last executing test programs: 5.577540165s ago: executing program 1 (id=739): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'veth0_to_team\x00', 0x0}) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_crypto(0x10, 0x3, 0x15) r3 = open(&(0x7f0000000180)='.\x00', 0x10000, 0x2) r4 = open(0x0, 0x100000, 0x0) flock(r4, 0x1) flock(r3, 0x1) flock(0xffffffffffffffff, 0x5) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000004c0)={r0, r2, 0x25, 0x0, @void}, 0x10) socket(0x10, 0x803, 0x0) 5.519381561s ago: executing program 1 (id=742): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x2c, 0x24, 0x4ee4e6a52ff56541, 0x1070bd26, 0xffffffff, {0x0, 0x0, 0x0, r6, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_qfg={0x8}]}, 0x2c}}, 0x20048884) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x400dc}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000027c0)=@newtfilter={0x40, 0x2c, 0xd27, 0x30bd29, 0x25dfdc00, {0x0, 0x0, 0x0, r3, {0x0, 0x4}, {}, {0x8}}, [@filter_kind_options=@f_matchall={{0xd}, {0xc, 0x2, [@TCA_MATCHALL_CLASSID={0x8, 0x1, {0xc, 0x4}}]}}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x0) 5.368181174s ago: executing program 1 (id=747): socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$HIDIOCGRAWNAME(r0, 0x80404804, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, 0x0, 0x0) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="2e00000010008188e6b62aa73f72cc9f0ba1f848140000005e140602000000000e000a000f000000028000001294", 0x2e}], 0x1}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000400)="5c00000013006bcd9e3fe3dc4e48aa31086b8703140000001f03000000330000040014000d000a000d0000009ee517d34460bc08eab556a705251e6182949a3651f60a84c9f5d1938837e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f000801}, 0x4040844) recvmmsg(r4, 0x0, 0x0, 0x2101, 0x0) syz_open_dev$vim2m(&(0x7f0000000040), 0xa, 0x2) r5 = memfd_create(&(0x7f0000000000)='\x103q}2\x9a\xce\xaf\x03\xdfy[\xd9\xffR8\xf4\x1c\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xa0\x00\x00\x00\x90+\xd6\x05\r\x84\x87\x1c\b\xdb\xe2\x00\x00A\x90m\xb6&\xd0\x9d\x00\x00\xc5\xb8,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\x00\x00\x00\x00\x00\x00\r\x1b\xd3\xff<\x83z\x80\x8fQ|\xf5d\x10\x10\xd7\x01M\x7fML\x18\'\x1a<\xfee7{l\x16}\xa0I\x7f\xb5)l\xbb\x02\xfa\xb7\xb6\xa0]\xda8\xe0~\x1c \x91\t\x8b\xbd\x1f\xb3834d1i\x9b\x94\xa6\\\x0e\xe2\xfa\xe5!\xd3\xcf\xfc\xce\xba\xe2\x9f\x05xgL5\x14Y+\xb3\x1axi)<\xf7\x98\xc1\xba\xf4|\xe7|\xc4\xd7\x03\x00\x00\x00\x04D\x15E^7%8\x94y\x98\xf0l\xa0\'Q%\xd4\xda\xee\x81}\xcc\xfd\xa2\xe3M~x\x96\xe3]\xd70\xa2\x17\xca\xde\x1b\xaa\xe0l\xfc\x85\x8fc\x1c{|e\x8bs\xb0\x85E\xce;p)\xf8\xa6\xaa&QC4V\x81\x04\xcf\xd2\x81\xdc\xdf\xd7<\x9f\x93\x8bX\xd4\xea\xb2\xff\b\x92\xc7\x00\xef\xff\x00\x93\x1f\x92\xa7dcY\x9c\x9e9O-\xfcF\xbb\xbd{:IR\xea\xd8$\xe2\xa0\xc2\x8b\x1a\xead\xb8\xe1:6\x15M\x1d\xdak\x8c\x909\xd8\xb3\x02\xe0\x04\x9c\xc2\x06|\xf0\x0f\xa6Y&r\x9b\xc7\x1d\xe7jDf\x87@\x8fg\x15RJwe\xe2\xdcunu\xff`\xa40\xce\xffB%\xe4k\xff\x8d\x06\x0e\x89\xd9DC\x9fF\x9c[M=\xe0^\xa8\xed)\xe8Z\xe8\x99&\x87\x04\xa4\t\xaa\xd8\xd6\xd5pG\xcb\xc4\x8b\xf7\xb8#\xcb\xd8|\xa5\xa6S\x8b\x8cv\xb7)\x02k\xf3L\x03\xbb\xfa\xe1\\\xf1\x8cUj\xd5\xa5\x88GL\xe7_\xfd\x17C=G\x0f\xe9u\x1d\xfeg\xfex\xcd\xaa\xad\x906\xd0sy\xc6T\x93\xae\xd5r\xc8G\xc5\xfdS\xff\x04:`\x1e\xe3;l\xcd&\xd4\xf4\x8eum\x04\x00~\xfa\x05\xd7\xe7X\xc7/\xae5\x93wwT\x13\xbd,\xd6\x16\x84\xcd\xd1\xd8\xe1P_\xbf0\xd8\x8d%Yh\xb5\xb4\"\xf5\x93\xdeh\xce\xa5\xe8\xc8\xec\x88\x89\xf07{\x95\xc9\xd0\xee\xe1\x1d\x80\xcc]-\xc2\xa1\x02ELhI\xd9\xf5\xcfk\x8a&i\xc1\xff9T\x8e\xe2rY\xa3\xd2H9\xfe\x0e\x1e\xac\x0f\xc3\xbd{\xd9\xcc\xbe\xa9\x93\xe0\xa4W\x1cn>\xc1\xf1\x9e\"\x93\x19\x19\x1a\xcc\x7fy\xd2~\x05\x99\xe6\x00o\xca\xe0\xc6\xd4\xf5\xa0\xc8P\xd6;\xf3\xc6~E\xacI\xd4\xe9\xa1|>\x91.K\x81\xa9+\xcf\xff\xcb\xfa\x0f\xe7n\x83H\x12\xac\x80\x16\xf8\x87Q\x97Az\n`\xb6\xe13A\xec\x8d(\\D\xec\xa6\t1\xa0h\xfc\x1f\xdd1@-4\xb4:\xf8\xd5wP \x84m\xe2\xd9\xfcb\xa0\xc3\xc9\xe7W\x86\xd7$\xa4ml\xee\x97[\xb7\xfa', 0x2) ftruncate(r5, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xb, 0x2012, r5, 0x0) rseq(&(0x7f00000004c0), 0x20, 0x0, 0x0) modify_ldt$write(0x1, &(0x7f0000000000)={0xfff, 0x100000, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) r6 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000300)={0x3b, @loopback, 0x4e23, 0x3, 'lblc\x00', 0x1, 0xb4, 0x1a}, 0x2c) lseek(r5, 0x6, 0x4) 4.480087503s ago: executing program 1 (id=758): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) r3 = syz_io_uring_setup(0x497, &(0x7f00000000c0)={0x0, 0x3238, 0x400, 0xffffffff, 0x28c}, &(0x7f0000000340)=0x0, &(0x7f0000000540)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f00000002c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r2, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x438}, 0x0, 0x12f4c4729764eade, 0x1}) io_uring_enter(r3, 0x3516, 0xa00100, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, 0x0, 0x0) syz_usb_connect(0x3, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000abe92710b1134200fe760102030109021b0001040000000904090201c9180200090582024000000001c54582daa7249d20d5829d31ec6ea3cc17b29aed095132f2897e6617d093ef5191bf786ab50261fb925762845e299cfb3333d9b897282153137bd995"], 0x0) 1.779798003s ago: executing program 3 (id=789): openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x601c2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x4d, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="ec", 0x1}], 0x1, &(0x7f0000000300)=ANY=[], 0xb0}, 0x0, 0x8400, 0x1}) r1 = syz_io_uring_setup(0x81f, &(0x7f0000000480)={0x0, 0xbe15, 0x10, 0x3, 0x30e}, &(0x7f00000000c0)=0x0, &(0x7f0000000540)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x30, 0x0, 0x0, 0x4}]}, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x4, 0x0, @fd_index=0x6, 0x0, 0x0, 0x3, 0x2, 0x1}) io_uring_enter(r1, 0x47bc, 0x0, 0x21, 0x0, 0x0) 1.530190083s ago: executing program 2 (id=793): openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) syz_usb_connect(0x0, 0x2d, &(0x7f0000000180)=ANY=[@ANYBLOB="1201fb0019030320d812010079de01ec020109021b0001000003000904000001785ecc00090585020004"], 0x0) r0 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) fcntl$setstatus(r0, 0x4, 0xc00) read$char_usb(r0, &(0x7f00000002c0)=""/31, 0x1f) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000040)) read$char_usb(r0, &(0x7f00000001c0)=""/185, 0xb9) socket$nl_generic(0x10, 0x3, 0x10) sched_setscheduler(0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = syz_open_dev$MSR(&(0x7f0000000100), 0x0, 0x0) read$msr(r2, &(0x7f0000001a40)=""/102392, 0x18ff8) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(0xffffffffffffffff, 0x0, 