last executing test programs: 18.256497986s ago: executing program 3 (id=424): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) r1 = getpgrp(0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000040)=0x5) prlimit64(0x0, 0xe, &(0x7f0000000100)={0x8, 0x80000100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000300)=0x7) prctl$PR_SCHED_CORE(0x3e, 0x1, r1, 0x2, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000000)=0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r3 = syz_clone(0x8000, 0x0, 0xfffffffffffffe7e, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, r3, 0x1, 0x0) r4 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r4, &(0x7f0000019680)=""/102392, 0x18ff8) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x10001043, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr', 0x3) sendto$inet(r0, &(0x7f0000000580)="17", 0x1d4c, 0x10048095, 0x0, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000000000), 0x4) sendmsg$kcm(r5, &(0x7f0000000080)={&(0x7f0000000100)=@hci={0x1f, 0x0, 0x5}, 0x80, &(0x7f0000001300)=[{&(0x7f0000000240)="27050200340f3c000688a82fb96dbcf706060000170000005f45f491bdd54ec5ff1144ee162fd4b8bf7256da82f600102c21880b00000000010040570000000600000000000000805db18fc083", 0x4d}, {&(0x7f00000002c0)="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", 0x79a00}, {&(0x7f0000001200)="d0", 0x1}], 0x3}, 0x9cdc2384056b48b8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x1f, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18020000020000000000000002000000850000009d0000009500000000"], &(0x7f0000000000)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x9}, 0x94) 17.225352167s ago: executing program 3 (id=427): r0 = openat$dma_heap(0xffffffffffffff9c, 0x0, 0x42300, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x4000811}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000080)) r5 = dup(r4) ioctl$USBDEVFS_DISCARDURB(r5, 0x550b, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001e00)={0x0, 0x0, &(0x7f0000001d80)=[{&(0x7f0000001640)=ANY=[@ANYBLOB="3000000000000000000002000000000000000000", @ANYRES32, @ANYBLOB], 0x30}], 0x1}, 0x0) sendto$inet(r6, &(0x7f0000000700)="0c268a927f1f6588b967481241ba78600a34f65ac618ded8974895abeaf4b4834ff959bcecc7a95425a3a07e758044ab4ea6f7c555d88fecf90b037511bf746bec66ba", 0x994b6e03113064ae, 0x0, 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000003b40)=0x4000000) 16.274495898s ago: executing program 4 (id=429): mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x2, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r1 = openat$proc_mixer(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$proc_mixer(r1, &(0x7f0000000380)=ANY=[@ANYBLOB], 0xaf) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'lo\x00'}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x305182, 0x0) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x6, 0x100008b}, 0x0) sched_setaffinity(0x0, 0x11, &(0x7f0000000180)=0x1400200bce) sched_setscheduler(0x0, 0x1, &(0x7f0000002200)=0x1) r5 = syz_open_dev$MSR(&(0x7f0000000200), 0x0, 0x0) read$msr(r5, &(0x7f0000002700)=""/102392, 0x18ff8) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e000000020013000200000000000000ff0800ed05000600200000000a0006000000000026b900000000000000001ffeff0001000003f1dc7f7c6e7c0200010000000000004000020000000005000500000000000a"], 0x80}}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000180000002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x0, 0xc}, &(0x7f0000001fee)='R\x10rust\xe3c*sgrVid:De', 0x0) ioctl$vim2m_VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) r8 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000080), 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={r8, r7, 0x4, r7}, 0x10) connect$pppoe(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, {0x0, @broadcast, 'veth1_to_hsr\x00'}}, 0x1e) read$FUSE(r0, &(0x7f0000006180)={0x2020}, 0x2020) 14.09228804s ago: executing program 2 (id=435): r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x141121) r1 = getpid() ioprio_set$pid(0x2, r1, 0x2007) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='<\x00\x00', @ANYRES16=r4, @ANYBLOB="310428bd7000fcdb9f251600000018000180140002006e657464657673696d3000000000800005000300000000000500"], 0x3c}, 0x1, 0x0, 0x0, 0x4c810}, 0x20000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) mount(&(0x7f0000000140)=@nullb, &(0x7f0000000040)='./cgroup\x00', 0x0, 0x2208004, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x103042, 0x0) socketpair(0x13, 0x80000, 0x9, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$packet(r7, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) mount$nfs(0x0, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='ac,,']) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000440), 0x0, 0x1000000, 0x0}) r8 = dup(r0) write$6lowpan_enable(r8, &(0x7f0000000000)='0', 0xfffffd2c) r9 = syz_io_uring_setup(0x38ff, &(0x7f0000000480)={0x0, 0x200003, 0x20, 0x1, 0xfffffffc}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r10, r11, &(0x7f0000000140)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index}) io_uring_enter(r9, 0x2def, 0x4000, 0x0, 0x0, 0x0) 11.909830931s ago: executing program 2 (id=436): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) r1 = getpgrp(0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000040)=0x5) prlimit64(0x0, 0xe, &(0x7f0000000100)={0x8, 0x80000100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000300)=0x7) prctl$PR_SCHED_CORE(0x3e, 0x1, r1, 0x2, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000000)=0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r3 = syz_clone(0x8000, 0x0, 0xfffffffffffffe7e, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, r3, 0x1, 0x0) r4 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r4, &(0x7f0000019680)=""/102392, 0x18ff8) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x10001043, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr', 0x3) sendto$inet(r0, &(0x7f0000000580)="17", 0x1d4c, 0x10048095, 0x0, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000000000), 0x4) 11.631878222s ago: executing program 1 (id=437): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000009c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, 0x0, 0x0) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000003e40), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r5, &(0x7f0000004440)={0x0, 0x0, &(0x7f0000004400)={&(0x7f00000000c0)={0x34, r4, 0x20d, 0x70bd2b, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_SECRET={0x8, 0x4, [0xffff]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x6}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xd}]}, 0x34}}, 0x4000) 10.534058878s ago: executing program 2 (id=438): socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) eventfd(0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000180)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x1c10a1, 0x0, 0x98}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x139, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xf7}, 0x48) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) setsockopt$MRT6_TABLE(0xffffffffffffffff, 0x29, 0xcf, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) socket$inet_smc(0x2b, 0x1, 0x0) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000015c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r4, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_BASE(r4, 0x4008af12, &(0x7f0000000080)={0x1, 0x7f}) ioctl$VHOST_SET_LOG_FD(r4, 0x4004af07, &(0x7f0000000000)) ioctl$VHOST_SET_VRING_KICK(r4, 0x4008af20, &(0x7f0000000040)={0x1}) ioctl$VHOST_SET_VRING_ADDR(r4, 0x4028af11, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000180)=""/53, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r4, 0x4028af11, &(0x7f0000000780)={0x1, 0x1, &(0x7f0000000380)=""/240, &(0x7f0000000900)=""/103, &(0x7f0000000800)=""/90}) ioctl$VHOST_SET_MEM_TABLE(r4, 0x4008af03, &(0x7f0000000680)={0x1, 0x0, [{0x0, 0xfffffeac, &(0x7f00000001c0)=""/115}]}) ioctl$VHOST_VSOCK_SET_RUNNING(r4, 0x4004af61, &(0x7f0000000980)=0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000380)={0x0, 0xcdf, 0xf}) 10.482824148s ago: executing program 3 (id=439): sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(0xffffffffffffffff, 0x0, 0x20000000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bond0\x00'}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bind$rds(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0xce) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000400)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@workdir={'workdir', 0x3d, './bus'}}]}) r3 = open(&(0x7f0000000040)='./file0\x00', 0x400, 0x43) mknodat$loop(r3, &(0x7f00000002c0)='./file1\x00', 0x6000, 0x0) chdir(&(0x7f00000003c0)='./bus\x00') linkat(r3, &(0x7f0000000100)='./file1\x00', r3, &(0x7f0000000240)='./file0\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000a00)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000600)='./file1\x00', 0x2) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) setxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380), &(0x7f0000000480)=@v2={0x3, 0x3, 0xb, 0x1, 0x29, "3a05eaeb032fcb544e2b868940f3ebb805cf7dd0a4ac95e5588b3aa178a31ae1d84e28dfa787da9f0f"}, 0x32, 0x1) writev(r4, &(0x7f00000025c0)=[{&(0x7f0000000240)='4', 0x1}, {0x0, 0x900}], 0x2) 9.535785831s ago: executing program 1 (id=440): syz_emit_vhci(&(0x7f0000000000)=ANY=[], 0x2a) syz_emit_ethernet(0x1b2, &(0x7f0000000880)={@local, @random="62734b8c555e", @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "7662d3", 0x17c, 0x11, 0x1, @dev={0xfe, 0x80, '\x00', 0x21}, @remote, {[@dstopts={0x33, 0x4, '\x00', [@hao={0xc9, 0x10, @remote}, @jumbo={0xc2, 0x4, 0x5}, @generic={0x1, 0x7, "e3626125f1290c"}]}, @routing, @routing={0x8, 0x2, 0x1, 0x80, 0x0, [@mcast1]}, @fragment={0x0, 0x0, 0xfb, 0x0, 0x0, 0x1e, 0x65}], {0x4e22, 0x4e20, 0x124, 0x0, @gue={{0x1, 0x1, 0x1, 0x62, 0x0, @void}, "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"}}}}}}}, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0xfffffffe}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) connect$llc(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) unshare(0x22020600) r4 = add_key$fscrypt_v1(&(0x7f0000000440), &(0x7f0000000480)={'fscrypt:', @auto=[0x38, 0x30, 0x0, 0x62, 0x86cc4097e8288a3a, 0x0, 0x0, 0x39, 0x34, 0x63, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64]}, &(0x7f00000004c0)={0x0, "3e82554dc8ccfbc2e85ec82d4ee9df60f6ae16b1a5f2c848722ba3b132e4fde178c945bd950b0477e801fc8a1be9b4ebbe9c2289a6b0aa00"}, 0x48, 0xfffffffffffffffe) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff}, 0x80) keyctl$KEYCTL_WATCH_KEY(0x20, r4, r5, 0x1d) r6 = syz_clone(0x200, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r6) ptrace(0x8, r6) syz_pidfd_open(r6, 0x0) wait4(0x0, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) 9.295728419s ago: executing program 3 (id=441): sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000005400)=[{{&(0x7f0000001d00)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0}}], 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, "0062ba7d82000000000000000000f7ffffff00"}) syz_open_pts(r0, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/226, 0xe2) read$watch_queue(0xffffffffffffffff, &(0x7f0000001d40)=""/4095, 0xfff) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="18000000009e0000000000000000000095"], &(0x7f0000000000)='GPL\x00'}, 0x94) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000001000)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}, {0x0, 0xfff1}}, [@qdisc_kind_options=@q_qfg={0x8}]}, 0x2c}}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newtfilter={0x84, 0x2c, 0x605, 0x70bd2a, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0xffe0}, {}, {0xffff, 0x2}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x4c, 0x2, [@TCA_CGROUP_ACT={0x48, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x10, 0x7ff, 0x6, 0x1, 0xff}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x2}}}}]}]}}, @TCA_RATE={0x6, 0x5, {0x8, 0x7}}]}, 0x84}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180), 0x109842, 0x0) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000780)="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") r5 = syz_clone3(&(0x7f0000000500)={0x10800000, &(0x7f0000000240), &(0x7f00000003c0), &(0x7f0000000400), {0x33}, &(0x7f0000000680)=""/227, 0xe3, &(0x7f0000000440)=""/56, &(0x7f0000000480)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) prlimit64(r5, 0xe, &(0x7f0000000580)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r6 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r6, &(0x7f0000019680)=""/102392, 0x18ff8) close(r4) sendmmsg(r3, &(0x7f00000002c0), 0x40000000000009f, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r1}, 0x10) 9.056773612s ago: executing program 4 (id=442): mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = openat$proc_mixer(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$proc_mixer(r2, &(0x7f0000000380)=ANY=[@ANYBLOB], 0xaf) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'lo\x00'}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, 0x0, 0x0) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x305182, 0x0) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x6, 0x100008b}, 0x0) sched_setaffinity(0x0, 0x11, &(0x7f0000000180)=0x1400200bce) sched_setscheduler(0x0, 0x1, &(0x7f0000002200)=0x1) r6 = syz_open_dev$MSR(&(0x7f0000000200), 0x0, 0x0) read$msr(r6, &(0x7f0000002700)=""/102392, 0x18ff8) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e000000020013000200000000000000ff0800ed05000600200000000a0006000000000026b900000000000000001ffeff0001000003f1dc7f7c6e7c0200010000000000004000020000000005000500000000000a"], 0x80}}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000180000002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x0, 0xc}, &(0x7f0000001fee)='R\x10rust\xe3c*sgrVid:De', 0x0) ioctl$vim2m_VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) r9 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000080), 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={r9, r8, 0x4, r8}, 0x10) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x0, @broadcast, 'veth1_to_hsr\x00'}}, 0x1e) read$FUSE(r0, &(0x7f0000006180)={0x2020}, 0x2020) 8.549325312s ago: executing program 0 (id=443): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000040)={@my=0x1}) socket$vsock_stream(0x28, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x94) futex_waitv(&(0x7f0000000a00)=[{0xc52, &(0x7f0000000240)=0x1221, 0x82}, {0x0, &(0x7f0000000300)=0xfff, 0x82}, {0x84, &(0x7f0000000340)=0x1, 0x2}, {0x1, &(0x7f0000000380)=0x7, 0x80}, {0x400, &(0x7f0000000480)=0xffffffff, 0x2}, {0x0, &(0x7f00000004c0)=0xfffffffffffffffe, 0x82}, {0x200, &(0x7f0000000500)=0x48, 0x2}, {0x8, &(0x7f0000000540)=0x5089, 0x2}, {0x4, &(0x7f00000006c0)=0x1000, 0x82}, {0x9, &(0x7f0000000700)=0x6, 0x2}, {0x3, &(0x7f0000000780)=0x5, 0x82}, {0x3c2, &(0x7f00000007c0)=0x5, 0x82}, {0x7, &(0x7f0000000800)=0x58c9, 0x2}, {0x4, &(0x7f0000000840)=0x9, 0x2}, {0x2, &(0x7f0000000880)=0x6, 0x2}, {0x2000e, &(0x7f0000000980)=0x9, 0x2}, {0x800, &(0x7f00000009c0)=0x3, 0x82}], 0x11, 0x0, &(0x7f0000000bc0)={0x77359400}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() r2 = socket$kcm(0x10, 0x2, 0x0) syz_open_dev$video4linux(&(0x7f0000000c00), 0x4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="000000000016d6cc3cb4e736617f84cf93d38489", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100}, 0x0) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeeb, 0x8031, 0xffffffffffffffff, 0xbf5ce000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="0a000000d2cf00003d36000002"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000180), 0x3, r6}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000380)={r6, &(0x7f0000001940), &(0x7f00000002c0)=""/187}, 0x20) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400001c008104e00f80ecdb4cb9f207c804a00d000000880802fb0a0002000a0ada1b40d80800c500c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r7, &(0x7f000057eff8)=@abs, 0x6e) 8.23679734s ago: executing program 1 (id=444): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) sched_setscheduler(0x0, 0x1, &(0x7f00000000c0)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x50, 0x0, 0x0) r3 = syz_open_dev$vim2m(&(0x7f0000000180), 0x0, 0x2) ioctl$vim2m_VIDIOC_ENUM_FMT(r3, 0xc0405602, &(0x7f0000000040)={0xa, 0x2, 0x0, "11010000001400000100b64c0000000f4cb85200000400", 0x32315659}) 7.131768253s ago: executing program 3 (id=445): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) r1 = getpgrp(0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000040)=0x5) prlimit64(0x0, 0xe, &(0x7f0000000100)={0x8, 0x80000100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000300)=0x7) prctl$PR_SCHED_CORE(0x3e, 0x1, r1, 0x2, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000000)=0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r3 = syz_clone(0x8000, 0x0, 0xfffffffffffffe7e, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, r3, 0x1, 0x0) r4 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r4, &(0x7f0000019680)=""/102392, 0x18ff8) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x10001043, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr', 0x3) sendto$inet(r0, &(0x7f0000000580)="17", 0x1d4c, 0x10048095, 0x0, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000000000), 0x4) sendmsg$kcm(r5, &(0x7f0000000080)={&(0x7f0000000100)=@hci={0x1f, 0x0, 0x5}, 0x80, &(0x7f0000001300)=[{&(0x7f0000000240)="27050200340f3c000688a82fb96dbcf706060000170000005f45f491bdd54ec5ff1144ee162fd4b8bf7256da82f600102c21880b00000000010040570000000600000000000000805db18fc083", 