last executing test programs: 7.093797056s ago: executing program 4 (id=516): sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="e03f03003d000b08d25a80648c7494f90224fc600b0002400c000400040082c137153e3719ac018000f01710d1bdd4381c9fb0466af692c5f7bc757c4c5b85b28c87ecab2e94a939933235f1efd209f4b1494d711d97a8835ae85337bdd70351b4ecea80c76f0d89633c6612fabce087c01adcba", 0x74}], 0x1}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)=ANY=[@ANYRES8, @ANYRES32, @ANYBLOB="0000000000000000400012800c0001"], 0x68}}, 0x0) r1 = socket$igmp6(0xa, 0x3, 0x2) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000300)={0x0, 'syzkaller1\x00', {0x2}}) write$tun(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="06000000bbbbbbbbbbbbaaaaaaaaaabb88f5"], 0x72) 5.835894139s ago: executing program 0 (id=524): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x40046207, 0x0) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000140)='./binderfs/binder0\x00', 0x802, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000003c0)={0x8, 0x0, &(0x7f0000000300)=[@acquire], 0x0, 0x0, 0x0}) dup2(r1, r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000480)={0x10, 0x0, &(0x7f0000000180)=[@request_death], 0x0, 0x0, 0x0}) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) lseek(r2, 0x851, 0x0) 5.418938237s ago: executing program 0 (id=528): sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) close_range(r0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000006c0)=ANY=[@ANYBLOB="4c0000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="1502ffffffa100001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4], 0x4c}, 0x1, 0xba01}, 0x0) 5.158658793s ago: executing program 4 (id=532): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000010c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd824498949714ffaac8a6f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb5447000001000000008f2b9000f22425e4097ed62cbc891061017cfa6fa26fa7088c60897d4a6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe6b1b8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3540546bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000100)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x22fe0}], 0x1}, 0x0) recvfrom(r1, &(0x7f0000004000)=""/4112, 0xfffffffffffffedc, 0x2080, 0x0, 0x0) 4.955710131s ago: executing program 0 (id=536): write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="8fcacb7907051175f37538e486dd6300800701082c00db5b686158bbcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd6372ce22fdb933"], 0xfdef) 4.910730693s ago: executing program 4 (id=537): r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@private=0xa010102, 0x0, 0x2b}, 0x0, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0xe8) socket$inet6(0xa, 0x2, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="0212000002"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0203100802"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 4.888525626s ago: executing program 3 (id=547): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x304}, "77746a315690a576", "07f217bd2e511e465bbbd5de32b495b2f9044677d4d588360663af84db44be59", "9bba8c07", "f37f20e2ff799aae"}, 0x38) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100)=0xffffffffffffffff, 0x4) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xfc94) syz_genetlink_get_family_id$mptcp(&(0x7f0000000140), r0) shutdown(r0, 0x1) 4.710890244s ago: executing program 4 (id=539): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = syz_io_uring_setup(0x235, &(0x7f00000002c0)={0x0, 0x4532, 0x10100, 0x0, 0x2b1}, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd_index=0x4, 0x0, 0x0, 0x0, {}, 0x1}) io_uring_enter(r2, 0x2ded, 0x4000, 0x0, 0x0, 0x0) r5 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) preadv(r5, &(0x7f0000000000)=[{&(0x7f0000001180)=""/4100, 0x1004}], 0x1, 0x0, 0x0) 4.529377607s ago: executing program 3 (id=540): r0 = syz_io_uring_setup(0x10d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x40000000}, &(0x7f0000000380)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) r3 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040), 0x2) r4 = memfd_create(&(0x7f0000000340)='y\x105\xfb\xf7u\x83%:r\xc2\xb9x\xa4q\xc1\xea_\x8cZ7\xe7a\x9b\x11x\x0e\xa1\xcf\x1a\x98S7\xc9\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x04\x879\xa24\xa9am\xde\xb2\xd3\xcbZJoa\xc4\x1acB\xaa\xc1\xfb Q\xd4\xf4\x01\xa52\xe2DG\xd4\xbd{\x9f\xa9\x97\x9b@\xdb\x00b\xe1br\xb6\x008\xe3\x10\xff\xc2\x9d\r2\x9e\x8e\x04sW\x1b\xb7\xb3\xa2\xc9&@\xca\xda\xdc\xe2/\x97X\xac\b\xb0\xc2<\x80E\x1a\xbc\xc7W\xda9VsA\xaf\xc6\xcf\xe1\xa1\xb5M\xa2\x85\xa6y\xc4J\xf1\xf7\xfcD\x95\xe3\xeb\xc7\xbc\x91\xb0\xa8\x9eo\xebF(\x9dL\x01vRk\xaacB\x04\xa7I\v\x86EZ\x96\xd5\x14OD\\\xe8R\xe4\xcd\xec\xcc\xd1\x0fre\xe86\xcd\xeb\xc4$\x98\x06J\xd6dD\x8d_U`ji{\xab\x97\xaf;l\x1f\xaf\xb38U\xcb\xfa\xb3j\x92\f\x81\xa0\xa2-g\b\x99\x0e\x8d\x8d\x16\xd9w\\\xf8\xce\xb0j\x9d\'\x93\xef\x1d\xa0H\xd9\xbd\xd9\xaf\x12$\x8d\x16%\x8b\x00', 0x3) ftruncate(r4, 0xffff) fcntl$addseals(r4, 0x409, 0x7) r5 = ioctl$UDMABUF_CREATE(r3, 0x40187542, &(0x7f0000000100)={r4, 0x0, 0x0, 0x1000}) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r5, 0x0, 0x0, 0x0, {0x414}, 0x1}) io_uring_enter(r0, 0x3f72, 0x74f1, 0x0, 0x0, 0x0) 4.090307405s ago: executing program 3 (id=543): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='freezer.parent_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000000), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffff23}], 0x1, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c0000001d00070f000000000000000007000000", @ANYRES32=r3, @ANYBLOB="000052000600050001000000080008"], 0x2c}}, 0x0) 3.886804461s ago: executing program 4 (id=544): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000300)=ANY=[@ANYBLOB="1201000000000040de28421100000000000109022400010000000009040000010300000009210000000122050009058103"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f00000001c0)={0x2c, &(0x7f0000000000)={0x0, 0x0, 0x5, {0x5, 0x0, "b1a748"}}, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_open_dev$hidraw(&(0x7f0000000080), 0x0, 0x0) syz_usb_disconnect(r0) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x5}, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'nicvf0\x00'}) sendmsg$nl_route(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000480)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {0x2}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x2}]}, 0x24}}, 0x0) 3.585012791s ago: executing program 3 (id=549): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20020084, &(0x7f00000018c0)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000b80)=ANY=[@ANYBLOB="b4050000200080006110600000000000c60000000000000295000000000000009f33ef60916e6e893f1eeb0be2566cd0723043c47c896ce0bce66a245ad99b817fd98cd824498949714ffaac8a6f77ef26dcca5582054d54d53cd2b6db714e4b94bdae214fa68a0557eb2c5ca683a4b6fc89398f2b9000f224891060017cfa6fa26fa7a34701008c61897d4a6148a1c11428607c40de60beac671e8e8fdecb03588aa623fa71f871ab5c2ff88afc6002084e5b52710800e835cf0d78e45f70983826fb8579c1fb01d2c5553d2ccb5fc5b51fe6b174bed9907dcff414ed55b0c20cdbe7009a6fe7cc78762f1d4dcdbca64920db9a50f86c21632fd30bf05121438bb74e4670ab5dfe447a4bd344e0bd74ff05d37ef68e3b9db863c758ffffffffb426e1230bc1cd4c02c4c2e6d17dc5c2edf332a62f5fe68fbbbbfcfd78a9f3fdc1f50c445e3f30e703cf05b90fbf940e6652d377474ed5f816f66ac3027460ae991e7f834dd7a7fc2a7003d1a6cf5478533584961c329fcf4fed5c9455640dcd28273dc9753cc979113f2915a3039c3ca60ec53bb1130c2d27fed7d67c440e23d130e51eea1e085bebabe7059de9cbfc51177cce5ef265c92b7957a334ff7be2ca867fd94286e016febfdb5827efc7a6efb01d66a396f84c1ca75daa4ead099694ed03d449b185cc836bab1a41a61bd6f03a54fafcee554bbb52adf8f1d7ede9f9a711256fb45e6c3d12ff560ee69d68733d522d9bbecf52396f15976381c27015403778139808142b48ced145ca8a6da5f322d413d09cc38b832fa05dd3c799042588f9eea6f443baa759257a000000000000000000bed1dad228e11f80cfea5848e436acf6e89dfae0b3d95b911af1818e0081504811a5f3c5d1ced3e592224f1d2ca3bdb2cc89001605db6987899eb99f94265401a95ff0a5a266438f1db461b7ebedd419bc038f7d36bd2bd4b3f92cd1469b63b1ce456a96152d353a8ab65f8bae521db73ff00b5d5cac7a439ab40d97e57f23e703fd6395930b9c3485ab181a83ed568cade43111530ec584cfb48e0cc5d63e2807b2e98525a84f9ac59cf74f3ba279e228e2a0dc8da8017cba3996541008785ab8f041f0a8d1399d88a3a58765e5a0149b9d0ea54b323675149783ec057ec6d6e8e600b9eced07ddcc56b77d8ea08223"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000007c0)=ANY=[@ANYRES32=r2, @ANYRES32=r1, @ANYBLOB="05"], 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r2, &(0x7f0000000340), &(0x7f0000000040)=@tcp=r0}, 0x20) sendto$inet(r0, &(0x7f00000000c0)='+', 0xffffffffffffff60, 0xf405, 0x0, 0xf06) recvfrom(r0, &(0x7f0000000140)=""/188, 0xbc, 0x40000000, 0x0, 0x0) 3.350989775s ago: executing program 3 (id=551): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), r2) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x38, r3, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x7, 0x0, @l2={'eth', 0x3a, 'syzkaller0\x00'}}}}}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8923, &(0x7f0000002280)={'syzkaller0\x00', @local}) 2.994024571s ago: executing program 4 (id=553): unshare(0x68040200) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="000386dd0a00100000004000000060ec97020fc80400fe8000000000000000000000000000aaff020000000000000000000000000001"], 0xffe) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 2.647170729s ago: executing program 1 (id=554): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = syz_io_uring_setup(0x239, &(0x7f0000000380)={0x0, 0x1ffffe, 0x10100, 0x0, 0x0, 0x0, r1}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd_index=0x4, 0x0, 0x0, 0x0, {}, 0x1}) io_uring_enter(r2, 0x2ded, 0x4000, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 1.805186211s ago: executing program 2 (id=556): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1, {0x7, 0x1f}}, 0x50) syz_fuse_handle_req(r0, &(0x7f00000066c0)="a062030607792c01386f28a428828947de99f79cc542703d923c7cb9d4e1f6fd95fbf2f747ab32f6fb041861fb3f87a88cb85405b4e73c0b6b12c81e42a9f13d82c32b7ddb172bcba1aac5c38f083747ac179f08d4d6d342a87ba8dd9bb7a9680f27433c3357b4f6ac97b19a973592f1ac6e7853a0b15ba42a28efb9cc30b146346b546018966e94976ca28f26a1950dd64c0adbb0c2e09bbd9caa9e7886a2b3d6e2b6d6616b718f1322ea2881ca59ef73948b1bcdc2dd3970e63cbc1043ce42af0ea1f95d17268cbc3ef062c8c31a537e94a20c1c505a6022d5ece7f51bd9c754d8c47cbe80bbb30b2159991a94dd3a25e64aff8a7a17374b5a71e0c7c241cbfd7f084e18a50bea512ada902210a3881ffcd42071ab09c4d80139d8980d6dc5d12c2595ced445caf22f80d8fb1a4c243da47fadb8e28e9c04fea820a8a2f032f5adff8b7d9269e63db68d196bf7f416405e52b6b8abd8bb9d9694b8b5eddae348209963738cd9710bd6c291af1c8eaf0e52d2f2f24bef8c8bc9f77eed40104e07c8ee1b4cb358fc73e2653fef6232b5e9f5d0be26b91a0b7967ed5e3bf10c449424ff4d11951d963677001d9576425d6a9c4503268a407d74854f5e1caacc0ccc463dc56e684db1d80b370da238915579ab82cdbd7d155adf10b96ed71100ea92834e8a4e4f5b7b831bff6fb4febe01bb398ea4065446f277f107aa3cc06e0b7a6e98434bf57744ba9ecb8effe704d7f852e16bc33ac113649f7540b7a7a67cf5493b400ce06e571d485af1732938b79ded4de7dad97a7e1c0be7bd479dc264647bb76503168423e3f6fc95f8ac8ea35e39f476ab54e88286fcf73eead1f794784465592fe4ad112ac63bbc3b3f35b87c40bc5fa6e3ca6cad878f9772a61a23aa00491a9e2442eb90a32af2bd74e99d075bcda20288bfc30f3b00a7e8e1a0b4791573abd65284bbb53e2b7d667239b95b332dd423e4d7c512de559bd53fde5285add9795bda81ec142620e693af9c787a4499dd76ca0d77d9c7c4043e537ec6c1cd0b9a642b12adc782a0e00f6c1ed7379d5fff4c2feb19182db977f657b195e4710ff00f78e35a146119897495b0e1a0068a6606292ee72bf65adcd2cd29b4e59a4b3f82eac77d5254013d03d2fb2511975558906741912d09304f0d4cf08c8f62690c67968c869f75a4025224d8e84baf7a42e01b4ecf7e55d7c45839778c2266880d1bb73e3aad618d1a4f8d5a16914d64d70438a88512649fd4caa90506e5a2d58a33ecaebc9b2e5f8a4fbeca57c829ae02fd2dc146e939c3d295ada7df4a07e74b356c6ffd7a9c546b9eddf7e013cbcb2b57ae0d225249f7e06a415681d9f597a060fd55e39bd56f04b863efeca458a0cbc54b660db50ca40d27a3fda3416860e691cfc780593f06b467700968bb918c32547e378b14b4e0dcd11cb0b2fb36ea70946ac62290184b4eed38b51c322a75367b50f558e063bf363341a17c28ddcbf9ce53da06f26303fd156423a25f686809bc9845a78e0cc3d94e04bc8da85f22a4a8ece2c4ac2c79e54dcc4eabc61e067060ad880377a71fe0c2c0305256e4f3c637575f086e4ae3d7ab5d106fde03d24c47dccba3da23a244c1f50a4f60cd8d71b77390c5ce6d5612fd0260a2f33389b064ae6acac783eca62874232fd3808fb2188151a43de6cebc7e245106183f7d929f1eeff6f972da3e3d967170247925fb0f04bf38e88d06321f9ff9d2c296553d842b69036a2b6de2aad3879aedee723ff00736f7b0dffe6182104105ff0f0b636f5192d6bb5ae7ef950825827d2f3d6285d83aedca3f31474e0ad50ce6290a0e546c30d900e5b4208ecc8b3aca0ba3d110fc3c0a7e004a53e5d0ba1cc1c2bb42c3dbcbb4ceb6674151932ae56f6b03cc34ce450c292fecd2456ddcf42b075e6fd49305fbf265a36f3cff61321dd60f16e844089d659130947672a2d059e04af9ef653e8afec926b5a5d411f60a2a435437095a1df8dc60a616bd1a1ce7b5251ed8f905becffebd635eee8ff0055c40f146f1350a406b853ecb005c6ede4dc270ce6751cff915aa27f5f6b0736da14c9949de599d57868c29cc97ad03bd89502a34b88ad29c8762d0dc24a6df759821882a32e70531cab51fa1752a4fc49cf0706cb24d203174b2940f29ef8b0ce65b40cfde4e0c7310c685cc8de8384e485a951192fa8c36c11f9b88a48caf027dca480caa4fccae70ea6c837eb82f926ad7691c7709f217220d71f6e374fb8522a84c118b5c25f3d56acfb25afbe676fc9e574b6c5a59c00a0bbeeff61fd82a1677f3da9bb596133db491a8f11b945d930c8a67de9ce80025c764d518efcbae25d9194dc96c31ed02c63b1ac976715f7233ffed7cb6e929bbb5afabd34bc37c095acd0abbbdb1ea48e40a30ac99550f0ccca19ecef5acb2604c48fffb53b352d114fac72d6fc019ddec558406668f773fed9476148133c0f9ca4d1fd7e70dd04bfa089dc57e5940f29a5fd33dc79913ff48853794fdaf891d71de94c4a4fed0544e09f2bd578b07003031b8602f08ca8a79fa5ebfd5477f4d4f031c3efe0db273446a99d0cbe21a3cf43f3b82774e4657bb4f9675adbaf71c52953f0b18a61e05a9c770536fbad215848f8238e8730b9085189ea4621780dac500d7d7dc7815b45e232f86592498f1515ac8c50306013524cc5f0a74b67bc85d435d332ce69f00641c86a3e91be84b78ac358f35b18d69679df4197d3be8554417cf44aee6dc623f68ce3388df18168efa1c87c776cbda792f6110b6af178eb8200a91dfb72c1e23b5e5a66b5a3ee3f4c2bba2ccac939dcb036006b86e894093922a95fd70baba9424a3d0327a0f209fe10b39f3cec3f669d301a2834e58fd56f94d622dccf653f08e776c9f3e1b0e5b3cdef133834b93c41c70438d51a0b127262868d49ca91623c3d8b75c2cce0b771b9ac941bb96029e782224a3686a7c0dd164e162ede667e0e5817e7bde85ad3bf30a6a5bdc420f751679be74a02f84aa93b971c3f45a67d155f7ecb1d5284660918dbf102bc16f496fb62a1290e6b88ddaff55740583cba13076afd623276634e0c11663be50766980949095003ef5bc6f90a98bbad436b67928513e70115224f672ca2a24e27bb98bd5288c49ea23d47ef13c5ff28c43ce53ca16a6caeccc1f601226253c4a38a88a93828f6c800547cadbaa6d7ad26db618cccd38a671507cad5ba0065ce2edba81a059b95c36c5d04ab456fd6fd81ec3738ebe546d973c0886a5e7b83dd9c2f58f5d6c19519e67575b3732a486555f8d8c4ae004a62e8d07ab2c8ef74cdb96aa99d75aeb1c25985996f281d71106910a3c3da17de35e04dbe00e2b7b75ec2fed177a7f2d04fbf68bd0b8af682b30911867d4d1497ba060b662f4e97a8e7fd3613015cc34302377497cd08bcdc29f06dae240820d2ccddbf8c95c76a4ba5d3e1b37a62369ce3f79fb74ebd9bc82c3fa3edad4034b6715c2853fa7781c974b5a4e541e8b69bf4bd653fcce4e4340d9409fe9112e4d253a3b7e9d43f4426127b10f2d5d3fcd2193490f7d933e0cc53dae552f2d7c9d77b8f9b27c59105cfae43a0aab314a0820fbb5684bf20986e3be215688b42938d272c4c0edd17bcdc84a514d2483456d6cfb4f5c1218859ee55bfc77da36c9c75734932a12fd03df38232063ed92024f8ee7c21f314129feb10670bb4d6a0ad4fb3dc57a64cfe6509a0770650cdec0efd5e0b1fd29433cf871c9ddbe648319bd481357326ac1eb32b4bef4ad89ab6122e92dc786decac88624a4a3963ae771f8023b9a92e446114764c53d7efc07e3ea77a9daac5cabbe648a223e249db62102ef7b7b6d06df46b6ff913911b89848a47aecc0563fb06b6d77fe1daf4541cf619105ab68e0bcdf7a05af22b0551323bf33dec8167df2b7fac62dc9e286dd3462f488c82ad194f7fd5d3ca72fe9c0c37cdb6d75684326e5cb30319ab333fc70bb197320acda161d2e685e78ac2cb1417223f64742b12a316d590b18a4173b2a105a381baf6f383ec2e81d04860b5cc536475d7c5d05bd6a7db1a5d93930bacba8c1de63707bd24785e19fc1f15ba724660ac00d0f2ebbcd5528b8cbe4f3ca332e8611e937a310fc79d234be6c1cd09d6a5cb06ab36a9d667188144c81f86aaf0851763573b36cc21462ba4f3d6e95d38d1e9b943085661d234ef6d079bc9d84c7447c85baba88263451ba10559e1ce326fee5074b26b54872e690a9a1e589e1c444daa3224b292bf9ec4a604dc512760084084f27386c89a1190b8905f0d720508c0ed69272f396725805480188aa4602a26e833c16aa5079c0577a8203ec0b2b929ef3b410bb427c168b7fefd1be652f06efc61c7a295a5d07a9fd61bd5bfe67ac5f74e485a66c92950a1b460257084ca3a3489943ad450300967234b487fa3def4010f9b715196562ebb0846b7ac3eba47646af6285582b4402f64aa684dff7d9cf81fbe1aa88959f7906f06839389f2ad56efb5029afe1d5ceac99a3e698f49ff0da7db06d7c9e94a8773a13fab93def139667b4dc6b741bd2769da7786acecbe315f9006bb6b72abe5bdc587d8d5aa8f67aaefef68197fd2e7874d9b7da2c3a5618720c12e8fc31db3e334c47abcbf10c6181ec14af4f9e90e19a35360a793b1e9b336e49b3ed67568a860cd4c298f967ba323d315821959629e5b7aaac367e1ddb8a1c5d61500afa69331a4c90861852f533657b28b97