0x20000000) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)) close_range(r3, 0xffffffffffffffff, 0x200000000000000) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) 1.410089861s ago: executing program 1 (id=795): r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x1, @dev={0xfe, 0x80, '\x00', 0x39}, 0x3e}, 0x1c) recvmmsg(r0, &(0x7f0000000080)=[{{0x0, 0x0, &(0x7f0000000740)=[{0x0}], 0x1}, 0x102}], 0x1, 0x82, 0x0) 1.409669222s ago: executing program 1 (id=796): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(0xffffffffffffffff) r1 = syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x0) r2 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setlease(r2, 0x400, 0x0) syz_usb_connect(0x3, 0x0, 0x0, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20008b}, 0x0) r3 = socket$kcm(0x10, 0x3, 0x10) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) add_key$user(&(0x7f00000003c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000140)={0x0, &(0x7f0000000380)=[0x0], 0x0, 0x0, 0x0, 0x1}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000080)) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f00000003c0)={0x0, 0x0, r7, 0x0}) ioctl$DRM_IOCTL_MODE_GETFB2(0xffffffffffffffff, 0xc06864ce, &(0x7f0000000680)={r8, 0x1ff, 0x0, 0x1, 0x3, [], [0x800020], [0x0, 0x1001000, 0x1], [0x0, 0x0, 0xfffffffffefffffc, 0x9]}) close_range(r0, 0xffffffffffffffff, 0x0) 960.332171ms ago: executing program 2 (id=804): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000300)=0x7) syz_emit_ethernet(0x7a, &(0x7f0000000640)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaabb8100000086dd60f51c9300403a00fe8000000000000000000000000000bbff020000000000000000000000000001020090780000050060508359002c0000fc010000000000000000000000000000000000080000000000000000000000010600000000000000ba6d395246bf356c"], 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xb4e02000) r0 = syz_clone(0x8000, 0x0, 0xfffffffffffffe7e, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, r0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000bce) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = getegid() setgroups(0x7, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2]) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0x0) io_setup(0x1, &(0x7f00000012c0)=0x0) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) io_submit(r3, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r4, &(0x7f0000000080)="4e8fc38e", 0xb, 0x200000000004}]) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), 0x0, 0x0, 0xfffffffffffffffe) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20004882) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r5 = socket(0x10, 0x803, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, r7, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x5, 0xfff3}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x4, 0x3c}}]}}]}, 0x48}}, 0x8080) symlink(&(0x7f0000000080)='.\x00', &(0x7f0000000200)='./file0\x00') chmod(&(0x7f0000000100)='./file0\x00', 0x24c) lchown(&(0x7f00000001c0)='./file0\x00', 0xee00, 0x0) 880.030209ms ago: executing program 3 (id=805): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r2 = socket(0x400000000010, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x2c, 0x24, 0x4ee4e6a52ff56541, 0x1070bd26, 0xffffffff, {0x0, 0x0, 0x0, r6, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_qfg={0x8}]}, 0x2c}}, 0x20048884) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=@newqdisc={0x34, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdfc, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}, {0x2, 0x1}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x400dc}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000027c0)=@newtfilter={0x40, 0x2c, 0xd27, 0x30bd29, 0x25dfdc00, {0x0, 0x0, 0x0, 0x0, {0x0, 0x4}, {}, {0x8}}, [@filter_kind_options=@f_matchall={{0xd}, {0xc, 0x2, [@TCA_MATCHALL_CLASSID={0x8, 0x1, {0xc, 0x4}}]}}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r8) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r9 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000001700)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x27}}, 0x10, 0x0, 0x0, &(0x7f0000001900)=ANY=[@ANYBLOB="140000000000000000000000010000000e000000000000001400000000000000000000000100000007000000000000002400000000000000000000000700000094040000820d212aab96bad6cdf92da325000000000000001c000000000000000000000008000000", @ANYRES32, @ANYBLOB="ac1414366401010100000000600000000000000010000000070000000144207d40000000090000069f000000060001000000000a76000000090000000701862a00000002070e301517f337fc5724b0f4b19f0210c22ab262618268e7b39eceaeaa720106fe8b1561940400001c000000000000000000000008000000", @ANYRES32, @ANYBLOB="ffffffff00000000000000001100000000000000290000000100000000000000000000001c000000000000000000000008000000", @ANYRES32, @ANYBLOB="0a010102ac1414aa000000001400000000000000010000000100000001000000000000001c000000000000000000000008000000", @ANYRES32=r10], 0x168}}], 0x1, 0x8000004) 779.286207ms ago: executing program 2 (id=806): r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x1, @dev={0xfe, 0x80, '\x00', 0x39}, 0x3e}, 0x1c) recvmmsg(r0, &(0x7f0000000080)=[{{0x0, 0x0, &(0x7f0000000740)=[{0x0}], 0x1}, 0x102}], 0x1, 0x82, 0x0) 778.804905ms ago: executing program 3 (id=807): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000740)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600), 0xfec8) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}}], 0x1, 0xcb, 0x0) 778.73217ms ago: executing program 3 (id=808): openat(0xffffffffffffff9c, 0x0, 0x2040, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffffffffffffffff86dd6060626000102c00fe8000000000000000000000000000bbfe8000000000000000000000000000aa11000001"], 0x0) syz_emit_ethernet(0x52, &(0x7f00000007c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd608a27f2000f2c00fe8000000000000000000000000000bbfe8000000000000000000000000000aa0000000e"], 0x0) 778.67697ms ago: executing program 2 (id=809): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000016c0)="5c00000013006bcc9e3be35c6e17aa31076b876c1d0000007ea600000000f36514001ac0040005000a00010004000200ea0400a705251e618294ff0051f60a84c9f4d49380", 0x45}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x300) 720.236457ms ago: executing program 3 (id=810): r0 = memfd_create(&(0x7f0000000000)='\x103q}2\x9a\xce\xaf\x03\xdfy[\xd9\xffR8\xf4\x1c\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xa0\x00\x00\x00\x90+\xd6\x05\r\x84\x87\x1c\b\xdb\xe2\x00\x00A\x90m\xb6&\xd0\x9d\x00\x00\xc5\xb8,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\x00\x00\x00\x00\x00\x00\r\x1b\xd3\xff<\x83z\x80\x8fQ|\xf5d\x10\x10\xd7\x01M\x7fML\x18\'\x1a<\xfee7{l\x16}\xa0I\x7f\xb5)l\xbb\x02\xfa\xb7\xb6\xa0]\xda8\xe0~\x1c \x91\t\x8b\xbd\x1f\xb3834d1i\x9b\x94\xa6\\\x0e\xe2\xfa\xe5!