:3500): avc: denied { execmem } for pid=12894 comm="syz.3.1962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 654.569439][ T30] audit: type=1400 audit(1742779643.957:3501): avc: denied { create } for pid=12894 comm="syz.3.1962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=0 [ 654.588989][ C0] vkms_vblank_simulate: vblank timer overrun [ 654.634487][ T30] audit: type=1400 audit(1742779643.957:3502): avc: denied { prog_load } for pid=12894 comm="syz.3.1962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 654.653614][ C0] vkms_vblank_simulate: vblank timer overrun [ 654.677851][T12892] lo speed is unknown, defaulting to 1000 [ 654.694267][ T30] audit: type=1400 audit(1742779643.957:3503): avc: denied { read append } for pid=12894 comm="syz.3.1962" name="dlm-monitor" dev="devtmpfs" ino=95 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 654.780871][ T30] audit: type=1400 audit(1742779643.957:3504): avc: denied { create } for pid=12894 comm="syz.3.1962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=0 [ 654.826396][ T30] audit: type=1400 audit(1742779644.127:3505): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 655.054647][ T30] audit: type=1400 audit(1742779644.177:3506): avc: denied { prog_load } for pid=12897 comm="syz.2.1963" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 655.403680][T12910] lo speed is unknown, defaulting to 1000 [ 656.810660][ T5822] Bluetooth: hci4: command 0x0406 tx timeout [ 657.291877][ T12] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 658.527540][T12979] ERROR: device name not specified. [ 659.134954][ T30] kauditd_printk_skb: 164 callbacks suppressed [ 659.134965][ T30] audit: type=1400 audit(1742779648.527:3671): avc: denied { create } for pid=12981 comm="syz.0.1993" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 659.184921][ T6686] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 659.460365][ T30] audit: type=1400 audit(1742779648.857:3672): avc: denied { read write } for pid=10909 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 659.508803][ T30] audit: type=1400 audit(1742779648.907:3673): avc: denied { mounton } for pid=12993 comm="syz.5.1996" path="/126/file0" dev="tmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 659.579640][ T30] audit: type=1400 audit(1742779648.907:3674): avc: denied { read write } for pid=5817 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 659.715852][ T30] audit: type=1400 audit(1742779648.947:3675): avc: denied { execmem } for pid=12993 comm="syz.5.1996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 659.789132][ T30] audit: type=1400 audit(1742779648.987:3676): avc: denied { map_create } for pid=12993 comm="syz.5.1996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 659.864613][ T30] audit: type=1400 audit(1742779648.987:3677): avc: denied { prog_load } for pid=12993 comm="syz.5.1996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 659.998715][ T30] audit: type=1400 audit(1742779649.027:3678): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 660.063681][ T30] audit: type=1400 audit(1742779649.067:3679): avc: denied { read } for pid=12997 comm="syz.3.1997" name="card1" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=0 [ 660.254788][ T30] audit: type=1400 audit(1742779649.077:3680): avc: denied { prog_load } for pid=12997 comm="syz.3.1997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 663.051561][ T1100] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 663.573093][T13074] x_tables: duplicate underflow at hook 2 [ 664.215821][ T30] kauditd_printk_skb: 164 callbacks suppressed [ 664.215837][ T30] audit: type=1400 audit(1742779653.617:3845): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 664.776446][ T30] audit: type=1400 audit(1742779653.667:3846): avc: denied { prog_load } for pid=13089 comm="syz.5.2027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 664.949328][ T30] audit: type=1400 audit(1742779653.677:3847): avc: denied { read } for pid=13089 comm="syz.5.2027" name="autofs" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=0 [ 664.973720][ T12] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 665.079056][ T30] audit: type=1400 audit(1742779653.677:3848): avc: denied { read write } for pid=13089 comm="syz.5.2027" name="event3" dev="devtmpfs" ino=1017 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=0 [ 665.194819][ T30] audit: type=1400 audit(1742779654.127:3849): avc: denied { read write } for pid=5817 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 665.290354][ T30] audit: type=1400 