a343bc531a11ff634b157a6d859a35f0d2a595375e11a32457575f1d73da033bf5eeda12337b9fdd46bce192d3aaaa240a8c65bf47704d6aa64a9531f9de14a96fc9fe380db35dd5ec52321c67fb4c18abcaf22fbe8f602ed201232251317e1a1b71e1e2c924a92d84685de348eec97fed954b7f6681ddf521b4ee03a1aeb2e446ee2a7f4dfa37b1c53831139fc624c14dcc4d144ccdf758fd9f344b4cdc1df70f6a24fa78cab136c912d1ebffa7053ccbc9b9445762236dca409820f738370117d5c369dfc50fd42277f14eeaf29110aedcd503008c42914d04e219a8b6c01e337d04724919b07157e2275ba6365a9dba5ebc8019bd1aa1b8668023f64cf47e1b49b4fbcfc10d560bb74405c90751504db8100d8a8a1a3ff84d98f1262fbbd6b962f492b9531a7411c08e7e56eb0f838075f754b6a395b6b58a8e4c47eb46bfaba2ac94800a396749d18ba0e6219f8d616ec71a1e60b3bcc24e19d4a20ddbc6a871e6d7efa50a362610598d892a5adecbcfe217534deee3620dfc88c7992ec2e710e083ef0a50c20621405f654804d1af4f24d22b8ca48f26303e6969127a74f0b276a5624c3b84410d4d5ee3c62605876e60a88df2bd6e8db8c7e486fdb452178563e7add6bc126b721b9ef8b12181989b87031573a4010d88e34f15a2344e4808b74c99ad68f0c2aca4e8d504397c03e1328c4b1ec43fd902d206c3cfb63d7541ac57fdbc70b0033f87514286101231fe7e79668c802e1c23d61540cdf13a5e675b736e221ddc29ab747d9c64f6213f51d3c1ded2e2b0efc4e45183d90468f61ec1720f7a0b87947e2c54125cebe6563ee4415d886bbe869d17d36371c942c11db1e13c1dd40ed24cabaf7ee80eae6c4db934e982d9619d753dcd679c5650cd95d21582e31b259043a0d03371cd294f4cc028042c75070c9b534a2d79f164ab9d773295795280d1584ca664b53b263fe2e23534d27b0d85742fae8061e03187795129dd272041c6eb9c10c3406da1f752f4ca697bdbddd74975cd4dbba5687fb30ac4fd5d2579494eac73053a63821a852cf41a80f6668006f7e1c4e30b48d638ebab470c558d42baeed1adc8fc71f73e95f3ca212a4b009b508e89898727f805685e4e7650a2961d62c117d1ee9017236a6bffa0c36ae11bc52d346c83399e43c42cdb9f443aa307109a97ee66ceb7a29eeb2f1a2bb3ee1492229116db07301b2aa4126aee7775daa2d0eab4d206fae11b3c6b565dcc4c7b4dd1cf2abec81150d0629803f6eb221be384b8772fe6d6c4fa98c928a9d0a02e9ff8bb7a2168dbebe140323d93bee8983c496bccf752c372b795a3493624cefb3cfeb4307bd39826cac1ea3f18912deef1b8c8db30bc016990a477bc0a925fb36453a9e21354b2d7e6e3d4ca4dd20f27a8db05429d44b7a485365191dc4ba977a815958faf6434813a9f4046054763dd55dbb7fae892b746e169ae046ae3361a9f75cf622b03f75b1633da864395bd1c3a594fab0b1fb37f088dd1f2776e2b795c78635c2026a8ce7ff40968a1960786049a217dd8872ac0c01f4bafcf2d3d751dd46a5e1bec00540a9ca7afca3ef37575d4a8b1291d05be94913092890a9b4bfff39edbff307e5654896e79228777c0f8ea46c55bfe19e522bf457ab4e6b0167d776dbcd0160598370a12c4a03e4edc82b245a7608797b03d4ed89dfc2a5bf07b9fcb251fb8608553f3b3774818717a9aabe6b2ded811515ba454b390a6065bbc59552f3bfe51d38f139792e1aae60093a7c5770b52a1730feb1049c14a7d5261d644f6b738e22ee72aafa422bd93f61e1ccac0a5ef4726c66f61bb539acb937bd63da82c700c0860be90ce5621ced22b52b63d041266fc258fbfa6641aef22e97804e5138ad2ce4405eaf76bb0acd7fc61b2d6de4aabc5c28a850fcf219cff77c97d3cb6bec0067c171b912d11d82c56cbad56c0032a9657d4cdd1eacaca53f40f5e3fe911127e1cd30781351f180e1413933cee2d46ca0eea31ee01fe4e99a567edd0b10565d47b87c8a48366143e889e52d0ff13c920aea092c2545fa9b7056204fec156549d3c0a997bc1cf4a01338483bf5c69d6958ae038f1c3e3b84baeb2c1f9e064c0750602c34c6c483c316391d975f94f21f6dfe74e92c33228b408a9e2b9abcda33c497abba9c48a63e5c8f1a8d0f4c24d36a44e1601e8a09e8a5c7179bd4c44b17e542dd99cace87aab60a5e53325d544c991b6fa5deffa49fd886332980deeca9229cb2f67f495a7b743153854ed81e1623b12dbd65512d08a5732fee2db3fb455cf6df5a1701a2b8674633c6792162dc86ac76e30da225b0167a7e704ad33ba694f9c902afbeed58eef609874767053f59414d4d3eccbbcdbc7eba997c71f9b1f5139bb020d5dae1db6e2dcfbb51b5371b08bdbc3312b05ee6d8c03c8b5a7d4f23da45f276394f222b1a0bdf4e2603243cdba60ee0530387c88bb457ca9932f2283a4d55bb1195e6d325ed93f714e21908b1baafa467f1cec7fa26e5c384ee6828e77978bd1abd014de549a5e5966f2b2f4ba000f9d77f1abfe3a6c337cdb852c1ec59f61b63d543f3062dd2616a163ed7ca60168b0347b5c5646a678dafb4c502c333a0a48f0341b47f5c5946e42e571db0bfa0682a449ca64e71b5661a842975182399245c6de241512c67ac918d7e0c5cb66565010e881b8333567ca584321ead1c383b099d8bf1c56dac08cb218cde4226ad420d6d6313f9c4884d6394722304fdaa76e61db8c0d54eb1151344c41ce1130272928eecb2f9f0f23c752622374eb1223a80efcf0b937dff7d813d7be0340226c0a7b163741d9aecafcb7ddae5a219323323f621c802be82399e06d2e1cc582e759ffa303c5103f8a44d7129d2853b02e506abda57ad2836d7ff16f95232149fbeb8b62e586d3536bb4ae042ecd9e25d1dee789353071f9c89d4361000c47b763556e8902f1f25cbd8ae71679e03ff27db0ec75eeee3fccafc7fcf22c377ac60d3c61a43cb53abf6162118f2efc86a5ce80e69a02bc1db80018beeef6d567941232e4412a958ed012bf7a832c1eaf68134ecabc4927ad666b3d0f21d4e8d52fa37e0a9751124efed8bf47544299138a6f69d89e295677f12606c79b72451c263fca3eec22bf0c47c641159a0bbfb3b2b03154af533e5c06a149e52adcfae31bfc55f30064a8903c8d3b828d275a937b1e4adffa0597da5e253b50bd71b33f057ffeff0b2a0829b3bf33350fbe67c7c79034f80d69e6a21be495a848d328f416f15966491b218eab390544e39d498258ad80ddae248634c845cbe6f1c1e93e7c2b02075411e075fe936bcc75f4a4e1a3687cb3dbbb61cb31ddfbbc87a1859b3a48fccdd8e5915c8bf4eebe8f7093cef6a7a91c8682915f9908c854c483e90c9643467292884d284134dbaddafdbc74d94a5f9713719d62b4f6b4236803d210181847ca27129fde264156895f4e1822ef78a3b215ef56d7e36d2b94c93f5e931a0d13a3a3030061ce62de595eecf47eae6bf698530145757700df18f66fd7261a12c119d6679663b3c0f99d1705aebe66dc862eb21ccb7360b93f54507149b577abf521113991e06f345e8282fdc18de673e1ca7b188ee34b14f37f86ddcf97fef0b913c33cf8e5d5d33707dbcdbe4b27cef056670252f186735cdd02f6ed6bfe5318a704f00e34ffc4fda9855bf37c51be6a7423e44dd8a98883c8fa82ca37c90d681fb7a0db915576b50e49aff545b99aa3aa6343b814ba0bf64e53b2a1edcae2231bf20d65e4bb4da6dc8382120ede652adfb7c30a46e0ee784cbde74563d83eb8d89a1573fa104fddca9d4833c49dc904bda905426c7dee3e48b596c8ee201bea57fedb1a0649457eaac3c5b5f4519af3adb66f10b861e711cd4034448890e15047c2f8902588268b5645051f3f3968ed8d630e050ccef0d01b61ffeade51e4e72d8fd46bba4c20009396e984c424d174934a67a1930665fbea04c809e7cda0a2cdfd3a14d6b99c3a8d8b3691825830456876f188ff871fc861e4c6a0ca377dc1f0cb0f929f7eb1f5da045d9a588a393312acacca5c5a3b15bb1b488b08fc40ad65ae2c1df187eccd8377525a81d80df57579ae52f775fb2efdd172a41c370300fcc594c2635dcf50e9eb9d34fa8b4bbfd13078422e3a7734a8ae6cc09e39d07c7ee19838f8da4cbafe4162c8f8dc44e284840bd0a5c80bfc657c22e37e0d9a96dda34a51ce616c9ccdc95955cf85d93860da902ab30f11aa333eacc25c47981d8636038761ed4d84fcbb0ca92dd2e07863b9505b451c3c49e36a172527578123049ff2dc2b4e258a3f698a12ca4705a6fd0ce6bc4f1767b4d9c2e57c9ed1388527964ac96ff5e4cf5ad6fdb6a853b43905df32af8bd788b520fd526cbb95195a1bc00d654cb080acdf67938517a6cdac741d86730358be16465b4e1301f47f6a444c4e8d2980b8bd98a8dcd6617cde0b287e2d1f59167b5c445146fa49728111b8a2729428cabd02facb8fbddbdb2769680f288648d6baac53e0d909335da3e2b4c13ebd41f32820c9f491e9124ca444a0532f60e2816e15a5810baa91f64454aa355f9d362c7d1a461561689d08b1350a216b6f1bda57aae0706b3710a1b8e52a7e3084e600b5ee3dc540bba0c16267d549304a7840659a32e40070715c9bb912792d4a7b84fa06e73b9ddbc2f06c4edc19d25f5a198c7e3fc6226842e6215da5d826fcf5949612889f78e9de39d4e64b86b7033b5717a21f8f2b81c799a3fc0bfe6f5837b252eefa360c91a6148296bd19d50a343d909c1edf5261e70c8dfb2c488940cf236941ad3fd01247e37902a4bbfdd1839f7c92c260a2c494022fac08629303c8e54108d78ae2c94289c7f998ba3b622b48931ee7c17c59f5499d282467a1b8050acc94a0b17b21836c80b69f519b9b077d18e33c027faad562fa09f2cc6120f8cf5ee18cf7db9d729ffbb9de58885713215b7aebb8c98d9fa009be0a9ef3ceccdb2b31968db555b26c5c94e382d06ebf6d356e8caa85def5813dd1596d823924c4fb63dba5bd094cb64f204d1e59d31287715f831a1f0be95d8749f2166ba0b0b6b64a37991be1fe1c1e922835f2da0c074ec9413561d52166576b1c4f1e18f078dc046d1c284964b80217b55c59a474740c3649116b33e927479736bff6005859c7c00598f22cb8eca38af802f4c86836e8330492ac7ef3707890a8ff856dc7786ed769bba75b18484b257b3b022eeb51aa720639f79e6e6bd3d3c9a61f7822abe562867b4693f0b2f61135aaeaa510b31112efeec48d2602c6d4f2ddeeb51bb03ab18c18d8e127a37e22881febca47742b9332d3f2251003b1a46c40eca111d02446466b669568c70971bd33254ca577777f126f86f8a3665f065b645ff261e78e0f532e83a81b99c5de3488de74ca82daa0e4e7404eff911ae955acbb800f9f91b774e472bc14aa92817b6d85877b1861a6ca92c03c83b6f1490068bad8eab1f58c9e91e1029683de2ca45c99966966031ee86d8c9995f0612480e2a6d5396e8ae361d6fd2e24557613a1191f5019d4c8078628013512ea3a59532efffa6cfe4970d28d8c7aa8c866c4275ff2b0b4ef1a7e56854d7ee4bc445713da9349d13e30a4a802cb9db2f10280fd9ea043b5b3480441e8ed2d907eae1259befba9d87a04ce42b0010c70af157b90e0bf72549852fd122edd6cf3475f76852b13b4bf887cf32e25ad34aed7fd5a6e97b307f9b4ff1c07b2b55beef5ef3dd96eeb2a57720c18209d911a55341cee67e6ff577f7acaba01c2c9690b15a3b8aaa5b9d734196467a8c074b2eeeb5ae931ddf3deb15b1a8d603e72125c2e68ad206f2c4252a659f8248ff882a8e54126ebc0c77a46101072272460e683d465279a3695be6b64c9eeb4a576d95fd520be42eab5c95cbace0dfd80e2d67bab9f683a1cc9c006c02f0f90a21a0f51218c628f5608fbf1abc79aa63452bde1002383033578f32980e3779a8edeb226f6d3f9b36d8f07bddd7479b60346a4b4fa883940e3aef8ad8d834dad4405960a4409a6255e8753d0c0ad0960ff3ef48ce93fbe6b165e86eab36fccb8b989f5b54e6ccaa19749ff065a0a732d15c41b9072bbc6f07e1fd5a3df2775874e46b61ed50714e8c403fbed6884ec06f52ab71d2c191fcc56ac0b17ba3c46d2dab3e11c79383bd8867ff14b5fbca73b9ae594b6a09fb73a2e8f15aee59150e8d6d3dad9659025d045bbd1b9ca257c67bb78abe8f7eb9c8b3bc32951c41f7390bacc8c7059a2a9b078ab50413605aec604e4666a6ace765b0e7ab558fe6232f2703d07811e3d0ac5bf9434e87876e99250ee9db6527a8ccb4a3ee3bde738563c9746f941cf2cd7efacdbd2593cafdbe5171864b2982b54dc5a32c86638c0e650a331625033b8dd65851965ae791880349d5cd52548f4422a317f96ed79e7ccf3bd671e6dc70365f521c65206386eb1f99570a544d11b3d36fea285f8a3770ca303a965a0c1d598ebe3696e647be734ccf760d3d47dec75e236d7ac08019b6622a7b9f08bc8f0937ab75e75a047a7386befbd56fc4b2f89c852dadce8df946cb3fafe4eed2678caadf1a913ae32b2c0b8a37984cb700343c5e24609f8c5ddeff5e653837a9332a41c8e21466a13d79224125d5f6a4fef79b5adae7f4ab7d351c55400545edd3c00637bd27164828925e9bb5d79f1f1e6eb3270ab799ae38772f779565d92c47503de695f7aad7ddacda6f6c71e755b3737231b64715bf07849d3466e4f92239f733436ce674389bd16900", 0x2000, &(0x7f0000008b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x90, 0x0, 0x0, {0x100000000404, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000}}}, 0x0, 0x0, 0x0, 0x0, 0x0}) readlink(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000540)=""/179, 0xb9) read$FUSE(r0, &(0x7f000000ac00)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, r2, {0x7, 0x24}}, 0x50) 1.702812434s ago: executing program 1 (id=557): r0 = syz_open_dev$admmidi(&(0x7f0000000140), 0x20, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0xff, 0x1f}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x80383, 0x0) read$midi(r0, 0x0, 0x0) ioctl$SNDCTL_SEQ_PANIC(r1, 0x5111) ioctl$SNDCTL_SEQ_PANIC(r1, 0x5100) r2 = io_uring_setup(0x30d0, &(0x7f0000000240)={0x0, 0xfffffffe, 0x40}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) 1.70257523s ago: executing program 2 (id=558): r0 = userfaultfd(0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000100)) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f00002d7000/0x1000)=nil, 0x1000, 0x400000, 0x3, &(0x7f000082a000/0x400000)=nil) get_mempolicy(0x0, 0x0, 0x5, &(0x7f0000a88000/0x2000)=nil, 0x3) ioctl$UFFDIO_WRITEPROTECT(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000800000/0x800000)=nil, 0x802000}, 0x2}) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000400)={&(0x7f0000b36000/0x12000)=nil, &(0x7f0000841000/0x4000)=nil, 0x12000}) syz_io_uring_setup(0x6866, &(0x7f00000003c0)={0x0, 0x0, 0x4, 0x2000000}, &(0x7f0000000440), &(0x7f0000000480)) 1.595779291s ago: executing program 1 (id=559): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000850000002300000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f00000000c0)={0x1, 0xaa4, 0x0, &(0x7f0000000100)}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000340)={0x2, &(0x7f0000000300)=[{0x8, 0xd, 0x4, 0x7fff}, {0x2, 0x7f, 0x0, 0x4}]}) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000180)={0x1, 0xaa4, 0x0, &(0x7f0000000340)}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_CLOCK(r1, 0x4188aec6, &(0x7f0000000040)) ioctl$KVM_SET_CLOCK(r1, 0x4188aec6, &(0x7f0000000040)={0x0, 0x8, 0x0, 0x95d}) 1.557222403s ago: executing program 2 (id=560): r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup(r0) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x2d) dup3(r1, r2, 0x0) 1.458980467s ago: executing program 2 (id=561): r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000000080)={0x80002000}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) r4 = getpid() r5 = getpid() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r0, &(0x7f00000000c0)={r3, r2, 0x1}) 1.457924452s ago: executing program 1 (id=562): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) timer_gettime(0x0, &(0x7f0000000000)) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x10) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x9, 0x4) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x2c}}, 0x0) 1.310282379s ago: executing program 1 (id=564): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000680)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000300)={0x0, 0x0, 0x0, &(0x7f0000000200)=""/148, &(0x7f00000002c0)=""/8}) r2 = dup(r1) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x0, r2}) 1.309835582s ago: executing program 2 (id=565): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xb, &(0x7f0000000c80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0, r0}, 0x18) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x41, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000080)={0x4e00, 0x0, 0x0, 0xbdff, 0x0, "fdffffffffffffff"}) write$binfmt_aout(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="4b0ec2221df2a4c1e8d2304e11"], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x90, 0x1b, "00bf46f8bbde7047bcd4a280000400"}) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000000)=0x17) 334.617633ms ago: executing program 2 (id=566): r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = syz_io_uring_setup(0x239, &(0x7f0000000380)={0x0, 0x1ffffe, 0x10100, 0x0, 0x0, 0x0, r1}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd_index=0x4, 0x0, 0x0, 0x0, {}, 0x1}) io_uring_enter(r2, 0x2ded, 0x4000, 0x0, 0x0, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x16b601, 0x0) write$sequencer(r5, &(0x7f0000000100)=ANY=[@ANYBLOB="0293"], 0x9) ioctl$SNDCTL_SEQ_SYNC(r5, 0x5101) 293.289218ms ago: executing program 1 (id=567): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0), 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f000000e0c0), 0x10010) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000b00)=@ccm_128={{0x304}, "0000090800000003", "73b59657269ef929ee540a8a0a86c5d0", "c506dfd5", "21be0dd9f7f3c312"}, 0x28) sendfile(r0, r1, &(0x7f0000000100)=0x10, 0x10001) 261.723404ms ago: executing program 0 (id=568): sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540), 0x3c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x303, 0x36}, "1a88ef816c4b42ed", "a5fdeb69a751e94df50ad7e9fb434d1665e9298b01e49419567b443803cf578f", "6d02cd81", "066580001e00"}, 0x38) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000005e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) close_range(r2, 0xffffffffffffffff, 0x0) 141.898026ms ago: executing program 0 (id=569): openat$iommufd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000, 0x0, 0x0, 0xfffff9e3, 0x5}) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f0000000140)={0xc}) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000098c0), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0f000000040000000400000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000200000000000000000818110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffeda, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r2, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 141.745725ms ago: executing program 3 (id=570): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000480)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x6a) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000480)='cgroup.procs\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0x4) socket$nl_xfrm(0x10, 0x3, 0x6) 0s ago: executing program 0 (id=571): r0 = syz_open_dev$admmidi(&(0x7f0000000140), 0x20, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0xff, 0x1f}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x80383, 0x0) read$midi(r0, 0x0, 0x0) ioctl$SNDCTL_SEQ_PANIC(r1, 0x5111) ioctl$SNDCTL_SEQ_PANIC(r1, 0x5100) r2 = io_uring_setup(0x30d0, &(0x7f0000000240)={0x0, 0xfffffffe, 0x40}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.10.17' (ED25519) to the list of known hosts. [ 50.058007][ T29] audit: type=1400 audit(1733360999.118:88): avc: denied { mounton } for pid=5801 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 50.062456][ T5801] cgroup: Unknown subsys name 'net' [ 50.081016][ T29] audit: type=1400 audit(1733360999.118:89): avc: denied { mount } for pid=5801 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 