\xd3\xcf\xfc\xce\xba\xe2\x9f\x05xgL5\x14Y+\xb3\x1axi)<\xf7\x98\xc1\xba\xf4|\xe7|\xc4\xd7\x03\x00\x00\x00\x04D\x15E^7%8\x94y\x98\xf0l\xa0\'Q%\xd4\xda\xee\x81}\xcc\xfd\xa2\xe3M~x\x96\xe3]\xd70\xa2\x17\xca\xde\x1b\xaa\xe0l\xfc\x85\x8fc\x1c{|e\x8bs\xb0\x85E\xce;p)\xf8\xa6\xaa&QC4V\x81\x04\xcf\xd2\x81\xdc\xdf\xd7<\x9f\x93\x8bX\xd4\xea\xb2\xff\b\x92\xc7\x00\xef\xff\x00\x93\x1f\x92\xa7dcY\x9c\x9e9O-\xfcF\xbb\xbd{:IR\xea\xd8$\xe2\xa0\xc2\x8b\x1a\xead\xb8\xe1:6\x15M\x1d\xdak\x8c\x909\xd8\xb3\x02\xe0\x04\x9c\xc2\x06|\xf0\x0f\xa6Y&r\x9b\xc7\x1d\xe7jDf\x87@\x8fg\x15RJwe\xe2\xdcunu\xff`\xa40\xce\xffB%\xe4k\xff\x8d\x06\x0e\x89\xd9DC\x9fF\x9c[M=\xe0^\xa8\xed)\xe8Z\xe8\x99&\x87\x04\xa4\t\xaa\xd8\xd6\xd5pG\xcb\xc4\x8b\xf7\xb8#\xcb\xd8|\xa5\xa6S\x8b\x8cv\xb7)\x02k\xf3L\x03\xbb\xfa\xe1\\\xf1\x8cUj\xd5\xa5\x88GL\xe7_\xfd\x17C=G\x0f\xe9u\x1d\xfeg\xfex\xcd\xaa\xad\x906\xd0sy\xc6T\x93\xae\xd5r\xc8G\xc5\xfdS\xff\x04:`\x1e\xe3;l\xcd&\xd4\xf4\x8eum\x04\x00~\xfa\x05\xd7\xe7X\xc7/\xae5\x93wwT\x13\xbd,\xd6\x16\x84\xcd\xd1\xd8\xe1P_\xbf0\xd8\x8d%Yh\xb5\xb4\"\xf5\x93\xdeh\xce\xa5\xe8\xc8\xec\x88\x89\xf07{\x95\xc9\xd0\xee\xe1\x1d\x80\xcc]-\xc2\xa1\x02ELhI\xd9\xf5\xcfk\x8a&i\xc1\xff9T\x8e\xe2rY\xa3\xd2H9\xfe\x0e\x1e\xac\x0f\xc3\xbd{\xd9\xcc\xbe\xa9\x93\xe0\xa4W\x1cn>\xc1\xf1\x9e\"\x93\x19\x19\x1a\xcc\x7fy\xd2~\x05\x99\xe6\x00o\xca\xe0\xc6\xd4\xf5\xa0\xc8P\xd6;\xf3\xc6~E\xacI\xd4\xe9\xa1|>\x91.K\x81\xa9+\xcf\xff\xcb\xfa\x0f\xe7n\x83H\x12\xac\x80\x16\xf8\x87Q\x97Az\n`\xb6\xe13A\xec\x8d(\\D\xec\xa6\t1\xa0h\xfc\x1f\xdd1@-4\xb4:\xf8\xd5wP \x84m\xe2\xd9\xfcb\xa0\xc3\xc9\xe7W\x86\xd7$\xa4ml\xee\x97[\xb7\xfa', 0x2) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xb, 0x2012, r0, 0x0) lseek(r0, 0x80000, 0x3) 719.818677ms ago: executing program 2 (id=811): r0 = syz_open_dev$dri(&(0x7f0000000440), 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x8}) 719.660927ms ago: executing program 2 (id=812): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0xb, 0x59032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x801) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x201}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000400000/0xc00000)=nil, 0xc00000}, 0x4}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x4, 0xfff, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x2, 0x80805, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x7d, &(0x7f00000000c0)={0x0, 0x20000a}, 0x8) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="4401000021000100000000000100000000000000000000000000000000000000fe8000000000000000000000000000bb0086e475f1eab5ff447100"/73, @ANYRES32=r2, @ANYRES32=0x0, @ANYBLOB="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", @ANYBLOB="550f473bf2d85dab7c9c89cd123e8a47a70620359dbaef88bb723b8eb64119f5224983c436afb46828c17c348b49ebdcb88e0daee1d3b87be9b852aea57027dbcfabcd272b69cd987b014a3e080dbb1de6a06b1cf5bbe4713406354ae39ec5fc18afe9243679f9a4f4705b84c5270e25c4bb940d14f6301a5758a79f44936df41fc172a1879f45bb65a1a2605c2b90cc86d5bedc0c89065053e4d5e493b4639c605fe5283fd71cfd2ea0607f611df7d184954f0c866c28691682dd12d6e4c0139266544951c17d53070011c5bb3ff88576996621d7500c84dd3b5c81f90d731823b7d87e35601104", @ANYRESOCT=r0, @ANYRES8, @ANYRES16, @ANYRES32=r4], 0x144}, 0x1, 0x0, 0x0, 0x400c890}, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(0xffffffffffffffff, 0x40085112, 0x0) socket$kcm(0x2, 0x3, 0x2) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0)={0x0, 0x24}}, 0x0) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffff00f687000000", @ANYRES32=r8, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)=@newqdisc={0x54, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {0xffff, 0xffff}, {0xffe0}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x24, 0x2, [@TCA_CAKE_ATM={0x8, 0x4, 0x1}, @TCA_CAKE_FLOW_MODE={0x8, 0x5, 0x5}, @TCA_CAKE_OVERHEAD={0x8, 0x6, 0x54}, @TCA_CAKE_TARGET={0x8, 0x8, 0x4}]}}]}, 0x54}, 0x1, 0x0, 0x0, 0x1}, 0x24000080) bind$packet(r5, &(0x7f0000000040)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @remote}, 0x14) sendto$inet6(r5, &(0x7f0000000800)="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", 0xfc13, 0x880, 0x0, 0xfffffffffffffef0) socket$kcm(0x2, 0x3, 0x2) 620.519624ms ago: executing program 3 (id=813): syz_usb_connect(0x0, 0x2d, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = socket$nl_generic(0x10, 0x3, 0x10) move_pages(0x0, 0x1, &(0x7f0000000080)=[&(0x7f000008c000/0x3000)=nil], &(0x7f0000002640)=[0x1], &(0x7f0000002240), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000005c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r3, @ANYBLOB], 0x54}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$TIPC_NL_KEY_SET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x58, r3, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0x44, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x3c, 0x4, {'gcm(aes)\x00', 0x14, "e3de3d7b4cd07ec3ee777de774fc7987cca41989"}}, @TIPC_NLA_NODE_KEY_MASTER={0x4}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x4000004) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000e40), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001080)={&(0x7f0000000000)={0x6c, r4, 0x1, 0x0, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @loopback}}, {0x20, 0x2, @in6={0xa, 0x0, 0x1, @remote}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x6c}}, 0x0) 200.199344ms ago: executing program 0 (id=816): futex(0x0, 0x5, 0x1, 0x0, 0x0, 0x2000000) 128.941849ms ago: executing program 0 (id=817): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000600)='hybla', 0x5) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xb, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0xc9100120, 0x0, 0xfffffffffffffd25) 127.646452ms ago: executing program 0 (id=818): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r2 = socket(0x400000000010, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x2c, 0x24, 0x4ee4e6a52ff56541, 0x1070bd26, 0xffffffff, {0x0, 0x0, 0x0, 0x0, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_qfg={0x8}]}, 0x2c}}, 0x20048884) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=@newqdisc={0x34, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdfc, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}, {0x2, 0x1}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x400dc}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000027c0)=@newtfilter={0x40, 0x2c, 0xd27, 0x30bd29, 0x25dfdc00, {0x0, 0x0, 0x0, r4, {0x0, 0x4}, {}, {0x8}}, [@filter_kind_options=@f_matchall={{0xd}, {0xc, 0x2, [@TCA_MATCHALL_CLASSID={0x8, 0x1, {0xc, 