0x4d}, {&(0x7f00000002c0)="1c393502dda1a67d93b1ceccbe972c4fef9c33ecf2d824f3a33513f45f472bbdc8e3a2275f2587f0da0b3ae419bed996116448f90d113ce98aa985f379d729430858f5cb9a668a1800bf2354b33cdff83033de518580a3080d7f4cc2406e071138439e1566dd17983ee153ab672f362d3292e24a9952f18ec3d8b37bb3391096c1d4442a754899299321c03cbcfb98a26994b2a072c2b9d9c70d619545e5f61b050e40166d2ff57dcc008f24fd5339e7bc21e25863f80d2487c30b6bf781608a31d68e9319ab1712d8f5bdde849c040417c864cbfd3923dcb9fc6bdc2ea53334184b03efcb631dc68f0a7b6e13eea4b80d4237120e32932ca4e2b50bad0a35496d36a191d91f03b477b9587bc0ba489932e34f819fa1524ebad53a3d94b46c6aeff4f42fa067729fbb2862c09d337a75e0c8429d4bfe0dee2e1e23e8c22787178600ecca135623731e4701f35bd4e7c936a8ee274120e7662328a5aba1161b05889b045696721c79bff0547efe051f3c5de77fdd3c77afd41a1a7747a982b7efb013c9d6bac7d3ad1f9b7c3a5a1448b35696f03bca1c875e346edc55b7a271c3e5f3c0df72c8e4d7cccfa2e9b598f0ae06efbc1a5d5bd91aed6b32deccf7755cef50fab72633c802533b9d94f17f9be978f2514c47671575ee528fbdddc6194328e605e4d10e293756d20eb8a545f2bfe48df5d1d98a270458392a0a57647dcb8ee005e78877a072d12d0429b9b9957a695c3289b4a59469691115e6ba204181708b9d1ae47418ed594b8128f20c100f5485a84e60d73ab818da73fab78caf42afd1f89cdb29dfdd6676c55ea00d35321bc4878170c62b056b4e03ae556ac804026cabcbc8e79e7a18f2f56442cd650aa2bc88f62ebb65bfafd3e5b4c62ac2e720ff0fdf03c46889df55ff91058319c953f90cd6e7f7b15d56a58ff6128357510c4c618aa25434881d58c39092969ba1f7c444465f16d1f2561991e357bda928f2a50422f774f318fb41169a0d0324a8efd19b940a17c28cda06b750cd02155dbdbd1dc695e190a997ae8f4bb8766983d8db8678a78ae8f044b868549e9c60f7ce25a36300ce07f304e75d285e914b3aec703969df969b2736dd99fcab1944c751f8ef4c34cbb86d5f27ef9982be245949d5579b540750d1eac428b0cd2541295b577573b27e9ecac3934987e85b44bc85e6e307cf6f5683bf1c817369d556a368bc5560a1737aa2bec3cac4689e04fbe851ed4b6c1a355950522f8918af3855fe97ec285da15a20e8119483e7419fa2b0639d5add10b396a8033ec2b98d9a9fca3fc4202d0a6bcfa55798eacafa4c8efafb73a2ab89bb58b0c20364a6ad9c233dfb1bdbb87b8f91e3ab9790e876f906107183419aa7480e327388c01dc5f2d5bcb8a7565cddc4e1275741116416b66bf3adf9e7e31c3fc518740446ed2a394e7699baf9408c62b4c0e7a11dec8f4a67e78a3f00bedae9f55f36c52a1fd4ee3a8be7285f9ca898ee63d3718a7c4603bcb9a24537b34a41a6c0eee4cc609b014d3f4fb928aa7e3fa7a4f97dcef5c0e526b650284ffeda82f603ed9ea1eb6627d29d8bcd6c7e6fe128b1c4463b2cfe50c0ff9a46090635dde4b4d4a984e5a91f7486856cd2bf85088fa4d27b219628be8cdba7004d00985a73fb5b0b4b0f96844e73a8ff7884bdee1a0d6e62decfeebfb56351c135e6580fd61ea806ee5592fe4ffba5c73b8a4a04d44aa52645320cb73fe0c5f14a971d3b3f64c85f5ebaab5e1a061f5186050230286331048e43368e45cfc88e8f4d0d3b1b86b64d5394bc68c2b754389b3c18a45c1edb0496dd88cb3113bbdf1a0f127eb8cd52caf8da95b83d0decad3775b2f2e43776d0d32d447cdd0b267b32775e3473f51a233f8c91a4c07ad669da1844f3d9554f399d43ca1eda29c5c761b3936f845f0c4d1c6a56b8b34b5ab3291e06cd86de6116fc3236a11343d6f4ad02199717054ac1f15471c5a2b8efe67bd4bea33c0ca36e2c4209026849de21c1da1057f353cc824947d75119e4501b98cb9e621d0644e3f4a75353093557afcee7da41ad368fe1cbb426922772b9b262a861fbce9ae86d6e8c5a8de6a1e8f03456c0a354277a2f3ff46a62b6d6cdee4febf23e2350f94b47a05a4d0e7da37a2e97b899d92ca1f3bd1cded5588593e8bb99b9dce0731fa1174de14b63be2bf7e424f870551f213fab437aac092c2e9798959fa3616465e2b36fd49cc9af902d47debec02558c036ed991f1a3895b37cd70f3c405cca362c885542fd976e73be4cf7580a0c4d5a9527c77c189573e3be07ed15472f6b012939abb5be9f3e8a5b720307fb2dbca48b35d121702cfb6b3690559b08fbeb77d53d37582d7f44fe269ac51665632bf070cfc7445741b70306cb3f19b7fbecd19a78092dfd086a0da019734d95660ba4e5ce5bcf25f09403c32e3ec902f3717cca0eca05e791c2b8c2b8988645afa2446d5218abce136c0dbbafb95e4f4727a29cc567b3f73d5dbc1aeee746653a7f5c445add24a9c1b67d1bfeec85d2a6478e80c3acdb9439aa46c8cf14a98ffa89790ef7a94b3146088566812e28ccbafb466772b7fbb98dcf1e792eb6d0de0829c3c49c5ecdeea3e80017324a0fe724565c4e7a242764e9012442cae44b57c7121889c044be05b5eca70efb649bb528e751f072af93ae2c5053fdce196cce158136f904cf64f2cb8becc2d024f5ec32a38d78b87a4dfe7c53769dadef890efd160eb662cedb18a756aed83edfb9efbbb3648eb399e61f80077e64b95eae9d17083aed05cfc2e148621e36be1f41d373c721a11804fce269c688b0c647d6e1083e336d1f7f90a7a080a83397773cc351531070af5c1a1418f28dce95c01052a314a9ebe39cb9cddb8e7855e58c4a636b7f6250ecad312ede18664c03d92e330935295a35ea3e0306f25ca971300f782ae2f6e79a513732d22ef9b9bc41d17df3352a855cdd19b18f5abd6e6420f4f42f01750a64f6acdb6b46622fafebe3e913c64a1a6a59f980e97deae0dc83c12ccae6b430d7a28f21c3e0e38b32f3d5f1d44927fc34ed5c9ddb5be8eb936dbdcd327b63ea69d86c2da15cb834a18ee51a44f2da7b11d79486942fd04eade92fe5d93342970ca4cc73861b15facf97e9c53c15488c5630b17b9364c58652cfa6de0918327498ba8d6120d3be9139c51a6e9017525772397529ddd4fd1905614fd1cc7f1370a577ad10ec9ea742f9aedc9fee42c3df38f4b35ccb1cf8590eaf770b3f74af21f5119ac238e82e92c83321b06f106530abbbd321c3e1dc948accdc21a586ff37253ad1d0c5bfb51541f876be1b6e4f490046204b9edfe9a9721b9019a495d1efed10d4570f4c75ac56aa862f738b46cfe8899f6d92e862611b35be8931a2460dc646ed332b3046baf48613bbb543f4abda22d3d62a484665ba5bbf8fec1bb199b430a6e96cfad417a1644cc5f7f640004836c60f15a174eb7eb1750a71a141549f393c7d88b8729a33f841f7f8f2bd03dccaaa825f2e29105f6b4c11ac8e06bb3be9dfdecce66294a0be9dbc5f40123644fcac59ed0c968eb62fb14d111e900ad1c038f17d5471ab088f704de7db35753f818f55669a76e6219e9d975253d177791e1434644a81b2b8bc4c8e147961b4f1b7f3e225571fecb10906957791b27d35a89e3ce84c91a2dc60aee460d8f41eb7b5e171516ef34d8c7dbbc8122cdeffa51b5a393d2cae7f69826d342d4d81b58ca7ddb0e688a15b39a00ef1aed5db337d1ab87e86f835663a4968c8bf5afd7cf80549f42588d9b8ea04ff3d9eac2b8ffd1155a504230103a68bd8b3c416a10d76cee236442a68393896587bc66c01a5f7f411325578d023d7619a89d0bcbbacae99b925fb72994e1ef4240cddad2294a56bec6d6243b95b04345c215bd48a3aa89786ba39b4d2f5015d8bd038c32a7b0eb02a4eb5a640371d9b4af540eb99a1e26547cc214da21e9538754a802972411a0bf416707b95457d0b77daac9bdf27a82b9aa7992ad1d3815f9a56a746eefa6f7e1913b6e3e859b2cc7797adcae825b7aad17c11e66597042c327a6473489a9664c5ce0ff8b1ecfb691daa0bd50c17f4597826553686bc2ee08eaca8dd6f77c626691699141a698e5b517e02130587ee503c7b5f638cbf32166b0d4ebe9222b6c9d50fb3db9d1ab060c31aabeef52cd51e5cf485eecc741e37a47c4996068f1d4b25f182b9d7bee4bec5cb070d3cea2f9762a41bb8d9ec5896ebcb2b17ca82f29bcce456412d8ed531afda50d259fcb7794216b6a9a873b6c3c4493c0c6d3e6a4f81f3b40dcc745a4e2383c678c472b1d5bf3ff02992bfe893a5bc96824039da1ee3cf8593e7d616d62f6e3c3e2c4e0cc58d5445998cf5b1c91c2468b2571b118709668efbbe72911f1bfa96b97c32f71cd7071f4c729e88631a89b53dd4bae6ef9c4ed082916e267479195599e9871b26b92c6885ded29f990070fddc4d8535088ddc70d6e83f797b6fa2260a92602eb90800000001cb7394f0c90fb5913b2f8d8d24c8f1056920e1facbe643dd49d8983b277da7282a986c28d5468aed9a4730579a20346d35f78b6bd2cacb4b9237fbfb0b7a2314105ff3b074a0e340b904e715e99c501e1435c15eaa262893c2883c90f26d2ff91792d46e4d867b62570e0c1e4739b8ac4fff8f778960de1ae40d4c85c51e1c47040bb2caeaf0c71dbb67c30715b8c14d6921831d7678522eeed29444df421ee206ca3be20d1b5fd2d2baf832f097fef590290eea77f8f3ed00b39841421b61f1c0d01def54bec0348be2216a8dad60838f3ad3595a744edeb6202dbcbd9c73a126a79cbefa43c7db0493103c2aa8fecb5cde1773ad0cdd03f5b0cfb0270642a96a9e14d116e9140501df48cdbf725611b398eb2b9e93f8da49e601099e0b2e880a95525b5f3f2edd74ae9d664a1f2e932493b61634ab53a1e2f3bf56add0a7f09c16853814b03a4212b9a0119420948da26bb171b288a66a2f0a4063754c2910512aa1cead69b94b498b5d4c44ce0a4aaa7855ee1a3b7ca738756a00a435062ccb86a40cc01f666d372f323e087ef5db2bc2d17ed1f72db14c52ca6723ce92ada6ff0c4f498d42d4218a9f799a216facb7377a1532e0755b894bfc0ee99a4072ac54ee5727846631574f348bf650e7d54b0ef3a1b5cc8233e660a2615bb7401f6c23e08ff0ddb488b9d504fc42508449b8fdd70afb387016e8c9206482c334f37d26fa3bdb6063f8147db9363e22c4b43b89ba0f68d06646fc1eb74fec0be4f59a17b274e0db67b2c0398250da219c9caf7e0f6cb1f828b6f89a67cacfd0fe0132bd94261410f8d8d7eb819bc783b8e66a1786285e1e429b71ccc22f7f4c216001375c7a816719e29abc98652b6752923132256cb5f0470223e2c685c9ebf635e316a12b35a429160d1c7688dbc3edcb1af64032177e41def01696e7100bbe102ae1b68a44b50c484b23164ab0387c3e23b8a5", 0x79a00}, {&(0x7f0000001200)="d0", 0x1}], 0x3}, 0x9cdc2384056b48b8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x1f, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18020000020000000000000002000000850000009d0000009500000000"], &(0x7f0000000000)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x9}, 0x94) 7.05891718s ago: executing program 4 (id=446): socket(0x400000000010, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) syz_create_resource$binfmt(0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000200)={0x8, 0x8a}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x3) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) r2 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f00000000c0)={@multicast1, @local}, 0xc) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0xe, @empty, 0x2}, {0xa, 0x4e23, 0x7, @remote, 0x3}, r4, 0x7}}, 0x48) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000740)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000001000000000000080000095"], &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='contention_end\x00', r7}, 0x18) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(0xffffffffffffffff, 0xc01064c7, &(0x7f00000002c0)={0x0, 0x0, 0x0}) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000000580)={0xe, 0x1, 0xfa00, @id_resuseaddr={&(0x7f00000005c0)=0x1, r6, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r6, 0x10, 0x0, @in={0x2, 0x4e23, @empty}}}, 0x90) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 6.971347126s ago: executing program 0 (id=447): socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) eventfd(0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000180)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x1c10a1, 0x0, 0x98}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x139, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xf7}, 0x48) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) setsockopt$MRT6_TABLE(0xffffffffffffffff, 0x29, 0xcf, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000015c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r4, 0xaf01, 0x0) r5 = eventfd(0x0) ioctl$VHOST_SET_VRING_BASE(r4, 0x4008af12, &(0x7f0000000080)={0x1, 0x7f}) ioctl$VHOST_SET_LOG_FD(r4, 0x4004af07, &(0x7f0000000000)=r5) ioctl$VHOST_SET_VRING_KICK(r4, 0x4008af20, &(0x7f0000000040)={0x1, r5}) ioctl$VHOST_SET_VRING_ADDR(r4, 0x4028af11, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000180)=""/53, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r4, 0x4028af11, &(0x7f0000000780)={0x1, 0x1, &(0x7f0000000380)=""/240, &(0x7f0000000900)=""/103, &(0x7f0000000800)=""/90}) ioctl$VHOST_SET_MEM_TABLE(r4, 0x4008af03, &(0x7f0000000680)={0x1, 0x0, [{0x0, 0xfffffeac, &(0x7f00000001c0)=""/115}]}) ioctl$VHOST_VSOCK_SET_RUNNING(r4, 0x4004af61, &(0x7f0000000980)=0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) 5.846205573s ago: executing program 4 (id=448): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080), 0xc0000, 0x0) poll(&(0x7f00000000c0)=[{r2, 0x100}], 0x1, 0x6) r3 = socket$nl_generic(0x11, 0x3, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {0x11, 0x7c, 0x0, @multicast1}}}}}, 0x0) sendmsg(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="4ba72c4cfd81685544f46c3f0800", 0xe}], 0x1, 0x0, 0x0, 0x11000000}, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r4, &(0x7f0000000140)=[{&(0x7f00000002c0)=""/31, 0x1f}], 0x1, 0x7ff, 0x4) sched_setattr(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'vxcan1\x00', 0x1000}) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="170000000000000000020000640b000004000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x48) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r5 = syz_io_uring_setup(0x88f, &(0x7f0000000140)={0x0, 0xaee2, 0x800, 0xffffffff, 0xbfe00001}, &(0x7f0000000000)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r6, r7, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r5, 0x47f6, 0x0, 0x2, 0x0, 0x300) 5.791833701s ago: executing program 3 (id=449): r0 = openat$dma_heap(0xffffffffffffff9c, &(0x7f0000003400), 0x42300, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x4000811}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000080)) r5 = dup(r4) ioctl$USBDEVFS_DISCARDURB(r5, 0x550b, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001e00)={0x0, 0x0, &(0x7f0000001d80)=[{&(0x7f0000001640)=ANY=[@ANYBLOB="3000000000000000000002000000000000000000", @ANYRES32, @ANYBLOB], 0x30}], 0x1}, 0x0) sendto$inet(r6, &(0x7f0000000700)="0c268a927f1f6588b967481241ba78600a34f65ac618ded8974895abeaf4b4834ff959bcecc7a95425a3a07e758044ab4ea6f7c555d88fecf90b037511bf746bec66ba", 0x994b6e03113064ae, 0x0, 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000003b40)=0x4000000) 4.467703502s ago: executing program 2 (id=450): r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000000380)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000080)=0x200000000) preadv(r1, &(0x7f0000000600)=[{&(0x7f0000000280)=""/117, 0x75}], 0x1, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, 0x0) 4.42674036s ago: executing program 0 (id=451): sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(0xffffffffffffffff, 0x0, 0x20000000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bond0\x00'}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bind$rds(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0xce) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000400)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './bus'}}]}) r3 = open(&(0x7f0000000040)='./file0\x00', 0x400, 0x43) mknodat$loop(r3, &(0x7f00000002c0)='./file1\x00', 0x6000, 0x0) chdir(&(0x7f00000003c0)='./bus\x00') linkat(r3, &(0x7f0000000100)='./file1\x00', r3, &(0x7f0000000240)='./file0\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000a00)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000600)='./file1\x00', 0x2) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) setxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380), &(0x7f0000000480)=@v2={0x3, 0x3, 0xb, 0x1, 0x29, "3a05eaeb032fcb544e2b868940f3ebb805cf7dd0a4ac95e5588b3aa178a31ae1d84e28dfa787da9f0f"}, 0x32, 0x1) writev(r4, &(0x7f00000025c0)=[{&(0x7f0000000240)='4', 0x1}, {0x0, 0x900}], 0x2) 3.584939197s ago: executing program 1 (id=452): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=0x0]) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, &(0x7f0000000300)) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000280)='autofs\x00', 0x201000c, &(0x7f0000000040)) chdir(&(0x7f0000000080)='./file0\x00') setpgid(0x0, 0x0) setpgid(0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0x4) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume', 0x149a82, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000002100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000090a010400000000000000000a0000040900010073797a310000000008000540000000040900020073797a310000000008000a40fffffffc200011800e000100636f6e6e6c696d69740000000c00028008000140fffff27414000000110001"], 0x84}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000050000000900010073797a300000000078000000030a01030000000000000000050000000900010073797a300000000008000540000000001c0008800c00024000000000000000000c00014000000000000000000900030073797a3200000000280004800800024000000000140003007465616d5f736c6176655f30"], 0xd4}}, 0x4000010) write$cgroup_int(r0, &(0x7f0000000040)=0x1f00, 0x12) setxattr$incfs_size(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=0x7fffffff, 0x8, 0x1) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x40100, 0x0) r2 = open(&(0x7f0000000000)='.\x00', 0x0, 0x244) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) 3.448761819s ago: executing program 2 (id=453): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) r1 = getpgrp(0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000040)=0x5) prlimit64(0x0, 0xe, &(0x7f0000000100)={0x8, 0x80000100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000300)=0x7) prctl$PR_SCHED_CORE(0x3e, 0x1, r1, 0x2, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000000)=0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r3 = syz_clone(0x8000, 0x0, 0xfffffffffffffe7e, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, r3, 0x1, 0x0) read$msr(0xffffffffffffffff, &(0x7f0000019680)=""/102392, 0x18ff8) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x10001043, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr', 0x3) sendto$inet(r0, &(0x7f0000000580)="17", 0x1d4c, 0x10048095, 0x0, 0x0) 3.346888732s ago: executing program 0 (id=454): socket$nl_netfilter(0x10, 0x3, 0xc) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000003c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010008020000001800006600000008000300", @ANYRES32=r2, @ANYBLOB], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 3.344476379s ago: executing program 1 (id=455): sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(0xffffffffffffffff, 0x0, 0x20000000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bond0\x00'}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bind$rds(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0xce) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000400)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@workdir={'workdir', 0x3d, './bus'}}]}) r3 = open(&(0x7f0000000040)='./file0\x00', 0x400, 0x43) mknodat$loop(r3, &(0x7f00000002c0)='./file1\x00', 0x6000, 0x0) chdir(&(0x7f00000003c0)='./bus\x00') linkat(r3, &(0x7f0000000100)='./file1\x00', r3, &(0x7f0000000240)='./file0\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000a00)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000600)='./file1\x00', 0x2) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) setxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380), &(0x7f0000000480)=@v2={0x3, 0x3, 0xb, 0x1, 0x29, "3a05eaeb032fcb544e2b868940f3ebb805cf7dd0a4ac95e5588b3aa178a31ae1d84e28dfa787da9f0f"}, 0x32, 0x1) writev(r4, &(0x7f00000025c0)=[{&(0x7f0000000240)='4', 0x1}, {0x0, 0x900}], 0x2) 1.706231517s ago: executing program 2 (id=456): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket$inet(0x2, 0x1, 0x100) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}, 0x1, 0x0, 0x0, 0x804}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000001c0)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000400)) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0186405, &(0x7f0000000440)={0x4, 0x200, {r3}, {}, 0xfffffffc, 0x80000001}) r4 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r4, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) shutdown(r2, 0x1) r7 = fsopen(&(0x7f0000000280)='ceph\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r7, 0x1, &(0x7f0000000b40)='source', &(0x7f0000000040)='c:::\x00', 0x0) r8 = gettid() fsconfig$FSCONFIG_CMD_CREATE(r7, 0x6, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000800)=@can_newroute={0x14c, 0x18, 0x1, 0x70bd29, 0x25dfdbfd, {0x1d, 0x1, 0x4}, [@CGW_CS_CRC8={0x11e, 0x6, {0x1, 0xe, 0x3, 0x0, 0xff, "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", 0x0, "5c8d586b2a88d818b56d2a5e15c8a95d29e5b2ea"}}, @CGW_MOD_SET={0x15, 0x4, {{{0x3, 0x1, 0x0, 0x1}, 0x0, 0x5, 0x0, 0x0, '\t\x00'}, 0x1}}]}, 0x14c}}, 0x4c0c8) tkill(r8, 0xb) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000041}, 0x55fdb4595c3d8036) openat$cuse(0xffffffffffffff9c, &(0x7f0000001f80), 0x2, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000001900)={0x2, {0xc, 0x117, 0x5, 0x101, 0x200}}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000380)={0x1, 0x1, 0x1000, 0x51, &(0x7f0000000300)="9f6718b2c7cada5274aa68a4cfebe1f508c9d9bdb8508abb7dba0ec33eca400abd474b277c04f62fb7c7ef5eb42c819520297cfb8f84790fe42914324e8577e47c4ecc0f6d687d17a6d41c7ff6f1e9eb5c", 0xbf, 0x0, &(0x7f0000000480)="6e3e05610634bf446138dc7a6e0be1283b182331800aaa78051d73fc4f8b640bed2b7ba0b2af9e71a89086fea224f8adf890dfc6b14392e58d0366dd182a5c2e146b6c1634faaeb8c651f821a24706a60d51652f8a49faf669ffa7880f499b5b24bc211ab0b1c83275cef74f445dae07a3068b6f1a3839ccfaf8624a18baff23275a1a7911cb47a922437fe88d5e940e9103a3cffa6aeac6a2a9af4316b64382f089133635291c0dab92bdc86dc9f420b883a496d601f84fef2d49f0d7ffe1"}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2031}, [@IFLA_XDP={0x14, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}, @IFLA_XDP_FLAGS={0x8, 0x3, 0x2}]}, @IFLA_GROUP={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20048054}, 0x0) 1.6812919s ago: executing program 4 (id=457): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20040000) mount(0x0, 0x0, 0x0, 0x208000, 0x0) socket$rxrpc(0x21, 0x2, 0xa) sched_setscheduler(0x0, 0x1, &(0x7f0000000300)=0x7) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) socket$unix(0x1, 0x1, 0x0) setresuid(0x0, 0x0, 0x0) ioctl$KDFONTOP_SET(r1, 0x4b4b, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = syz_open_dev$vim2m(&(0x7f0000000140), 0x800000, 0x2) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="300000001a00010029bd70000000000081000000000000000000000014000200fc00"], 0x30}}, 0x0) pwrite64(r5, &(0x7f00000002c0), 0x0, 0x8) 1.605228603s ago: executing program 1 (id=458): socket(0x400000000010, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) syz_create_resource$binfmt(0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000200)={0x8, 0x8a}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x3) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) r2 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f00000000c0)={@multicast1, @local}, 0xc) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0xe, @empty, 0x2}, {0xa, 0x4e23, 0x7, @remote, 