50.108506][ T29] audit: type=1400 audit(1733360999.148:90): avc: denied { unmount } for pid=5801 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 50.285599][ T5801] cgroup: Unknown subsys name 'cpuset' [ 50.293615][ T5801] cgroup: Unknown subsys name 'rlimit' [ 50.423586][ T29] audit: type=1400 audit(1733360999.488:91): avc: denied { setattr } for pid=5801 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 50.454157][ T29] audit: type=1400 audit(1733360999.488:92): avc: denied { create } for pid=5801 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 50.477021][ T29] audit: type=1400 audit(1733360999.488:93): avc: denied { write } for pid=5801 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 50.497832][ T29] audit: type=1400 audit(1733360999.488:94): avc: denied { read } for pid=5801 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 50.518638][ T29] audit: type=1400 audit(1733360999.488:95): avc: denied { mounton } for pid=5801 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 50.543789][ T29] audit: type=1400 audit(1733360999.488:96): avc: denied { mount } for pid=5801 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 50.547244][ T5805] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 50.567578][ T29] audit: type=1400 audit(1733360999.518:97): avc: denied { read } for pid=5485 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 51.432998][ T5801] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 55.141664][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 55.141683][ T29] audit: type=1400 audit(1733361004.198:103): avc: denied { create } for pid=5813 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 55.191913][ T29] audit: type=1400 audit(1733361004.208:104): avc: denied { read write } for pid=5815 comm="syz-executor" name="vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 55.222507][ T5822] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 55.231483][ T29] audit: type=1400 audit(1733361004.208:105): avc: denied { open } for pid=5815 comm="syz-executor" path="/dev/vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 55.233124][ T5824] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 55.255885][ T29] audit: type=1400 audit(1733361004.238:106): avc: denied { ioctl } for pid=5813 comm="syz-executor" path="socket:[4605]" dev="sockfs" ino=4605 ioctlcmd=0x48c9 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 55.279222][ T5830] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 55.296580][ T5830] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 55.305854][ T5830] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 55.313842][ T5830] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 55.322117][ T5830] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 55.327367][ T5826] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 55.337233][ T5830] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 55.338337][ T5826] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 55.354161][ T5830] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 55.360071][ T5831] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 55.362305][ T5830] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 55.375735][ T5826] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 55.383168][ T5830] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 55.383807][ T5826] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 55.391323][ T5830] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 55.398842][ T5826] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 55.404466][ T5834] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 55.412717][ T5826] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 55.419913][ T5830] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 55.426629][ T5826] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 55.432143][ T5831] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 55.454241][ T5130] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 55.454626][ T5822] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 55.469656][ T5822] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 55.475011][ T5834] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 55.476989][ T5130] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 55.485325][ T29] audit: type=1400 audit(1733361004.508:107): avc: denied { read } for pid=5823 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 55.514589][ T54] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 55.531128][ T54] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 55.543979][ T29] audit: type=1400 audit(1733361004.508:108): avc: denied { open } for pid=5823 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 55.569251][ T29] audit: type=1400 audit(1733361004.508:109): avc: denied { mounton } for pid=5823 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 55.772705][ T29] audit: type=1400 audit(1733361004.828:110): avc: denied { module_request } for pid=5815 comm="syz-executor" kmod="rtnl-link-nicvf" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 55.854405][ T5815] chnl_net:caif_netlink_parms(): no params data found [ 55.877683][ T5814] chnl_net:caif_netlink_parms(): no params data found [ 55.964873][ T5815] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.974323][ T5815] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.981734][ T5815] bridge_slave_0: entered allmulticast mode [ 55.988812][ T5815] bridge_slave_0: entered promiscuous mode [ 55.997125][ T5823] chnl_net:caif_netlink_parms(): no params data found [ 56.013062][ T5813] chnl_net:caif_netlink_parms(): no params data found [ 56.027911][ T5814] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.035331][ T5814] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.042524][ T5814] bridge_slave_0: entered allmulticast mode [ 56.049102][ T5814] bridge_slave_0: entered promiscuous mode [ 56.056265][ T5815] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.063794][ T5815] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.070954][ T5815] bridge_slave_1: entered allmulticast mode [ 56.077728][ T5815] bridge_slave_1: entered promiscuous mode [ 56.094544][ T5814] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.101692][ T5814] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.108974][ T5814] bridge_slave_1: entered allmulticast mode [ 56.115499][ T5814] bridge_slave_1: entered promiscuous mode [ 56.169280][ T5814] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.180044][ T5814] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 56.191756][ T5815] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.203106][ T5815] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 56.274185][ T5814] team0: Port device team_slave_0 added [ 56.283110][ T5815] team0: Port device team_slave_0 added [ 56.289412][ T5813] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.296684][ T5813] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.304338][ T5813] bridge_slave_0: entered allmulticast mode [ 56.310877][ T5813] bridge_slave_0: entered promiscuous mode [ 56.320642][ T5813] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.331295][ T5813] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.339032][ T5813] bridge_slave_1: entered allmulticast mode [ 56.346537][ T5813] bridge_slave_1: entered promiscuous mode [ 56.359251][ T5814] team0: Port device team_slave_1 added [ 56.376826][ T5815] team0: Port device team_slave_1 added [ 56.392894][ T5823] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.399995][ T5823] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.407499][ T5823] bridge_slave_0: entered allmulticast mode [ 56.414853][ T5823] bridge_slave_0: entered promiscuous mode [ 56.435435][ T5815] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 56.442416][ T5815] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 56.468487][ T5815] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 56.487985][ T5823] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.495455][ T5823] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.502801][ T5823] bridge_slave_1: entered allmulticast mode [ 56.510382][ T5823] bridge_slave_1: entered promiscuous mode [ 56.517086][ T5825] chnl_net:caif_netlink_parms(): no params data found [ 56.525887][ T5814] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 56.534412][ T5814] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 56.560397][ T5814] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 56.571927][ T5815] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 56.579691][ T5815] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 56.606029][ T5815] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 56.622468][ T5813] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.640926][ T5814] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 56.648127][ T5814] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 56.674526][ T5814] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 56.691466][ T5813] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 56.730166][ T5813] team0: Port device team_slave_0 added [ 56.738484][ T5823] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.750112][ T5823] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 56.770857][ T5813] team0: Port device team_slave_1 added [ 56.824998][ T5815] hsr_slave_0: entered promiscuous mode [ 56.833669][ T5815] hsr_slave_1: entered promiscuous mode [ 56.853787][ T5814] hsr_slave_0: entered promiscuous mode [ 56.860018][ T5814] hsr_slave_1: entered promiscuous mode [ 56.866548][ T5814] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 56.874829][ T5814] Cannot create hsr debugfs directory [ 56.888722][ T5823] team0: Port device team_slave_0 added [ 56.897841][ T5823] team0: Port device team_slave_1 added [ 56.905195][ T5825] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.912359][ T5825] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.919722][ T5825] bridge_slave_0: entered allmulticast mode [ 56.926788][ T5825] bridge_slave_0: entered promiscuous mode [ 56.934826][ T5825] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.941947][ T5825] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.949319][ T5825] bridge_slave_1: entered allmulticast mode [ 56.956032][ T5825] bridge_slave_1: entered promiscuous mode [ 56.964641][ T5813] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 56.971601][ T5813] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 56.997917][ T5813] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 57.041622][ T5813] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 57.048785][ T5813] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 57.074857][ T5813] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 57.089291][ T5823] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 57.097160][ T5823] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 57.123691][ T5823] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 57.161220][ T5823] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 57.168566][ T5823] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 57.195073][ T5823] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 57.213265][ T5825] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 57.235333][ T5825] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 57.280199][ T5813] hsr_slave_0: entered promiscuous mode [ 57.286574][ T5813] hsr_slave_1: entered promiscuous mode [ 57.292626][ T5813] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 57.300229][ T5813] Cannot create hsr debugfs directory [ 57.321147][ T5825] team0: Port device team_slave_0 added [ 57.328693][ T5825] team0: Port device team_slave_1 added [ 57.338247][ T5823] hsr_slave_0: entered promiscuous mode [ 57.345019][ T5823] hsr_slave_1: entered promiscuous mode [ 57.351020][ T5823] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 57.358891][ T5823] Cannot create hsr debugfs directory [ 57.426471][ T5825] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 57.434125][ T5825] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 57.460306][ T5825] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 57.474327][ T5825] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 57.481385][ T5825] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 57.498564][ T5824] Bluetooth: hci0: command tx timeout [ 57.507887][ T54] Bluetooth: hci3: command tx timeout [ 57.517200][ T5824] Bluetooth: hci2: command tx timeout [ 57.519179][ T5825] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 57.573934][ T5824] Bluetooth: hci1: command tx timeout [ 57.621058][ T5825] hsr_slave_0: entered promiscuous mode [ 57.628325][ T5825] hsr_slave_1: entered promiscuous mode [ 57.635219][ T5825] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 57.643109][ T5825] Cannot create hsr debugfs directory [ 57.653373][ T5824] Bluetooth: hci4: command tx timeout [ 57.715728][ T5815] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 57.730416][ T5815] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 57.747875][ T5815] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 57.762003][ T5815] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 57.841677][ T5814] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 57.852137][ T5814] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 57.861361][ T5814] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 57.882420][ T5814] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 57.928124][ T5813] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 57.936969][ T5813] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 57.965802][ T5813] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 57.998165][ T5813] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 58.046652][ T5823] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 58.061000][ T5815] 8021q: adding VLAN 0 to HW filter on device bond0 [ 58.071178][ T5823] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 58.095104][ T5823] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 58.105143][ T5823] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 58.155678][ T5815] 8021q: adding VLAN 0 to HW filter on device team0 [ 58.169056][ T5825] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 58.179997][ T5825] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 58.189134][ T5825] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 58.202332][ T1134] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.209794][ T1134] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.226745][ T5825] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 58.241670][ T1134] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.248807][ T1134] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.276202][ T5814] 8021q: adding VLAN 0 to HW filter on device bond0 [ 58.294605][ T5814] 8021q: adding VLAN 0 to HW filter on device team0 [ 58.320515][ T35] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.327639][ T35] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.347975][ T35] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.355195][ T35] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.423837][ T5813] 8021q: adding VLAN 0 to HW filter on device bond0 [ 58.477399][ T5823] 8021q: adding VLAN 0 to HW filter on device bond0 [ 58.485399][ T29] audit: type=1400 audit(1733361007.538:111): avc: denied { sys_module } for pid=5815 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 58.520523][ T5823] 8021q: adding VLAN 0 to HW filter on device team0 [ 58.531114][ T5813] 8021q: adding VLAN 0 to HW filter on device team0 [ 58.560584][ T63] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.568417][ T63] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.602011][ T1134] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.609203][ T1134] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.649848][ T1134] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.657086][ T1134] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.671377][ T1134] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.678534][ T1134] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.714834][ T5815] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 58.757277][ T5823] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 58.791987][ T5825] 8021q: adding VLAN 0 to HW filter on device bond0 [ 58.817334][ T5825] 8021q: adding VLAN 0 to HW filter on device team0 [ 58.831998][ T5814] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 58.869265][ T1026] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.876432][ T1026] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.887230][ T1026] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.894381][ T1026] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.921470][ T5823] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 58.975456][ T5815] veth0_vlan: entered promiscuous mode [ 59.066180][ T5815] veth1_vlan: entered promiscuous mode [ 59.095277][ T5814] veth0_vlan: entered promiscuous mode [ 59.138923][ T5814] veth1_vlan: entered promiscuous mode [ 59.211713][ T5814] veth0_macvtap: entered promiscuous mode [ 59.220075][ T5815] veth0_macvtap: entered promiscuous mode [ 59.233170][ T5815] veth1_macvtap: entered promiscuous mode [ 59.249211][ T5814] veth1_macvtap: entered promiscuous mode [ 59.276840][ T5813] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 59.309662][ T5815] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 59.332207][ T5815] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 59.340619][ T5814] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 59.351728][ T5814] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 59.365455][ T5814] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 59.379988][ T5823] veth0_vlan: entered promiscuous mode [ 59.403903][ T5813] veth0_vlan: entered promiscuous mode [ 59.410121][ T5814] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 59.422076][ T5814] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 59.437404][ T5814] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 59.447659][ T5815] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 59.457035][ T5815] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 59.466161][ T5815] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 59.475227][ T5815] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 59.491082][ T5813] veth1_vlan: entered promiscuous mode [ 59.503633][ T5823] veth1_vlan: entered promiscuous mode [ 59.510599][ T5814] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 59.519463][ T5814] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 59.529136][ T5814] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 59.537927][ T5814] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 59.572948][ T5824] Bluetooth: hci2: command tx timeout [ 59.573006][ T54] Bluetooth: hci0: command tx timeout [ 59.579178][ T5813] veth0_macvtap: entered promiscuous mode [ 59.584202][ T5822] Bluetooth: hci3: command tx timeout [ 59.613149][ T5823] veth0_macvtap: entered promiscuous mode [ 59.631247][ T5813] veth1_macvtap: entered promiscuous mode [ 59.644417][ T5825] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 59.652936][ T5822] Bluetooth: hci1: command tx timeout [ 59.668837][ T5823] veth1_macvtap: entered promiscuous mode [ 59.710638][ T5813] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 59.721471][ T5813] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 59.734022][ T5822] Bluetooth: hci4: command tx timeout [ 59.739521][ T5813] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 59.750154][ T5813] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 59.761398][ T5813] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 59.791787][ T12] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 59.807100][ T12] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 59.836013][ T5823] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 59.847542][ T5823] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 59.858419][ T5823] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 59.871891][ T5823] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 59.882853][ T5823] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 59.894084][ T5823] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 59.905371][ T5823] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 59.913701][ T5813] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 59.924496][ T5813] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 59.934523][ T5813] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 59.945178][ T5813] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 59.955802][ T5813] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 59.965816][ T5813] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 59.974839][ T5813] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 59.985807][ T5813] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 59.995199][ T5813] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 60.038352][ T5823] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 60.049011][ T5823] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 60.064059][ T5823] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 60.075230][ T5823] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 60.085396][ T5823] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 60.096652][ T5823] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 60.107761][ T5823] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 60.122418][ T1026] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 60.132459][ T1026] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 60.141711][ T12] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 60.150791][ T12] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 60.153826][ T5823] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 60.167288][ T5823] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 60.177362][ T5823] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 60.189031][ T5823] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 60.228498][ T29] audit: type=1400 audit(1733361009.288:112): avc: denied { mounton } for pid=5814 comm="syz-executor" path="/root/syzkaller.LwZg7O/syz-tmp" dev="sda1" ino=1944 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 60.253402][ T29] audit: type=1400 audit(1733361009.288:113): avc: denied { mount } for pid=5814 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 60.276409][ T29] audit: type=1400 audit(1733361009.288:114): avc: denied { mounton } for pid=5814 comm="syz-executor" path="/root/syzkaller.LwZg7O/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 60.309121][ T5825] veth0_vlan: entered promiscuous mode [ 60.323707][ T5825] veth1_vlan: entered promiscuous mode [ 60.324358][ T1026] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 60.329605][ T29] audit: type=1400 audit(1733361009.288:115): avc: denied { mount } for pid=5814 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 60.368263][ T1026] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 60.377101][ T29] audit: type=1400 audit(1733361009.288:116): avc: denied { mounton } for pid=5814 comm="syz-executor" path="/root/syzkaller.LwZg7O/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 60.427716][ T29] audit: type=1400 audit(1733361009.288:117): avc: denied { mounton } for pid=5814 comm="syz-executor" path="/root/syzkaller.LwZg7O/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=6873 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 60.473581][ T12] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 60.481297][ T5814] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 60.489137][ T12] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 60.505656][ T5825] veth0_macvtap: entered promiscuous mode [ 60.525887][ T29] audit: type=1400 audit(1733361009.288:118): avc: denied { unmount } for pid=5814 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 60.546624][ T29] audit: type=1400 audit(1733361009.318:119): avc: denied { mounton } for pid=5814 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=2724 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 60.577926][ T29] audit: type=1400 audit(1733361009.318:120): avc: denied { mount } for pid=5814 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 60.579967][ T5825] veth1_macvtap: entered promiscuous mode [ 60.605246][ T29] audit: type=1400 audit(1733361009.318:121): avc: denied { mounton } for pid=5814 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 60.636638][ T52] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 60.649687][ T52] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 60.675256][ T5825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 60.686157][ T5825] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 60.698442][ T5825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 60.709579][ T5825] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 60.719672][ T5825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 60.730529][ T5825] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 60.740572][ T5825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 60.751290][ T5825] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 60.763122][ T5825] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 60.830051][ T35] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 60.843578][ T5825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 60.859057][ T5825] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 60.859277][ T35] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 60.875453][ T52] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 60.885533][ T5825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 60.900384][ T5825] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 60.903102][ T52] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 60.917654][ T5825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 60.929248][ T5825] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 60.941444][ T5825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 60.955414][ T5825] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 60.978846][ T5825] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 61.026249][ T5825] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 61.041660][ T5825] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 61.052089][ T5825] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 61.065467][ T5825] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 61.133804][ T5909] block nbd3: shutting down sockets [ 61.314673][ T35] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 61.363274][ T35] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 61.455352][ T12] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 61.468932][ T5914] fuse: root generation should be zero [ 61.484387][ T12] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 61.656408][ T5822] Bluetooth: hci3: command tx timeout [ 61.661871][ T5822] Bluetooth: hci0: command tx timeout [ 61.662620][ T54] Bluetooth: hci2: command tx timeout [ 61.719279][ T9] IPVS: starting estimator thread 0... [ 61.733474][ T54] Bluetooth: hci1: command tx timeout [ 61.813469][ T54] Bluetooth: hci4: command tx timeout [ 61.834945][ T5931] IPVS: using max 41 ests per chain, 98400 per kthread [ 62.139823][ T8] usb 1-1: new high-speed USB device number 2 using dummy_hcd Dec 5 01:10:11 syzkaller kern.info kernel: [ 62.139823][ T8] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 63.016132][ T5988] Bluetooth: Short BCSP packet [ 63.031219][ T3517] Bluetooth: Error in BCSP hdr checksum Dec 5 01:10:12 syzkaller kern.err kernel: [ 63.016132][ T5988] Bluetooth: Short BCSP packet Dec 5 01:10:12 syzkaller kern.err kernel: [ 63.031219][ T3517] Bluetooth: Error in BCSP hdr checksum [ 63.732826][ T5824] Bluetooth: hci3: command tx timeout [ 63.739165][ T5822] Bluetooth: hci2: command tx timeout Dec 5 01:10:12 syzkaller kern.err kernel: [ 63.732826][ T5824] Bluetooth: hci3: command tx timeout Dec 5 01:10:12 syzkaller kern.err kernel: [ 63.739165][ T5822] Bluetooth: hci2: command tx timeout [ 63.822803][ T5822] Bluetooth: hci1: command tx timeout Dec 5 01:10:12 syzkaller daemon.err dhcpcd[5485]: ps_sendpsmmsg: Connection refused Dec 5 01:10:12 syzkaller daemon.err dhcpcd[5485]: ps_root_recvmsgcb: failed to send message to pid 5795: Connection refused Dec 5 01:10:12 syzkaller kern.err kernel: [ 63.822803][ T5822] Bluetooth: hci1: command tx timeout Dec 5 01:10:12 syzkaller daemon.err dhcpcd[5485]: ps_sendpsmmsg: Connection refused Dec 5 01:10:12 syzkaller daemon.err dhcpcd[5485]: ps_root_recvmsgcb: failed to send message to pid 5800: Connection refused [ 63.903658][ T5822] Bluetooth: hci4: command tx timeout Dec 5 01:10:12 syzkaller kern.err kernel: [ 63.903658][ T5822] Bluetooth: hci4: command tx timeout Dec 5 01:10:13 syzkaller daemon.err dhcpcd[5485]: ps_sendpsmmsg: Connection refused Dec 5 01:10:13 syzkaller daemon.err dhcpcd[5485]: ps_root_recvmsgcb: failed to send message to pid 5799: Connection refused [ 64.264399][ T6039] syz.3.57 uses obsolete (PF_INET,SOCK_PACKET) Dec 5 01:10:13 syzkaller kern.info kernel: [ 64.264399][ T6039] syz.3.57 uses obsolete (PF_INET,SOCK_PACKET) [ 64.462758][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! Dec 5 01:10:13 syzkaller kern.warn kernel: [ 64.462758][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! Dec 5 01:10:13 syzkaller daemon.err dhcpcd[5485]: ps_sendpsmmsg: Connection refused Dec 5 01:10:13 syzkaller daemon.err dhcpcd[5485]: ps_root_recvmsgcb: failed to send message to pid 5802: Connection refused [ 64.569852][ T6055] warning: `syz.2.64' uses wireless extensions which will stop working for Wi-Fi 7 hardware; use nl80211 Dec 5 01:10:13 syzkaller kern.warn kernel: [ 64.569852][ T6055] warning: `syz.2.64' uses wireless extensions which will stop working for Wi-Fi 7 hardware; use nl80211 Dec 5 01:10:13 syzkaller daemon.err dhcpcd[5485]: ps_sendpsmmsg: Connection refused Dec 5 01:10:13 syzkaller daemon.err dhcpcd[5485]: ps_root_recvmsgcb: failed to send message to pid 5796: Connection refused [ 65.093266][ T5822] Bluetooth: hci5: command 0x1003 tx timeout [ 65.093493][ T54] Bluetooth: hci5: Opcode 0x1003 failed: -110 Dec 5 01:10:14 syzkaller kern.err kernel: [ 65.093266][ T5822] Bluetooth: hci5: command 0x1003 tx timeout Dec 5 01:10:14 syzkaller kern.err kernel: [ 65.093493][ T54] Bluetooth: hci5: Opcode 0x1003 failed: -110 Dec 5 01:10:14 [ 65.262346][ T29] kauditd_printk_skb: 206 callbacks suppressed syzkaller daemon[ 65.262362][ T29] audit: type=1400 audit(1733361014.318:328): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 .err dhcpcd[5485]: ps_sendpsmmsg: Connection refused Dec 5 01:10:14 syzkaller daemon.err dhcpcd[5485]: ps_root_recvmsgcb: failed to send message to pid 5803: Connection refused Dec 5 01:10:14 syzkaller kern.warn kernel: [ 65.262346][ T29] kauditd_printk_skb: 206 callbacks suppressed Dec 5 01:10:14 syzkaller kern.notice kernel: [ 65.262362][ T29] audit: type=1400 audit(1733361014.318:328): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 65.342650][ T29] audit: type=1400 audit(1733361014.318:329): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 65.365850][ T29] audit: type=1400 audit(1733361014.358:330): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Dec 5 01:10:14 syzkaller kern.notice kernel: [ 65.342650][ T29] audit: type=1400 audit(1733361014.318:329): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Dec 5 01:10:14 syzkaller kern.notice kernel: [ 65.365850][ T29] audit: type=1400 audit(1733361014.358:330): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext[ 65.434770][ T29] audit: type=1400 audit(1733361014.368:331): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 =root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix Dec 5 01:10:14 syzkaller kern.notice kernel: [ 65.434770][ T29] audit: type=1400 audit(1733361014.368:331): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=sys[ 65.487495][ T29] audit: type=1400 audit(1733361014.368:332): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 tem_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Dec 5 01:10:14 syzkaller ke[ 65.518043][ T29] audit: type=1400 audit(1733361014.378:333): avc: denied { read } for pid=6080 comm="syz.0.74" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 rn.notice kernel: [ 65.487495][ 65.543382][ T29] audit: type=1400 audit(1733361014.408:334): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ T29] audit: type=1400 audit(1733361014.368:332): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Dec 5 01:10:14 syzkaller kern.notice ke[ 65.590009][ T29] audit: type=1400 audit(1733361014.418:335): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 rnel: [ 65.518043][ T29] audit: type=1400 audit(1733361014.378:333): avc: denied { read } for pid=6080 comm="syz.0.74" name="kvm" dev="devtmpfs" ino=84 scontext=root:sys[ 65.630266][ T29] audit: type=1400 audit(1733361014.428:336): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 adm_r:sysadm_t tcontext=system_u:object_r:kvm_de[ 65.655957][ T29] audit: type=1400 audit(1733361014.468:337): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 