audit(1742779654.127:3850): avc: denied { create } for pid=13087 comm="syz.4.2026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 665.370450][ T30] audit: type=1400 audit(1742779654.147:3851): avc: denied { read } for pid=13094 comm="syz.2.2028" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 665.470300][ T30] audit: type=1400 audit(1742779654.147:3852): avc: denied { create } for pid=13094 comm="syz.2.2028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 665.620296][ T30] audit: type=1400 audit(1742779654.147:3853): avc: denied { mounton } for pid=13094 comm="syz.2.2028" path="/401" dev="tmpfs" ino=2136 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 666.082375][ T30] audit: type=1400 audit(1742779654.147:3854): avc: denied { read } for pid=13094 comm="syz.2.2028" name="iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 666.340043][T10481] Bluetooth: hci5: Frame reassembly failed (-84) [ 668.410366][T10453] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 668.410458][ T5822] Bluetooth: hci5: command 0x1003 tx timeout [ 668.850803][ T6686] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 669.221595][ T30] kauditd_printk_skb: 135 callbacks suppressed [ 669.221608][ T30] audit: type=1400 audit(1742779658.627:3990): avc: denied { create } for pid=13167 comm="syz.5.2054" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 669.462652][ T30] audit: type=1400 audit(1742779658.717:3991): avc: denied { create } for pid=13171 comm="syz.0.2055" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 669.550386][ T30] audit: type=1400 audit(1742779658.717:3992): avc: denied { create } for pid=13171 comm="syz.0.2055" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 669.570892][ T30] audit: type=1400 audit(1742779658.747:3993): avc: denied { create } for pid=13176 comm="syz.4.2056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 669.591672][ T30] audit: type=1400 audit(1742779658.757:3994): avc: denied { map_create } for pid=13176 comm="syz.4.2056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 669.610970][ T30] audit: type=1400 audit(1742779658.757:3995): avc: denied { create } for pid=13176 comm="syz.4.2056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 669.631623][ T30] audit: type=1400 audit(1742779658.757:3996): avc: denied { create } for pid=13176 comm="syz.4.2056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 669.909073][ T30] audit: type=1400 audit(1742779658.757:3997): avc: denied { read } for pid=13176 comm="syz.4.2056" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 670.067285][ T30] audit: type=1400 audit(1742779658.757:3998): avc: denied { create } for pid=13176 comm="syz.4.2056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 670.161547][ T30] audit: type=1400 audit(1742779658.817:3999): avc: denied { prog_load } for pid=13178 comm="syz.2.2057" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 670.730817][ T1100] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 674.335823][ T30] kauditd_printk_skb: 157 callbacks suppressed [ 674.335846][ T30] audit: type=1400 audit(1742779663.737:4157): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 674.417742][ T30] audit: type=1400 audit(1742779663.817:4158): avc: denied { prog_load } for pid=13267 comm="syz.2.2090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 674.457990][ T30] audit: type=1400 audit(1742779663.847:4159): avc: denied { create } for pid=13267 comm="syz.2.2090" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 674.500166][ T30] audit: type=1400 audit(1742779663.847:4160): avc: denied { create } for pid=13267 comm="syz.2.2090" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 674.542913][ T30] audit: type=1400 audit(1742779663.847:4161): avc: denied { read write } for pid=13267 comm="syz.2.2090" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 674.566481][ C0] vkms_vblank_simulate: vblank timer overrun [ 674.573742][ T6686] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 674.634242][ T30] audit: type=1400 audit(1742779663.847:4162): avc: denied { create } for pid=13267 comm="syz.2.2090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 674.675840][ T30] audit: type=1400 audit(1742779664.007:4163): avc: denied { read write } for pid=10909 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 674.700095][ C0] vkms_vblank_simulate: vblank timer overrun [ 674.919494][ T30] audit: type=1400 audit(1742779664.037:4164): avc: denied { read write } for pid=5817 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 674.943871][ T30] audit: type=1400 audit(1742779664.147:4165): avc: denied { mounton } for pid=13269 comm="syz.5.2091" path="/151/bus" dev="tmpfs" ino=817 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 674.966507][ T30] audit: type=1400 audit(1742779664.307:4166): avc: denied { read write } for pid=5817 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 675.850651][T10481] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 676.550179][T13310] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13310 comm=syz.3.2104 [ 679.264400][T13377] x_tables: duplicate underflow at hook 2 [ 679.345192][ T30] kauditd_printk_skb: 178 callbacks suppressed [ 679.345208][ T30] audit: type=1400 audit(1742779668.747:4345): avc: denied { map_create } for pid=13374 comm="syz.5.2129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 679.418812][ T30] audit: type=1400 audit(1742779668.747:4346): avc: denied { map_create } for pid=13374 comm="syz.5.2129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 679.462717][ T30] audit: type=1400 audit(1742779668.747:4347): avc: denied { prog_load } for pid=13374 comm="syz.5.2129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 679.523429][ T30] audit: type=1400 audit(1742779668.757:4348): avc: denied { execmem } for pid=13382 comm="syz.0.2132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 679.564746][ T30] audit: type=1400 audit(1742779668.797:4349): avc: denied { execmem } for pid=13379 comm="syz.3.2131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 679.634147][ T30] audit: type=1400 audit(1742779668.797:4350): avc: denied { create } for pid=13379 comm="syz.3.2131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 679.727760][ T30] audit: type=1400 audit(1742779668.797:4351): avc: denied { read write } for pid=13379 comm="syz.3.2131" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 679.795113][ T30] audit: type=1400 audit(1742779668.797:4352): avc: denied { create } for pid=13379 comm="syz.3.2131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 679.815966][ T30] audit: type=1400 audit(1742779668.797:4353): avc: denied { mounton } for pid=13379 comm="syz.3.2131" path="/451/file0" dev="tmpfs" ino=2350 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 679.988990][ T30] audit: type=1400 audit(1742779668.817:4354): avc: denied { sqpoll } for pid=13382 comm="syz.0.2132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 680.331046][ T6686] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 680.971263][ T12] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 684.380809][ T30] kauditd_printk_skb: 215 callbacks suppressed [ 684.380825][ T30] audit: type=1400 audit(1742779673.787:4570): avc: denied { create } for pid=13491 comm="syz.3.2173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 684.553386][ T30] audit: type=1400 audit(1742779673.787:4571): avc: denied { execmem } for pid=13491 comm="syz.3.2173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 684.650349][ T30] audit: type=1400 audit(1742779673.837:4572): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 684.674801][ T30] audit: type=1400 audit(1742779673.857:4573): avc: denied { execute } for pid=13491 comm="syz.3.2173" name="file1" dev="tmpfs" ino=2387 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 684.697322][ T30] audit: type=1400 audit(1742779673.857:4574): avc: denied { write } for pid=13491 comm="syz.3.2173" path="/dev/vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=0 [ 684.720954][ C0] vkms_vblank_simulate: vblank timer overrun [ 684.727216][ T30] audit: type=1400 audit(1742779674.017:4575): avc: denied { read write } for pid=10909 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 684.751486][ C0] vkms_vblank_simulate: vblank timer overrun [ 684.770074][ T30] audit: type=1400 audit(1742779674.027:4576): avc: denied { prog_load } for pid=13496 comm="syz.4.2174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 684.798080][ T30] audit: type=1400 audit(1742779674.037:4577): avc: denied { execmem } for pid=13496 comm="syz.4.2174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 684.817399][ C0] vkms_vblank_simulate: vblank timer overrun [ 684.835836][ T30] audit: type=1400 audit(1742779674.197:4578): avc: denied { create } for pid=13496 comm="syz.4.2174" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 684.924666][ T30] audit: type=1400 audit(1742779674.237:4579): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 685.453195][ T1295] ieee802154 phy0 wpan0: encryption failed: -22 [ 686.093243][ T6686] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 686.211622][T13516] trusted_key: encrypted_key: key description must be 16 hexadecimal characters long [ 686.672150][T13516] lo speed is unknown, defaulting to 1000 [ 686.731066][ T6716] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 687.234202][ T971] libceph: connect (1)[c::]:6789 error -101 [ 687.246928][ T971] libceph: mon0 (1)[c::]:6789 connect error [ 687.540880][ T971] libceph: connect (1)[c::]:6789 error -101 [ 687.546926][ T971] libceph: mon0 (1)[c::]:6789 connect error [ 687.830288][T13529] ceph: No mds server is up or the cluster is laggy [ 689.413293][ T30] kauditd_printk_skb: 116 callbacks suppressed [ 689.413309][ T30] audit: type=1400 audit(1742779678.817:4696): avc: denied { create } for pid=13568 comm="syz.2.2196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 689.465137][ T30] audit: type=1400 audit(1742779678.847:4697): avc: denied { read write } for pid=13568 comm="syz.2.2196" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 689.586411][ T30] audit: type=1400 audit(1742779678.987:4698): avc: denied { read write } for pid=5817 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 689.670359][ T30] audit: type=1400 audit(1742779679.067:4699): avc: denied { create } for pid=13574 comm="syz.3.2197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 689.730318][ T30] audit: type=1400 audit(1742779679.077:4700): avc: denied { create } for pid=13574 comm="syz.3.2197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 689.784736][ T30] audit: type=1400 audit(1742779679.077:4701): avc: denied { execmem } for pid=13574 comm="syz.3.2197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 689.831977][ T30] audit: type=1400 audit(1742779679.127:4702): avc: denied { map_create } for pid=13574 comm="syz.3.2197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 689.880447][ T30] audit: type=1400 audit(1742779679.127:4703): avc: denied { map_create } for pid=13574 comm="syz.3.2197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 689.915560][ T30] audit: type=1400 audit(1742779679.127:4704): avc: denied { prog_load } for pid=13574 comm="syz.3.2197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 689.962992][ T30] audit: type=1400 audit(1742779679.367:4705): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 690.016921][T13578] libceph: resolve '0.' (ret=-3): failed [ 691.859340][ T1100] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 691.872511][ T12] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 692.384592][T13630] lo speed is unknown, defaulting to 1000 [ 692.548790][T13637] block device autoloading is deprecated and will be removed. [ 693.384149][T13659] netdevsim netdevsim3: Direct firmware load for ./file0 failed with error -2 [ 693.559310][T13659] netdevsim netdevsim3: Falling back to sysfs fallback for: ./file0 [ 693.945427][T13654] lo speed is unknown, defaulting to 1000 [ 694.445342][ T30] kauditd_printk_skb: 204 callbacks suppressed [ 694.445355][ T30] audit: type=1400 audit(1742779683.847:4910): avc: denied { map_create } for pid=13680 comm="syz.4.2236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 694.471559][ T30] audit: type=1400 audit(1742779683.847:4911): avc: denied { map_create } for pid=13680 comm="syz.4.2236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 694.491194][ T30] audit: type=1400 audit(1742779683.847:4912): avc: denied { prog_load } for pid=13680 comm="syz.4.2236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 694.510447][ T30] audit: type=1400 audit(1742779683.877:4913): avc: denied { create } for pid=13677 comm="syz.3.2235" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 694.706828][ T30] audit: type=1400 audit(1742779684.107:4914): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 694.778619][ T30] audit: type=1400 audit(1742779684.177:4915): avc: denied { read write } for pid=10909 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 694.860357][ T30] audit: type=1400 audit(1742779684.247:4916): avc: denied { execmem } for pid=13684 comm="syz.2.2237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 694.912888][ T30] audit: type=1400 audit(1742779684.307:4917): avc: denied { prog_load } for pid=13686 comm="syz.5.2238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 694.959958][ T30] audit: type=1400 audit(1742779684.307:4918): avc: denied { execmem } for pid=13686 comm="syz.5.2238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 695.039679][T13688] lo speed is unknown, defaulting to 1000 [ 695.071675][ T30] audit: type=1400 