0x3}, r4, 0x7}}, 0x48) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000740)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000001000000000000080000095"], &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='contention_end\x00', r7}, 0x18) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(0xffffffffffffffff, 0xc01064c7, &(0x7f00000002c0)={0x0, 0x0, 0x0}) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000000580)={0xe, 0x1, 0xfa00, @id_resuseaddr={&(0x7f00000005c0)=0x1, r6, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r6, 0x10, 0x0, @in={0x2, 0x4e23, @empty}}}, 0x90) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 1.398101176s ago: executing program 0 (id=459): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000040)={@my=0x1}) socket$vsock_stream(0x28, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) futex_waitv(&(0x7f0000000a00)=[{0xc52, &(0x7f0000000240)=0x1221, 0x82}, {0x0, &(0x7f0000000300)=0xfff, 0x82}, {0x84, &(0x7f0000000340)=0x1, 0x2}, {0x1, &(0x7f0000000380)=0x7, 0x80}, {0x400, &(0x7f0000000480)=0xffffffff, 0x2}, {0x0, &(0x7f00000004c0)=0xfffffffffffffffe, 0x82}, {0x200, &(0x7f0000000500)=0x48, 0x2}, {0x8, &(0x7f0000000540)=0x5089, 0x2}, {0x4, &(0x7f00000006c0)=0x1000, 0x82}, {0x9, &(0x7f0000000700)=0x6, 0x2}, {0x3, &(0x7f0000000780)=0x5, 0x82}, {0x3c2, &(0x7f00000007c0)=0x5, 0x82}, {0x7, &(0x7f0000000800)=0x58c9, 0x2}, {0x4, &(0x7f0000000840)=0x9, 0x2}, {0x2, &(0x7f0000000880)=0x6, 0x2}, {0x2000e, &(0x7f0000000980)=0x9, 0x2}, {0x800, &(0x7f00000009c0)=0x3, 0x82}], 0x11, 0x0, &(0x7f0000000bc0)={0x77359400}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() r2 = socket$kcm(0x10, 0x2, 0x0) syz_open_dev$video4linux(&(0x7f0000000c00), 0x4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="000000000016d6cc3cb4e736617f84cf93d38489", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100}, 0x0) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeeb, 0x8031, 0xffffffffffffffff, 0xbf5ce000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="0a000000d2cf00003d36000002"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000180), 0x3, r6}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000380)={r6, &(0x7f0000001940), &(0x7f00000002c0)=""/187}, 0x20) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400001c008104e00f80ecdb4cb9f207c804a00d000000880802fb0a0002000a0ada1b40d80800c500c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r7, &(0x7f000057eff8)=@abs, 0x6e) 123.935406ms ago: executing program 4 (id=460): socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) eventfd(0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000180)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x1c10a1, 0x0, 0x98}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x139, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xf7}, 0x48) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) setsockopt$MRT6_TABLE(0xffffffffffffffff, 0x29, 0xcf, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) socket$inet_smc(0x2b, 0x1, 0x0) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000015c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r4, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_BASE(r4, 0x4008af12, &(0x7f0000000080)={0x1, 0x7f}) ioctl$VHOST_SET_LOG_FD(r4, 0x4004af07, &(0x7f0000000000)) ioctl$VHOST_SET_VRING_KICK(r4, 0x4008af20, &(0x7f0000000040)={0x1}) ioctl$VHOST_SET_VRING_ADDR(r4, 0x4028af11, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000180)=""/53, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r4, 0x4028af11, &(0x7f0000000780)={0x1, 0x1, &(0x7f0000000380)=""/240, &(0x7f0000000900)=""/103, &(0x7f0000000800)=""/90}) ioctl$VHOST_SET_MEM_TABLE(r4, 0x4008af03, &(0x7f0000000680)={0x1, 0x0, [{0x0, 0xfffffeac, &(0x7f00000001c0)=""/115}]}) ioctl$VHOST_VSOCK_SET_RUNNING(r4, 0x4004af61, &(0x7f0000000980)=0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000380)={0x0, 0xcdf, 0xf}) 0s ago: executing program 0 (id=461): socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) eventfd(0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000180)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x1c10a1, 0x0, 0x98}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x139, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xf7}, 0x48) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) setsockopt$MRT6_TABLE(0xffffffffffffffff, 0x29, 0xcf, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000015c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r4, 0xaf01, 0x0) r5 = eventfd(0x0) ioctl$VHOST_SET_VRING_BASE(r4, 0x4008af12, &(0x7f0000000080)={0x1, 0x7f}) ioctl$VHOST_SET_LOG_FD(r4, 0x4004af07, &(0x7f0000000000)=r5) ioctl$VHOST_SET_VRING_KICK(r4, 0x4008af20, &(0x7f0000000040)={0x1, r5}) ioctl$VHOST_SET_VRING_ADDR(r4, 0x4028af11, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000180)=""/53, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r4, 0x4028af11, &(0x7f0000000780)={0x1, 0x1, &(0x7f0000000380)=""/240, &(0x7f0000000900)=""/103, &(0x7f0000000800)=""/90}) ioctl$VHOST_SET_MEM_TABLE(r4, 0x4008af03, &(0x7f0000000680)={0x1, 0x0, [{0x0, 0xfffffeac, &(0x7f00000001c0)=""/115}]}) ioctl$VHOST_VSOCK_SET_RUNNING(r4, 0x4004af61, &(0x7f0000000980)=0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) kernel console output (not intermixed with test programs): interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 62.235675][ T5809] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 62.257254][ T5810] hsr_slave_0: entered promiscuous mode [ 62.263389][ T5810] hsr_slave_1: entered promiscuous mode [ 62.289756][ T5807] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 62.296881][ T5807] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 62.322821][ T5807] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 62.337364][ T5806] hsr_slave_0: entered promiscuous mode [ 62.343404][ T5806] hsr_slave_1: entered promiscuous mode [ 62.349251][ T5806] debugfs: 'hsr0' already exists in 'hsr' [ 62.355260][ T5806] Cannot create hsr debugfs directory [ 62.363970][ T5807] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 62.370886][ T5807] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 62.397494][ T5807] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 62.397534][ T5134] Bluetooth: hci2: command tx timeout [ 62.457794][ T5808] hsr_slave_0: entered promiscuous mode [ 62.464415][ T5808] hsr_slave_1: entered promiscuous mode [ 62.470294][ T5808] debugfs: 'hsr0' already exists in 'hsr' [ 62.476783][ T5808] Cannot create hsr debugfs directory [ 62.515047][ T5809] hsr_slave_0: entered promiscuous mode [ 62.521056][ T5809] hsr_slave_1: entered promiscuous mode [ 62.527249][ T5809] debugfs: 'hsr0' already exists in 'hsr' [ 62.533020][ T5809] Cannot create hsr debugfs directory [ 62.553305][ T5822] Bluetooth: hci0: command tx timeout [ 62.553374][ T51] Bluetooth: hci3: command tx timeout [ 62.563226][ T5822] Bluetooth: hci4: command tx timeout [ 62.564866][ T5134] Bluetooth: hci1: command tx timeout [ 62.608036][ T5807] hsr_slave_0: entered promiscuous mode [ 62.614075][ T5807] hsr_slave_1: entered promiscuous mode [ 62.619877][ T5807] debugfs: 'hsr0' already exists in 'hsr' [ 62.626467][ T5807] Cannot create hsr debugfs directory [ 62.887847][ T5810] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 62.900421][ T5810] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 62.909903][ T5810] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 62.924960][ T5810] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 62.970838][ T5806] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 62.982156][ T5806] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 62.991275][ T5806] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 63.011879][ T5806] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 63.069900][ T5809] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 63.081356][ T5809] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 63.093639][ T5809] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 63.102819][ T5809] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 63.195501][ T5810] 8021q: adding VLAN 0 to HW filter on device bond0 [ 63.209176][ T5808] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 63.226538][ T5808] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 63.247135][ T5808] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 63.264716][ T5806] 8021q: adding VLAN 0 to HW filter on device bond0 [ 63.271589][ T5808] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 63.296951][ T5810] 8021q: adding VLAN 0 to HW filter on device team0 [ 63.318331][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.325519][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.350836][ T1107] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.358051][ T1107] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.368830][ T5807] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 63.383207][ T5806] 8021q: adding VLAN 0 to HW filter on device team0 [ 63.393114][ T5807] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 63.401958][ T5807] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 63.414080][ T5807] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 63.429386][ T1107] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.436447][ T1107] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.457982][ T1107] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.465097][ T1107] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.537124][ T5809] 8021q: adding VLAN 0 to HW filter on device bond0 [ 63.609164][ T5808] 8021q: adding VLAN 0 to HW filter on device bond0 [ 63.636798][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 63.636811][ T30] audit: type=1400 audit(1767292675.509:84): avc: denied { sys_module } for pid=5810 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 63.641711][ T5809] 8021q: adding VLAN 0 to HW filter on device team0 [ 63.680926][ T5808] 8021q: adding VLAN 0 to HW filter on device team0 [ 63.693542][ T1087] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.700619][ T1087] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.730217][ T3524] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.737352][ T3524] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.768352][ T3524] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.775503][ T3524] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.802389][ T3524] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.809522][ T3524] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.851074][ T5807] 8021q: adding VLAN 0 to HW filter on device bond0 [ 63.891985][ T5810] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 63.921755][ T5807] 8021q: adding VLAN 0 to HW filter on device team0 [ 63.934387][ T5806] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 63.952569][ T3524] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.959653][ T3524] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.983480][ T1087] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.990585][ T1087] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.068436][ T5810] veth0_vlan: entered promiscuous mode [ 64.109546][ T5806] veth0_vlan: entered promiscuous mode [ 64.128368][ T5810] veth1_vlan: entered promiscuous mode [ 64.166513][ T5806] veth1_vlan: entered promiscuous mode [ 64.225813][ T5810] veth0_macvtap: entered promiscuous mode [ 64.255664][ T5810] veth1_macvtap: entered promiscuous mode [ 64.268618][ T5809] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 64.301260][ T5806] veth0_macvtap: entered promiscuous mode [ 64.325890][ T5810] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 64.336246][ T5806] veth1_macvtap: entered promiscuous mode [ 64.347899][ T5808] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 64.359872][ T5810] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 64.415491][ T3524] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 64.426741][ T3524] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 64.439466][ T3524] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 64.448748][ T3524] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 64.476086][ T5134] Bluetooth: hci2: command tx timeout [ 64.485265][ T5807] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 64.494074][ T5806] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 64.538495][ T5806] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 64.548104][ T5809] veth0_vlan: entered promiscuous mode [ 64.569210][ T49] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 64.600623][ T49] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 64.616224][ T49] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 64.625569][ T49] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 64.635873][ T5134] Bluetooth: hci1: command tx timeout [ 64.635903][ T5822] Bluetooth: hci3: command tx timeout [ 64.646683][ T51] Bluetooth: hci0: command tx timeout [ 64.646747][ T5134] Bluetooth: hci4: command tx timeout [ 64.661711][ T5809] veth1_vlan: entered promiscuous mode [ 64.668298][ T3524] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 64.681384][ T3524] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 64.745017][ T49] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 64.754061][ T49] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 64.781796][ T5808] veth0_vlan: entered promiscuous mode [ 64.788047][ T5807] veth0_vlan: entered promiscuous mode [ 64.797463][ T30] audit: type=1400 audit(1767292676.669:85): avc: denied { mounton } for pid=5810 comm="syz-executor" path="/root/syzkaller.17Hien/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 64.806741][ T5808] veth1_vlan: entered promiscuous mode [ 64.821954][ T30] audit: type=1400 audit(1767292676.669:86): avc: denied { mount } for pid=5810 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 64.858821][ T30] audit: type=1400 audit(1767292676.669:87): avc: denied { mounton } for pid=5810 comm="syz-executor" path="/root/syzkaller.17Hien/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 64.883172][ T3524] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 64.887724][ T30] audit: type=1400 audit(1767292676.669:88): avc: denied { mount } for pid=5810 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 64.897439][ T3524] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 64.919553][ T30] audit: type=1400 audit(1767292676.729:89): avc: denied { mounton } for pid=5810 comm="syz-executor" path="/root/syzkaller.17Hien/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 64.953996][ T30] audit: type=1400 audit(1767292676.729:90): avc: denied { mounton } for pid=5810 comm="syz-executor" path="/root/syzkaller.17Hien/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=7461 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 64.958889][ T5807] veth1_vlan: entered promiscuous mode [ 64.988674][ T30] audit: type=1400 audit(1767292676.729:91): avc: denied { unmount } for pid=5810 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 65.009667][ T30] audit: type=1400 audit(1767292676.789:92): avc: denied { mounton } for pid=5810 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=2784 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 65.013173][ T5810] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 65.036276][ T30] audit: type=1400 audit(1767292676.789:93): avc: denied { mount } for pid=5810 comm="syz-executor" name="/" dev="gadgetfs" ino=7463 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 65.083889][ T5809] veth0_macvtap: entered promiscuous mode [ 65.105017][ T5809] veth1_macvtap: entered promiscuous mode [ 65.115338][ T5808] veth0_macvtap: entered promiscuous mode [ 65.147373][ T5808] veth1_macvtap: entered promiscuous mode [ 65.181807][ T49] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 65.195467][ T49] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 65.207399][ T5807] veth0_macvtap: entered promiscuous mode [ 65.263906][ T5808] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 65.276795][ T5808] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 65.323751][ T49] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.359081][ T5809] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 65.373629][ T49] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.385809][ T5807] veth1_macvtap: entered promiscuous mode [ 65.394182][ T49] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.610815][ T5809] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 65.706073][ T49] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.800532][ T49] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.820356][ T5807] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 65.833248][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 65.839593][ T49] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.851344][ T49] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.865836][ T49] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.877870][ T5807] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 65.904596][ T76] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 65.916908][ T76] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 65.948588][ T4234] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.972633][ T4234] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.989171][ T1107] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.008063][ T1107] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.073109][ T0] NOHZ tick-stop error: local softirq work is pending, handler #08!!! [ 66.158955][ T1107] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 66.200493][ T1107] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 66.523941][ T12] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 66.545546][ T12] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 66.555375][ T5822] Bluetooth: hci2: command tx timeout [ 66.673859][ T0] NOHZ tick-stop error: local softirq work is pending, handler #40!!! [ 66.738719][ T5822] Bluetooth: hci3: command tx timeout [ 66.738750][ T5817] Bluetooth: hci1: command tx timeout [ 66.749596][ T5134] Bluetooth: hci4: command tx timeout [ 66.755776][ T51] Bluetooth: hci0: command tx timeout [ 66.944384][ T36] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 66.992818][ T36] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 67.266472][ T13] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 67.601908][ T13] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 67.641631][ T13] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 67.747867][ T13] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 67.879470][ T5956] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 67.908801][ T5956] evm: overlay not supported [ 68.162906][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 68.210310][ T0] NOHZ tick-stop error: local softirq work is pending, handler #40!!! [ 68.312684][ T0] NOHZ tick-stop error: local softirq work is pending, handler #c2!!! [ 68.321793][ T0] NOHZ tick-stop error: local softirq work is pending, handler #c2!!! [ 68.414887][ T0] NOHZ tick-stop error: local softirq work is pending, handler #40!!! [ 68.473011][ T0] NOHZ tick-stop error: local softirq work is pending, handler #08!!! [ 68.722675][ T0] NOHZ tick-stop error: local softirq work is pending, handler #02!!! [ 69.287756][ T30] kauditd_printk_skb: 48 callbacks suppressed [ 69.287773][ T30] audit: type=1400 audit(1767292680.439:142): avc: denied { read } for pid=5957 comm="syz.2.9" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 69.319558][ T5134] Bluetooth: hci0: command tx timeout [ 69.319974][ T5822] Bluetooth: hci1: command tx timeout [ 69.324969][ T5824] Bluetooth: hci4: command tx timeout [ 69.325012][ T51] Bluetooth: hci2: command tx timeout [ 69.329572][ T30] audit: type=1400 audit(1767292680.439:143): avc: denied { open } for pid=5957 comm="syz.2.9" path="/dev/cpu/0/msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 69.333347][ T5817] Bluetooth: hci3: command tx timeout [ 69.337426][ T30] audit: type=1400 audit(1767292680.589:144): avc: denied { create } for pid=5957 comm="syz.2.