vice_t tcl Dec 5 01:10:14 syzkaller kern.notice kernel: [ 65.543382][ T29] audit: type=1400 audit(1733361014.408:334): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix Dec 5 01:10:14 syzkaller kern.notice kernel: [ 65.590009][ T29] audit: type=1400 audit(1733361014.418:335): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix Dec 5 01:10:14 syzkaller kern.notice kernel: [ 65.630266][ T29] audit: type=1400 audit(1733361014.428:336): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Dec 5 01:10:14 syzkaller kern.notice kernel: [ 65.655957][ T29] audit: type=1400 audit(1733361014.468:337): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 65.893467][ T0] NOHZ tick-stop error: local softirq work is pending, handler #08!!! Dec 5 01:10:14 syzkaller kern.w[ 65.905859][ T0] NOHZ tick-stop error: local softirq work is pending, handler #202!!! arn kernel: [ 65.893467][ T0] NOHZ tick-stop error: local softirq work is pending, handler #08!!! Dec 5 01:10:14 syzkaller kern.warn kernel: [ 65.905859][ T0] NOHZ tick-stop error: local softirq work is pending, handler #202!!! [ 66.248960][ T6109] serio: Serial port ptm0 Dec 5 01:10:15 syzkaller kern.info kernel: [ 66.248960][ T6109] serio: Serial port ptm0 [ 67.013693][ T35] wlan1: Trigger new scan to find an IBSS to join Dec 5 01:10:16 syzkaller kern.info kernel: [ 67.013693][ T35] wlan1: Trigger new scan to find an IBSS to join [ 67.596609][ T6156] ptrace attach of "./syz-executor exec"[6157] was attempted by " [ 68.824214][ T5822] Bluetooth: hci5: Received unexpected HCI Event 0x00 [ 68.915564][ C0] vkms_vblank_simulate: vblank timer overrun Dec 5 01:10:17 syzkaller kern.notice kernel: [ 67.596609][ T6156] ptrace attach of "./syz-executor exec"[6157] was attempted by " Dec 5 01:10:17 syzkaller kern.info kernel: Dec 5 01:10:17 syzkaller kern.warn kernel: [ 68.824214][ T5822] Bluetooth: hci5: Received unexpected HCI Event 0x00 Dec 5 01:10:17 syzkaller kern.warn kernel: [ 68.915564][ C0] vkms_vblank_simulate: vblank timer overrun [ 69.981630][ T1026] wlan1: Trigger new scan to find an IBSS to join Dec 5 01:10:19 syzkaller kern.info kernel: [ 69.981630][ T1026] wlan1: Trigger new scan to find an IBSS to join [ 70.281107][ T29] kauditd_printk_skb: 127 callbacks suppressed [ 70.281125][ T29] audit: type=1400 audit(1733361019.338:465): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Dec 5 01:10:19 syzkaller kern.w[ 70.323721][ T29] audit: type=1400 audit(1733361019.358:466): avc: denied { read } for pid=6207 comm="syz.4.125" dev="nsfs" ino=4026533218 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 arn kernel: [ 70.281107][ T29] kauditd_printk_skb: 127 callb[ 70.349391][ T29] audit: type=1400 audit(1733361019.358:467): avc: denied { read } for pid=6207 comm="syz.4.125" name="iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 acks suppressed Dec 5 01:10:19 syzkaller kern.notice kernel: [[ 70.385434][ T29] audit: type=1400 audit(1733361019.358:468): avc: denied { mounton } for pid=6207 comm="syz.4.125" path="/24/file0" dev="tmpfs" ino=144 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 70.281125][ T29] audit: typ[ 70.415769][ T29] audit: type=1400 audit(1733361019.378:469): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 e=1400 audit(1733361019.338:465): avc: denied { read write } f[ 70.440553][ T29] audit: type=1400 audit(1733361019.378:470): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 or pid=5823 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=sy[ 70.440592][ T29] audit: type=1400 audit(1733361019.408:471): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 stem_u:object_r:fix Dec 5 01:10:19 syzkaller kern.notice kernel: [ 70.323721][ T29] audit: type=1400 audit(1733361019.358:466): avc: deni[ 70.440623][ T29] audit: type=1400 audit(1733361019.408:472): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 ed { read } for pid=6207 comm="syz.4.125" dev="nsfs" ino=4026533218 scontext=root:sysadm_r:sys[ 70.440652][ T29] audit: type=1400 audit(1733361019.438:473): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 adm_t tcontext=system_u:object_r[ 70.440681][ T29] audit: type=1400 audit(1733361019.478:474): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 :nsfs_t tclass=file per Dec 5 01:10:19 syzkaller kern.notice kernel: [ 70.349391][ T29] audit: type=1400 audit(1733361019.358:467): avc: denied { read } for pid=6207 comm="syz.4.125" name="iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tcl Dec 5 01:10:19 syzkaller kern.notice kernel: [ 70.385434][ T29] audit: type=1400 audit(1733361019.358:468): avc: denied { mounton } for pid=6207 comm="syz.4.125" path="/24/file0" dev="tmpfs" ino=144 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t Dec 5 01:10:19 syzkaller kern.notice kernel: [ 70.415769][ T29] audit: type=1400 audit(1733361019.378:469): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Dec 5 01:10:19 syzkaller kern.notice kernel: [ 70.440553][ T29] audit: type=1400 audit(1733361019.378:470): avc: denied { read } for pid=5173 comm="syslogd" name="[ 70.855309][ T54] Bluetooth: hci5: Opcode 0x1003 failed: -110 log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Dec 5 01:10:19 syzkaller kern.notice kernel: [ 70.440592][ T29] audit: type=1400 audit(1733361019.408:471): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Dec 5 01:10:19 syzkaller kern.notice kernel: [ 70.440623][ T29] audit: type=1400 audit(1733361019.408:472): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix Dec 5 01:10:19 syzkaller kern.notice kernel: [ 70.440652][ T29] audit: type=1400 audit(1733361019.438:473): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Dec 5 01:10:19 syzkaller kern.notice kernel: [ 70.440681][ T29] audit: type=1400 audit(1733361019.478:474): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Dec 5 01:10:19 syzkaller kern.err kernel: [ 70.855309][ T54] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 72.006031][ T5827] libceph: connect (1)[c::]:6789 error -101 [ 72.013469][ T5827] libceph: mon0 (1)[c::]:6789 connect error Dec 5 01:10:21 syzkaller kern.err kernel: [ 72.006031][ T5827] libceph: conne[ 72.029803][ T5827] libceph: connect (1)[c::]:6789 error -101 ct (1)[c::]:6789 error -101 Dec 5 01:10:21 syz[ 72.040163][ T5827] libceph: mon0 (1)[c::]:6789 connect error kaller kern.warn kernel: [ 72.013469][ T5827] libceph: mon0 (1)[c::]:6789 connect error Dec 5 01:10:21 syzkaller kern.err kernel: [ 72.029803][ T5827] libceph: connect (1)[c::]:6789 error -101 Dec 5 01:10:21 syzkaller kern.warn kernel: [ 72.040163][ T5827] libceph: mon0 (1)[c::]:6789 connect e[ 72.074811][ T6255] Cannot find add_set index 0 as target rror Dec 5 01:10:21 syzkaller kern.info kernel: [ 72.074811][ T6255] Cannot find add_set index 0 as target [ 72.116857][ T6249] ceph: No mds server is up or the cluster is laggy Dec 5 01:10:21 syzkaller kern.info kernel: [ 72.116857][ T6249] ceph: No mds server is up or the cluster is laggy [ 72.536250][ T1293] ieee802154 phy0 wpan0: encryption failed: -22 [ 72.545838][ T1293] ieee802154 phy1 wpan1: encryption failed: -22 Dec 5 01:10:21 syzkaller kern.warn kernel: [ 72.536250][ T1293] ieee802154 phy0 wpan0: encryption failed: -22 Dec 5 01:10:21 syzkaller kern.warn kernel: [ 72.545838][ T1293] ieee802154 phy1 wpan1: encryption failed: -[ 72.572875][ T0] NOHZ tick-stop error: local softirq work is pending, handler #300!!! 22 [ 72.582212][ T0] NOHZ tick-stop error: local softirq work is pending, handler #40!!! Dec 5 01:10:21 syzkaller kern.warn kernel: [ 72.572875][ T0] NOHZ tick-stop error: local softirq work is pending, handler #300!!! Dec 5 01:10:21 syzkaller kern.warn kernel: [ 72.582212][ T0] NOHZ tick-stop error: local softirq work is pending, handler #40!!! [ 72.711508][ T6270] syzkaller0: entered promiscuous mode [ 72.717187][ T6270] syzkaller0: entered allmulticast mode Dec 5 01:10:21 syzkaller kern.info kernel: [ 72.711508][ T6270] syzkaller0: entered promiscuous mode Dec 5 01:10:21 syzkaller kern.info kernel: [ 72.717187][ T6270] syzkaller0: entered allmulticast mode [ 72.742773][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 72.751510][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! Dec 5 01:10:21 syzkaller kern.warn kernel: [ 72.742773][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! Dec 5 01:10:21 syzkaller kern.warn kernel: [ 72.751510][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 72.806654][ T6274] block device autoloading is deprecated and will be removed. [ 72.816316][ T6274] syz.3.150: attempt to access beyond end of device [ 72.816316][ T6274] md0: rw=2048, sector=0, nr_sectors = 8 limit=0 Dec 5 01:10:21 syzkaller kern.warn kernel: [ 72.806654][ T6274] block device autoloading is deprecated and will be removed. Dec 5 01:10:21 syzkaller kern.info kernel: [ 72.816316][ T6274] syz.3.150: attempt to access beyond end of device Dec 5 01:10:21 syzkaller kern.info kernel: [ 72.816316][ T6274] md0: rw=2048, sector=0, nr_sectors = 8 limit=0 Dec 5 01:10:21 syzkaller kern.debug kernel: [ 72.842434][ T6274] PM: Image not found (code -5) [ 73.014252][ T3517] wlan1: Trigger new scan to find an IBSS to join Dec 5 01:10:22 syzkaller kern.info kernel: [ 73.014252][ T3517] wlan1: Trigger new scan to find an IBSS to join [ 73.970665][ T63] wlan1: Creating new IBSS network, BSSID 72:d3:e9:93:e0:dc Dec 5 01:10:23 syzkaller kern.info kernel: [ 73.970665][ T63] wlan1: Creating new IBSS network, BSSID 72:d3:e9:93:e0:dc [ 74.115261][ T0] NOHZ tick-stop error: local softirq work is pending, handler #40!!! Dec 5 01:10:23 syzkaller kern.warn kernel: [ 74.115261][ T0] NOHZ tick-stop error: local softirq work is pending, handler #40!!! [ 74.351290][ T6312] capability: warning: `syz.3.166' uses deprecated v2 capabilities in a way that may be insecure Dec 5 01:10:23 syzkaller kern.info kernel: [ 74.351290][ T6312] capability: warning: `syz.3.166' uses deprecated v2 capabilities in a way that may be insecure [ 75.287748][ T29] kauditd_printk_skb: 192 callbacks suppressed [ 75.287762][ T29] audit: type=1400 audit(1733361024.348:667): avc: denied { execute } for pid=6353 comm="syz.3.181" path="/31/cpuacct.usage_sys" dev="tmpfs" ino=187 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 75.290701][ T29] audit: type=1400 audit(1733361024.348:668): avc: denied { create } for pid=6355 comm="syz.2.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 75.293917][ T29] audit: type=1400 audit(1733361024.358:669): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 75.311685][ T29] audit: type=1400 audit(1733361024.368:670): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.322427][ T29] audit: type=1400 audit(1733361024.378:671): avc: denied { read write } for pid=5814 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.324147][ T29] audit: type=1400 audit(1733361024.388:672): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.378685][ T29] audit: type=1400 audit(1733361024.428:673): avc: denied { prog_load } for pid=6361 comm="syz.3.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Dec 5 01:10:24 syzkaller kern.warn kernel: [ [ 75.529031][ T29] audit: type=1400 audit(1733361024.478:674): avc: denied { write } for pid=6363 comm="syz.4.182" name="tcp" dev="proc" ino=4026533244 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 75.287748][ T29] kauditd_printk_skb: 192 callbacks suppressed Dec 5 01:10:24 syzkaller kern.notice kernel: [ 75.287762][ T29] audit: type=1400 audit(1733361024.348:667): avc: denied { execute } for pid=6353 comm="syz.3.181" path="/31/cpuacct.usage_sys" dev="tmpfs" ino=187 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r: Dec 5 01:10:24 syzkaller kern.notice kernel: [ 75.290701][ T29] audit:[ 75.588365][ T29] audit: type=1400 audit(1733361024.588:675): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 type=1400 audit[ 75.611742][ T29] audit: type=1400 audit(1733361024.618:676): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 (1733361024.348:668): avc: denied { create } for pid=6355 comm="syz.2.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 Dec 5 01:10:24 syzkaller kern.notice kernel: [ 75.293917][ T29] audit: type=1400 audit(1733361024.358:669): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Dec 5 01:10:24 syzkaller kern.notice kernel: [ 75.311685][ T29] audit: type=1400 audit(1733361024.368:670): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix Dec 5 01:10:24 syzkaller kern.notice kernel: [ 75.322427][ T29] audit: type=1400 audit(1733361024.378:671): avc: denied { read write } for pid=5814 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix Dec 5 01:10:24 syzkaller kern.notice kernel: [ 75.324147][ T29] audit: type=1400 audit(1733361024.388:672): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix Dec 5 01:10:24 syzkaller kern.notice kernel: [ 75.378685][ T29] audit: type=1400 audit(1733361024.428:673): avc: denied { prog_load } for pid=6361 comm="syz.3.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Dec 5 01:10:24 syzkaller kern.notice kernel: [ 75.529031][ T29] audit: type=1400 audit(1733361024.478:674): avc: denied { write } for pid=6363 comm="syz.4.182" name="tcp" dev="proc" ino=4026533244 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t Dec 5 01:10:24 syzkaller kern.notice kernel: [ 75.588365][ T29] audit: type=1400 audit(1733361024.588:675): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Dec 5 01:10:24 syzkaller kern.notice kernel: [ 75.611742][ T29] audit: type=1400 audit(1733361024.618:676): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 76.355738][ T6417] serio: Serial port ptm1 Dec 5 01:10:25 syzkaller kern.info kernel: [ 76.355738][ T6417] serio: Serial port ptm1 [ 77.679980][ T25] cfg80211: failed to load regulatory.db Dec 5 01:10:26 syzkaller kern.info kernel: [ 77.679980][ T25] cfg80211: failed to load regulatory.db [ 78.164933][ T6488] serio: Serial port ptm0 Dec 5 01:10:27 syzkaller kern.info kernel: [ 78.164933][ T6488] serio: Serial port ptm0 [ 78.433621][ T6497] TCP: out of memory -- consider tuning tcp_mem Dec 5 01:10:27 syzkaller kern.info kernel: [ 78.433621][ T6497] TCP: out of memory -- consider tuning tcp_mem [ 78.524422][ T6502] Zero length message leads to an empty skb Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.524422][ T6502] Zero length message leads to an empty skb [ 78.572319][ T5822] sysfs: cannot create duplicate filename '/devices/virtual/bluetooth/hci0/hci0:201' [ 78.587037][ T5822] CPU: 1 UID: 0 PID: 5822 Comm: kworker/u9:3 Not tainted 6.13.0-rc1-syzkaller-00025-gfeffde684ac2 #0 [ 78.597923][ T5822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 78.607992][ T5822] Workqueue: hci0 hci_rx_work [ 78.612692][ T5822] Call Trace: [ 78.615989][ T5822] [ 78.618915][ T5822] dump_stack_lvl+0x16c/0x1f0 [ 78.623719][ T5822] sysfs_warn_dup+0x7f/0xa0 [ 78.628241][ T5822] sysfs_create_dir_ns+0x24d/0x2b0 [ 78.633351][ T5822] ? __pfx_sysfs_create_dir_ns+0x10/0x10 [ 78.639020][ T5822] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 78.644400][ T5822] ? kobject_add_internal+0x12d/0x990 [ 78.649812][ T5822] ? do_raw_spin_unlock+0x172/0x230 [ 78.655032][ T5822] kobject_add_internal+0x2c8/0x990 [ 78.660259][ T5822] kobject_add+0x16f/0x240 [ 78.664703][ T5822] ? __pfx_kobject_add+0x10/0x10 [ 78.669698][ T5822] ? class_to_subsys+0x3e/0x160 [ 78.674555][ T5822] ? do_raw_spin_unlock+0x172/0x230 [ 78.679751][ T5822] ? kobject_put+0xab/0x5a0 [ 78.684264][ T5822] device_add+0x289/0x1a70 [ 78.688804][ T5822] ? __pfx_dev_set_name+0x10/0x10 [ 78.693851][ T5822] ? __pfx_device_add+0x10/0x10 [ 78.698733][ T5822] ? mgmt_send_event_skb+0x2f2/0x460 [ 78.704049][ T5822] hci_conn_add_sysfs+0x17e/0x230 [ 78.709101][ T5822] le_conn_complete_evt+0x1077/0x1d60 [ 78.714502][ T5822] ? __pfx_le_conn_complete_evt+0x10/0x10 [ 78.720256][ T5822] ? __mutex_lock+0x1cc/0xa60 [ 78.724990][ T5822] hci_le_enh_conn_complete_evt+0x23d/0x380 [ 78.730937][ T5822] ? skb_pull_data+0x166/0x210 [ 78.735752][ T5822] hci_le_meta_evt+0x2e2/0x5d0 [ 78.740549][ T5822] ? __pfx_hci_le_enh_conn_complete_evt+0x10/0x10 [ 78.747007][ T5822] hci_event_packet+0x666/0x1180 [ 78.751996][ T5822] ? __pfx_hci_le_meta_evt+0x10/0x10 [ 78.757330][ T5822] ? __pfx_hci_event_packet+0x10/0x10 [ 78.762740][ T5822] ? mark_held_locks+0x9f/0xe0 [ 78.767563][ T5822] ? kcov_remote_start+0x3cf/0x6e0 [ 78.772717][ T5822] ? lockdep_hardirqs_on+0x7c/0x110 [ 78.777961][ T5822] hci_rx_work+0x2c5/0x16b0 [ 78.782524][ T5822] ? process_one_work+0x921/0x1ba0 [ 78.787679][ T5822] process_one_work+0x9c5/0x1ba0 [ 78.792655][ T5822] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 78.798319][ T5822] ? __pfx_process_one_work+0x10/0x10 [ 78.803732][ T5822] ? rcu_is_watching+0x12/0xc0 [ 78.808559][ T5822] ? assign_work+0x1a0/0x250 [ 78.813192][ T5822] worker_thread+0x6c8/0xf00 [ 78.817839][ T5822] ? __pfx_worker_thread+0x10/0x10 [ 78.822993][ T5822] kthread+0x2c1/0x3a0 [ 78.827090][ T5822] ? _raw_spin_unlock_irq+0x23/0x50 [ 78.832314][ T5822] ? __pfx_kthread+0x10/0x10 [ 78.836954][ T5822] ret_from_fork+0x45/0x80 [ 78.841409][ T5822] ? __pfx_kthread+0x10/0x10 [ 78.846056][ T5822] ret_from_fork_asm+0x1a/0x30 [ 78.850888][ T5822] Dec 5 01:10:27 syzkaller kern.w[ 78.861002][ T5822] kobject: kobject_add_internal failed for hci0:201 with -EEXIST, don't try to register things with the same name in the same directory. arn kernel: [ 78.572319][ T5822] sysfs: cannot[ 78.878424][ T5822] Bluetooth: hci0: failed to register connection device create duplicate filename '/devices/virtual/bluetooth/hci0/hci0:201' Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.587037][ T5822] CPU: 1 UID: 0 PID: 5822 Comm: kworker/u9:3 Not tainted 6.13.0-rc1-syzkaller-00025-gfeffde684ac2 #0 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.597923][ T5822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.607992][ T5822] Workqueue: hci0 hci_rx_work Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.612692][ T5822] Call Trace: Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.615989][ T5822] Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.618915][ T5822] dump_stack_lvl+0x16c/0x1f0 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.623719][ T5822] sysfs_warn_dup+0x7f/0xa0 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.628241][ T5822] sysfs_create_dir_ns+0x24d/0x2b0 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.633351][ T5822] ? __pfx_sysfs_create_dir_ns+0x10/0x10 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.639020][ T5822] ? __pfx_do_raw_spin_lock+0x10/0x10 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.644400][ T5822] ? kobject_add_internal+0x12d/0x990 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.649812][ T5822] ? do_raw_spin_unlock+0x172/0x230 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.655032][ T5822] kobject_add_internal+0x2c8/0x990 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.660259][ T5822] kobject_add+0x16f/0x240 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.664703][ T5822] ? __pfx_kobject_add+0x10/0x10 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.669698][ T5822] ? class_to_subsys+0x3e/0x160 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.674555][ T5822] ? do_raw_spin_unlock+0x172/0x230 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.679751][ T5822] ? kobject_put+0xab/0x5a0 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.684264][ T5822] device_add+0x289/0x1a70 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.688804][ T5822] ? __pfx_dev_set_name+0x10/0x10 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.693851][ T5822] ? __pfx_device_add+0x10/0x10 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.698733][ T5822] ? mgmt_send_event_skb+0x2f2/0x460 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.704049][ T5822] hci_conn_add_sysfs+0x17e/0x230 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.709101][ T5822] le_conn_complete_evt+0x1077/0x1d60 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.714502][ T5822] ? __pfx_le_conn_complete_evt+0x10/0x10 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.720256][ T5822] ? __mutex_lock+0x1cc/0xa60 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.724990][ T5822] hci_le_enh_conn_complete_evt+0x23d/0x380 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.730937][ T5822] ? skb_pull_data+0x166/0x210 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.735752][ T5822] hci_le_meta_evt+0x2e2/0x5d0 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.740549][ T5822] ? __pfx_hci_le_enh_conn_complete_evt+0x10/0x10 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.747007][ T5822] hci_event_packet+0x666/0x1180 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.751996][ T5822] ? __pfx_hci_le_meta_evt+0x10/0x10 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.757330][ T5822] ? __pfx_hci_event_packet+0x10/0x10 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.762740][ T5822] ? mark_held_locks+0x9f/0xe0 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.767563][ T5822] ? kcov_remote_start+0x3cf/0x6e0 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.772717][ T5822] ? lockdep_hardirqs_on+0x7c/0x110 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.777961][ T5822] hci_rx_work+0x2c5/0x16b0 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.782524][ T5822] ? process_one_work+0x921/0x1ba0 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.787679][ T5822] process_one_work+0x9c5/0x1ba0 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.792655][ T5822] ? __pfx_lock_acquire.part.0+0x10/0x10 Dec 5 01:10:27 syzkaller kern.warn kernel: [ 78.798319][ T5822] ? __pfx_process_one_work+0x10/0x10 Dec 5 01:10:27 syzkaller kern.warn kernel:Dec 5 01:10:27 syzkaller kern.wDec 5 01:10:27 Dec 5 01:10:27 Dec 5 01:10:27 [ 80.388514][ T5822] Bluetooth: hci3: Controller not accepting commands anymore: ncmd = 0 [ 80.390394][ T29] kauditd_printk_skb: 236 callbacks suppressed [ 80.390411][ T29] audit: type=1400 audit(1733361029.448:913): avc: denied { mounton } for pid=6528 comm="syz.3.253" path="/proc/125/task" dev="proc" ino=10359 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=0 [ 80.397409][ T5822] Bluetooth: hci3: Injecting HCI hardware error event [ 80.439828][ T54] Bluetooth: hci3: hardware error 0x00 Dec 5 01:10:29 syzkaller kern.err kernel: [ 80.388514][ T5822] Bluetooth: hci3: Controller not accepting commands anymore: ncmd = 0 Dec 5 01:10:29 syzkaller kern.warn kernel: [ 80.390394][ T29] kauditd_printk_skb: 236 callbacks suppressed Dec 5 01:10:29 syzkaller kern.notice kernel: [ 80.39[ 80.472514][ T29] audit: type=1400 audit(1733361029.498:914): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 0411][ T29] audit: type=1400 audit(1733361029.448:913): avc: denied { mounton } for pid=6528 comm="syz.3.253" path="/proc/125/task" dev="proc" ino=10359 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm Dec 5 01:10:29 syzkaller kern.err kernel: [ 80.397409][ T5822] Bluetooth: hci3: Injecting HCI hardware error event Dec 5 01:10:29 syzkaller kern.err kernel: [ 80.439828][ T54] Bluetooth: hci3: hardware error 0x00 [ 80.562665][ T29] audit: type=1400 audit(1733361029.498:915): avc: denied { relabelfrom } for pid=6473 comm="syz.2.230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=0 [ 80.583193][ T29] audit: type=1400 audit(1733361029.508:916): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 5 01:10:29 syzkaller kern.notice kernel: [ 80.472514][ T29] audit: type[ 80.612323][ T29] audit: type=1400 audit(1733361029.508:917): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 =1400 audit(1733361029.498:914):[ 80.636264][ T29] audit: type=1400 audit(1733361029.508:918): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 avc: denied {[ 80.660224][ T29] audit: type=1400 audit(1733361029.508:919): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 read } for pid[ 80.684093][ T29] audit: type=1400 audit(1733361029.528:920): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 =5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Dec 5 01:10:29 syzkaller kern.notice kernel: [ 80.562665][ T29] audit: type=1400 audit(1733361029.498:915): avc: denied { relabelfrom } for pid=6473 comm="syz.2.230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=0 Dec 5 01:10:29 syzkaller kern.notice kernel: [ 80.583193][ T29] audit: type=1400 audit(1733361029.508:916): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r[ 80.762780][ T29] audit: type=1400 audit(1733361029.578:921): avc: denied { prog_load } for pid=6525 comm="syz.1.252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 :syslogd_t tcontext=system_u:object_r:var_t tclass=l Dec 5 01:10:29 syzkaller kern.notice kernel: [ 80.612323][ T29] audit: type=1400 audit(1733361029.508:917): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Dec 5 01:10:29 syzkaller kern.notice kernel: [ 80.636264][ T29] audit: type=1400 audit(1733361029.508:918): avc: denied { read [ 80.822683][ T29] audit: type=1400 audit(1733361029.588:922): avc: denied { map_create } for pid=6525 comm="syz.1.252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Dec 5 01:10:29 syzkaller kern.notice kernel: [ 80.660224][ T29] audit: type=1400 audit(1733361029.508:919): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Dec 5 01:10:29 syzkaller kern.notice kernel: [ 80.684093][ T29] audit: type=1400 audit(1733361029.528:920): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix Dec 5 01:10:29 syzkaller kern.notice kernel: [ 80.762780][ T29] audit: type=1400 audit(1733361029.578:921): avc: den[ 80.912950][ T5822] Bluetooth: hci4: Unknown advertising packet type: 0x11 ied { prog_load } for pid=6525 comm="syz.1.252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Dec 5 01:10:29 syzkaller kern.notice kernel: [ 80.822683][ T29] audit: type=1400 audit(1733361029.588:922): avc: denied { map_create } for pid=6525 comm="syz.1.252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Dec 5 01:10:29 syzkaller kern.err kernel: [ 80.912950][ T5822] Bluetooth: hci4: Unknown advertising packet type: 0x11 [ 80.913022][ T5822] Bluetooth: hci4: Unknown advertising packet type: 0x17 [ 81.017503][ T6548] TCP: out of memory -- consider tuning tcp_mem Dec 5 01:10:30 syzkaller kern.err kernel: [ 80.913022][ T5822] Bluetooth: hci4: Unknown advertising packet type: 0x17 Dec 5 01:10:30 syzkaller kern.info kernel: [ 81.017503][ T6548] TCP: out of memory -- consider tuning tcp_mem [ 81.380086][ T0] NOHZ tick-stop error: local softirq work is pending, handler #40!!! Dec 5 01:10:30 syzkaller kern.warn kernel: [ 81.380086][ T0] NOHZ tick-stop error: local softirq work is pending, handler #40!!! [ 81.482349][ T0] NOHZ tick-stop error: local softirq work is pending, handler #40!!! Dec 5 01:10:30 syzkaller kern.warn kernel: [ 81.482349][ T0] NOHZ tick-stop error: local softirq work is pending, handler #40!!! [ 82.612790][ T54] Bluetooth: hci3: Opcode 0x0c03 failed: -110 Dec 5 01:10:31 syzkaller kern.err kernel: [ 82.612790][ T54] Bluetooth: hci3: Opcode 0x0c03 failed: -110 [ 85.034624][ T54] sysfs: cannot create duplicate filename '/devices/virtual/bluetooth/hci4/hci4:201' [ 85.044312][ T54] CPU: 1 UID: 0 PID: 54 Comm: kworker/u9:0 Not tainted 6.13.0-rc1-syzkaller-00025-gfeffde684ac2 #0 [ 85.055020][ T54] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 85.065193][ T54] Workqueue: hci4 hci_rx_work [ 85.069925][ T54] Call Trace: [ 85.073220][ T54] [ 85.076154][ T54] dump_stack_lvl+0x16c/0x1f0 [ 85.080869][ T54] sysfs_warn_dup+0x7f/0xa0 [ 85.085397][ T54] sysfs_create_dir_ns+0x24d/0x2b0 [ 85.090525][ T54] ? __pfx_sysfs_create_dir_ns+0x10/0x10 [ 85.096180][ T54] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 85.101581][ T54] ? kobject_add_internal+0x12d/0x990 [ 85.106981][ T54] ? do_raw_spin_unlock+0x172/0x230 [ 85.112186][ T54] kobject_add_internal+0x2c8/0x990 [ 85.117387][ T54] kobject_add+0x16f/0x240 [ 85.121823][ T54] ? __pfx_kobject_add+0x10/0x10 [ 85.126764][ T54] ? class_to_subsys+0x3e/0x160 [ 85.131625][ T54] ? do_raw_spin_unlock+0x172/0x230 [ 85.136825][ T54] ? kobject_put+0xab/0x5a0 [ 85.141324][ T54] device_add+0x289/0x1a70 [ 85.145754][ T54] ? __pfx_dev_set_name+0x10/0x10 [ 85.150767][ T54] ? __pfx_device_add+0x10/0x10 [ 85.155644][ T54] ? mgmt_send_event_skb+0x2f2/0x460 [ 85.160929][ T54] hci_conn_add_sysfs+0x17e/0x230 [ 85.165963][ T54] le_conn_complete_evt+0x1077/0x1d60 [ 85.171333][ T54] ? __pfx_le_conn_complete_evt+0x10/0x10 [ 85.177046][ T54] ? __mutex_lock+0x1cc/0xa60 [ 85.181723][ T54] hci_le_enh_conn_complete_evt+0x23d/0x380 [ 85.187642][ T54] ? skb_pull_data+0x166/0x210 [ 85.192430][ T54] hci_le_meta_evt+0x2e2/0x5d0 [ 85.197206][ T54] ? __pfx_hci_le_enh_conn_complete_evt+0x10/0x10 [ 85.203622][ T54] hci_event_packet+0x666/0x1180 [ 85.208561][ T54] ? __pfx_hci_le_meta_evt+0x10/0x10 [ 85.213865][ T54] ? __pfx_hci_event_packet+0x10/0x10 [ 85.219280][ T54] ? mark_held_locks+0x9f/0xe0 [ 85.224059][ T54] ? kcov_remote_start+0x3cf/0x6e0 [ 85.229164][ T54] ? lockdep_hardirqs_on+0x7c/0x110 [ 85.234357][ T54] hci_rx_work+0x2c5/0x16b0 [ 85.238900][ T54] ? process_one_work+0x921/0x1ba0 [ 85.244122][ T54] process_one_work+0x9c5/0x1ba0 [ 85.249155][ T54] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 85.254795][ T54] ? __pfx_process_one_work+0x10/0x10 [ 85.260164][ T54] ? rcu_is_watching+0x12/0xc0 [ 85.264930][ T54] ? assign_work+0x1a0/0x250 [ 85.269511][ T54] worker_thread+0x6c8/0xf00 [ 85.274138][ T54] ? __pfx_worker_thread+0x10/0x10 [ 85.279323][ T54] kthread+0x2c1/0x3a0 [ 85.283415][ T54] ? _raw_spin_unlock_irq+0x23/0x50 [ 85.288661][ T54] ? __pfx_kthread+0x10/0x10 [ 85.293252][ T54] ret_from_fork+0x45/0x80 [ 85.297676][ T54] ? __pfx_kthread+0x10/0x10 [ 85.302259][ T54] ret_from_fork_asm+0x1a/0x30 [ 85.307029][ T54] [ 85.312294][ T54] kobject: kobject_add_internal failed for hci4:201 with -EEXIST, don't try to register things with the same name in the same directory. [ 85.326624][ T54] Bluetooth: hci4: failed to register connection device Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.034624][ T54] sysfs: cannot create duplicate filename '/devices/virtual/bluetooth/hci4/hci4:201' Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.044312][ T54] CPU: 1 UID: 0 PID: 54 Comm: kworker/u9:0 Not tainted 6.13.0-rc1-syzkaller-00025-gfeffde684ac2 #0 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.055020][ T54] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.065193][ T54] Workqueue: hci4 hci_rx_work Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.069925][ T54] Call Trace: Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.073220][ T54] Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.076154][ T54] dump_stack_lvl+0x16c/0x1f0 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.080869][ T54] sysfs_warn_dup+0x7f/0xa0 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.085397][ T54] sysfs_create_dir_ns+0x24d/0x2b0 Dec 5 01:10:34 syzkall[ 85.449499][ T29] kauditd_printk_skb: 256 callbacks suppressed er kern.warn ker[ 85.449520][ T29] audit: type=1400 audit(1733361034.458:1179): avc: denied { execmem } for pid=6678 comm="syz.2.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 nel: [ 85.090525][ T54] ? __pfx_sysfs_create_dir_ns+0x10/0x10 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.096180][ T54] ? __pfx_do_raw_spin_lock+0x10/0x10 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.101581][ T54] ? kobject_add_internal+0x12d/0x990 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.106981][ T54] ? do_raw_spin_unlock+0x172/0x230 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.112186][ T54] kobject_add_internal+0x2c8/0x990 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.117387][ T54] kobject_add+0x16f/0x240 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.121823][ T54] ? __pfx_kobject_add+0x10/0x10 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.126764][ T54] ? class_to_subsys+0x3e/0x160 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.131625][ T54] ? do_raw_spin_unlock+0x172/0x230 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.136825][ T54] ? kobject_put+0xab/0x5a0 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.141324][ T54] device_add+0x289/0x1a70 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.145754][ T54] ? __pfx_dev_set_name+0x10/0x10 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.150767][ T54] ? __pfx_device_add+0x10/0x10 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.155644][ T54] ? mgmt_send_event_skb+0x2f2/0x460 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.160929][ T54] hci_conn_add_sysfs+0x17e/0x230 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.165963][ T54] le_conn_complete_evt+0x1077/0x1d60 Dec 5 01:10:34 syzk[ 85.614389][ T29] audit: type=1400 audit(1733361034.468:1180): avc: denied { name_bind } for pid=6680 comm="syz.3.317" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 aller kern.warn kernel: [ 85.171333][ T54] ? __pfx_le_conn_complete_evt+0x10/0x10 Dec 5 01:10:34 syzkaller kern.warn kern[ 85.646403][ T29] audit: type=1400 audit(1733361034.508:1181): avc: denied { read write } for pid=5814 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 el: [ 85.177046][ T54] ? __mutex_lock+0x1cc/0xa60 Dec 5 01:10:34 syzkaller kern.warn kern[ 85.678703][ T29] audit: type=1400 audit(1733361034.538:1182): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 el: [ 85.181723][ T54] hci_le_enh_conn_complete_evt+0x23d/0x380 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.187642][ T54] ? skb_pull_data+0x166/0x210 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.192430][ T54] hci_le_meta_evt+0x2e2/0x5d0 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.197206][ T54] ? __pfx_hci_le_enh_conn_complete_evt+0x10/0x10 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.203622][ T54] hci_event_packet+0x666/0x1180 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.208561][ T54[ 85.747989][ T29] audit: type=1400 audit(1733361034.538:1183): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ] ? __pfx_hci_le_meta_evt+0x10/0x10 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.213865][ T54] ? __pfx_hci_event_packet+0x10/0x10 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.219280][ T54] ? mark_held_locks+0x9f/0xe0 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.224059][ T54[ 85.797098][ T29] audit: type=1400 audit(1733361034.678:1184): avc: denied { create } for pid=6678 comm="syz.2.