audit(1742779684.327:4919): avc: denied { map_create } for pid=13684 comm="syz.2.2237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 696.148400][T13705] syz.0.2243 (13705): drop_caches: 2 [ 697.124883][T13736] mkiss: ax0: crc mode is auto. [ 697.612882][T10837] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 697.636694][ T6716] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 698.463729][T13755] kernel profiling enabled (shift: 7) [ 699.388791][ T971] IPVS: starting estimator thread 0... [ 699.398672][T13776] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 699.452649][ T30] kauditd_printk_skb: 159 callbacks suppressed [ 699.452665][ T30] audit: type=1400 audit(1742779688.857:5079): avc: denied { name_bind } for pid=13782 comm="syz.2.2270" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 699.483127][ T30] audit: type=1400 audit(1742779688.897:5080): avc: denied { read } for pid=13784 comm="syz.5.2271" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 699.540396][ T30] audit: type=1400 audit(1742779688.907:5081): avc: denied { create } for pid=13784 comm="syz.5.2271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 699.540476][T13781] IPVS: using max 37 ests per chain, 88800 per kthread [ 699.583745][ T30] audit: type=1400 audit(1742779688.907:5082): avc: denied { mounton } for pid=13784 comm="syz.5.2271" path="/187" dev="tmpfs" ino=1005 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 699.790551][ T30] audit: type=1400 audit(1742779688.917:5083): avc: denied { read } for pid=13784 comm="syz.5.2271" name="iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 699.906956][ T30] audit: type=1400 audit(1742779688.967:5084): avc: denied { execmem } for pid=13782 comm="syz.2.2270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 699.930364][ T30] audit: type=1400 audit(1742779689.017:5085): avc: denied { create } for pid=13782 comm="syz.2.2270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=0 [ 699.952683][ T30] audit: type=1400 audit(1742779689.017:5086): avc: denied { read } for pid=13782 comm="syz.2.2270" dev="nsfs" ino=4026532915 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 700.003771][ T30] audit: type=1400 audit(1742779689.407:5087): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 700.058792][ T30] audit: type=1400 audit(1742779689.437:5088): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 703.211114][T13840] trusted_key: encrypted_key: insufficient parameters specified [ 703.428583][ T6686] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 703.522028][T13849] IPVS: sync thread started: state = BACKUP, mcast_ifn = sit0, syncid = 0, id = 0 [ 704.482181][ T30] kauditd_printk_skb: 143 callbacks suppressed [ 704.482196][ T30] audit: type=1400 audit(1742779693.887:5232): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 704.551192][ T30] audit: type=1400 audit(1742779693.937:5233): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 704.608179][ T30] audit: type=1400 audit(1742779693.947:5234): avc: denied { create } for pid=13866 comm="syz.0.2299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 704.634376][ T30] audit: type=1400 audit(1742779694.007:5235): avc: denied { create } for pid=13868 comm="syz.2.2300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 704.663009][ T30] audit: type=1400 audit(1742779694.007:5236): avc: denied { prog_load } for pid=13868 comm="syz.2.2300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 704.686693][ T30] audit: type=1400 audit(1742779694.007:5237): avc: denied { execmem } for pid=13868 comm="syz.2.2300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 704.739325][ T30] audit: type=1400 audit(1742779694.057:5238): avc: denied { map_create } for pid=13868 comm="syz.2.2300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 704.775090][ T30] audit: type=1400 audit(1742779694.057:5239): avc: denied { map_create } for pid=13868 comm="syz.2.2300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 704.800394][ T30] audit: type=1400 audit(1742779694.067:5240): avc: denied { prog_load } for pid=13868 comm="syz.2.2300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 704.824363][ T30] audit: type=1400 audit(1742779694.067:5241): avc: denied { read } for pid=13866 comm="syz.0.2299" dev="nsfs" ino=4026532810 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 706.042754][ T6716] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 708.501194][ T6716] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 709.770372][ T30] kauditd_printk_skb: 195 callbacks