0x4}}]}}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r8) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r9 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000001700)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x27}}, 0x10, 0x0, 0x0, &(0x7f0000001900)=ANY=[@ANYBLOB="140000000000000000000000010000000e000000000000001400000000000000000000000100000007000000000000002400000000000000000000000700000094040000820d212aab96bad6cdf92da325000000000000001c000000000000000000000008000000", @ANYRES32, @ANYBLOB="ac1414366401010100000000600000000000000010000000070000000144207d40000000090000069f000000060001000000000a76000000090000000701862a00000002070e301517f337fc5724b0f4b19f0210c22ab262618268e7b39eceaeaa720106fe8b1561940400001c000000000000000000000008000000", @ANYRES32, @ANYBLOB="ffffffff00000000000000001100000000000000290000000100000000000000000000001c000000000000000000000008000000", @ANYRES32, @ANYBLOB="0a010102ac1414aa000000001400000000000000010000000100000001000000000000001c000000000000000000000008000000", @ANYRES32=r10], 0x168}}], 0x1, 0x8000004) 440.545µs ago: executing program 0 (id=819): syz_emit_ethernet(0x46, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffffffffffffffff86dd6060626000102c00fe8000000000000000000000000000bbfe8000000000000000000000000000aa11000001"], 0x0) syz_emit_ethernet(0x52, &(0x7f00000007c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd608a27f2000f2c00fe8000000000000000000000000000bbfe8000000000000000000000000000aa0000000e"], 0x0) 173.02µs ago: executing program 0 (id=820): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000016c0)="5c00000013006bcc9e3be35c6e17aa31076b876c1d0000007ea600000000f36514001ac0040005000a00010004000200ea0400a705251e618294ff0051f60a84c9f4d49380", 0x45}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x300) 0s ago: executing program 0 (id=821): r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x1, @dev={0xfe, 0x80, '\x00', 0x39}, 0x3e}, 0x1c) recvmmsg(r0, &(0x7f0000000080)=[{{0x0, 0x0, &(0x7f0000000740)=[{0x0}], 0x1}, 0x102}, {{0x0, 0x0, 0x0}, 0x3}], 0x2, 0x82, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:18854' (ED25519) to the list of known hosts. [ 47.432310][ T41] audit: type=1400 audit(1771264717.802:62): avc: denied { name_bind } for pid=5911 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 47.462810][ T41] audit: type=1400 audit(1771264717.832:63): avc: denied { execute } for pid=5912 comm="sh" name="syz-executor" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 47.471943][ T41] audit: type=1400 audit(1771264717.832:64): avc: denied { execute_no_trans } for pid=5912 comm="sh" path="/syz-executor" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 49.671974][ T41] audit: type=1400 audit(1771264720.042:65): avc: denied { mounton } for pid=5912 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 49.679987][ T41] audit: type=1400 audit(1771264720.042:66): avc: denied { mount } for pid=5912 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 49.682061][ T5912] cgroup: Unknown subsys name 'net' [ 49.854301][ T5912] cgroup: Unknown subsys name 'cpuset' [ 49.858957][ T5912] cgroup: Unknown subsys name 'rlimit' [ 50.069577][ T5915] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 50.737055][ T5912] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 53.801946][ T41] kauditd_printk_skb: 15 callbacks suppressed [ 53.801957][ T41] audit: type=1400 audit(1771264724.172:82): avc: denied { execmem } for pid=5920 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 53.971201][ T41] audit: type=1400 audit(1771264724.332:83): avc: denied { create } for pid=5925 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 53.979215][ T41] audit: type=1400 audit(1771264724.332:84): avc: denied { read write } for pid=5925 comm="syz-executor" name="vhci" dev="devtmpfs" ino=1291 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 53.985774][ T5930] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 53.987450][ T41] audit: type=1400 audit(1771264724.332:85): avc: denied { read write } for pid=5926 comm="syz-executor" name="vhci" dev="devtmpfs" ino=1291 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 53.989510][ T5930] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 53.996558][ T41] audit: type=1400 audit(1771264724.332:86): avc: denied { open } for pid=5925 comm="syz-executor" path="/dev/vhci" dev="devtmpfs" ino=1291 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 54.006429][ T41] audit: type=1400 audit(1771264724.342:87): avc: denied { ioctl } for pid=5926 comm="syz-executor" path="socket:[2860]" dev="sockfs" ino=2860 ioctlcmd=0x48c9 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 54.012522][ T5932] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 54.017209][ T5932] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 54.018161][ T5939] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 54.019850][ T5932] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 54.020401][ T5940] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 54.021328][ T5941] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 54.022887][ T5941] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 54.024026][ T5939] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 54.024775][ T5932] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 54.025010][ T5932] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 54.027434][ T5941] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 54.029982][ T5286] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 54.033183][ T5941] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 54.037411][ T41] audit: type=1400 audit(1771264724.402:88): avc: denied { read } for pid=5925 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 54.038000][ T5941] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 54.040026][ T41] audit: type=1400 audit(1771264724.402:89): avc: denied { open } for pid=5925 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 54.042147][ T5286] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 54.042958][ T5286] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 54.044250][ T5941] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 54.045358][ T41] audit: type=1400 audit(1771264724.402:90): avc: denied { mounton } for pid=5925 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 54.058113][ T5930] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 54.284889][ T41] audit: type=1400 audit(1771264724.652:91): avc: denied { module_request } for pid=5924 comm="syz-executor" kmod="rtnl-link-nicvf" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 54.316224][ T5924] chnl_net:caif_netlink_parms(): no params data found [ 