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=0 ] ? kcov_remote_start+0x3cf/0x6e0 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.229164][ T54] ? lockdep_hardirqs_on+0x7c/0x110 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.234357][ T54] hc[ 85.835645][ T29] audit: type=1400 audit(1733361034.708:1185): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 i_rx_work+0x2c5/0x16b0 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.238900][ T54] ? process_one_work+0x921/0x1ba0 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.244122][ T54] process_one_work+0x9c5/0x1ba0 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.249155][ T54] ? __pfx_lock_acquire.part.0+0x10/0x10 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.254795][ T54] ?Dec 5 01:10:34 Dec 5 01:10:34 [ 85.895649][ T29] audit: type=1400 audit(1733361034.738:1186): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 5 01:10:34 Dec 5 01:10:34 Dec 5 01:10:34 syzkaller kern.warn kernel: [ 85.449499][ T29] kauditd_printk_skb: 256 callb[ 85.929163][ T29] audit: type=1400 audit(1733361034.778:1187): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 acks suppressed Dec 5 01:10:34 syzkaller kern.[ 85.955030][ T29] audit: type=1400 audit(1733361034.838:1188): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 notice kernel: [ 85.449520][ T29] audit: type=1400 audit(1733361034.458:1179): avc: denied { execmem } for pid=6678 comm="syz.2.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Dec 5 01:10:34 syzkaller kern.notice kernel: [ 85.614389][ T29] audit: type=1400 audit(1733361034.468:1180): avc: denied { name_bind } for pid=6680 comm="syz.3.317" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_soc Dec 5 01:10:34 syzkaller kern.notice kernel: [ 85.646403][ T29] audit: type=1400 audit(1733361034.508:1181): avc: denied { read write } for pid=5814 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Dec 5 01:10:34 syzkaller kern.notice kernel: [ 85.678703][ T29] audit: type=1400 audit(1733361034.538:1182): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 5 01:10:34 syzkaller kern.notice kernel: [ 85.747989][ T29] audit: type=1400 audit(1733361034.538:1183): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 5 01:10:34 syzkaller kern.notice kernel: [ 85.797098][ T29] audit: type=1400 audit(1733361034.678:1184): avc: denied { create } for pid=6678 comm="syz.2.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive Dec 5 01:10:34 syzkaller kern.notice kernel: [ 85.835645][ T29] audit: type=1400 audit(1733361034.708:1185): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 5 01:10:34 syzkaller kern.notice kernel: [ 85.895649][ T29] audit: type=1400 audit(1733361034.738:1186): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 5 01:10:35 syzkaller kern.notice kernel: [ 85.929163][ T29] audit: type=1400 audit(1733361034.778:1187): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 5 01:10:35 syzkaller kern.notice kernel: [ 85.955030][ T29] audit: type=1400 audit(1733361034.838:1188): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 86.450916][ T5822] Bluetooth: hci0: ISO packet for unknown connection handle 57 Dec 5 01:10:35 syzkaller kern.err kernel: [ 86.450916][ T5822] Bluetooth: hci0: ISO packet for unknown connection handle 57 [ 87.004162][ T6728] syzkaller0: entered promiscuous mode [ 87.010062][ T6728] syzkaller0: entered allmulticast mode Dec 5 01:10:36 syzkaller kern.info kernel: [ 87.004162][ T6728] syzkaller0: entered promiscuous mode Dec 5 01:10:36 syzkaller kern.info kernel: [ 87.010062][ T6728] syzkaller0: entered allmulticast mode [ 88.521689][ T54] Bluetooth: hci5: sending frame failed (-49) Dec 5 01:10:37 [ 88.544911][ T5822] Bluetooth: hci5: Opcode 0x1003 failed: -49 syzkaller kern.e[ 88.546972][ T6781] Bluetooth: Short BCSP packet rr kernel: [ 88.521689][ T54] Bluetooth: hci5: sending frame failed (-49) Dec 5 01:10:37 syzkaller kern.err kernel: [ 88.544911][ T5822] Bluetooth: hci5: Opcode 0x1003 failed: -49 Dec 5 01:10:37 syzkaller kern.err kernel: [ 88.546972][ T6781] Bluetooth: Short BCSP packet [ 90.194672][ T6817] Bluetooth: Short BCSP packet [ 90.203594][ T52] Bluetooth: Error in BCSP hdr checksum Dec 5 01:10:39 syzkaller kern.err kernel: [ 90.194672][ T6817] Bluetooth: Short BCSP packet Dec 5 01:10:39 syzkaller kern.err kernel: [ 90.203594][ T52] Bluetooth: Error in BCSP hdr checksum [ 90.476779][ T29] kauditd_printk_skb: 149 callbacks suppressed [ 90.476795][ T29] audit: type=1400 audit(1733361039.538:1338): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 90.515925][ T29] audit: type=1400 audit(1733361039.568:1339): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Dec 5 01:10:39 syzkaller kern.w[ 90.541914][ T29] audit: type=1400 audit(1733361039.578:1340): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 90.476779][ T2[ 90.566507][ T29] audit: type=1400 audit(1733361039.578:1341): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 90.590836][ T29] audit: type=1400 audit(1733361039.598:1342): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 149 callbacks suppressed[ 90.614438][ T29] audit: type=1400 audit(1733361039.628:1343): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 5 01:10:39 syzkaller kern.[ 90.639124][ T29] audit: type=1400 audit(1733361039.628:1344): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 notice kernel: [ 90.476795][ [ 90.666012][ T29] audit: type=1400 audit(1733361039.648:1345): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 T29] audit: type=1400 audit(1733361039.538:1338[ 90.693406][ T29] audit: type=1400 audit(1733361039.698:1346): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ): avc: denied { read write } [ 90.718275][ T29] audit: type=1400 audit(1733361039.698:1347): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 for pid=5823 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Dec 5 01:10:39 syzkaller kern.notice kernel: [ 90.515925][ T29] audit: type=1400 audit(1733361039.568:1339): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Dec 5 01:10:39 syzkaller kern.notice kernel: [ 90.541914][ T29] audit: type=1400 audit(1733361039.578:1340): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 5 01:10:39 syzkaller kern.notice kernel: [ 90.566507][ T29] audit: type=1400 audit(1733361039.578:1341): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 5 01:10:39 syzkaller kern.notice kernel: [ 90.590836][ T29] audit: type=1400 audit(1733361039.598:1342): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 5 01:10:39 syzkaller kern.notice kernel: [ 90.614438][ T29] audit: type=1400 audit(1733361039.628:1343): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 5 01:10:39 syzkaller kern.notice kernel: [ 90.639124][ T29] audit: type=1400 audit(1733361039.628:1344): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Dec 5 01:10:39 syzkaller kern.notice kernel: [ 90.666012][ T29] audit: type=1400 audit(1733361039.648:1345): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 5 01:10:39 syzkaller kern.notice kernel: [ 90.693406][ T29] audit: type=1400 audit(1733361039.698:1346): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 5 01:10:39 syzkaller kern.notice kernel: [ 90.718275][ T29] audit: type=1400 audit(1733361039.698:1347): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 92.053011][ T35] wlan1: Trigger new scan to find an IBSS to join Dec 5 01:10:41 syzkaller kern.info kernel: [ 92.053011][ T35] wlan1: Trigger new scan to find an IBSS to join [ 92.212953][ T54] Bluetooth: hci5: command 0x1003 tx timeout [ 92.220402][ T5822] Bluetooth: hci5: Opcode 0x1003 failed: -110 Dec 5 01:10:41 syzkaller kern.err kernel: [ 92.212953][ T54] Bluetooth: hci5: command 0x1003 tx timeout Dec 5 01:10:41 syzkaller kern.err kernel: [ 92.220402][ T5822] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 92.850951][ T6868] ptrace attach of "./syz-executor exec"[6870] was attempted by " Dec 5 01:10:43 syzkaller kern.notice kernel: [ 92.850951][ T6868] ptrace attach of "./syz-executor exec"[6870] was attempted by " Dec 5 01:10:43 syzkaller kern.info kernel: Dec 5 01:10:44 syzkaller daemon.err dhcpcd[6943]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 5 01:10:44 syzkaller daemon.err dhcpcd[6943]: ps_root_recvmsg: Invalid argument [ 94.550879][ T6924] ptrace attach of "./syz-executor exec"[6926] was attempted by " [ 95.505855][ T29] kauditd_printk_skb: 127 callbacks suppressed [ 95.505879][ T29] audit: type=1400 audit(1733361044.568:1475): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 95.596897][ C1] vkms_vblank_simulate: vblank timer overrun [ 95.628293][ C1] vkms_vblank_simulate: vblank timer overrun Dec 5 01:10:44 syzkaller kern.notice kernel: [ 94.550879][ T6924] ptrace attach of "./syz-executor exec"[6926] was attempted by " Dec 5 01:10:44 syzkaller kern.info kernel: Dec 5 01:10:44 syzkaller kern.warn kernel: [ 95.505855][ T29] kauditd_printk_skb: 127 callbacks suppressed Dec 5 01:10:44 syzkaller kern.notice[ 95.701243][ T29] audit: type=1400 audit(1733361044.628:1476): avc: denied { prog_load } for pid=6944 comm="syz.2.427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 kernel: [ 95.505879][ T29] audit: type=1400 audit(1733361044.568:1475): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Dec 5 01:10:44 syzkaller kern.warn kernel: [ 95.596897][ C1] vkms_vblank_simulate: vblank timer overrun Dec 5 01:10:44 syzkaller kern.warn kernel: [ 95.628293][ C1] vkms_vblank_simulate: vblank timer overrun Dec 5 01:10:44 syz[ 95.762859][ T29] audit: type=1400 audit(1733361044.628:1477): avc: denied { create } for pid=6944 comm="syz.2.427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 kaller kern.notice kernel: [ 95.701243][ T29] audit: type=1400 audit(1733361044.628:1476): avc: denied { prog_load } for pid=6944 comm="syz.2.427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Dec 5 01:10:44 syzkaller kern.notice kernel: [ 95.762859][ T29] audit: type=1400 audit(1733361044.628:1477): avc: denied { create } for pid=6944 comm="syz.2.427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive [ 95.842961][ T29] audit: type=1400 audit(1733361044.628:1478): avc: denied { create } for pid=6944 comm="syz.2.427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 Dec 5 01:10:44 syzkaller kern.notice kernel: [ 95.842961][ T29] audit: type=1400 audit(1733361044.628:1478): avc: denied { create } for pid=6944 comm="syz.2.427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive [ 95.892800][ T29] audit: type=1400 audit(1733361044.628:1479): avc: denied { create } for pid=6944 comm="syz.2.427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 Dec 5 01:10:44 syzkaller kern.notice kernel: [ 95.892800][ T29] audit: type=1400 audit(1733361044.628:1479): avc: denied { create } for pid=6944 comm="syz.2.427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 95.942936][ T29] audit: type=1400 audit(1733361044.708:1480): avc: denied { prog_load } for pid=6944 comm="syz.2.427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Dec 5 01:10:45 syzkaller kern.notice kernel: [ 95.942936][ T29] audit: type=1400 audit(1733361044.708:1480): avc: denied { prog_load } for pid=6944 comm="syz.2.427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Dec 5 01:10:45 syzkaller daemon.err dhcpcd[6956]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 5 01:10:45 syzkaller daemon.err dhcpcd[6956]: ps_root_recvmsg: Invalid argument [ 96.013154][ T29] audit: type=1400 audit(1733361044.718:1481): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 5 01:10:45 syzkaller kern.notice kernel: [ 96.013154][ T29] audit: type=1400 audit(1733361044.718:1481): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 96.062901][ T29] audit: type=1400 audit(1733361044.718:1482): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 5 01:10:45 syzkaller kern.notice kernel: [ 96.062901][ T29] audit: type=1400 audit(1733361044.718:1482): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 96.120381][ T29] audit: type=1400 audit(1733361044.718:1483): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 5 01:10:45 syzkaller kern.notice kernel: [ 96.120381][ T29] audit: type=1400 audit(1733361044.718:1483): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 96.183065][ T29] audit: type=1400 audit(1733361044.718:1484): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 5 01:10:45 syzkaller kern.notice kernel: [ 96.183065][ T29] audit: type=1400 audit(1733361044.718:1484): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 96.323584][ T6977] wg2: entered promiscuous mode [ 96.328523][ T6977] wg2: entered allmulticast mode Dec 5 01:10:45 syzkaller daemon.err dhcpcd[6976]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 5 01:10:45 syzkaller daemon.err dhcpcd[6976]: ps_root_recvmsg: Invalid argument Dec 5 01:10:45 syzkaller daemon.err dhcpcd[6979]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 5 01:10:45 syzkaller daemon.err dhcpcd[6979]: ps_root_recvmsg: Invalid argument Dec 5 01:10:45 syzkaller kern.info kernel: [ 96.323584][ T6977] wg2: entered promiscuous mode Dec 5 01:10:45 syzkaller kern.info kernel: [ 96.328523][ T6977] wg2: entered allmulticast mode Dec 5 01:10:45 syzkaller daemon.err dhcpcd[6981]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 5 01:10:45 syzkaller daemon.err dhcpcd[6981]: ps_root_recvmsg: Invalid argument Dec 5 01:10:45 syzkaller daemon.err dhcpcd[6997]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 5 01:10:45 syzkaller daemon.err dhcpcd[6997]: ps_root_recvmsg: Invalid argument [ 97.014329][ T1153] wlan1: Trigger new scan to find an IBSS to join Dec 5 01:10:46 syzkaller kern.info kernel: [ 97.014329][ T1153] wlan1: Trigger new scan to find an IBSS to join [ 97.938487][ T52] wlan1: Creating new IBSS network, BSSID fa:9a:33:0e:8d:0a Dec 5 01:10:47 syzkaller kern.info kernel: [ 97.938487][ T52] wlan1: Creating new IBSS network, BSSID fa:9a:33:0e:8d:0a [ 100.541637][ T29] kauditd_printk_skb: 207 callbacks suppressed [ 100.541656][ T29] audit: type=1400 audit(1733361049.598:1692): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Dec 5 01:10:49 syzkaller kern.warn kernel: [ 100.541637][ T29] kauditd_printk_skb: 207 callb[ 100.581907][ T29] audit: type=1400 audit(1733361049.638:1693): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 acks suppressed Dec 5 01:10:49 syzkaller kern.