suppressed [ 709.770396][ T30] audit: type=1400 audit(1742779698.847:5437): avc: denied { read } for pid=13964 comm="syz.3.2332" dev="nsfs" ino=4026532815 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 709.843849][ T30] audit: type=1400 audit(1742779698.887:5438): avc: denied { prog_load } for pid=13972 comm="syz.4.2336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 710.115356][ T30] audit: type=1400 audit(1742779698.897:5439): avc: denied { create } for pid=13972 comm="syz.4.2336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 710.149580][ T30] audit: type=1400 audit(1742779698.897:5440): avc: denied { execmem } for pid=13972 comm="syz.4.2336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 710.597121][ T30] audit: type=1400 audit(1742779698.907:5441): avc: denied { create } for pid=13972 comm="syz.4.2336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 710.646141][ T30] audit: type=1400 audit(1742779698.917:5442): avc: denied { create } for pid=13974 comm="syz.0.2337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 710.666420][ T30] audit: type=1400 audit(1742779698.947:5443): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 710.691841][ T30] audit: type=1400 audit(1742779698.977:5444): avc: denied { execmem } for pid=13974 comm="syz.0.2337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 710.778019][ T30] audit: type=1400 audit(1742779699.017:5445): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 710.856797][ T30] audit: type=1400 audit(1742779699.027:5446): avc: denied { execmem } for pid=13971 comm="syz.5.2335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 711.389141][T14018] xt_CT: No such helper "syz1" [ 711.691049][ T6716] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 712.947942][T14061] trusted_key: encrypted_key: key user:syz not found [ 713.013970][T14066] serio: Serial port ttyS3 [ 713.470152][ T5866] IPVS: starting estimator thread 0... [ 713.570441][T14074] IPVS: using max 53 ests per chain, 127200 per kthread [ 818.820167][ C0] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 818.827170][ C0] rcu: 1-...!: (3 ticks this GP) idle=68d4/1/0x4000000000000000 softirq=57778/57780 fqs=2 [ 818.838379][ C0] rcu: (detected by 0, t=10505 jiffies, g=54953, q=58 ncpus=2) [ 818.846023][ C0] Sending NMI from CPU 0 to CPUs 1: [ 818.846049][ C1] NMI backtrace for cpu 1 [ 818.846058][ C1] CPU: 1 UID: 0 PID: 14079 Comm: syz.5.2372 Not tainted 6.14.0-rc7-syzkaller-00205-g586de92313fc #0 [ 818.846075][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 818.846083][ C1] RIP: 0010:do_raw_spin_lock+0x1ab/0x2c0 [ 818.846101][ C1] Code: 00 00 00 fc ff df 48 c1 ea 03 65 4c 8b 25 0d ac 6c 7e 80 3c 02 00 0f 85 e9 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 63 10 <48> c7 44 05 00 00 00 00 00 48 8b 44 24 60 65 48 2b 04 25 28 00 00 [ 818.846114][ C1] RSP: 0018:ffffc90000a28d98 EFLAGS: 00000046 [ 818.846125][ C1] RAX: dffffc0000000000 RBX: ffff8880b872c680 RCX: ffffffff81972ccd [ 818.846135][ C1] RDX: 1ffff110170e58d2 RSI: 0000000000000004 RDI: ffffc90000a28dc0 [ 818.846144][ C1] RBP: 1ffff920001451b4 R08: 0000000000000001 R09: fffff520001451b8 [ 818.846153][ C1] R10: 0000000000000003 R11: 0000000000000001 R12: ffff888058e58000 [ 818.846161][ C1] R13: ffff8880b872c690 R14: 0000000000000001 R15: ffffffff896ae430 [ 818.846170][ C1] FS: 00007f03876276c0(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 [ 818.846185][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 818.846194][ C1] CR2: 0000200000111030 CR3: 000000004f36c000 CR4: 00000000003526f0 [ 818.846202][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 818.846210][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 818.846219][ C1] Call Trace: [ 818.846224][ C1] [ 818.846230][ C1] ? nmi_cpu_backtrace+0x1d8/0x390 [ 818.846248][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 818.846265][ C1] ? nmi_handle+0x1ac/0x5d0 [ 818.846283][ C1] ? do_raw_spin_lock+0x1ab/0x2c0 [ 818.846296][ C1] ? default_do_nmi+0x6a/0x160 [ 818.846310][ C1] ? exc_nmi+0x170/0x1e0 [ 818.846323][ C1] ? end_repeat_nmi+0xf/0x53 [ 818.846340][ C1] ? __pfx_advance_sched+0x10/0x10 [ 818.846356][ C1] ? do_raw_spin_lock+0x12d/0x2c0 [ 818.846369][ C1] ? do_raw_spin_lock+0x1ab/0x2c0 [ 818.846382][ C1] ? do_raw_spin_lock+0x1ab/0x2c0 [ 818.846395][ C1] ? do_raw_spin_lock+0x1ab/0x2c0 [ 818.846407][ C1] [ 818.846412][ C1] [ 818.846416][ C1] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 818.846429][ C1] ? lock_acquire+0x2f/0xb0 [ 818.846445][ C1] ? __hrtimer_run_queues+0x2be/0xae0 [ 