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 71.349565][ T1298] ieee802154 phy0 wpan0: encryption failed: -22 [ 71.410838][ T30] audit: type=1400 audit(1767292680.599:145): avc: denied { name_bind } for pid=5957 comm="syz.2.9" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 71.411405][ T1298] ieee802154 phy1 wpan1: encryption failed: -22 [ 71.485638][ T5930] usb 3-1: new full-speed USB device number 2 using dummy_hcd [ 71.524412][ T30] audit: type=1400 audit(1767292680.599:146): avc: denied { node_bind } for pid=5957 comm="syz.2.9" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 72.227587][ T5990] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=5990 comm=syz.1.12 [ 73.372656][ T30] audit: type=1400 audit(1767292680.709:147): avc: denied { read write } for pid=5957 comm="syz.2.9" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 73.470362][ T30] audit: type=1400 audit(1767292680.709:148): avc: denied { open } for pid=5957 comm="syz.2.9" path="/dev/raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 74.422480][ T5923] usb 1-1: new full-speed USB device number 2 using dummy_hcd [ 74.477794][ T30] audit: type=1400 audit(1767292680.709:149): avc: denied { ioctl } for pid=5957 comm="syz.2.9" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 74.692612][ T30] audit: type=1400 audit(1767292681.199:150): avc: denied { unmount } for pid=5808 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 74.730179][ T30] audit: type=1400 audit(1767292681.299:151): avc: denied { prog_load } for pid=5960 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 74.778455][ T30] audit: type=1400 audit(1767292681.299:152): avc: denied { bpf } for pid=5960 comm="syz.1.2" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 74.792617][ T5983] usb 2-1: new full-speed USB device number 2 using dummy_hcd [ 74.851274][ T30] audit: type=1400 audit(1767292681.299:153): avc: denied { perfmon } for pid=5960 comm="syz.1.2" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 74.902642][ T5923] usb 1-1: device not accepting address 2, error -71 [ 75.024213][ T30] audit: type=1400 audit(1767292681.299:154): avc: denied { prog_run } for pid=5960 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 75.047554][ T5983] usb 2-1: config 0 interface 0 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 75.058844][ T5983] usb 2-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0x94, changing to 0x84 [ 75.092765][ T30] audit: type=1400 audit(1767292681.369:155): avc: denied { unlink } for pid=5808 comm="syz-executor" name="file1" dev="tmpfs" ino=30 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=blk_file permissive=1 [ 75.114840][ T5983] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x84 has an invalid bInterval 0, changing to 10 [ 75.132595][ T5983] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x84 has invalid wMaxPacketSize 0 [ 75.156105][ T5983] usb 2-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 75.169083][ T30] audit: type=1400 audit(1767292681.369:156): avc: denied { unmount } for pid=5808 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 75.204439][ T5983] usb 2-1: New USB device found, idVendor=04e8, idProduct=ff30, bcdDevice=a6.d1 [ 75.223455][ T30] audit: type=1400 audit(1767292681.429:157): avc: denied { create } for pid=5967 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 75.243830][ T5983] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 75.251811][ T5983] usb 2-1: Product: syz [ 75.273098][ T5983] usb 2-1: Manufacturer: syz [ 75.278967][ T5983] usb 2-1: SerialNumber: syz [ 75.292799][ T30] audit: type=1400 audit(1767292681.429:158): avc: denied { write } for pid=5967 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 75.339650][ T5983] usb 2-1: config 0 descriptor?? [ 75.472629][ T5983] rc_core: IR keymap rc-imon-rsc not found [ 75.503190][ T5983] Registered IR keymap rc-empty [ 75.555542][ T5983] rc rc0: iMON Station as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/rc/rc0 [ 75.750105][ T5983] input: iMON Station as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/rc/rc0/input5 [ 75.889424][ T5983] imon_raw 2-1:0.0: probe with driver imon_raw failed with error -90 [ 76.116590][ T5983] usb 2-1: USB disconnect, device number 2 [ 76.132110][ T6012] mmap: syz.4.18 (6012) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 76.306532][ T6016] Zero length message leads to an empty skb [ 77.745737][ T5963] usb 1-1: new full-speed USB device number 4 using dummy_hcd [ 79.163474][ T5963] usb 1-1: config 0 interface 0 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 79.706564][ T5963] usb 1-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0x94, changing to 0x84 [ 79.753217][ T5963] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x84 has an invalid bInterval 0, changing to 10 [ 79.822606][ T5963] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x84 has invalid wMaxPacketSize 0 [ 79.832381][ T5963] usb 1-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 79.884277][ T5963] usb 1-1: string descriptor 0 read error: -71 [ 79.890538][ T5963] usb 1-1: New USB device found, idVendor=04e8, idProduct=ff30, bcdDevice=a6.d1 [ 79.958262][ T5963] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 80.206672][ T5963] usb 1-1: config 0 descriptor?? [ 80.222236][ T5963] usb 1-1: can't set config #0, error -71 [ 80.242177][ T5963] usb 1-1: USB disconnect, device number 4 [ 81.118098][ T117] cfg80211: failed to load regulatory.db [ 81.169719][ T30] kauditd_printk_skb: 35 callbacks suppressed [ 81.169735][ T30] audit: type=1400 audit(1767292693.039:194): avc: denied { create } for pid=6047 comm="syz.2.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 81.466304][ T6050] netlink: 830 bytes leftover after parsing attributes in process `syz.2.27'. [ 83.116951][ T30] audit: type=1400 audit(1767292694.989:195): avc: denied { read write } for pid=6054 comm="syz.4.22" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 83.118796][ T6058] overlay: Unknown parameter 'uid>00000000000000000000' [ 83.193212][ T30] audit: type=1400 audit(1767292694.989:196): avc: denied { open } for pid=6054 comm="syz.4.22" path="/dev/fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 83.262734][ T30] audit: type=1400 audit(1767292694.989:197): avc: denied { mounton } for pid=6054 comm="syz.4.22" path="/5/bus" dev="tmpfs" ino=53 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 87.644077][ T30] audit: type=1400 audit(1767292699.339:198): avc: denied { setopt } for pid=6085 comm="syz.3.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 88.672958][ T30] audit: type=1400 audit(1767292700.519:199): avc: denied { setopt } for pid=6095 comm="syz.3.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 88.682686][ T6101] SELinux: policydb version -759146342 does not match my version range 15-35 [ 88.704120][ T6101] SELinux: failed to load policy [ 88.937837][ T117] IPVS: starting estimator thread 0... [ 89.025609][ T30] audit: type=1400 audit(1767292700.549:200): avc: denied { load_policy } for pid=6095 comm="syz.3.37" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 89.082747][ T6102] IPVS: using max 43 ests per chain, 103200 per kthread [ 89.242192][ T6096] netlink: 12 bytes leftover after parsing attributes in process `syz.3.37'. [ 89.680151][ T30] audit: type=1400 audit(1767292701.179:201): avc: denied { write } for pid=6104 comm="syz.1.38" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 89.742703][ T30] audit: type=1400 audit(1767292701.279:202): avc: denied { read } for pid=6104 comm="syz.1.38" dev="nsfs" ino=4026532795 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 89.763800][ T30] audit: type=1400 audit(1767292701.279:203): avc: denied { open } for pid=6104 comm="syz.1.38" path="pid:[4026532795]" dev="nsfs" ino=4026532795 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 90.871499][ T30] audit: type=1400 audit(1767292702.739:204): avc: denied { bind } for pid=6117 comm="syz.1.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 91.495764][ T30] audit: type=1400 audit(1767292702.769:205): avc: denied { setopt } for pid=6117 comm="syz.1.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 91.561443][ T30] audit: type=1400 audit(1767292702.769:206): avc: denied { accept } for pid=6117 comm="syz.1.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 91.603132][ T6115] SELinux: policydb version -759146342 does not match my version range 15-35 [ 91.612091][ T6115] SELinux: failed to load policy [ 91.743459][ T5923] IPVS: starting estimator thread 0... [ 91.832623][ T6130] IPVS: using max 48 ests per chain, 115200 per kthread [ 91.881369][ T6134] netlink: 'syz.2.43': attribute type 10 has an invalid length. [ 91.983097][ T30] audit: type=1400 audit(1767292703.399:207): avc: denied { create } for pid=6117 comm="syz.1.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 93.482695][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 93.482723][ T30] audit: type=1400 audit(1767292705.329:217): avc: denied { read write } for pid=6145 comm="syz.0.45" name="video0" dev="devtmpfs" ino=930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 93.821811][ T30] audit: type=1400 audit(1767292705.329:218): avc: denied { open } for pid=6145 comm="syz.0.45" path="/dev/video0" dev="devtmpfs" ino=930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 93.882993][ T30] audit: type=1400 audit(1767292705.329:219): avc: denied { ioctl } for pid=6145 comm="syz.0.45" path="/dev/video0" dev="devtmpfs" ino=930 ioctlcmd=0x5602 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 94.814184][ T30] audit: type=1400 audit(1767292706.689:220): avc: denied { mount } for pid=6158 comm="syz.4.48" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 94.875271][ T30] audit: type=1400 audit(1767292706.749:221): avc: denied { create } for pid=6158 comm="syz.4.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 95.118869][ T30] audit: type=1400 audit(1767292706.979:222): avc: denied { create } for pid=6158 comm="syz.4.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 95.417002][ T30] audit: type=1400 audit(1767292707.009:223): avc: denied { write } for pid=6158 comm="syz.4.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 95.459151][ T30] audit: type=1400 audit(1767292707.149:224): avc: denied { connect } for pid=6158 comm="syz.4.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 95.520217][ T30] audit: type=1400 audit(1767292707.319:225): avc: denied { unmount } for pid=5808 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 96.524268][ T6174] loop8: detected capacity change from 0 to 8 [ 96.562305][ T6174] Dev loop8: unable to read RDB block 8 [ 96.582703][ T6174] loop8: unable to read partition table [ 96.689879][ T6174] loop8: partition table beyond EOD, truncated [ 96.718299][ T6174] loop_reread_partitions: partition scan of loop8 (þ被xü^>Ñà– ) failed (rc=-5) [ 97.980505][ T30] audit: type=1400 audit(1767292709.839:226): avc: denied { ioctl } for pid=6193 comm="syz.2.59" path="socket:[9309]" dev="sockfs" ino=9309 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 98.839871][ T30] audit: type=1400 audit(1767292710.709:227): avc: denied { create } for pid=6200 comm="syz.2.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 100.467982][ T30] audit: type=1400 audit(1767292712.339:228): avc: denied { create } for pid=6200 comm="syz.2.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 100.574863][ T30] audit: type=1400 audit(1767292712.359:229): avc: denied { connect } for pid=6200 comm="syz.2.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 100.641284][ T30] audit: type=1400 audit(1767292712.419:230): avc: denied { ioctl } for pid=6220 comm="syz.0.63" path="socket:[9372]" dev="sockfs" ino=9372 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 100.738926][ T30] audit: type=1400 audit(1767292712.429:231): avc: denied { setopt } for pid=6220 comm="syz.0.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 103.553719][ T30] audit: type=1400 audit(1767292715.429:232): avc: denied { write } for pid=6247 comm="syz.1.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 105.385950][ T6268] overlayfs: failed to resolve './file0': -2 [ 105.835255][ T30] audit: type=1400 audit(1767292717.699:233): avc: denied { read write } for pid=5807 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 105.874086][ T30] audit: type=1400 audit(1767292717.719:234): avc: denied { open } for pid=5807 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 105.919961][ T30] audit: type=1400 audit(1767292717.719:235): avc: denied { ioctl } for pid=5807 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 106.067791][ T30] audit: type=1400 audit(1767292717.739:236): avc: denied { write } for pid=6245 comm="syz.4.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 106.396331][ T30] audit: type=1400 audit(1767292717.739:237): avc: denied { read write } for pid=6270 comm="syz.3.77" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 106.476593][ T30] audit: type=1400 audit(1767292717.739:238): avc: denied { open } for pid=6270 comm="syz.3.77" path="/dev/fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 106.520292][ T30] audit: type=1400 audit(1767292717.739:239): avc: denied { mounton } for pid=6270 comm="syz.3.77" path="/12/file0" dev="tmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 106.554618][ T30] audit: type=1400 audit(1767292717.759:240): avc: denied { mount } for pid=6270 comm="syz.3.77" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 106.662607][ T30] audit: type=1400 audit(1767292717.789:241): avc: denied { read } for pid=6266 comm="syz.1.76" name="uinput" dev="devtmpfs" ino=920 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 107.666400][ T30] audit: type=1400 audit(1767292717.789:242): avc: denied { open } for pid=6266 comm="syz.1.76" path="/dev/uinput" dev="devtmpfs" ino=920 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 109.539124][ T6297] can: request_module (can-proto-0) failed. [ 110.030949][ T6314] SELinux: policydb version -759146342 does not match my version range 15-35 [ 110.040307][ T6314] SELinux: failed to load policy [ 110.056384][ T6314] netlink: 12 bytes leftover after parsing attributes in process `syz.4.87'. [ 110.270177][ T117] IPVS: starting estimator thread 0... [ 110.364228][ T6317] IPVS: using max 55 ests per chain, 132000 per kthread [ 111.428355][ T30] kauditd_printk_skb: 52 callbacks suppressed [ 111.428371][ T30] audit: type=1400 audit(1767292723.299:295): avc: denied { create } for pid=6323 comm="syz.3.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 111.722602][ T30] audit: type=1400 audit(1767292723.329:296): avc: denied { bind } for pid=6323 comm="syz.3.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 111.795480][ T30] audit: type=1400 audit(1767292723.329:297): avc: denied { setopt } for pid=6323 comm="syz.3.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 111.855147][ T30] audit: type=1400 audit(1767292723.329:298): avc: denied { accept } for pid=6323 comm="syz.3.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 112.050727][ T30] audit: type=1400 audit(1767292723.499:299): avc: denied { create } for pid=6323 comm="syz.3.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 112.243722][ T30] audit: type=1400 audit(1767292723.829:300): avc: denied { write } for pid=6327 comm="syz.3.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 112.335432][ T30] audit: type=1400 audit(1767292724.179:301): avc: denied { write } for pid=6330 comm="syz.2.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 113.472619][ T30] audit: type=1400 audit(1767292725.329:302): avc: denied { map_read map_write } for pid=6333 comm="syz.2.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 115.385354][ T30] audit: type=1400 audit(1767292726.319:303): avc: denied { unlink } for pid=6340 comm="syz.1.88" name="#5" dev="tmpfs" ino=97 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 115.523148][ T30] audit: type=1400 audit(1767292726.319:304): avc: denied { mount } for pid=6340 comm="syz.1.88" name="/" dev="overlay" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 116.228805][ T6349] netlink: 830 bytes leftover after parsing attributes in process `syz.0.97'. [ 116.774856][ T30] kauditd_printk_skb: 23 callbacks suppressed [ 116.774872][ T30] audit: type=1400 audit(1767292728.199:328): avc: denied { mounton } for pid=6353 comm="syz.4.91" path="/syzcgroup/unified/syz4" dev="cgroup2" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 116.873076][ T30] audit: type=1400 audit(1767292728.239:329): avc: denied { module_request } for pid=6353 comm="syz.4.91" kmod="net-pf-19" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 116.973694][ T30] audit: type=1400 audit(1767292728.309:330): avc: denied { mounton } for pid=6353 comm="syz.4.91" path="/21/file1" dev="tmpfs" ino=141 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 116.996382][ T30] audit: type=1400 audit(1767292728.319:331): avc: denied { allowed } for pid=6353 comm="syz.4.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 117.106232][ T30] audit: type=1400 audit(1767292728.959:332): avc: denied { sys_module } for pid=6351 comm="syz.1.98" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 117.222682][ T30] audit: type=1400 audit(1767292728.969:333): avc: denied { perfmon } for pid=6364 comm="syz.4.100" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 117.292618][ T30] audit: type=1400 audit(1767292728.969:334): avc: denied { prog_run } for pid=6364 comm="syz.4.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 117.798037][ T30] audit: type=1400 audit(1767292729.669:335): avc: denied { mounton } for pid=6369 comm="syz.0.101" path="/19/file0" dev="tmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 118.028218][ T30] audit: type=1400 audit(1767292729.669:336): avc: denied { mount } for pid=6369 comm="syz.0.101" name="/" dev="autofs" ino=9585 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 118.097512][ T30] audit: type=1400 audit(1767292729.709:337): avc: denied { read } for pid=6369 comm="syz.0.101" name="autofs" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 119.620037][ T6394] netlink: 12 bytes leftover after parsing attributes in process `syz.2.99'. [ 119.656660][ T5812] IPVS: starting estimator thread 0... [ 119.739233][ T6393] SELinux: policydb version -759146342 does not match my version range 15-35 [ 119.846101][ T6393] SELinux: failed to load policy [ 119.863246][ T6395] IPVS: using max 49 ests per chain, 117600 per kthread [ 121.820857][ T30] kauditd_printk_skb: 83 callbacks suppressed [ 121.820884][ T30] audit: type=1400 audit(1767292733.649:421): avc: denied { create } for pid=6419 comm="syz.3.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 122.124577][ T30] audit: type=1400 audit(1767292733.659:422): avc: denied { write } for pid=6419 comm="syz.3.