54.336927][ T5925] chnl_net:caif_netlink_parms(): no params data found [ 54.375979][ T5927] chnl_net:caif_netlink_parms(): no params data found [ 54.381360][ T5926] chnl_net:caif_netlink_parms(): no params data found [ 54.496879][ T5924] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.499801][ T5924] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.502914][ T5924] bridge_slave_0: entered allmulticast mode [ 54.505854][ T5924] bridge_slave_0: entered promiscuous mode [ 54.515840][ T5924] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.518714][ T5924] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.521019][ T5924] bridge_slave_1: entered allmulticast mode [ 54.524192][ T5924] bridge_slave_1: entered promiscuous mode [ 54.551446][ T5925] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.554535][ T5925] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.557630][ T5925] bridge_slave_0: entered allmulticast mode [ 54.561565][ T5925] bridge_slave_0: entered promiscuous mode [ 54.564737][ T5925] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.566987][ T5925] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.569325][ T5925] bridge_slave_1: entered allmulticast mode [ 54.572555][ T5925] bridge_slave_1: entered promiscuous mode [ 54.597069][ T5924] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 54.624385][ T5924] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 54.639073][ T5925] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 54.642096][ T5927] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.644520][ T5927] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.646904][ T5927] bridge_slave_0: entered allmulticast mode [ 54.649669][ T5927] bridge_slave_0: entered promiscuous mode [ 54.653663][ T5927] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.655999][ T5927] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.658298][ T5927] bridge_slave_1: entered allmulticast mode [ 54.660883][ T5927] bridge_slave_1: entered promiscuous mode [ 54.674482][ T5926] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.677459][ T5926] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.679940][ T5926] bridge_slave_0: entered allmulticast mode [ 54.682964][ T5926] bridge_slave_0: entered promiscuous mode [ 54.686832][ T5925] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 54.702058][ T5924] team0: Port device team_slave_0 added [ 54.704200][ T5926] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.706504][ T5926] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.708784][ T5926] bridge_slave_1: entered allmulticast mode [ 54.711679][ T5926] bridge_slave_1: entered promiscuous mode [ 54.733262][ T5924] team0: Port device team_slave_1 added [ 54.748100][ T5926] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 54.752021][ T5925] team0: Port device team_slave_0 added [ 54.755057][ T5927] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 54.765152][ T5926] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 54.769156][ T5925] team0: Port device team_slave_1 added [ 54.772318][ T5927] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 54.775833][ T5924] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 54.778121][ T5924] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 54.786363][ T5924] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 54.817715][ T5925] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 54.819915][ T5925] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 54.828245][ T5925] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 54.832332][ T5924] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 54.834590][ T5924] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 54.843013][ T5924] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 54.847606][ T5926] team0: Port device team_slave_0 added [ 54.856543][ T5926] team0: Port device team_slave_1 added [ 54.858722][ T5925] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 54.860952][ T5925] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 54.869071][ T5925] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 54.885981][ T5927] team0: Port device team_slave_0 added [ 54.905603][ T5924] hsr_slave_0: entered promiscuous mode [ 54.908003][ T5924] hsr_slave_1: entered promiscuous mode [ 54.912575][ T5927] team0: Port device team_slave_1 added [ 54.938166][ T5926] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 54.940412][ T5926] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 54.948597][ T5926] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 54.952976][ T5926] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 54.955217][ T5926] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 54.963396][ T5926] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 54.973355][ T5927] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 54.975873][ T5927] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 54.984299][ T5927] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 55.003263][ T5927] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 55.005622][ T5927] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 55.013911][ T5927] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 55.031106][ T5925] hsr_slave_0: entered promiscuous mode [ 55.034058][ T5925] hsr_slave_1: entered promiscuous mode [ 55.036662][ T5925] debugfs: 'hsr0' already exists in 'hsr' [ 55.038564][ T5925] Cannot create hsr debugfs directory [ 55.085436][ T5926] hsr_slave_0: entered promiscuous mode [ 55.087686][ T5926] hsr_slave_1: entered promiscuous mode [ 55.089776][ T5926] debugfs: 'hsr0' already exists in 'hsr' [ 55.091770][ T5926] Cannot create hsr debugfs directory [ 55.102679][ T5927] hsr_slave_0: entered promiscuous mode [ 55.105045][ T5927] hsr_slave_1: entered promiscuous mode [ 55.107220][ T5927] debugfs: 'hsr0' already exists in 'hsr' [ 55.109028][ T5927] Cannot create hsr debugfs directory [ 55.334621][ T5924] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 55.341448][ T5924] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 55.345884][ T5924] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 55.355978][ T5924] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 55.396370][ T5925] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 55.403485][ T5925] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 55.407588][ T5925] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 55.412701][ T5925] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 55.469980][ T5926] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 55.482178][ T5926] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 55.487225][ T5926] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 55.492075][ T5926] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 55.555307][ T5927] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 55.559553][ T5927] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 55.564586][ T5927] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 55.568721][ T5927] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 55.577496][ T5924] 8021q: adding VLAN 0 to HW filter on device bond0 [ 55.610417][ T5924] 8021q: adding VLAN 0 to HW filter on device team0 [ 55.624535][ T167] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.627767][ T167] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.639345][ T47] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.642516][ T47] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.655795][ T5925] 8021q: adding VLAN 0 to HW filter on device bond0 [ 55.676968][ T5925] 8021q: adding VLAN 0 to HW filter on device team0 [ 55.690679][ T167] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.693037][ T167] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.713121][ T5926] 8021q: adding VLAN 0 to HW filter on device bond0 [ 55.723559][ T167] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.725908][ T167] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.794683][ T5926] 8021q: adding VLAN 0 to HW filter on device team0 [ 55.809784][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.812132][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.819427][ T47] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.822540][ T47] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.846771][ T5927] 8021q: adding VLAN 0 to HW filter on device bond0 [ 55.885735][ T5924] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 55.890526][ T5927] 8021q: adding VLAN 0 to HW filter on device team0 [ 55.905832][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.908782][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.926264][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.928598][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.937661][ T5925] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 55.990409][ T5924] veth0_vlan: entered promiscuous mode [ 56.011765][ T5924] veth1_vlan: entered promiscuous mode [ 56.018386][ T5925] veth0_vlan: entered promiscuous mode [ 56.035784][ T5926] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 56.056167][ T5925] veth1_vlan: entered promiscuous mode [ 56.072592][ T5930] Bluetooth: hci2: command tx timeout [ 56.072953][ T63] Bluetooth: hci3: command tx timeout [ 56.073190][ T5941] Bluetooth: hci1: command tx timeout [ 56.087798][ T5924] veth0_macvtap: entered promiscuous mode [ 56.098963][ T5924] veth1_macvtap: entered promiscuous mode [ 56.108384][ T5927] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 56.121061][ T5925] veth0_macvtap: entered promiscuous mode [ 56.127070][ T5926] veth0_vlan: entered promiscuous mode [ 56.132399][ T5924] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 56.142331][ T5925] veth1_macvtap: entered promiscuous mode [ 56.146069][ T5924] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 56.150579][ T5926] veth1_vlan: entered promiscuous mode [ 56.161698][ T63] Bluetooth: hci0: command tx timeout [ 56.161921][ T12] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.184255][ T12] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.187832][ T12] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.194084][ T5927] veth0_vlan: entered promiscuous mode [ 56.198839][ T12] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.207557][ T5925] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 56.213963][ T5925] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 56.224210][ T5926] veth0_macvtap: entered promiscuous mode [ 56.232287][ T5927] veth1_vlan: entered promiscuous mode [ 56.243807][ T5926] veth1_macvtap: entered promiscuous mode [ 56.251681][ T12] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.264972][ T12] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.268737][ T12] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.280693][ T12] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.281591][ T1158] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 56.286719][ T1158] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 56.313266][ T12] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 56.316538][ T12] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 56.323423][ T5926] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 56.326729][ T5927] veth0_macvtap: entered promiscuous mode [ 56.343338][ T5926] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 56.349171][ T5927] veth1_macvtap: entered promiscuous mode [ 56.368834][ T1158] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.370488][ T5924] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 56.372982][ T1158] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.378973][ T1158] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.387189][ T5927] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 56.392058][ T5927] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 56.402181][ T1158] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.414169][ T60] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.422229][ T60] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.422911][ T1158] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 56.425150][ T60] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.428779][ T1158] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 56.439369][ T60] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.468801][ T60] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 56.483225][ T60] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 56.509591][ T6011] syzkaller0: entered promiscuous mode [ 56.511462][ T6011] syzkaller0: entered allmulticast mode [ 56.530588][ T167] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 56.533684][ T167] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 56.782725][ T40] usb 7-1: new high-speed USB device number 2 using dummy_hcd [ 56.941444][ T40] usb 7-1: Using ep0 maxpacket: 32 [ 56.952027][ T40] usb 7-1: config 0 interface 0 altsetting 0 bulk endpoint 0x85 has invalid maxpacket 1024 [ 56.958380][ T40] usb 7-1: New USB device found, idVendor=12d8, idProduct=0001, bcdDevice=de.79 [ 56.962146][ T40] usb 7-1: New USB device strings: Mfr=1, Product=236, SerialNumber=2 [ 56.965039][ T40] usb 7-1: Product: syz [ 56.966425][ T40] usb 7-1: Manufacturer: syz [ 56.968043][ T40] usb 7-1: SerialNumber: syz [ 56.986417][ T40] usb 7-1: config 0 descriptor?? [ 56.998399][ T6014] raw-gadget.0 gadget.2: fail, usb_ep_enable returned -22 [ 57.150958][ T47] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 57.154181][ T47] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 57.170530][ T13] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 57.173835][ T13] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 57.186387][ T60] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 57.188998][ T60] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 57.257987][ T40] usb 7-1: USB disconnect, device number 2 [ 57.302246][ T6020] syzkaller0: entered promiscuous mode [ 57.304061][ T6020] syzkaller0: entered allmulticast mode [ 57.440289][ T6035] syzkaller0: entered promiscuous mode [ 57.444235][ T6035] syzkaller0: entered allmulticast mode [ 57.828965][ T6041] xt_cgroup: invalid path, errno=-2 [ 58.083092][ T6047] syzkaller0: entered promiscuous mode [ 58.084905][ T6047] syzkaller0: entered allmulticast mode [ 58.151549][ T63] Bluetooth: hci3: command tx timeout [ 58.152080][ T5941] Bluetooth: hci2: command tx timeout [ 58.155898][ T5930] Bluetooth: hci1: command tx timeout [ 58.211609][ T6055] netlink: 'syz.3.19': attribute type 29 has an invalid length. [ 58.223683][ T6055] netlink: 'syz.3.19': attribute type 29 has an invalid length. [ 58.232196][ T5930] Bluetooth: hci0: command tx timeout [ 58.271408][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 58.328009][ T6064] syzkaller0: entered promiscuous mode [ 58.329752][ T6064] syzkaller0: entered allmulticast mode [ 58.818458][ T41] kauditd_printk_skb: 102 callbacks suppressed [ 58.818475][ T41] audit: type=1400 audit(1771264729.182:194): avc: denied { module_request } for pid=6077 comm="syz.3.30" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 58.830672][ T41] audit: type=1400 audit(1771264729.182:195): avc: denied { sys_module } for pid=6077 comm="syz.3.30" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 58.840030][ T41] audit: type=1400 audit(1771264729.192:196): avc: denied { read write } for pid=5924 comm="syz-executor" name="loop3" dev="devtmpfs" ino=661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 58.854249][ T41] audit: type=1400 audit(1771264729.222:197): avc: denied { read write } for pid=6079 comm="syz.3.31" name="fuse" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 58.863977][ T41] audit: type=1400 audit(1771264729.222:198): avc: denied { mounton } for pid=6079 comm="syz.3.31" path="/13/file0" dev="tmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 58.874920][ T41] audit: type=1400 audit(1771264729.232:199): avc: denied { read write } for pid=5924 comm="syz-executor" name="loop3" dev="devtmpfs" ino=661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 58.938388][ T41] audit: type=1400 audit(1771264729.302:200): avc: denied { module_request } for pid=6081 comm="syz.3.32" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 58.945295][ T41] audit: type=1400 audit(1771264729.302:201): avc: denied { sys_module } for pid=6081 comm="syz.3.32" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 58.952569][ T41] audit: type=1400 audit(1771264729.302:202): avc: denied { module_request } for pid=6081 comm="syz.3.32" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 58.959471][ T41] audit: type=1400 audit(1771264729.302:203): avc: denied { sys_module } for pid=6081 comm="syz.3.32" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 59.433747][ T6100] syz.0.39 uses obsolete (PF_INET,SOCK_PACKET) [ 59.591972][ T6104] syzkaller0: entered promiscuous mode [ 59.594197][ T6104] syzkaller0: entered allmulticast mode [ 59.873756][ T6117] syzkaller0: entered promiscuous mode [ 59.875828][ T6117] syzkaller0: entered allmulticast mode [ 60.231748][ T5941] Bluetooth: hci1: command tx timeout [ 60.231840][ T63] Bluetooth: hci3: command tx timeout [ 60.243036][ T63] Bluetooth: hci2: command tx timeout [ 60.311189][ T63] Bluetooth: hci0: command tx timeout [ 60.526427][ T6125] syzkaller0: entered promiscuous mode [ 60.530063][ T6125] syzkaller0: entered allmulticast mode [ 60.706286][ T6144] ptrace attach of "/syz-executor exec"[5924] was attempted by ""[6144] [ 60.731333][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 60.930912][ T6152] syzkaller0: entered promiscuous mode [ 60.933685][ T6152] syzkaller0: entered allmulticast mode [ 61.173343][ T0] NOHZ tick-stop error: local softirq work is pending, handler #40!!! [ 61.548123][ T6163] syzkaller0: entered promiscuous mode [ 61.549943][ T6163] syzkaller0: entered allmulticast mode [ 61.558413][ T6165] syzkaller0: entered promiscuous mode [ 61.560199][ T6165] syzkaller0: entered allmulticast mode [ 61.755480][ T6182] netlink: 12 bytes leftover after parsing attributes in process `syz.3.72'. [ 62.004176][ T6196] syzkaller0: entered promiscuous mode [ 62.006002][ T6196] syzkaller0: entered allmulticast mode [ 62.311249][ T63] Bluetooth: hci1: command tx timeout [ 62.321320][ T5930] Bluetooth: hci3: command tx timeout [ 62.323518][ T63] Bluetooth: hci2: command tx timeout [ 62.391324][ T5930] Bluetooth: hci0: command tx timeout [ 62.647339][ T6220] netlink: 12 bytes leftover after parsing attributes in process `syz.3.88'. [ 62.851874][ T0] NOHZ tick-stop error: local softirq work is pending, handler #208!!! [ 63.221479][ T0] NOHZ tick-stop error: local softirq work is pending, handler #c0!!! [ 63.231331][ T0] NOHZ tick-stop error: local softirq work is pending, handler #282!!! [ 63.307797][ T6239] syzkaller0: entered promiscuous mode [ 63.309719][ T6239] syzkaller0: entered allmulticast mode [ 63.861199][ T41] kauditd_printk_skb: 204 callbacks suppressed [ 63.861212][ T41] audit: type=1400 audit(1771264734.222:408): avc: denied { read write } for pid=5925 comm="syz-executor" name="loop2" dev="devtmpfs" ino=660 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 63.975442][ T6254] syzkaller0: entered promiscuous mode [ 63.977268][ T6254] syzkaller0: entered allmulticast mode [ 63.990911][ T6258] syzkaller0: entered promiscuous mode [ 63.993775][ T6258] syzkaller0: entered allmulticast mode [ 64.052596][ T41] audit: type=1400 audit(1771264734.422:409): avc: denied { read write } for pid=5924 comm="syz-executor" name="loop3" dev="devtmpfs" ino=661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 64.072937][ T41] audit: type=1400 audit(1771264734.442:410): avc: denied { create } for pid=6260 comm="syz.3.