818.846461][ C1] __hrtimer_run_queues+0x2be/0xae0 [ 818.846477][ C1] ? __pfx___hrtimer_run_queues+0x10/0x10 [ 818.846489][ C1] ? read_tsc+0x9/0x20 [ 818.846506][ C1] hrtimer_interrupt+0x392/0x8e0 [ 818.846523][ C1] __sysvec_apic_timer_interrupt+0x10f/0x400 [ 818.846544][ C1] sysvec_apic_timer_interrupt+0x9f/0xc0 [ 818.846561][ C1] [ 818.846565][ C1] [ 818.846570][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 818.846587][ C1] RIP: 0010:lock_acquire.part.0+0x155/0x380 [ 818.846606][ C1] Code: b8 ff ff ff ff 65 0f c1 05 70 ca 6b 7e 83 f8 01 0f 85 d0 01 00 00 9c 58 f6 c4 02 0f 85 e5 01 00 00 48 85 ed 0f 85 b6 01 00 00 <48> b8 00 00 00 00 00 fc ff df 48 01 c3 48 c7 03 00 00 00 00 48 c7 [ 818.846618][ C1] RSP: 0018:ffffc9000aabfbb8 EFLAGS: 00000206 [ 818.846629][ C1] RAX: 0000000000000046 RBX: 1ffff92001557f78 RCX: ffffffff8195c64e [ 818.846638][ C1] RDX: 0000000000000001 RSI: ffffffff8b6cff80 RDI: ffffffff8bd36a20 [ 818.846646][ C1] RBP: 0000000000000200 R08: 0000000000000000 R09: fffffbfff2dd8d9e [ 818.846655][ C1] R10: ffffffff96ec6cf7 R11: 0000000000000000 R12: 0000000000000000 [ 818.846663][ C1] R13: ffff888022ee0be0 R14: 0000000000000000 R15: 0000000000000000 [ 818.846674][ C1] ? hlock_class+0x4e/0x130 [ 818.846691][ C1] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 818.846709][ C1] ? rcu_is_watching+0x12/0xc0 [ 818.846724][ C1] ? trace_lock_acquire+0x14e/0x1f0 [ 818.846738][ C1] ? __might_fault+0xe3/0x190 [ 818.846754][ C1] ? lock_acquire+0x2f/0xb0 [ 818.846770][ C1] ? __might_fault+0xe3/0x190 [ 818.846785][ C1] ? __might_fault+0xe3/0x190 [ 818.846799][ C1] __might_fault+0x11b/0x190 [ 818.846814][ C1] ? __might_fault+0xe3/0x190 [ 818.846829][ C1] do_recvmmsg+0x321/0x740 [ 818.846849][ C1] ? __pfx_do_recvmmsg+0x10/0x10 [ 818.846876][ C1] ? do_futex+0x123/0x350 [ 818.846895][ C1] ? __x64_sys_futex+0x1e1/0x4c0 [ 818.846911][ C1] __x64_sys_recvmmsg+0x239/0x290 [ 818.846925][ C1] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 818.846940][ C1] do_syscall_64+0xcd/0x250 [ 818.846958][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 818.846976][ C1] RIP: 0033:0x7f038678d169 [ 818.846988][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 818.847000][ C1] RSP: 002b:00007f0387627038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 818.847011][ C1] RAX: ffffffffffffffda RBX: 00007f03869a5fa0 RCX: 00007f038678d169 [ 818.847020][ C1] RDX: 0000000000010106 RSI: 00002000000000c0 RDI: 0000000000000003 [ 818.847028][ C1] RBP: 00007f038680e2a0 R08: 0000000000000000 R09: 0000000000000000 [ 818.847035][ C1] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000000 [ 818.847043][ C1] R13: 0000000000000000 R14: 00007f03869a5fa0 R15: 00007ffcfe77fce8 [ 818.847055][ C1] [ 818.848043][ C0] rcu: rcu_preempt kthread starved for 10495 jiffies! g54953 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 [ 819.362439][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 819.372403][ C0] rcu: RCU grace-period kthread stack dump: [ 819.378279][ C0] task:rcu_preempt state:R running task stack:25744 pid:18 tgid:18 ppid:2 task_flags:0x208040 flags:0x00004000 [ 819.391763][ C0] Call Trace: [ 819.395208][ C0] [ 819.398143][ C0] __schedule+0xf43/0x5890 [ 819.402565][ C0] ? __pfx___lock_acquire+0x10/0x10 [ 819.407777][ C0] ? __pfx___schedule+0x10/0x10 [ 819.412627][ C0] ? schedule+0x298/0x350 [ 819.416959][ C0] ? __pfx_lock_release+0x10/0x10 [ 819.421986][ C0] ? lock_acquire+0x2f/0xb0 [ 819.426485][ C0] ? schedule+0x1fd/0x350 [ 819.430902][ C0] schedule+0xe7/0x350 [ 819.434968][ C0] schedule_timeout+0x124/0x280 [ 819.439816][ C0] ? __pfx_schedule_timeout+0x10/0x10 [ 819.445183][ C0] ? __pfx_process_timeout+0x10/0x10 [ 819.450470][ C0] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 819.456272][ C0] ? prepare_to_swait_event+0xf3/0x470 [ 819.461735][ C0] rcu_gp_fqs_loop+0x1eb/0xb00 [ 819.466503][ C0] ? __pfx_rcu_gp_fqs_loop+0x10/0x10 [ 819.471788][ C0] ? rcu_gp_init+0xc82/0x1630 [ 819.476466][ C0] ? lock_acquire+0x2f/0xb0 [ 819.480966][ C0] ? finish_swait+0xc5/0x280 [ 819.485558][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 819.491364][ C0] rcu_gp_kthread+0x271/0x380 [ 819.496043][ C0] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 819.501245][ C0] ? lockdep_hardirqs_on+0x7c/0x110 [ 819.506443][ C0] ? __kthread_parkme+0x148/0x220 [ 819.511464][ C0] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 819.516666][ C0] kthread+0x3af/0x750 [ 819.520736][ C0] ? __pfx_kthread+0x10/0x10 [ 819.525336][ C0] ? __pfx_kthread+0x10/0x10 [ 819.529925][ C0] ret_from_fork+0x45/0x80 [ 819.534340][ C0] ? __pfx_kthread+0x10/0x10 [ 819.538934][ C0] ret_from_fork_asm+0x1a/0x30 [ 819.543706][ C0] [ 819.546717][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 819.553029][ C0] CPU: 0 UID: 0 PID: 10481 Comm: kworker/u8:1 Not tainted 6.14.0-rc7-syzkaller-00205-g586de92313fc #0 [ 819.564040][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 819.574088][ C0] Workqueue: events_unbound toggle_allocation_gate [ 819.580592][ C0] RIP: 0010:smp_call_function_many_cond+0x4c6/0x12c0 [ 819.587279][ C0] Code: 0c 00 85 ed 74 4d 48 b8 00 00 00 00 00 fc ff df 4d 89 fc 4c 89 fd 49 c1 ec 03 83 e5 07 49 01 c4 83 c5 03 e8 ac 0e 0c 00 f3 90 <41> 0f b6 04 24 40 38 c5 7c 08 84 c0 0f 85 e8 0b 00 00 8b 43 08 31 [ 819.606898][ C0] RSP: 0018:ffffc90003a9f928 EFLAGS: 00000293 [ 819.612980][ C0] RAX: 0000000000000000 RBX: ffff8880b8744a80 RCX: ffffffff81ade1ea [ 819.620963][ C0] RDX: ffff88802a2c0000 RSI: ffffffff81ade1c4 RDI: 0000000000000005 [ 819.628936][ C0] RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000 [ 819.636901][ C0] R10: 0000000000000001 R11: 0000000000000006 R12: ffffed10170e8951 [ 819.644869][ C0] R13: 0000000000000001 R14: ffff8880b863fe80 R15: ffff8880b8744a88 [ 819.652833][ C0] FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 [ 819.661756][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 819.668334][ C0] CR2: 0000001b2f7feff8 CR3: 000000000df80000 CR4: 00000000003526f0 [ 819.676303][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 819.684266][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 819.692227][ C0] Call Trace: [ 819.695500][ C0] [ 819.698340][ C0] ? rcu_check_gp_kthread_starvation+0x31b/0x450 [ 819.704666][ C0] ? do_raw_spin_unlock+0x172/0x230 [ 819.709860][ C0] ? rcu_sched_clock_irq+0x247a/0x3310 [ 819.715319][ C0] ? timekeeping_advance+0x72e/0xa90 [ 819.720600][ C0] ? __pfx_rcu_sched_clock_irq+0x10/0x10 [ 819.726237][ C0] ? __asan_memcpy+0x3c/0x60 [ 819.730839][ C0] ? rcu_is_watching+0x12/0xc0 [ 819.735601][ C0] ? update_process_times+0x178/0x2d0 [ 819.740978][ C0] ? __pfx_update_process_times+0x10/0x10 [ 819.746700][ C0] ? update_wall_time+0x1c/0x40 [ 819.751549][ C0] ? tick_nohz_handler+0x376/0x530 [ 819.756658][ C0] ? __pfx_tick_nohz_handler+0x10/0x10 [ 819.762110][ C0] ? __hrtimer_run_queues+0x5fb/0xae0 [ 819.767480][ C0] ? __pfx___hrtimer_run_queues+0x10/0x10 [ 819.773192][ C0] ? read_tsc+0x9/0x20 [ 819.777264][ C0] ? hrtimer_interrupt+0x392/0x8e0 [ 819.782395][ C0] ? __sysvec_apic_timer_interrupt+0x10f/0x400 [ 819.788553][ C0] ? sysvec_apic_timer_interrupt+0x9f/0xc0 [ 819.794359][ C0] [ 819.797281][ C0] [ 819.800205][ C0] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 819.806362][ C0] ? smp_call_function_many_cond+0x4ea/0x12c0 [ 819.812421][ C0] ? smp_call_function_many_cond+0x4c4/0x12c0 [ 819.818481][ C0] ? smp_call_function_many_cond+0x4c6/0x12c0 [ 819.824544][ C0] ? smp_call_function_many_cond+0x4c4/0x12c0 [ 819.830612][ C0] ? __pfx_do_sync_core+0x10/0x10 [ 819.835636][ C0] on_each_cpu_cond_mask+0x40/0x90 [ 819.840745][ C0] text_poke_bp_batch+0x22b/0x760 [ 819.845783][ C0] ? __pfx___mutex_lock+0x10/0x10 [ 819.850831][ C0] ? __pfx_text_poke_bp_batch+0x10/0x10 [ 819.856377][ C0] ? text_poke_queue+0xef/0x180 [ 819.861234][ C0] ? arch_jump_label_transform_queue+0xc0/0x120 [ 819.867489][ C0] text_poke_finish+0x30/0x40 [ 819.872170][ C0] arch_jump_label_transform_apply+0x1c/0x30 [ 819.878147][ C0] jump_label_update+0x1d7/0x400 [ 819.883110][ C0] static_key_enable_cpuslocked+0x1b7/0x270 [ 819.889019][ C0] static_key_enable+0x1a/0x20 [ 819.893786][ C0] toggle_allocation_gate+0xfc/0x260 [ 819.899073][ C0] ? __pfx_toggle_allocation_gate+0x10/0x10 [ 819.904971][ C0] ? trace_lock_acquire+0x14e/0x1f0 [ 819.910172][ C0] ? process_one_work+0x921/0x1ba0 [ 819.915304][ C0] ? lock_acquire+0x2f/0xb0 [ 819.919805][ C0] ? process_one_work+0x921/0x1ba0 [ 819.924918][ C0] process_one_work+0x9c5/0x1ba0 [ 819.929862][ C0] ? __pfx_bond_arp_monitor+0x10/0x10 [ 819.935238][ C0] ? __pfx_process_one_work+0x10/0x10 [ 819.940621][ C0] ? assign_work+0x1a0/0x250 [ 819.945212][ C0] worker_thread+0x6c8/0xf00 [ 819.949808][ C0] ? __kthread_parkme+0x148/0x220 [ 819.954826][ C0] ? __pfx_worker_thread+0x10/0x10 [ 819.959940][ C0] kthread+0x3af/0x750 [ 819.964006][ C0] ? __pfx_kthread+0x10/0x10 [ 819.968650][ C0] ? lock_acquire+0x2f/0xb0 [ 819.973197][ C0] ? __pfx_kthread+0x10/0x10 [ 819.977797][ C0] ret_from_fork+0x45/0x80 [ 819.982226][ C0] ? __pfx_kthread+0x10/0x10 [ 819.986836][ C0] ret_from_fork_asm+0x1a/0x30 [ 819.991639][ C0]