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 122.238487][ T6407] can: request_module (can-proto-0) failed. [ 122.245562][ T30] audit: type=1400 audit(1767292733.689:423): avc: denied { create } for pid=6386 comm="syz.1.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 122.312633][ T30] audit: type=1400 audit(1767292733.689:424): avc: denied { module_request } for pid=6386 comm="syz.1.104" kmod="can-proto-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 122.430248][ T30] audit: type=1400 audit(1767292733.959:425): avc: denied { connect } for pid=6419 comm="syz.3.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 122.599516][ T30] audit: type=1400 audit(1767292734.459:426): avc: denied { unmount } for pid=5807 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 122.802918][ T30] audit: type=1400 audit(1767292734.529:427): avc: denied { create } for pid=6425 comm="syz.4.111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 122.888883][ T30] audit: type=1400 audit(1767292734.529:428): avc: denied { read } for pid=6425 comm="syz.4.111" name="v4l-subdev4" dev="devtmpfs" ino=944 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 122.931787][ T6433] netlink: 830 bytes leftover after parsing attributes in process `syz.4.111'. [ 123.133003][ T30] audit: type=1400 audit(1767292734.529:429): avc: denied { open } for pid=6425 comm="syz.4.111" path="/dev/v4l-subdev4" dev="devtmpfs" ino=944 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 123.568091][ T30] audit: type=1400 audit(1767292734.529:430): avc: denied { map_read map_write } for pid=6425 comm="syz.4.111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 126.233962][ T6461] can: request_module (can-proto-0) failed. [ 127.095585][ T30] kauditd_printk_skb: 47 callbacks suppressed [ 127.095602][ T30] audit: type=1400 audit(1767292738.519:478): avc: denied { name_bind } for pid=6456 comm="syz.0.122" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 127.340706][ T30] audit: type=1400 audit(1767292738.519:479): avc: denied { node_bind } for pid=6456 comm="syz.0.122" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 127.519445][ T30] audit: type=1400 audit(1767292739.339:480): avc: denied { create } for pid=6468 comm="syz.4.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 127.794878][ T30] audit: type=1400 audit(1767292739.349:481): avc: denied { bind } for pid=6468 comm="syz.4.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 127.865254][ T30] audit: type=1400 audit(1767292739.349:482): avc: denied { setopt } for pid=6468 comm="syz.4.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 127.941974][ T30] audit: type=1400 audit(1767292739.349:483): avc: denied { accept } for pid=6468 comm="syz.4.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 128.001293][ T30] audit: type=1400 audit(1767292739.419:484): avc: denied { create } for pid=6468 comm="syz.4.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 128.116790][ T30] audit: type=1400 audit(1767292739.469:485): avc: denied { write } for pid=6468 comm="syz.4.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 128.197141][ T30] audit: type=1400 audit(1767292739.939:486): avc: denied { create } for pid=6474 comm="syz.4.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 128.324428][ T30] audit: type=1400 audit(1767292739.939:487): avc: denied { ioctl } for pid=6474 comm="syz.4.127" path="socket:[9715]" dev="sockfs" ino=9715 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 131.148352][ T6513] netlink: 830 bytes leftover after parsing attributes in process `syz.1.131'. [ 132.458638][ T1298] ieee802154 phy0 wpan0: encryption failed: -22 [ 132.464982][ T1298] ieee802154 phy1 wpan1: encryption failed: -22 [ 132.862652][ T30] kauditd_printk_skb: 64 callbacks suppressed [ 132.862685][ T30] audit: type=1400 audit(1767292744.659:552): avc: denied { read write } for pid=6522 comm="syz.1.135" name="video0" dev="devtmpfs" ino=930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 133.129431][ T30] audit: type=1400 audit(1767292744.659:553): avc: denied { open } for pid=6522 comm="syz.1.135" path="/dev/video0" dev="devtmpfs" ino=930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 133.153970][ T30] audit: type=1400 audit(1767292744.659:554): avc: denied { ioctl } for pid=6522 comm="syz.1.135" path="/dev/video0" dev="devtmpfs" ino=930 ioctlcmd=0x5602 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 133.878981][ T30] audit: type=1400 audit(1767292745.739:555): avc: denied { create } for pid=6526 comm="syz.4.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 133.898253][ T30] audit: type=1400 audit(1767292745.739:556): avc: denied { module_request } for pid=6526 comm="syz.4.136" kmod="can-proto-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 134.080382][ T6528] can: request_module (can-proto-0) failed. [ 134.120786][ T30] audit: type=1400 audit(1767292745.919:557): avc: denied { write } for pid=6509 comm="syz.3.133" name="udmabuf" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 134.576981][ T30] audit: type=1400 audit(1767292745.919:558): avc: denied { ioctl } for pid=6509 comm="syz.3.133" path="/dev/udmabuf" dev="devtmpfs" ino=701 ioctlcmd=0x7542 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 134.609657][ T30] audit: type=1400 audit(1767292745.919:559): avc: denied { read } for pid=6509 comm="syz.3.133" name="card0" dev="devtmpfs" ino=627 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 134.742451][ T30] audit: type=1400 audit(1767292745.919:560): avc: denied { open } for pid=6509 comm="syz.3.133" path="/dev/dri/card0" dev="devtmpfs" ino=627 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 134.874066][ T30] audit: type=1400 audit(1767292745.919:561): avc: denied { ioctl } for pid=6509 comm="syz.3.133" path="/dev/dri/card1" dev="devtmpfs" ino=628 ioctlcmd=0x643a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 138.603777][ T6564] overlayfs: failed to resolve './file1': -2 [ 139.408423][ T30] kauditd_printk_skb: 34 callbacks suppressed [ 139.408439][ T30] audit: type=1400 audit(1767292750.469:596): avc: denied { mounton } for pid=6559 comm="syz.0.145" path="/26/file0" dev="tmpfs" ino=157 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 139.757767][ T30] audit: type=1400 audit(1767292750.479:597): avc: denied { mount } for pid=6559 comm="syz.0.145" name="/" dev="ramfs" ino=10561 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 139.856526][ T30] audit: type=1400 audit(1767292751.089:598): avc: denied { module_request } for pid=6561 comm="syz.2.146" kmod="fs-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 140.208565][ T30] audit: type=1400 audit(1767292751.419:599): avc: denied { create } for pid=6559 comm="syz.0.145" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=blk_file permissive=1 [ 140.299791][ T30] audit: type=1400 audit(1767292751.539:600): avc: denied { unlink } for pid=6561 comm="syz.2.146" name="#14" dev="tmpfs" ino=204 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 141.159233][ T30] audit: type=1400 audit(1767292751.539:601): avc: denied { link } for pid=6559 comm="syz.0.145" name="file1" dev="ramfs" ino=10566 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=blk_file permissive=1 [ 141.181110][ T30] audit: type=1400 audit(1767292751.559:602): avc: denied { mount } for pid=6561 comm="syz.2.146" name="/" dev="overlay" ino=199 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 141.576520][ T30] audit: type=1400 audit(1767292751.629:603): avc: denied { create } for pid=6561 comm="syz.2.146" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 141.657333][ T30] audit: type=1400 audit(1767292751.649:604): avc: denied { link } for pid=6561 comm="syz.2.146" name="file1" dev="tmpfs" ino=206 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 141.730554][ T30] audit: type=1400 audit(1767292751.659:605): avc: denied { setattr } for pid=6561 comm="syz.2.146" name="file0" dev="overlay" ino=206 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 141.865254][ T6586] SELinux: policydb version -759146342 does not match my version range 15-35 [ 141.874224][ T6586] SELinux: failed to load policy [ 141.879972][ T6586] netlink: 12 bytes leftover after parsing attributes in process `syz.3.144'. [ 142.786896][ T6603] netlink: 64138 bytes leftover after parsing attributes in process `syz.3.154'. [ 144.457816][ T30] kauditd_printk_skb: 63 callbacks suppressed [ 144.457831][ T30] audit: type=1400 audit(1767292756.329:669): avc: denied { create } for pid=6614 comm="syz.1.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 144.592618][ T117] usb 4-1: new full-speed USB device number 2 using dummy_hcd [ 144.755809][ T30] audit: type=1400 audit(1767292756.359:670): avc: denied { ioctl } for pid=6614 comm="syz.1.156" path="socket:[10714]" dev="sockfs" ino=10714 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 144.816712][ T117] usb 4-1: config 0 interface 0 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 144.839916][ T117] usb 4-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0x94, changing to 0x84 [ 144.872722][ T117] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x84 has an invalid bInterval 0, changing to 10 [ 144.914865][ T117] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x84 has invalid wMaxPacketSize 0 [ 144.946479][ T117] usb 4-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 144.964158][ T117] usb 4-1: New USB device found, idVendor=04e8, idProduct=ff30, bcdDevice=a6.d1 [ 145.025351][ T30] audit: type=1400 audit(1767292756.359:671): avc: denied { write } for pid=6614 comm="syz.1.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 145.026784][ T117] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 145.075629][ T117] usb 4-1: Product: syz [ 145.084850][ T117] usb 4-1: Manufacturer: syz [ 145.222899][ T117] usb 4-1: SerialNumber: syz [ 145.244121][ T30] audit: type=1400 audit(1767292756.359:672): avc: denied { read } for pid=6614 comm="syz.1.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 145.288482][ T117] usb 4-1: config 0 descriptor?? [ 145.345710][ T6595] can: request_module (can-proto-0) failed. [ 145.357393][ T30] audit: type=1400 audit(1767292756.359:673): avc: denied { create } for pid=6614 comm="syz.1.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 145.562561][ T117] rc_core: IR keymap rc-imon-rsc not found [ 145.572384][ T117] Registered IR keymap rc-empty [ 145.615517][ T30] audit: type=1400 audit(1767292756.359:674): avc: denied { create } for pid=6614 comm="syz.1.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 145.615555][ T30] audit: type=1400 audit(1767292756.359:675): avc: denied { ioctl } for pid=6614 comm="syz.1.156" path="socket:[10718]" dev="sockfs" ino=10718 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 145.771803][ T117] rc rc0: iMON Station as /devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.0/rc/rc0 [ 145.782626][ T30] audit: type=1400 audit(1767292756.359:676): avc: denied { bind } for pid=6614 comm="syz.1.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 145.838041][ T30] audit: type=1400 audit(1767292756.429:677): avc: denied { connect } for pid=6614 comm="syz.1.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 145.916645][ T6630] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=6630 comm=syz.1.159 [ 145.986681][ T30] audit: type=1400 audit(1767292756.429:678): avc: denied { write } for pid=6614 comm="syz.1.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 146.003161][ T117] input: iMON Station as /devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.0/rc/rc0/input6 [ 146.065800][ T117] imon_raw 4-1:0.0: probe with driver imon_raw failed with error -90 [ 146.388980][ T117] usb 4-1: USB disconnect, device number 2 [ 149.820084][ T30] kauditd_printk_skb: 29 callbacks suppressed [ 149.820102][ T30] audit: type=1400 audit(1767292761.379:708): avc: denied { prog_load } for pid=6652 comm="syz.0.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 150.052638][ T30] audit: type=1400 audit(1767292761.379:709): avc: denied { bpf } for pid=6652 comm="syz.0.166" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 150.214229][ T30] audit: type=1400 audit(1767292761.379:710): avc: denied { perfmon } for pid=6652 comm="syz.0.166" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 150.706091][ T30] audit: type=1400 audit(1767292761.889:711): avc: denied { write } for pid=6656 comm="syz.4.170" path="/dev/vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 150.729934][ T30] audit: type=1400 audit(1767292761.899:712): avc: denied { prog_run } for pid=6656 comm="syz.4.170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 151.324585][ T30] audit: type=1400 audit(1767292763.099:713): avc: denied { create } for pid=6661 comm="syz.4.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 151.353035][ T30] audit: type=1400 audit(1767292763.099:714): avc: denied { write } for pid=6661 comm="syz.4.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 151.839270][ T30] audit: type=1400 audit(1767292763.099:715): avc: denied { read } for pid=6661 comm="syz.4.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 151.953289][ T30] audit: type=1400 audit(1767292763.329:716): avc: denied { module_request } for pid=6661 comm="syz.4.172" kmod="fs-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 151.998357][ T30] audit: type=1400 audit(1767292763.479:717): avc: denied { mounton } for pid=6661 comm="syz.4.172" path="/37/file1" dev="tmpfs" ino=235 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 153.638692][ T6688] overlayfs: failed to resolve './file1': -2 [ 154.913145][ T30] kauditd_printk_skb: 49 callbacks suppressed [ 154.913159][ T30] audit: type=1400 audit(1767292766.789:767): avc: denied { read } for pid=6692 comm="syz.2.177" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 154.982210][ T30] audit: type=1400 audit(1767292766.789:768): avc: denied { open } for pid=6692 comm="syz.2.177" path="/dev/cpu/0/msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 155.089760][ T30] audit: type=1400 audit(1767292766.959:769): avc: denied { bind } for pid=6692 comm="syz.2.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 155.172624][ T30] audit: type=1400 audit(1767292767.039:770): avc: denied { unmount } for pid=5809 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 155.258018][ T30] audit: type=1400 audit(1767292767.089:771): avc: denied { connect } for pid=6692 comm="syz.2.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 155.293195][ T30] audit: type=1400 audit(1767292767.089:772): avc: denied { create } for pid=6692 comm="syz.2.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 155.653184][ T30] audit: type=1400 audit(1767292767.089:773): avc: denied { create } for pid=6692 comm="syz.2.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 155.682715][ T30] audit: type=1400 audit(1767292767.089:774): avc: denied { write } for pid=6692 comm="syz.2.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 155.797250][ T30] audit: type=1400 audit(1767292767.099:775): avc: denied { read } for pid=6692 comm="syz.2.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 155.839354][ T30] audit: type=1400 audit(1767292767.109:776): avc: denied { write } for pid=6692 comm="syz.2.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 157.212728][ T6687] can: request_module (can-proto-0) failed. [ 161.222621][ T30] kauditd_printk_skb: 39 callbacks suppressed [ 161.222638][ T30] audit: type=1400 audit(1767292772.759:816): avc: denied { create } for pid=6729 comm="syz.3.183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 162.525159][ T30] audit: type=1400 audit(1767292772.769:817): avc: denied { read write } for pid=6729 comm="syz.3.183" name="vhost-vsock" dev="devtmpfs" ino=1275 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 162.664451][ T30] audit: type=1400 audit(1767292772.769:818): avc: denied { open } for pid=6729 comm="syz.3.183" path="/dev/vhost-vsock" dev="devtmpfs" ino=1275 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 163.015952][ T30] audit: type=1400 audit(1767292772.769:819): avc: denied { ioctl } for pid=6729 comm="syz.3.183" path="/dev/vhost-vsock" dev="devtmpfs" ino=1275 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 163.112357][ T30] audit: type=1400 audit(1767292774.419:820): avc: denied { mount } for pid=6730 comm="syz.4.184" name="/" dev="autofs" ino=10848 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 163.162727][ T30] audit: type=1400 audit(1767292774.419:821): avc: denied { read } for pid=6730 comm="syz.4.184" name="autofs" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 163.415167][ T6754] SELinux: policydb version -759146342 does not match my version range 15-35 [ 163.424607][ T6754] SELinux: failed to load policy [ 163.436634][ T5941] IPVS: starting estimator thread 0... [ 163.513565][ T30] audit: type=1400 audit(1767292774.419:822): avc: denied { open } for pid=6730 comm="syz.4.184" path="/dev/autofs" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 163.644970][ T30] audit: type=1400 audit(1767292774.419:823): avc: denied { ioctl } for pid=6730 comm="syz.4.184" path="/dev/autofs" dev="devtmpfs" ino=98 ioctlcmd=0x9379 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 164.161853][ T6752] netlink: 12 bytes leftover after parsing attributes in process `syz.1.191'. [ 164.170806][ T6755] IPVS: using max 47 ests per chain, 112800 per kthread [ 164.182660][ T30] audit: type=1400 audit(1767292774.489:824): avc: denied { unmount } for pid=5808 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 164.211296][ T30] audit: type=1400 audit(1767292774.929:825): avc: denied { write } for pid=6748 comm="syz.1.190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 165.881802][ T6784] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6784 comm=syz.0.186 [ 167.615114][ T6801] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6801 comm=syz.0.197 [ 168.197073][ T6804] SELinux: policydb version -759146342 does not match my version range 15-35 [ 168.395275][ T6804] SELinux: failed to load policy [ 168.604219][ T6803] netlink: 12 bytes leftover after parsing attributes in process `syz.4.198'. [ 170.429312][ T30] kauditd_printk_skb: 18 callbacks suppressed [ 170.429323][ T30] audit: type=1400 audit(1767292782.279:844): avc: denied { write } for pid=6823 comm="syz.4.205" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 170.763503][ T30] audit: type=1400 audit(1767292782.639:845): avc: denied { ioctl } for pid=6828 comm="syz.1.206" path="socket:[10222]" dev="sockfs" ino=10222 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 171.373382][ T30] audit: type=1400 audit(1767292782.679:846): avc: denied { read } for pid=6830 comm="syz.4.207" name="uinput" dev="devtmpfs" ino=920 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 171.493595][ T30] audit: type=1400 audit(1767292782.679:847): avc: denied { open } for pid=6830 comm="syz.4.207" path="/dev/uinput" dev="devtmpfs" ino=920 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 171.686013][ T6832] can: request_module (can-proto-0) failed. [ 171.872771][ T30] audit: type=1400 audit(1767292782.679:848): avc: denied { create } for pid=6830 comm="syz.4.207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 171.939797][ T30] audit: type=1400 audit(1767292782.679:849): avc: denied { write } for pid=6830 comm="syz.4.207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 172.037046][ T30] audit: type=1400 audit(1767292782.679:850): avc: denied { nlmsg_write } for pid=6830 comm="syz.4.207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 172.446252][ T30] audit: type=1400 audit(1767292782.679:851): avc: denied { read write } for pid=6830 comm="syz.4.207" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 172.719655][ T30] audit: type=1400 audit(1767292782.679:852): avc: denied { open } for pid=6830 comm="syz.4.207" path="/dev/vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 173.086722][ T6846] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6846 comm=syz.3.210 [ 174.143177][ T6851] vivid-000: kernel_thread() failed [ 178.262993][ T6878] can: request_module (can-proto-0) failed. [ 179.052577][ T30] audit: type=1400 audit(1767292790.909:853): avc: denied { map_read map_write } for pid=6886 comm="syz.3.222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 180.240633][ T30] audit: type=1400 audit(1767292792.109:854): avc: denied { bind } for pid=6886 comm="syz.3.222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 180.263303][ T6898] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=6898 comm=syz.3.222 [ 180.322173][ T30] audit: type=1400 audit(1767292792.139:855): avc: denied { setopt } for pid=6886 comm="syz.3.222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 180.389817][ T30] audit: type=1400 audit(1767292792.159:856): avc: denied { read } for pid=6886 comm="syz.3.222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 180.827366][ T30] audit: type=1400 audit(1767292792.699:857): avc: denied { create } for pid=6902 comm="syz.2.