[ 100.608956][ T29] audit: type=1400 audit(1733361049.638:1694): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 notice kernel: [ 100.541656][ T29] audit: type=1400 audit(1733361049.598:1692): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop0" d[ 100.645224][ T29] audit: type=1400 audit(1733361049.668:1695): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=s[ 100.673408][ T29] audit: type=1400 audit(1733361049.698:1696): avc: denied { create } for pid=7092 comm="syz.0.484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 ystem_u:object_r:fi Dec 5 01:10:49 syzkaller kern.notice kernel: [ 100.581907][ T29] audit: type=1400 audit(1733361049.638:1693): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 sconte[ 100.712280][ T7091] Cannot find add_set index 0 as target xt=system_u:syst[ 100.718279][ T29] audit: type=1400 audit(1733361049.698:1697): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 em_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 5 01:10:49 syzkaller kern.notice kernel: [ 100.608956][ T29] audit: type=1400 audit(1733361049.638:1694): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=syst[ 100.767421][ T29] audit: type=1400 audit(1733361049.738:1698): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 em_u:object_r:var_t tclass= Dec 5 01:10:49 syzkaller kern.notice kernel: [ 100.645224][ T29] audit: type=1400 audit(1733361049.668:1695): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:sys[ 100.811386][ T29] audit: type=1400 audit(1733361049.768:1699): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 logd_t tcontext=system_u:object_r:var_t tclass= Dec 5 01:10:49 syzkaller kern.notice kernel: [ 100.673408][ T29] audit: type=1400 audit(1733361049.698:1696): avc: denied { create } for [ 100.849703][ T29] audit: type=1400 audit(1733361049.768:1700): avc: denied { read } for pid=7090 comm="syz.2.495" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 pid=7092 comm="syz.0.484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 Dec 5 01:10:49 syzkaller kern.info kernel: [ 100.712280][ T7091] Ca[ 100.889198][ T29] audit: type=1400 audit(1733361049.788:1701): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 nnot find add_set index 0 as target Dec 5 01:10:49 syzkaller kern.notice kernel: [ 100.718279][ T29] audit: type=1400 audit(1733361049.698:1697): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 5 01:10:49 syzkaller kern.notice kernel: [ 100.767421][ T29] audit: type=1400 audit(1733361049.738:1698): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 5 01:10:49 syzkaller kern.notice kernel: [ 100.811386][ T29] audit: type=1400 audit(1733361049.768:1699): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 5 01:10:49 syzkaller kern.notice kernel: [ 100.849703][ T29] audit: type=1400 audit(1733361049.768:1700): avc: denied { read } for pid=7090 comm="syz.2.495" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t t Dec 5 01:10:49 syzkaller kern.notice kernel: [ 100.889198][ T29] audit: type=1400 audit(1733361049.788:1701): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 102.308276][ T8] libceph: connect (1)[c::]:6789 error -101 [ 102.314451][ T8] libceph: mon0 (1)[c::]:6789 connect error Dec 5 01:10:51 syzkaller kern.err kernel: [ 102.308276][ T8] libceph: connect (1)[c::]:6789 error -101 Dec 5 01:10:51 syzkaller kern.warn kernel: [ 102.314451][ T8] libceph: mon0 (1)[c::]:6789 connect error [ 102.425239][ T7135] ceph: No mds server is up or the cluster is laggy Dec 5 01:10:51 syzkaller kern.info kernel: [ 102.425239][ T7135] ceph: No mds server is up or the cluster is laggy [ 104.010757][ T3517] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) Dec 5 01:10:53 syzkaller kern.info kernel: [ 104.010757][ T3517] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 106.073215][ T29] kauditd_printk_skb: 104 callbacks suppressed [ 106.073235][ T29] audit: type=1400 audit(1733361055.128:1806): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 106.104524][ T29] audit: type=1400 audit(1733361055.138:1807): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Dec 5 01:10:55 [ 106.130636][ T29] audit: type=1400 audit(1733361055.198:1808): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 106.153334][ T29] audit: type=1400 audit(1733361055.198:1809): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 106.073215][ T2[ 106.178275][ T29] audit: type=1400 audit(1733361055.198:1810): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_printk_skb: 104 callbacks suppressed[ 106.204313][ T29] audit: type=1400 audit(1733361055.218:1811): avc: denied { read write } for pid=5815 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Dec 5 01:10:55[ 106.230222][ T29] audit: type=1400 audit(1733361055.268:1812): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.[ 106.254221][ T29] audit: type=1400 audit(1733361055.268:1813): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 notice kernel: [[ 106.276979][ T29] audit: type=1400 audit(1733361055.268:1814): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 106.073235][ [ 106.300796][ T29] audit: type=1400 audit(1733361055.318:1815): avc: denied { create } for pid=7199 comm="syz.2.523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 T29] audit: type=1400 audit(1733361055.128:1806): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Dec 5 01:10:55 syzkaller kern.notice kernel: [ 106.104524][ T29] audit: type=1400 audit(1733361055.138:1807): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Dec 5 01:10:55 syzkaller kern.notice kernel: [ 106.130636][ T29] audit: type=1400 audit(1733361055.198:1808): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 5 01:10:55 syzkaller kern.notice kernel: [ 106.153334][ T29] audit: type=1400 audit(1733361055.198:1809): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 5 01:10:55 syzkaller kern.notice kernel: [ 106.178275][ T29] audit: type=1400 audit(1733361055.198:1810): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 5 01:10:55 syzkaller kern.notice kernel: [ 106.204313][ T29] audit: type=1400 audit(1733361055.218:1811): avc: denied { read write } for pid=5815 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Dec 5 01:10:55 syzkaller kern.notice kernel: [ 106.230222][ T29] audit: type=1400 audit(1733361055.268:1812): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 5 01:10:55 syzkaller kern.notice kernel: [ 106.254221][ T29] audit: type=1400 audit(1733361055.268:1813): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 5 01:10:55 syzkaller kern.notice kernel: [ 106.276979][ T29] audit: type=1400 audit(1733361055.268:1814): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 5 01:10:55 syzkaller kern.notice kernel: [ 106.300796][ T29] audit: type=1400 audit(1733361055.318:1815): avc: denied { create } for pid=7199 comm="syz.2.523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive [ 111.660212][ T29] kauditd_printk_skb: 117 callbacks suppressed [ 111.660232][ T29] audit: type=1400 audit(1733361060.708:1933): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Dec 5 01:11:00 [ 111.693709][ T29] audit: type=1400 audit(1733361060.738:1934): avc: denied { read write } for pid=5815 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 syzkaller kern.warn kernel: [ 111.660212][ T29] kauditd_printk_skb: 117 callbacks suppressed Dec 5 01:11:00 syzkaller kern.notice kernel: [ 111.660232][ T29] audit: type=1400 audit(1733361060.708:1933): avc: denied { read write } for pid=5813 co[ 111.738908][ T29] audit: type=1400 audit(1733361060.748:1935): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 mm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Dec 5 01:11:00 syzkaller kern.notice kernel: [ 111.693709][ T29] audit: type=1400 audit(1733361060.738:1934): avc: denied { read write } for pid=5815 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Dec 5 01:11:00 syzkaller kern.notice kernel: [ 111.738908][ T29] audit: type=1400 audit(1733361060.748:1935): avc: denied { read } for pid=5173 comm="syslogd" n[ 111.810629][ T29] audit: type=1400 audit(1733361060.758:1936): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ame="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 5 01:11:00 syzkaller kern.notice kernel: [ 111.810629][ T29] audit: type=1400 audit(1733361060.758:1936): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 111.925102][ T29] audit: type=1400 audit(1733361060.778:1937): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 5 01:11:01 syzkaller kern.notice kernel: [ 111.925102][ T29] audit: type=1400 audit(1733361060.778:1937): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tconte[ 111.969937][ T29] audit: type=1400 audit(1733361060.778:1938): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 xt=system_u:object_r:var_t tclass= Dec 5 01:11:01 syzkaller kern.notice kernel: [ 111.969937][ T29] audit: type=1400 audit(1733361060.778:1938): avc: denied [ 112.033296][ T29] audit: type=1400 audit(1733361060.828:1939): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 { read write } for pid=5825 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=sy[ 112.067203][ T29] audit: type=1400 audit(1733361060.858:1940): avc: denied { read write } for pid=5814 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 stem_u:object_r:fi Dec 5 01:11:01 syzkaller kern.notice kernel: [ 112.033296][ T29] audit: type=1400 audit(1733361060.828:1939): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t t[ 112.124120][ T29] audit: type=1400 audit(1733361060.898:1941): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 class= Dec 5 01:11:01 syzkaller kern.notice kernel: [ 112.067203][ T29] aud[ 112.153350][ T29] audit: type=1400 audit(1733361060.898:1942): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 it: type=1400 audit(1733361060.858:1940): avc: denied { read write } for pid=5814 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Dec 5 01:11:01 syzkaller kern.notice kernel: [ 112.124120][ T29] audit: type=1400 audit(1733361060.898:1941): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 5 01:11:01 syzkaller kern.notice kernel: [ 112.153350][ T29] audit: type=1400 audit(1733361060.898:1942): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 112.252137][ T7279] ------------[ cut here ]------------ [ 112.258051][ T7279] WARNING: CPU: 0 PID: 7279 at net/ipv6/ip6mr.c:419 ip6mr_free_table+0xbd/0x120 [ 112.267284][ T7279] Modules linked in: [ 112.272319][ T7279] CPU: 0 UID: 0 PID: 7279 Comm: syz.4.553 Not tainted 6.13.0-rc1-syzkaller-00025-gfeffde684ac2 #0 [ 112.283057][ T7279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Dec 5 01:11:01 [ 112.293383][ T7279] RIP: 0010:ip6mr_free_table+0xbd/0x120 syzkaller kern.w[ 112.300140][ T7279] Code: 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 75 58 49 83 bc 24 c0 0e 00 00 00 74 09 e8 44 c6 af f7 90 <0f> 0b 90 e8 3b c6 af f7 48 8d 7b 38 e8 a2 86 9c f7 48 89 df be 0f arn kernel: [ 1[ 112.321730][ T7279] RSP: 0018:ffffc9000c977bd8 EFLAGS: 00010246 12.252137][ T727[ 112.329152][ T7279] RAX: 0000000000080000 RBX: ffff888078878000 RCX: ffffc9000c4e9000 9] ------------[[ 112.339201][ T7279] RDX: 0000000000080000 RSI: ffffffff89ea3fcc RDI: ffff88802c6cad00 [ 112.339235][ T7279] RBP: 0000000000000001 R08: 0000000000000005 R09: 0000000000000000 cut here ]-----[ 112.339247][ T7279] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88802c6c9e40 ------- [ 112.339256][ T7279] R13: ffff888078878000 R14: ffff888078878008 R15: dead000000000100 [ 112.339268][ T7279] FS: 00007f60faf276c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 [ 112.339287][ T7279] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 112.339299][ T7279] CR2: 0000000020780000 CR3: 00000000318c8000 CR4: 00000000003526f0 [ 112.397171][ T7279] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 112.405411][ T7279] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 112.414067][ T7279] Call Trace: [ 112.417377][ T7279] [ 112.420321][ T7279] ? __warn+0xea/0x3c0 [ 112.425030][ T7279] ? ip6mr_free_table+0xbd/0x120 [ 112.430009][ T7279] ? report_bug+0x3c0/0x580 [ 112.434597][ T7279] ? handle_bug+0x54/0xa0 [ 112.438951][ T7279] ? exc_invalid_op+0x17/0x50 [ 112.443758][ T7279] ? asm_exc_invalid_op+0x1a/0x20 [ 112.448816][ T7279] ? ip6mr_free_table+0xbc/0x120 [ 112.453828][ T7279] ? ip6mr_free_table+0xbd/0x120 [ 112.458772][ T7279] ? ip6mr_free_table+0xbc/0x120 Dec 5 01:11:01 [ 112.463778][ T7279] ip6mr_rules_exit+0x176/0x2d0 [ 112.470005][ T7279] ip6mr_net_exit_batch+0x53/0xa0 syzkaller kern.w[ 112.475131][ T7279] ? __pfx_ip6mr_net_exit_batch+0x10/0x10 [ 112.482166][ T7279] ? __pfx_ip6mr_net_exit+0x10/0x10 arn kernel: [ 112.258051][ T727[ 112.488291][ T7279] ops_exit_list+0x128/0x180 [ 112.488328][ T7279] setup_net+0x4fe/0x860 [ 112.488352][ T7279] ? __pfx_setup_net+0x10/0x10 [ 112.488371][ T7279] ? down_read_killable+0xcc/0x380 [ 112.488401][ T7279] ? __pfx_down_read_killable+0x10/0x10 [ 112.488428][ T7279] ? __raw_spin_lock_init+0x3a/0x110 [ 112.488468][ T7279] ? debug_mutex_init+0x37/0x70 [ 112.488500][ T7279] copy_net_ns+0x2b4/0x6b0 [ 112.488527][ T7279] create_new_namespaces+0x3ea/0xad0 [ 112.488561][ T7279] unshare_nsproxy_namespaces+0xc0/0x1f0 [ 112.488590][ T7279] ksys_unshare+0x45d/0xa40 [ 112.488620][ T7279] ? __pfx_ksys_unshare+0x10/0x10 [ 112.488652][ T7279] ? do_user_addr_fault+0x83d/0x13f0 [ 112.488679][ T7279] __x64_sys_unshare+0x31/0x40 [ 112.488705][ T7279] do_syscall_64+0xcd/0x250 [ 112.488749][ T7279] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 112.488780][ T7279] RIP: 0033:0x7f60fa17ff19 [ 112.488800][ T7279] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 112.488816][ T7279] RSP: 002b:00007f60faf27058 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 112.488835][ T7279] RAX: ffffffffffffffda RBX: 00007f60fa345fa0 RCX: 00007f60fa17ff19 [ 112.488847][ T7279] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000068040200 [ 112.488859][ T7279] RBP: 00007f60fa1f3986 R08: 0000000000000000 R09: 0000000000000000 [ 112.488870][ T7279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 112.488881][ T7279] R13: 0000000000000001 R14: 00007f60fa345fa0 R15: 00007ffe6d522f38 [ 112.488903][ T7279] [ 112.488913][ T7279] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 112.488927][ T7279] CPU: 0 UID: 0 PID: 7279 Comm: syz.4.553 Not tainted 6.13.0-rc1-syzkaller-00025-gfeffde684ac2 #0 [ 112.488949][ T7279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 112.488960][ T7279] Call Trace: [ 112.488966][ T7279] [ 112.488974][ T7279] dump_stack_lvl+0x3d/0x1f0 [ 112.489001][ T7279] panic+0x71d/0x800 [ 112.489029][ T7279] ? __pfx_panic+0x10/0x10 [ 112.489057][ T7279] ? show_trace_log_lvl+0x29d/0x3d0 [ 112.489094][ T7279] ? ip6mr_free_table+0xbd/0x120 [ 112.489121][ T7279] check_panic_on_warn+0xab/0xb0 [ 112.489140][ T7279] __warn+0xf6/0x3c0 [ 112.489157][ T7279] ? ip6mr_free_table+0xbd/0x120 [ 112.489183][ T7279] report_bug+0x3c0/0x580 [ 112.489208][ T7279] handle_bug+0x54/0xa0 [ 112.489234][ T7279] exc_invalid_op+0x17/0x50 [ 112.489261][ T7279] asm_exc_invalid_op+0x1a/0x20 [ 112.489285][ T7279] RIP: 0010:ip6mr_free_table+0xbd/0x120 [ 112.489310][ T7279] Code: 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 75 58 49 83 bc 24 c0 0e 00 00 00 74 09 e8 44 c6 af f7 90 <0f> 0b 90 e8 3b c6 af f7 48 8d 7b 38 e8 a2 86 9c f7 48 89 df be 0f [ 112.489331][ T7279] RSP: 0018:ffffc9000c977bd8 EFLAGS: 00010246 [ 112.489346][ T7279] RAX: 0000000000080000 RBX: ffff888078878000 RCX: ffffc9000c4e9000 [ 112.489358][ T7279] RDX: 0000000000080000 RSI: ffffffff89ea3fcc RDI: ffff88802c6cad00 [ 112.489369][ T7279] RBP: 0000000000000001 R08: 0000000000000005 R09: 0000000000000000 [ 112.489380][ T7279] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88802c6c9e40 [ 112.489391][ T7279] R13: ffff888078878000 R14: ffff888078878008 R15: dead000000000100 [ 112.489411][ T7279] ? ip6mr_free_table+0xbc/0x120 [ 112.489443][ T7279] ? ip6mr_free_table+0xbc/0x120 [ 112.489467][ T7279] ip6mr_rules_exit+0x176/0x2d0 [ 112.489495][ T7279] ip6mr_net_exit_batch+0x53/0xa0 [ 112.489519][ T7279] ? __pfx_ip6mr_net_exit_batch+0x10/0x10 [ 112.489543][ T7279] ? __pfx_ip6mr_net_exit+0x10/0x10 [ 112.489565][ T7279] ops_exit_list+0x128/0x180 [ 112.489587][ T7279] setup_net+0x4fe/0x860 [ 112.489610][ T7279] ? __pfx_setup_net+0x10/0x10 [ 112.489629][ T7279] ? down_read_killable+0xcc/0x380 [ 112.489655][ T7279] ? __pfx_down_read_killable+0x10/0x10 [ 112.489682][ T7279] ? __raw_spin_lock_init+0x3a/0x110 [ 112.489711][ T7279] ? debug_mutex_init+0x37/0x70 [ 112.489740][ T7279] copy_net_ns+0x2b4/0x6b0 [ 112.489765][ T7279] create_new_namespaces+0x3ea/0xad0 [ 112.489796][ T7279] unshare_nsproxy_namespaces+0xc0/0x1f0 [ 112.489823][ T7279] ksys_unshare+0x45d/0xa40 [ 112.489850][ T7279] ? __pfx_ksys_unshare+0x10/0x10 [ 112.489881][ T7279] ? do_user_addr_fault+0x83d/0x13f0 [ 112.489906][ T7279] __x64_sys_unshare+0x31/0x40 [ 112.489933][ T7279] do_syscall_64+0xcd/0x250 [ 112.489959][ T7279] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 112.489984][ T7279] RIP: 0033:0x7f60fa17ff19 [ 112.489999][ T7279] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 112.490015][ T7279] RSP: 002b:00007f60faf27058 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 112.490033][ T7279] RAX: ffffffffffffffda RBX: 00007f60fa345fa0 RCX: 00007f60fa17ff19 [ 112.490046][ T7279] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000068040200 [ 112.490057][ T7279] RBP: 00007f60fa1f3986 R08: 0000000000000000 R09: 0000000000000000 [ 112.490068][ T7279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 112.490079][ T7279] R13: 0000000000000001 R14: 00007f60fa345fa0 R15: 00007ffe6d522f38 [ 112.490103][ T7279] [ 112.490406][ T7279] Kernel Offset: disabled