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 180.850313][ T6906] netlink: 822 bytes leftover after parsing attributes in process `syz.2.223'. [ 181.963753][ T6911] netlink: 'syz.2.223': attribute type 4 has an invalid length. [ 182.064672][ T6912] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6912 comm=syz.0.221 [ 182.772749][ T30] audit: type=1400 audit(1767292793.139:858): avc: denied { mount } for pid=6901 comm="syz.4.218" name="/" dev="ramfs" ino=11351 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 182.798103][ T30] audit: type=1400 audit(1767292793.659:859): avc: denied { create } for pid=6901 comm="syz.4.218" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=blk_file permissive=1 [ 182.967577][ T30] audit: type=1400 audit(1767292793.659:860): avc: denied { link } for pid=6901 comm="syz.4.218" name="file1" dev="ramfs" ino=11161 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=blk_file permissive=1 [ 183.031806][ T30] audit: type=1400 audit(1767292793.689:861): avc: denied { execmem } for pid=6905 comm="syz.0.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 183.912736][ T30] audit: type=1400 audit(1767292793.829:862): avc: denied { map_create } for pid=6902 comm="syz.2.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 184.785864][ T30] audit: type=1400 audit(1767292793.829:863): avc: denied { prog_load } for pid=6902 comm="syz.2.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 184.829177][ T30] audit: type=1400 audit(1767292793.829:864): avc: denied { bpf } for pid=6902 comm="syz.2.223" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 184.889468][ T30] audit: type=1400 audit(1767292793.859:865): avc: denied { connect } for pid=6902 comm="syz.2.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 184.996614][ T30] audit: type=1400 audit(1767292793.939:866): avc: denied { read } for pid=6905 comm="syz.0.221" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 185.067270][ T30] audit: type=1400 audit(1767292793.939:867): avc: denied { open } for pid=6905 comm="syz.0.221" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 185.166364][ T30] audit: type=1400 audit(1767292793.939:868): avc: denied { ioctl } for pid=6905 comm="syz.0.221" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x550b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 185.257350][ T30] audit: type=1400 audit(1767292793.949:869): avc: denied { name_bind } for pid=6905 comm="syz.0.221" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 185.322966][ T30] audit: type=1400 audit(1767292793.949:870): avc: denied { node_bind } for pid=6905 comm="syz.0.221" saddr=255.255.255.255 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 185.392642][ T30] audit: type=1400 audit(1767292794.009:871): avc: denied { ioctl } for pid=6905 comm="syz.0.221" path="/dev/dma_heap/system" dev="devtmpfs" ino=700 ioctlcmd=0xaf00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 185.458973][ T30] audit: type=1400 audit(1767292794.639:872): avc: denied { read write } for pid=5806 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 186.510726][ T5822] Bluetooth: hci2: command 0x0406 tx timeout [ 186.510745][ T5825] Bluetooth: hci0: command 0x0406 tx timeout [ 186.516784][ T51] Bluetooth: hci3: command 0x0406 tx timeout [ 186.522725][ T5828] Bluetooth: hci1: command 0x0406 tx timeout [ 188.029509][ T6952] SELinux: policydb version -759146342 does not match my version range 15-35 [ 188.038738][ T6952] SELinux: failed to load policy [ 188.076133][ T6952] netlink: 12 bytes leftover after parsing attributes in process `syz.4.235'. [ 191.214674][ T30] kauditd_printk_skb: 45 callbacks suppressed [ 191.214708][ T30] audit: type=1400 audit(1767292802.799:918): avc: denied { create } for pid=6969 comm="syz.2.241" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 191.346227][ T30] audit: type=1400 audit(1767292802.949:919): avc: denied { ioctl } for pid=6969 comm="syz.2.241" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=11229 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 191.921505][ T6982] SELinux: policydb version -759146342 does not match my version range 15-35 [ 191.931051][ T6982] SELinux: failed to load policy [ 191.971887][ T6982] netlink: 12 bytes leftover after parsing attributes in process `syz.2.244'. [ 192.990613][ T6975] SELinux: policydb version -759146342 does not match my version range 15-35 [ 192.999538][ T6975] SELinux: failed to load policy [ 193.005918][ T6975] netlink: 12 bytes leftover after parsing attributes in process `syz.0.242'. [ 193.773391][ T1298] ieee802154 phy0 wpan0: encryption failed: -22 [ 193.779779][ T1298] ieee802154 phy1 wpan1: encryption failed: -22 [ 193.888028][ T30] audit: type=1400 audit(1767292805.759:920): avc: denied { map_read map_write } for pid=6993 comm="syz.4.238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 194.701456][ T6996] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=6996 comm=syz.4.238 [ 194.806027][ T30] audit: type=1400 audit(1767292806.569:921): avc: denied { bind } for pid=6993 comm="syz.4.238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 194.853055][ T30] audit: type=1400 audit(1767292806.569:922): avc: denied { setopt } for pid=6993 comm="syz.4.238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 194.972600][ T30] audit: type=1400 audit(1767292806.589:923): avc: denied { read } for pid=6993 comm="syz.4.238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 194.995042][ T30] audit: type=1400 audit(1767292806.639:924): avc: denied { allowed } for pid=6998 comm="syz.2.248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 195.014707][ T30] audit: type=1400 audit(1767292806.639:925): avc: denied { map } for pid=6998 comm="syz.2.248" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=12326 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 195.075506][ T30] audit: type=1400 audit(1767292806.639:926): avc: denied { read write } for pid=6998 comm="syz.2.248" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=12326 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 195.973373][ T30] audit: type=1326 audit(1767292806.669:927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6991 comm="syz.0.247" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f20cf78f749 code=0x0 [ 199.192459][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 199.192472][ T30] audit: type=1400 audit(1767292811.059:929): avc: denied { write } for pid=7034 comm="syz.1.255" path="/dev/vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 199.797805][ T30] audit: type=1400 audit(1767292811.329:930): avc: denied { read } for pid=7026 comm="syz.0.253" name="iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 199.835938][ T30] audit: type=1400 audit(1767292811.329:931): avc: denied { open } for pid=7026 comm="syz.0.253" path="/dev/iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 200.392582][ T30] audit: type=1400 audit(1767292811.939:932): avc: denied { write } for pid=7037 comm="syz.2.254" name="udmabuf" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 200.533917][ T30] audit: type=1400 audit(1767292812.009:933): avc: denied { read } for pid=7037 comm="syz.2.254" name="card0" dev="devtmpfs" ino=627 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 200.614153][ T30] audit: type=1400 audit(1767292812.009:934): avc: denied { open } for pid=7037 comm="syz.2.254" path="/dev/dri/card0" dev="devtmpfs" ino=627 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 201.646840][ T30] audit: type=1400 audit(1767292812.029:935): avc: denied { ioctl } for pid=7037 comm="syz.2.254" path="/dev/dri/card1" dev="devtmpfs" ino=628 ioctlcmd=0x643a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 201.713144][ T30] audit: type=1400 audit(1767292813.439:936): avc: denied { read write } for pid=7047 comm="syz.0.257" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 201.763591][ T30] audit: type=1400 audit(1767292813.439:937): avc: denied { open } for pid=7047 comm="syz.0.257" path="/dev/fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 202.057411][ T7054] SELinux: policydb version -759146342 does not match my version range 15-35 [ 202.067388][ T7054] SELinux: failed to load policy [ 202.113853][ T7054] netlink: 12 bytes leftover after parsing attributes in process `syz.3.259'. [ 202.233006][ T30] audit: type=1400 audit(1767292813.449:938): avc: denied { create } for pid=7047 comm="syz.0.257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 204.590637][ T7077] netlink: 830 bytes leftover after parsing attributes in process `syz.2.265'. [ 205.055733][ T7065] can: request_module (can-proto-0) failed. [ 206.371004][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 206.371019][ T30] audit: type=1400 audit(1767292818.239:953): avc: denied { bind } for pid=7087 comm="syz.2.268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 206.422574][ T30] audit: type=1400 audit(1767292818.269:954): avc: denied { listen } for pid=7087 comm="syz.2.268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 206.454356][ T30] audit: type=1400 audit(1767292818.269:955): avc: denied { accept } for pid=7087 comm="syz.2.268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 207.406744][ T30] audit: type=1400 audit(1767292819.279:956): avc: denied { shutdown } for pid=7087 comm="syz.2.268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 207.452916][ T30] audit: type=1400 audit(1767292819.299:957): avc: denied { read } for pid=7087 comm="syz.2.268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 207.567546][ T30] audit: type=1400 audit(1767292819.379:958): avc: denied { read } for pid=7087 comm="syz.2.268" name="cachefiles" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cachefiles_device_t tclass=chr_file permissive=1 [ 207.695191][ T7089] SELinux: policydb version -759146342 does not match my version range 15-35 [ 207.704105][ T7089] SELinux: failed to load policy [ 207.723446][ T30] audit: type=1400 audit(1767292819.439:959): avc: denied { open } for pid=7087 comm="syz.2.268" path="/dev/cachefiles" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cachefiles_device_t tclass=chr_file permissive=1 [ 207.778862][ T7089] netlink: 12 bytes leftover after parsing attributes in process `syz.3.269'. [ 209.061820][ T30] audit: type=1400 audit(1767292820.929:960): avc: denied { create } for pid=7116 comm="syz.3.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 209.082376][ T30] audit: type=1400 audit(1767292820.949:961): avc: denied { shutdown } for pid=7116 comm="syz.3.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 209.719171][ T7123] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7123 comm=syz.4.277 [ 210.663646][ T7128] can: request_module (can-proto-0) failed. [ 210.730554][ T7137] loop8: detected capacity change from 0 to 8 [ 210.898757][ T7137] Dev loop8: unable to read RDB block 8 [ 211.158298][ T7137] loop8: unable to read partition table [ 211.175061][ T7137] loop8: partition table beyond EOD, truncated [ 211.206550][ T7137] loop_reread_partitions: partition scan of loop8 (þ被xü^>Ñà– ) failed (rc=-5) [ 211.283172][ T7142] SELinux: policydb version -759146342 does not match my version range 15-35 [ 211.292304][ T7142] SELinux: failed to load policy [ 211.337116][ T7142] netlink: 24 bytes leftover after parsing attributes in process `syz.4.283'. [ 212.432659][ T30] audit: type=1400 audit(1767292824.299:962): avc: denied { write } for pid=7153 comm="syz.4.287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 212.702584][ T30] audit: type=1400 audit(1767292824.569:963): avc: denied { setopt } for pid=7158 comm="syz.1.289" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 212.705738][ T7162] faux_driver vkms: [drm] Unknown color mode 11; guessing buffer size. [ 213.047097][ T7166] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7166 comm=syz.4.291 [ 214.344531][ T30] audit: type=1400 audit(1767292826.219:964): avc: denied { read write } for pid=7171 comm="syz.2.282" name="rdma_cm" dev="devtmpfs" ino=1271 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 214.422559][ T30] audit: type=1400 audit(1767292826.219:965): avc: denied { open } for pid=7171 comm="syz.2.282" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=1271 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 214.878157][ T30] audit: type=1400 audit(1767292826.629:966): avc: denied { mount } for pid=7176 comm="syz.4.294" name="/" dev="ramfs" ino=12530 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 214.910054][ T30] audit: type=1400 audit(1767292826.689:967): avc: denied { create } for pid=7176 comm="syz.4.294" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=blk_file permissive=1 [ 215.930201][ T30] audit: type=1400 audit(1767292826.689:968): avc: denied { link } for pid=7176 comm="syz.4.294" name="file1" dev="ramfs" ino=12531 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=blk_file permissive=1 [ 216.002677][ T30] audit: type=1400 audit(1767292826.739:969): avc: denied { ioctl } for pid=7158 comm="syz.1.289" path="socket:[11878]" dev="sockfs" ino=11878 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 216.106424][ T7187] fuse: Bad value for 'fd' [ 216.122569][ T30] audit: type=1400 audit(1767292826.749:970): avc: denied { read write } for pid=7158 comm="syz.1.289" name="video2" dev="devtmpfs" ino=932 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 216.195987][ T30] audit: type=1400 audit(1767292826.749:971): avc: denied { open } for pid=7158 comm="syz.1.289" path="/dev/video2" dev="devtmpfs" ino=932 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 217.572395][ T7210] netlink: 830 bytes leftover after parsing attributes in process `syz.4.301'. [ 217.585824][ T30] kauditd_printk_skb: 36 callbacks suppressed [ 217.585835][ T30] audit: type=1400 audit(1767292829.439:1008): avc: denied { read write } for pid=7203 comm="syz.1.304" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 217.636993][ T7206] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 217.648920][ T30] audit: type=1400 audit(1767292829.439:1009): avc: denied { open } for pid=7203 comm="syz.1.304" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 217.783538][ T7202] SELinux: policydb version -759146342 does not match my version range 15-35 [ 217.795609][ T7202] SELinux: failed to load policy [ 217.898364][ T7202] netlink: 12 bytes leftover after parsing attributes in process `syz.0.303'. [ 217.991610][ T30] audit: type=1400 audit(1767292829.439:1010): avc: denied { ioctl } for pid=7203 comm="syz.1.304" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 218.158607][ T30] audit: type=1400 audit(1767292829.519:1011): avc: denied { read } for pid=7203 comm="syz.1.304" dev="nsfs" ino=4026532795 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 218.181048][ T7215] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7215 comm=syz.4.305 [ 218.264090][ T30] audit: type=1400 audit(1767292829.519:1012): avc: denied { open } for pid=7203 comm="syz.1.304" path="pid:[4026532795]" dev="nsfs" ino=4026532795 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 218.957262][ T30] audit: type=1400 audit(1767292829.649:1013): avc: denied { load_policy } for pid=7198 comm="syz.0.303" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 218.985766][ T30] audit: type=1400 audit(1767292829.769:1014): avc: denied { write } for pid=7198 comm="syz.0.303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 219.006602][ T30] audit: type=1400 audit(1767292830.059:1015): avc: denied { ioctl } for pid=7212 comm="syz.4.305" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x550b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 219.046171][ T30] audit: type=1400 audit(1767292830.059:1016): avc: denied { read } for pid=7214 comm="syz.3.293" name="uinput" dev="devtmpfs" ino=920 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 219.086891][ T30] audit: type=1400 audit(1767292830.059:1017): avc: denied { open } for pid=7214 comm="syz.3.293" path="/dev/uinput" dev="devtmpfs" ino=920 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 219.133562][ T7227] can: request_module (can-proto-0) failed. [ 219.254806][ T7235] overlayfs: missing 'lowerdir' [ 221.459940][ T7250] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=7250 comm=syz.0.312 [ 222.861585][ T30] kauditd_printk_skb: 43 callbacks suppressed [ 222.861599][ T30] audit: type=1400 audit(1767292834.729:1061): avc: denied { allowed } for pid=7256 comm="syz.2.315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 223.004808][ T30] audit: type=1400 audit(1767292834.759:1062): avc: denied { create } for pid=7256 comm="syz.2.315" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 223.658543][ T30] audit: type=1400 audit(1767292834.999:1063): avc: denied { read write } for pid=7256 comm="syz.2.315" name="udmabuf" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 223.757338][ T7260] SELinux: policydb version -759146342 does not match my version range 15-35 [ 223.769147][ T7260] SELinux: failed to load policy [ 223.822576][ T7260] netlink: 12 bytes leftover after parsing attributes in process `syz.0.316'. [ 223.860136][ T30] audit: type=1400 audit(1767292834.999:1064): avc: denied { open } for pid=7256 comm="syz.2.315" path="/dev/udmabuf" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 223.910996][ T30] audit: type=1400 audit(1767292835.009:1065): avc: denied { ioctl } for pid=7256 comm="syz.2.315" path="/dev/udmabuf" dev="devtmpfs" ino=701 ioctlcmd=0x7542 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 223.981328][ T30] audit: type=1400 audit(1767292835.009:1066): avc: denied { ioctl } for pid=7256 comm="syz.2.315" path="/dev/dri/card1" dev="devtmpfs" ino=628 ioctlcmd=0x643a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 224.084226][ T30] audit: type=1400 audit(1767292835.409:1067): avc: denied { create } for pid=7254 comm="syz.0.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 224.263518][ T30] audit: type=1400 audit(1767292835.419:1068): avc: denied { setopt } for pid=7254 comm="syz.0.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 224.424193][ T30] audit: type=1400 audit(1767292835.509:1069): avc: denied { mounton } for pid=7254 comm="syz.0.316" path="/61/file0" dev="tmpfs" ino=348 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 224.750855][ T30] audit: type=1400 audit(1767292835.629:1070): avc: denied { load_policy } for pid=7254 comm="syz.0.316" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 224.891604][ T7268] loop8: detected capacity change from 0 to 8 [ 224.925248][ T7268] Dev loop8: unable to read RDB block 8 [ 224.930835][ T7268] loop8: unable to read partition table [ 224.944594][ T7268] loop8: partition table beyond EOD, truncated [ 224.972381][ T7268] loop_reread_partitions: partition scan of loop8 (þ被xü^>Ñà– ) failed (rc=-5) [ 228.227433][ T30] kauditd_printk_skb: 28 callbacks suppressed [ 228.227464][ T30] audit: type=1400 audit(1767292840.039:1099): avc: denied { ioctl } for pid=7308 comm="syz.4.329" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=12718 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 228.449319][ T30] audit: type=1400 audit(1767292840.159:1100): avc: denied { write } for pid=7308 comm="syz.4.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 228.535235][ T30] audit: type=1400 audit(1767292840.159:1101): avc: denied { read } for pid=7308 comm="syz.4.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 228.912006][ T7322] overlayfs: missing 'lowerdir' [ 229.263969][ T30] audit: type=1400 audit(1767292840.779:1102): avc: denied { mount } for pid=7319 comm="syz.4.330" name="/" dev="ramfs" ino=12197 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 229.362248][ T30] audit: type=1400 audit(1767292840.859:1103): avc: denied { create } for pid=7319 comm="syz.4.330" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=blk_file permissive=1 [ 229.512928][ T30] audit: type=1400 audit(1767292840.859:1104): avc: denied { link } for pid=7319 comm="syz.4.330" name="file1" dev="ramfs" ino=12198 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=blk_file permissive=1 [ 229.604283][ T30] audit: type=1400 audit(1767292841.229:1105): avc: denied { read write } for pid=7324 comm="syz.1.331" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 229.630260][ T30] audit: type=1400 audit(1767292841.239:1106): avc: denied { open } for pid=7324 comm="syz.1.331" path="/dev/fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 229.655097][ T30] audit: type=1400 audit(1767292841.239:1107): avc: denied { mounton } for pid=7324 comm="syz.1.331" path="/59/file0" dev="tmpfs" ino=356 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 229.682188][ T30] audit: type=1400 audit(1767292841.259:1108): avc: denied { mount } for pid=7324 comm="syz.1.331" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 230.507823][ T7338] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 231.198326][ T7343] loop8: detected capacity change from 0 to 8 [ 231.225798][ T7343] Dev loop8: unable to read RDB block 8 [ 231.272605][ T7343] loop8: unable to read partition table [ 231.333297][ T7343] loop8: partition table beyond EOD, truncated [ 231.344622][ T7343] loop_reread_partitions: partition scan of loop8 (þ被xü^>Ñà– ) failed (rc=-5) [ 233.457438][ T7361] overlayfs: missing 'lowerdir' [ 233.561896][ T30] kauditd_printk_skb: 34 callbacks suppressed [ 233.561922][ T30] audit: type=1400 audit(1767292845.319:1143): avc: denied { mount } for pid=7356 comm="syz.2.342" name="/" dev="ramfs" ino=13333 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 233.782807][ T30] audit: type=1400 audit(1767292845.399:1144): avc: denied { create } for pid=7356 comm="syz.2.342" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=blk_file permissive=1 [ 233.873384][ T30] audit: type=1400 audit(1767292845.409:1145): avc: denied { link } for pid=7356 comm="syz.2.342" name="file1" dev="ramfs" ino=13334 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=blk_file permissive=1 [ 234.112807][ T30] audit: type=1400 audit(1767292845.649:1146): avc: denied { create } for pid=7358 comm="syz.0.339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 234.134170][ T30] audit: type=1400 audit(1767292845.659:1147): avc: denied { write } for pid=7358 comm="syz.0.339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 234.157539][ T30] audit: type=1400 audit(1767292845.659:1148): avc: denied { prog_load } for pid=7358 comm="syz.0.339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 234.178285][ T30] audit: type=1400 audit(1767292845.659:1149): avc: denied { bpf } for pid=7358 comm="syz.0.339" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 234.234719][ T30] audit: type=1400 audit(1767292845.659:1150): avc: denied { perfmon } for pid=7358 comm="syz.0.339" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 234.372794][ T30] audit: type=1400 audit(1767292845.659:1151): avc: denied { prog_run } for pid=7358 comm="syz.0.339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 234.846631][ T30] audit: type=1400 audit(1767292845.659:1152): avc: denied { connect } for pid=7358 comm="syz.0.339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 237.178494][ T7391] loop8: detected capacity change from 0 to 8 [ 237.252816][ T7391] Dev loop8: unable to read RDB block 8 [ 237.287168][ T7391] loop8: unable to read partition table [ 237.312134][ T7391] loop8: partition table beyond EOD, truncated [ 237.423590][ T7391] loop_reread_partitions: partition scan of loop8 (þ被xü^>Ñà– ) failed (rc=-5) [ 237.504502][ T7397] netlink: 830 bytes leftover after parsing attributes in process `syz.1.351'. [ 239.282557][ T30] kauditd_printk_skb: 53 callbacks suppressed [ 239.282573][ T30] audit: type=1400 audit(1767292850.729:1206): avc: denied { name_bind } for pid=7410 comm="syz.1.353" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 239.383627][ T30] audit: type=1400 audit(1767292850.729:1207): avc: denied { node_bind } for pid=7410 comm="syz.1.353" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 239.514587][ T30] audit: type=1400 audit(1767292851.359:1208): avc: denied { ioctl } for pid=7392 comm="syz.0.350" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x550b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 239.542991][ T30] audit: type=1400 audit(1767292851.359:1209): avc: denied { ioctl } for pid=7392 comm="syz.0.350" path="/dev/dma_heap/system" dev="devtmpfs" ino=700 ioctlcmd=0xaf00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 239.838282][ T7419] overlayfs: missing 'workdir' [ 239.843408][ T30] audit: type=1400 audit(1767292851.699:1210): avc: denied { mount } for pid=7416 comm="syz.3.354" name="/" dev="ramfs" ino=13483 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 240.227304][ T30] audit: type=1400 audit(1767292851.779:1211): avc: denied { create } for pid=7416 comm="syz.3.354" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=blk_file permissive=1 [ 240.395871][ T30] audit: type=1400 audit(1767292851.789:1212): avc: denied { link } for pid=7416 comm="syz.3.354" name="file1" dev="ramfs" ino=13484 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=blk_file permissive=1 [ 240.820253][ T30] audit: type=1400 audit(1767292852.089:1213): avc: denied { write } for pid=7421 comm="syz.2.356" path="/dev/vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 240.889801][ T30] audit: type=1400 audit(1767292852.089:1214): avc: denied { prog_load } for pid=7421 comm="syz.2.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 240.944358][ T30] audit: type=1400 audit(1767292852.099:1215): avc: denied { bpf } for pid=7421 comm="syz.2.356" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 243.364131][ T7448] loop8: detected capacity change from 0 to 8 [ 243.555494][ T5882] usb 4-1: new full-speed USB device number 3 using dummy_hcd [ 243.602619][ T7452] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=7452 comm=syz.2.362 [ 244.380162][ T30] kauditd_printk_skb: 37 callbacks suppressed [ 244.380178][ T30] audit: type=1400 audit(1767292855.449:1253): avc: denied { map_read map_write } for pid=7444 comm="syz.2.362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 244.418642][ T5823] Dev loop8: unable to read RDB block 8 [ 244.432853][ T5823] loop8: unable to read partition table [ 244.465379][ T5823] loop8: partition table beyond EOD, truncated [ 244.473298][ T7448] Dev loop8: unable to read RDB block 8 [ 244.477534][ T30] audit: type=1400 audit(1767292855.469:1254): avc: denied { bind } for pid=7444 comm="syz.2.362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 244.478878][ T7448] loop8: unable to read partition table [ 244.499302][ T30] audit: type=1400 audit(1767292855.469:1255): avc: denied { setopt } for pid=7444 comm="syz.2.362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 244.526202][ T30] audit: type=1400 audit(1767292855.589:1256): avc: denied { write } for pid=7444 comm="syz.2.362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 245.409998][ T30] audit: type=1400 audit(1767292855.599:1257): avc: denied { read } for pid=7444 comm="syz.2.362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 245.471732][ T5882] usb 4-1: device descriptor read/all, error -71 [ 245.484713][ T30] audit: type=1400 audit(1767292856.119:1258): avc: denied { read } for pid=7446 comm="syz.4.363" name="card0" dev="devtmpfs" ino=627 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 245.507902][ T7448] loop8: partition table beyond EOD, truncated [ 245.578435][ T30] audit: type=1400 audit(1767292856.119:1259): avc: denied { open } for pid=7446 comm="syz.4.363" path="/dev/dri/card0" dev="devtmpfs" ino=627 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 245.603747][ T7448] loop_reread_partitions: partition scan of loop8 (þ被xü^>Ñà– ) failed (rc=-5) [ 245.739641][ T30] audit: type=1400 audit(1767292856.119:1260): avc: denied { ioctl } for pid=7446 comm="syz.4.363" path="/dev/dri/card1" dev="devtmpfs" ino=628 ioctlcmd=0x643a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 245.766785][ T30] audit: type=1400 audit(1767292856.879:1261): avc: denied { create } for pid=7456 comm="syz.2.366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 245.914758][ T7465] overlayfs: missing 'lowerdir' [ 246.049897][ T30] audit: type=1400 audit(1767292856.899:1262): avc: denied { setopt } for pid=7456 comm="syz.2.366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 249.843593][ T30] kauditd_printk_skb: 40 callbacks suppressed [ 249.843605][ T30] audit: type=1400 audit(1767292861.299:1303): avc: denied { name_bind } for pid=7490 comm="syz.0.375" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 249.918987][ T30] audit: type=1400 audit(1767292861.299:1304): avc: denied { node_bind } for pid=7490 comm="syz.0.375" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 250.056409][ T30] audit: type=1400 audit(1767292861.309:1305): avc: denied { create } for pid=7490 comm="syz.0.375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 250.077381][ T30] audit: type=1400 audit(1767292861.319:1306): avc: denied { setopt } for pid=7490 comm="syz.0.375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 250.102572][ T30] audit: type=1400 audit(1767292861.319:1307): avc: denied { write } for pid=7490 comm="syz.0.375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 250.142911][ T30] audit: type=1400 audit(1767292861.829:1308): avc: denied { allowed } for pid=7489 comm="syz.4.376" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 250.383495][ T30] audit: type=1400 audit(1767292861.829:1309): avc: denied { create } for pid=7489 comm="syz.4.376" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 251.336361][ T30] audit: type=1400 audit(1767292862.869:1310): avc: denied { read write } for pid=7498 comm="syz.1.378" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 251.412634][ T30] audit: type=1400 audit(1767292862.869:1311): avc: denied { open } for pid=7498 comm="syz.1.378" path="/dev/raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 251.413868][ T7503] loop8: detected capacity change from 0 to 8 [ 251.458265][ T7503] Dev loop8: unable to read RDB block 8 [ 251.477853][ T7503] loop8: unable to read partition table [ 251.483747][ T30] audit: type=1400 audit(1767292862.869:1312): avc: denied { ioctl } for pid=7498 comm="syz.1.378" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 251.512768][ T7503] loop8: partition table beyond EOD, truncated [ 251.552159][ T7503] loop_reread_partitions: partition scan of loop8 (þ被xü^>Ñà– ) failed (rc=-5) [ 251.583732][ T5923] usb 2-1: new full-speed USB device number 3 using dummy_hcd [ 251.768010][ T5923] usb 2-1: config 0 interface 0 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 251.836808][ T5923] usb 2-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0x94, changing to 0x84 [ 251.919988][ T5923] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x84 has an invalid bInterval 0, changing to 10 [ 251.934615][ T7508] No control pipe specified [ 251.939228][ T5923] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x84 has invalid wMaxPacketSize 0 [ 251.992403][ T5923] usb 2-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 252.054993][ T5923] usb 2-1: New USB device found, idVendor=04e8, idProduct=ff30, bcdDevice=a6.d1 [ 252.121487][ T5923] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 252.169527][ T5923] usb 2-1: Product: syz [ 252.185069][ T5923] usb 2-1: Manufacturer: syz [ 252.193485][ T5923] usb 2-1: SerialNumber: syz [ 252.208738][ T5923] usb 2-1: config 0 descriptor?? [ 252.604181][ T5923] rc_core: IR keymap rc-imon-rsc not found [ 252.610002][ T5923] Registered IR keymap rc-empty [ 252.635027][ T5923] rc rc0: iMON Station as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/rc/rc0 [ 252.721657][ T7525] overlayfs: missing 'workdir' [ 253.063601][ T5923] input: iMON Station as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/rc/rc0/input7 [ 253.093035][ T5923] imon_raw 2-1:0.0: probe with driver imon_raw failed with error -90 [ 253.238551][ T5923] usb 2-1: USB disconnect, device number 3 [ 254.585934][ T7542] netlink: 830 bytes leftover after parsing attributes in process `syz.3.388'. [ 255.171809][ T30] kauditd_printk_skb: 42 callbacks suppressed [ 255.171823][ T30] audit: type=1400 audit(1767292867.039:1355): avc: denied { read write } for pid=7540 comm="syz.4.389" name="rdma_cm" dev="devtmpfs" ino=1271 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 255.222128][ T1298] ieee802154 phy0 wpan0: encryption failed: -22 [ 255.228487][ T1298] ieee802154 phy1 wpan1: encryption failed: -22 [ 255.285671][ T30] audit: type=1400 audit(1767292867.109:1356): avc: denied { open } for pid=7540 comm="syz.4.389" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=1271 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 255.354910][ T7545] loop8: detected capacity change from 0 to 8 [ 255.520692][ T7545] Dev loop8: unable to read RDB block 8 [ 255.582977][ T7545] loop8: unable to read partition table [ 255.588797][ T7545] loop8: partition table beyond EOD, truncated [ 255.593746][ T30] audit: type=1400 audit(1767292867.439:1357): avc: denied { write } for pid=7548 comm="syz.3.391" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 255.613652][ T7545] loop_reread_partitions: partition scan of loop8 (þ被xü^>Ñà– ) failed (rc=-5) [ 255.673191][ T30] audit: type=1400 audit(1767292867.439:1358): avc: denied { ioctl } for pid=7548 comm="syz.3.391" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 255.752220][ T30] audit: type=1400 audit(1767292867.609:1359): avc: denied { mount } for pid=7550 comm="syz.4.392" name="/" dev="autofs" ino=13030 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 255.802550][ T9] usb 4-1: new high-speed USB device number 5 using dummy_hcd [ 255.822040][ T30] audit: type=1400 audit(1767292867.649:1360): avc: denied { read } for pid=7550 comm="syz.4.392" name="autofs" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 255.869382][ T30] audit: type=1400 audit(1767292867.649:1361): avc: denied { open } for pid=7550 comm="syz.4.392" path="/dev/autofs" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 255.936596][ T7554] SELinux: policydb version -759146342 does not match my version range 15-35 [ 255.946649][ T7554] SELinux: failed to load policy [ 256.095324][ T7554] netlink: 12 bytes leftover after parsing attributes in process `syz.2.393'. [ 256.202594][ T9] usb 4-1: Using ep0 maxpacket: 16 [ 256.204128][ T30] audit: type=1400 audit(1767292867.649:1362): avc: denied { ioctl } for pid=7550 comm="syz.4.392" path="/dev/autofs" dev="devtmpfs" ino=98 ioctlcmd=0x9379 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 256.234959][ T9] usb 4-1: config index 0 descriptor too short (expected 530, got 18) [ 256.254467][ T9] usb 4-1: New USB device found, idVendor=0403, idProduct=b8d8, bcdDevice=30.bb [ 256.284404][ T9] usb 4-1: New USB device strings: Mfr=1, Product=121, SerialNumber=76 [ 256.303334][ T9] usb 4-1: Product: syz [ 256.312713][ T9] usb 4-1: Manufacturer: syz [ 256.317322][ T9] usb 4-1: SerialNumber: syz [ 256.369083][ T30] audit: type=1400 audit(1767292867.719:1363): avc: denied { unmount } for pid=5808 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 256.402567][ T30] audit: type=1400 audit(1767292867.789:1364): avc: denied { create } for pid=7552 comm="syz.2.393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 257.514624][ T9] usb 4-1: Quirk or no altset; falling back to MIDI 1.0 [ 258.820156][ T7580] netlink: 830 bytes leftover after parsing attributes in process `syz.0.387'. [ 259.521944][ T9] snd-usb-audio 4-1:222.0: probe with driver snd-usb-audio failed with error -110 [ 259.695662][ T9] usb 4-1: USB disconnect, device number 5 [ 259.714955][ T5823] udevd[5823]: error opening ATTR{/sys/devices/platform/dummy_hcd.3/usb4/4-1/4-1:222.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 259.754194][ T7575] SELinux: policydb version -759146342 does not match my version range 15-35 [ 259.766314][ T7575] SELinux: failed to load policy [ 259.775936][ T7575] netlink: 12 bytes leftover after parsing attributes in process `syz.4.396'. [ 260.022567][ T5861] usb 2-1: new full-speed USB device number 4 using dummy_hcd [ 260.227527][ T5861] usb 2-1: config 0 interface 0 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 260.362970][ T5861] usb 2-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0x94, changing to 0x84 [ 260.390969][ T7598] netlink: 44 bytes leftover after parsing attributes in process `syz.0.403'. [ 260.408889][ T5861] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x84 has an invalid bInterval 0, changing to 10 [ 260.460701][ T5861] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x84 has invalid wMaxPacketSize 0 [ 260.489485][ T5861] usb 2-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 260.524445][ T7600] loop8: detected capacity change from 0 to 8 [ 260.563677][ T7600] Dev loop8: unable to read RDB block 8 [ 260.569289][ T7600] loop8: unable to read partition table [ 260.578649][ T5861] usb 2-1: New USB device found, idVendor=04e8, idProduct=ff30, bcdDevice=a6.d1 [ 260.591470][ T30] kauditd_printk_skb: 16 callbacks suppressed [ 260.591482][ T30] audit: type=1400 audit(1767292872.449:1381): avc: denied { read } for pid=7602 comm="syz.3.405" name="uinput" dev="devtmpfs" ino=920 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 260.602699][ T7600] loop8: partition table beyond EOD, [ 261.184739][ T5861] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 261.212523][ T5861] usb 2-1: Product: syz [ 261.216680][ T5861] usb 2-1: Manufacturer: syz [ 261.221258][ T5861] usb 2-1: SerialNumber: syz [ 261.226086][ T7600] truncated [ 261.229207][ T7600] loop_reread_partitions: partition scan of loop8 (þ被xü^>Ñà– ) failed (rc=-5) [ 261.251611][ T5861] usb 2-1: config 0 descriptor?? [ 261.256614][ T30] audit: type=1400 audit(1767292872.449:1382): avc: denied { open } for pid=7602 comm="syz.3.405" path="/dev/uinput" dev="devtmpfs" ino=920 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 261.256652][ T30] audit: type=1400 audit(1767292872.449:1383): avc: denied { create } for pid=7602 comm="syz.3.405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 261.256686][ T30] audit: type=1400 audit(1767292872.449:1384): avc: denied { write } for pid=7602 comm="syz.3.405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 261.424274][ T7606] SELinux: policydb version -759146342 does not match my version range 15-35 [ 261.433552][ T7606] SELinux: failed to load policy [ 261.442944][ T7606] netlink: 12 bytes leftover after parsing attributes in process `syz.0.406'. [ 261.738575][ T30] audit: type=1400 audit(1767292872.449:1385): avc: denied { nlmsg_write } for pid=7602 comm="syz.3.405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 261.774711][ T7603] can: request_module (can-proto-0) failed. [ 261.912579][ T30] audit: type=1400 audit(1767292872.459:1386): avc: denied { read write } for pid=7602 comm="syz.3.405" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 262.852544][ T30] audit: type=1400 audit(1767292872.459:1387): avc: denied { open } for pid=7602 comm="syz.3.405" path="/dev/vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 262.882635][ T30] audit: type=1400 audit(1767292872.459:1388): avc: denied { read } for pid=7602 comm="syz.3.405" dev="nsfs" ino=4026533362 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 262.982591][ T30] audit: type=1400 audit(1767292872.459:1389): avc: denied { open } for pid=7602 comm="syz.3.405" path="net:[4026533362]" dev="nsfs" ino=4026533362 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 262.984224][ T5861] rc_core: IR keymap rc-imon-rsc not found [ 263.072514][ T5861] Registered IR keymap rc-empty [ 263.404924][ T30] audit: type=1400 audit(1767292872.459:1390): avc: denied { create } for pid=7602 comm="syz.3.405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 263.418105][ T5861] rc rc0: iMON Station as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/rc/rc0 [ 263.477915][ T5861] input: iMON Station as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/rc/rc0/input8 [ 263.529662][ T5861] imon_raw 2-1:0.0: probe with driver imon_raw failed with error -90 [ 263.587014][ T5861] usb 2-1: USB disconnect, device number 4 [ 265.016416][ T7633] Device name cannot be null; rc = [-22] [ 265.030358][ T7633] netlink: 48 bytes leftover after parsing attributes in process `syz.0.413'. [ 265.957864][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 265.957893][ T30] audit: type=1400 audit(1767292877.829:1397): avc: denied { ioctl } for pid=7636 comm="syz.0.415" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x550b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 266.368574][ T30] audit: type=1400 audit(1767292878.149:1398): avc: denied { connect } for pid=7631 comm="syz.1.414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 266.702235][ T7648] netlink: 830 bytes leftover after parsing attributes in process `syz.4.410'. [ 267.516947][ T7657] loop8: detected capacity change from 0 to 8 [ 267.523773][ T7657] Dev loop8: unable to read RDB block 8 [ 267.529401][ T7657] loop8: unable to read partition table [ 267.535666][ T7657] loop8: partition table beyond EOD, truncated [ 267.556709][ T30] audit: type=1400 audit(1767292879.429:1399): avc: denied { ioctl } for pid=7641 comm="syz.3.409" path="/dev/video0" dev="devtmpfs" ino=930 ioctlcmd=0x5602 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 267.596306][ T7657] loop_reread_partitions: partition scan of loop8 (þ被xü^>Ñà– ) failed (rc=-5) [ 267.942739][ T7661] SELinux: policydb version -759146342 does not match my version range 15-35 [ 267.952307][ T7661] SELinux: failed to load policy [ 267.993204][ T7661] netlink: 12 bytes leftover after parsing attributes in process `syz.4.419'. [ 268.673864][ T30] audit: type=1400 audit(1767292880.119:1400): avc: denied { create } for pid=7660 comm="syz.1.420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 268.748534][ T30] audit: type=1400 audit(1767292880.119:1401): avc: denied { getopt } for pid=7660 comm="syz.1.420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 270.119176][ T5868] usb 5-1: new full-speed USB device number 2 using dummy_hcd [ 270.276439][ T5868] usb 5-1: config 0 interface 0 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 270.303840][ T5868] usb 5-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0x94, changing to 0x84 [ 270.322790][ T5868] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x84 has an invalid bInterval 0, changing to 10 [ 270.341305][ T5868] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x84 has invalid wMaxPacketSize 0 [ 270.355840][ T5868] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 270.372644][ T5868] usb 5-1: New USB device found, idVendor=04e8, idProduct=ff30, bcdDevice=a6.d1 [ 270.381824][ T5868] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 270.390103][ T5868] usb 5-1: Product: syz [ 270.394709][ T5868] usb 5-1: Manufacturer: syz [ 270.400392][ T5868] usb 5-1: SerialNumber: syz [ 271.402450][ T5868] usb 5-1: config 0 descriptor?? [ 272.336740][ T5868] usb 5-1: can't set config #0, error -71 [ 272.545823][ T5868] usb 5-1: USB disconnect, device number 2 [ 272.660599][ T7697] netlink: 830 bytes leftover after parsing attributes in process `syz.1.428'. [ 273.959448][ T30] audit: type=1400 audit(1767292885.829:1402): avc: denied { write } for pid=7705 comm="syz.2.432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 274.031729][ T30] audit: type=1400 audit(1767292885.849:1403): avc: denied { read } for pid=7705 comm="syz.2.432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 274.111634][ T30] audit: type=1400 audit(1767292885.859:1404): avc: denied { ioctl } for pid=7705 comm="syz.2.432" path="socket:[13287]" dev="sockfs" ino=13287 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 274.144735][ T30] audit: type=1400 audit(1767292885.959:1405): avc: denied { create } for pid=7707 comm="syz.2.433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 274.447491][ T30] audit: type=1400 audit(1767292885.969:1406): avc: denied { bind } for pid=7707 comm="syz.2.433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 274.522744][ T30] audit: type=1400 audit(1767292885.969:1407): avc: denied { setopt } for pid=7707 comm="syz.2.433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 274.564846][ T30] audit: type=1400 audit(1767292885.969:1408): avc: denied { accept } for pid=7707 comm="syz.2.433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 274.782581][ T30] audit: type=1400 audit(1767292886.039:1409): avc: denied { create } for pid=7707 comm="syz.2.433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 275.792610][ T30] audit: type=1400 audit(1767292886.049:1410): avc: denied { write } for pid=7707 comm="syz.2.433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 276.557221][ T30] audit: type=1400 audit(1767292887.589:1411): avc: denied { mounton } for pid=7712 comm="syz.2.435" path="/92/file1" dev="tmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 278.768447][ T7741] overlayfs: missing 'lowerdir' [ 279.096563][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 279.096577][ T30] audit: type=1400 audit(1767292890.969:1416): avc: denied { ioctl } for pid=5809 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=648 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 279.318065][ T30] audit: type=1400 audit(1767292891.189:1417): avc: denied { unmount } for pid=5807 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 279.361143][ T30] audit: type=1400 audit(1767292891.229:1418): avc: denied { read write } for pid=5807 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 279.606139][ T30] audit: type=1400 audit(1767292891.259:1419): avc: denied { open } for pid=7747 comm="syz.0.430" path="/dev/loop8" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 280.407919][ T30] audit: type=1400 audit(1767292891.279:1420): avc: denied { write } for pid=7746 comm="syz.1.440" path="/dev/vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 280.842537][ T30] audit: type=1400 audit(1767292891.279:1421): avc: denied { prog_load } for pid=7746 comm="syz.1.440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 280.867063][ T30] audit: type=1400 audit(1767292891.279:1422): avc: denied { bpf } for pid=7746 comm="syz.1.440" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 280.912777][ T30] audit: type=1400 audit(1767292891.279:1423): avc: denied { perfmon } for pid=7746 comm="syz.1.440" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 280.991592][ T7766] netlink: 830 bytes leftover after parsing attributes in process `syz.0.443'. [ 281.438134][ T30] audit: type=1400 audit(1767292891.289:1424): avc: denied { prog_run } for pid=7746 comm="syz.1.440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 281.485298][ T30] audit: type=1400 audit(1767292891.289:1425): avc: denied { execmem } for pid=7746 comm="syz.1.440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 284.108979][ T30] kauditd_printk_skb: 28 callbacks suppressed [ 284.108993][ T30] audit: type=1400 audit(1767292895.979:1454): avc: denied { write } for pid=7780 comm="syz.4.448" name="anycast6" dev="proc" ino=4026533193 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 284.250854][ T30] audit: type=1400 audit(1767292896.029:1455): avc: denied { allowed } for pid=7780 comm="syz.4.448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 284.304358][ T30] audit: type=1400 audit(1767292896.029:1456): avc: denied { create } for pid=7780 comm="syz.4.448" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 284.470962][ T30] audit: type=1400 audit(1767292896.029:1457): avc: denied { map } for pid=7780 comm="syz.4.448" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=14402 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 284.509168][ T30] audit: type=1400 audit(1767292896.029:1458): avc: denied { read write } for pid=7780 comm="syz.4.448" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=14402 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 284.615590][ T7798] overlayfs: option "workdir=./bus" is useless in a non-upper mount, ignore [ 284.624515][ T7798] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 285.001560][ T30] audit: type=1400 audit(1767292896.479:1459): avc: denied { mounton } for pid=7795 comm="syz.0.451" path="/86/file0" dev="tmpfs" ino=483 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 285.060448][ T30] audit: type=1400 audit(1767292896.479:1460): avc: denied { mount } for pid=7795 comm="syz.0.451" name="/" dev="ramfs" ino=14409 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 285.136571][ T30] audit: type=1400 audit(1767292896.559:1461): avc: denied { create } for pid=7795 comm="syz.0.451" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=blk_file permissive=1 [ 285.211636][ T30] audit: type=1400 audit(1767292896.559:1462): avc: denied { link } for pid=7795 comm="syz.0.451" name="file1" dev="ramfs" ino=14410 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=blk_file permissive=1 [ 285.324720][ T30] audit: type=1400 audit(1767292896.869:1463): avc: denied { read } for pid=7792 comm="syz.2.450" path="/dev/vhost-vsock" dev="devtmpfs" ino=1275 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 286.130489][ T7809] overlayfs: missing 'lowerdir' [ 287.025452][ T7808] netlink: 16 bytes leftover after parsing attributes in process `syz.0.454'. [ 288.000073][ T7825] netlink: 830 bytes leftover after parsing attributes in process `syz.0.459'. [ 289.225259][ T30] kauditd_printk_skb: 47 callbacks suppressed [ 289.225275][ T30] audit: type=1400 audit(1767292901.089:1511): avc: denied { create } for pid=7827 comm="syz.4.460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 393.742480][ C0] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 393.750057][ C0] rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P7813/1:b..l [ 393.759116][ C0] rcu: (detected by 0, t=10503 jiffies, g=16881, q=636 ncpus=2) [ 393.767527][ C0] task:syz.3.449 state:R running task stack:26648 pid:7813 tgid:7812 ppid:5807 task_flags:0x400040 flags:0x00080000 [ 393.783223][ C0] Call Trace: [ 393.786618][ C0] [ 393.789642][ C0] ? __schedule+0x10b9/0x6150 [ 393.794415][ C0] __schedule+0x1139/0x6150 [ 393.799042][ C0] ? __pfx___schedule+0x10/0x10 [ 393.803912][ C0] ? mark_held_locks+0x49/0x80 [ 393.808680][ C0] preempt_schedule_irq+0x51/0x90 [ 393.813694][ C0] irqentry_exit+0x1d8/0x8c0 [ 393.818274][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 393.824244][ C0] RIP: 0010:lock_acquire+0x62/0x330 [ 393.829433][ C0] Code: b4 18 12 83 f8 07 0f 87 a2 02 00 00 89 c0 48 0f a3 05 22 bb ee 0e 0f 82 74 02 00 00 8b 35 ba eb ee 0e 85 f6 0f 85 8d 00 00 00 <48> 8b 44 24 30 65 48 2b 05 39 b4 18 12 0f 85 ad 02 00 00 48 83 c4 [ 393.849034][ C0] RSP: 0018:ffffc9001b7ff8e8 EFLAGS: 00000206 [ 393.855089][ C0] RAX: 0000000000000046 RBX: ffffffff8e3c96a0 RCX: 00000000c64af325 [ 393.863063][ C0] RDX: 0000000000000000 RSI: ffffffff8daa7ee5 RDI: ffffffff8bf2b400 [ 393.871036][ C0] RBP: 0000000000000002 R08: 0000000055fd6992 R09: 00000000255fd699 [ 393.879074][ C0] R10: 0000000000000002 R11: ffff888076ed8b30 R12: 0000000000000000 [ 393.887026][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 393.894997][ C0] ___pte_offset_map+0x40/0x380 [ 393.899829][ C0] ? ___pte_offset_map+0x2f/0x380 [ 393.904826][ C0] __pte_offset_map_lock+0x8d/0x310 [ 393.909998][ C0] ? __pfx___pte_offset_map_lock+0x10/0x10 [ 393.915776][ C0] ? memcg_rstat_updated.part.0+0x110/0x250 [ 393.921660][ C0] follow_page_pte+0xab/0x1390 [ 393.926405][ C0] ? __pfx_follow_page_pte+0x10/0x10 [ 393.931663][ C0] ? __pfx___might_resched+0x10/0x10 [ 393.936948][ C0] __get_user_pages+0x918/0x3590 [ 393.941872][ C0] ? __pfx___get_user_pages+0x10/0x10 [ 393.947223][ C0] populate_vma_page_range+0x267/0x3f0 [ 393.952658][ C0] ? __pfx_populate_vma_page_range+0x10/0x10 [ 393.958609][ C0] ? __pfx_find_vma_intersection+0x10/0x10 [ 393.964398][ C0] ? do_mmap+0x69c/0x1210 [ 393.969233][ C0] __mm_populate+0x1d8/0x380 [ 393.973796][ C0] ? __pfx___mm_populate+0x10/0x10 [ 393.978885][ C0] ? up_write+0x282/0x4e0 [ 393.983190][ C0] vm_mmap_pgoff+0x37f/0x470 [ 393.987752][ C0] ? __pfx_vm_mmap_pgoff+0x10/0x10 [ 393.992838][ C0] ? __x64_sys_futex+0x1e0/0x4c0 [ 393.997749][ C0] ? __x64_sys_futex+0x1e9/0x4c0 [ 394.002661][ C0] ksys_mmap_pgoff+0x7d/0x5c0 [ 394.007311][ C0] ? xfd_validate_state+0x61/0x180 [ 394.012406][ C0] __x64_sys_mmap+0x125/0x190 [ 394.017060][ C0] do_syscall_64+0xcd/0xf80 [ 394.021551][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 394.027418][ C0] RIP: 0033:0x7f4d9dd8f749 [ 394.031814][ C0] RSP: 002b:00007f4d9ecd2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 394.040206][ C0] RAX: ffffffffffffffda RBX: 00007f4d9dfe5fa0 RCX: 00007f4d9dd8f749 [ 394.048174][ C0] RDX: b635773f06ebbeee RSI: 0000000000b36000 RDI: 0000200000000000 [ 394.056129][ C0] RBP: 00007f4d9de13f91 R08: ffffffffffffffff R09: 0000000000000000 [ 394.064091][ C0] R10: 0000000000008031 R11: 0000000000000246 R12: 0000000000000000 [ 394.072052][ C0] R13: 00007f4d9dfe6038 R14: 00007f4d9dfe5fa0 R15: 00007ffc51480b98 [ 394.080017][ C0] [ 394.083014][ C0] rcu: rcu_preempt kthread starved for 10482 jiffies! g16881 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 394.094192][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 394.104140][ C0] rcu: RCU grace-period kthread stack dump: [ 394.110008][ C0] task:rcu_preempt state:R running task stack:28344 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00080000 [ 394.123458][ C0] Call Trace: [ 394.126719][ C0] [ 394.129628][ C0] ? __schedule+0x10b9/0x6150 [ 394.134294][ C0] __schedule+0x1139/0x6150 [ 394.138775][ C0] ? __lock_acquire+0x436/0x2890 [ 394.143694][ C0] ? __mod_timer+0x8f2/0xd30 [ 394.148261][ C0] ? __pfx___schedule+0x10/0x10 [ 394.153084][ C0] ? find_held_lock+0x2b/0x80 [ 394.157740][ C0] ? schedule+0x2d7/0x3a0 [ 394.162058][ C0] schedule+0xe7/0x3a0 [ 394.166108][ C0] schedule_timeout+0x123/0x290 [ 394.170939][ C0] ? __pfx_schedule_timeout+0x10/0x10 [ 394.176301][ C0] ? __pfx_process_timeout+0x10/0x10 [ 394.181574][ C0] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 394.187361][ C0] ? prepare_to_swait_event+0xf5/0x480 [ 394.192888][ C0] rcu_gp_fqs_loop+0x1ea/0xaf0 [ 394.197676][ C0] ? __pfx_rcu_gp_fqs_loop+0x10/0x10 [ 394.202946][ C0] ? lockdep_hardirqs_on+0x7c/0x110 [ 394.208120][ C0] ? __pfx_rcu_gp_init+0x10/0x10 [ 394.213030][ C0] ? rcu_gp_cleanup+0x7c1/0xe90 [ 394.217884][ C0] rcu_gp_kthread+0x26d/0x380 [ 394.222546][ C0] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 394.227718][ C0] ? rcu_is_watching+0x12/0xc0 [ 394.232455][ C0] ? lockdep_hardirqs_on+0x7c/0x110 [ 394.237736][ C0] ? __kthread_parkme+0x19e/0x250 [ 394.242739][ C0] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 394.247913][ C0] kthread+0x3c5/0x780 [ 394.251963][ C0] ? __pfx_kthread+0x10/0x10 [ 394.256551][ C0] ? rcu_is_watching+0x12/0xc0 [ 394.261292][ C0] ? __pfx_kthread+0x10/0x10 [ 394.265854][ C0] ret_from_fork+0x983/0xb10 [ 394.270418][ C0] ? __pfx_ret_from_fork+0x10/0x10 [ 394.275503][ C0] ? __switch_to+0x7af/0x10d0 [ 394.280161][ C0] ? __pfx_kthread+0x10/0x10 [ 394.284730][ C0] ret_from_fork_asm+0x1a/0x30 [ 394.289476][ C0] [ 394.292468][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 394.298770][ C0] Sending NMI from CPU 0 to CPUs 1: [ 394.303967][ C1] NMI backtrace for cpu 1 [ 394.303978][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT(full) [ 394.303992][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 394.303999][ C1] RIP: 0010:pv_native_safe_halt+0xf/0x20 [ 394.304018][ C1] Code: c6 5f 02 c3 cc cc cc cc 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d 13 49 12 00 fb f4 cc 35 03 00 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 [ 394.304034][ C1] RSP: 0018:ffffc90000197de8 EFLAGS: 000002c6 [ 394.304045][ C1] RAX: 00000000011861d9 RBX: 0000000000000001 RCX: ffffffff8b7816d9 [ 394.304053][ C1] RDX: 0000000000000000 RSI: ffffffff8dacdf79 RDI: ffffffff8bf2b400 [ 394.304061][ C1] RBP: ffffed1003b54498 R08: 0000000000000001 R09: ffffed10170a673d [ 394.304069][ C1] R10: ffff8880b85339eb R11: ffff88801daa2ff0 R12: 0000000000000001 [ 394.304076][ C1] R13: ffff88801daa24c0 R14: ffffffff9088b6d0 R15: 0000000000000000 [ 394.304084][ C1] FS: 0000000000000000(0000) GS:ffff8881249f5000(0000) knlGS:0000000000000000 [ 394.304097][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 394.304105][ C1] CR2: 000055b7f7e95be0 CR3: 0000000075e3c000 CR4: 00000000003526f0 [ 394.304112][ C1] Call Trace: [ 394.304118][ C1] [ 394.304122][ C1] default_idle+0x13/0x20 [ 394.304139][ C1] default_idle_call+0x6c/0xb0 [ 394.304154][ C1] do_idle+0x38d/0x510 [ 394.304174][ C1] ? __pfx_do_idle+0x10/0x10 [ 394.304193][ C1] cpu_startup_entry+0x4f/0x60 [ 394.304210][ C1] start_secondary+0x21d/0x2d0 [ 394.304223][ C1] ? __pfx_start_secondary+0x10/0x10 [ 394.304236][ C1] common_startup_64+0x13e/0x148 [ 394.304255][ C1]