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 64.079340][ T41] audit: type=1400 audit(1771264734.442:411): avc: denied { read } for pid=6260 comm="syz.3.102" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 64.096080][ T41] audit: type=1400 audit(1771264734.462:412): avc: denied { read write } for pid=5925 comm="syz-executor" name="loop2" dev="devtmpfs" ino=660 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 64.105871][ T41] audit: type=1400 audit(1771264734.462:413): avc: denied { read write } for pid=5926 comm="syz-executor" name="loop1" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 64.116877][ T41] audit: type=1400 audit(1771264734.482:414): avc: denied { read write } for pid=6262 comm="syz.1.103" name="vhost-vsock" dev="devtmpfs" ino=1301 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=0 [ 64.126700][ T41] audit: type=1400 audit(1771264734.482:415): avc: denied { execmem } for pid=6262 comm="syz.1.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 64.134000][ T41] audit: type=1400 audit(1771264734.502:416): avc: denied { read write } for pid=5926 comm="syz-executor" name="loop1" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 64.143595][ T41] audit: type=1400 audit(1771264734.502:417): avc: denied { read write } for pid=5925 comm="syz-executor" name="loop2" dev="devtmpfs" ino=660 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 64.208855][ T6277] netlink: 12 bytes leftover after parsing attributes in process `syz.2.110'. [ 64.637954][ T6281] syzkaller0: entered promiscuous mode [ 64.639857][ T6281] syzkaller0: entered allmulticast mode [ 64.748020][ T6283] syzkaller0: entered promiscuous mode [ 64.750310][ T6283] syzkaller0: entered allmulticast mode [ 64.883296][ T6305] syzkaller0: entered promiscuous mode [ 64.885103][ T6305] syzkaller0: entered allmulticast mode [ 65.095252][ T6314] netlink: 12 bytes leftover after parsing attributes in process `syz.1.127'. [ 65.792552][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 65.981599][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 66.003371][ T6339] netlink: 12 bytes leftover after parsing attributes in process `syz.0.138'. [ 66.262871][ T6341] syzkaller0: entered promiscuous mode [ 66.264752][ T6341] syzkaller0: entered allmulticast mode [ 66.403169][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 66.421659][ T0] NOHZ tick-stop error: local softirq work is pending, handler #208!!! [ 66.727388][ T6364] syzkaller0: entered promiscuous mode [ 66.729170][ T6364] syzkaller0: entered allmulticast mode [ 67.440235][ T6394] syzkaller0: entered promiscuous mode [ 67.443213][ T6394] syzkaller0: entered allmulticast mode [ 67.604147][ T6400] netlink: 'syz.3.169': attribute type 1 has an invalid length. [ 67.792161][ T6413] syzkaller0: entered promiscuous mode [ 67.793957][ T6413] syzkaller0: entered allmulticast mode [ 68.587856][ T6475] Zero length message leads to an empty skb [ 68.616438][ T6475] syzkaller0: entered promiscuous mode [ 68.618278][ T6475] syzkaller0: entered allmulticast mode [ 69.167728][ T41] kauditd_printk_skb: 251 callbacks suppressed [ 69.167739][ T41] audit: type=1400 audit(1771264739.532:669): avc: denied { read write } for pid=5926 comm="syz-executor" name="loop1" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 69.271936][ T41] audit: type=1400 audit(1771264739.642:670): avc: denied { module_request } for pid=6487 comm="syz.1.206" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 69.283710][ T41] audit: type=1400 audit(1771264739.642:671): avc: denied { sys_module } for pid=6487 comm="syz.1.206" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 69.297380][ T41] audit: type=1400 audit(1771264739.642:672): avc: denied { module_request } for pid=6487 comm="syz.1.206" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 69.308556][ T41] audit: type=1400 audit(1771264739.642:673): avc: denied { sys_module } for pid=6487 comm="syz.1.206" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 69.454228][ T41] audit: type=1400 audit(1771264739.822:674): avc: denied { module_request } for pid=6487 comm="syz.1.206" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 69.471728][ T41] audit: type=1400 audit(1771264739.822:675): avc: denied { sys_module } for pid=6487 comm="syz.1.206" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 69.663545][ T6477] syz.0.202 (6477): drop_caches: 2 [ 69.706102][ T41] audit: type=1400 audit(1771264740.072:676): avc: denied { read write } for pid=5927 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 69.727889][ T41] audit: type=1400 audit(1771264740.092:677): avc: denied { read } for pid=6493 comm="syz.0.207" name="dlm_plock" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 69.757541][ T41] audit: type=1400 audit(1771264740.122:678): avc: denied { read write } for pid=5927 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 70.709300][ T6530] syzkaller0: entered promiscuous mode [ 70.711096][ T6530] syzkaller0: entered allmulticast mode [ 71.920750][ T6583] syzkaller0: entered promiscuous mode [ 71.923406][ T6583] syzkaller0: entered allmulticast mode [ 72.910433][ T6624] syzkaller0: entered promiscuous mode [ 72.913503][ T6624] syzkaller0: entered allmulticast mode [ 74.211651][ T41] kauditd_printk_skb: 212 callbacks suppressed [ 74.211664][ T41] audit: type=1400 audit(1771264744.582:891): avc: denied { allowed } for pid=6661 comm="syz.0.278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 74.230675][ T41] audit: type=1400 audit(1771264744.592:892): avc: denied { read write } for pid=5926 comm="syz-executor" name="loop1" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 74.255173][ T41] audit: type=1400 audit(1771264744.622:893): avc: denied { read write } for pid=5925 comm="syz-executor" name="loop2" dev="devtmpfs" ino=660 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 74.263431][ T41] audit: type=1400 audit(1771264744.632:894): avc: denied { read write } for pid=5927 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 74.276736][ T41] audit: type=1400 audit(1771264744.642:895): avc: denied { create } for pid=6673 comm="syz.1.283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 74.285713][ T41] audit: type=1400 audit(1771264744.642:896): avc: denied { prog_load } for pid=6673 comm="syz.1.283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 74.293060][ T41] audit: type=1400 audit(1771264744.642:897): avc: denied { read } for pid=6675 comm="syz.2.284" dev="nsfs" ino=4026532891 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 74.300527][ T41] audit: type=1400 audit(1771264744.662:898): avc: denied { create } for pid=6675 comm="syz.2.284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 74.315829][ T41] audit: type=1400 audit(1771264744.682:899): avc: denied { read } for pid=6675 comm="syz.2.284" name="video7" dev="devtmpfs" ino=974 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 [ 74.334433][ T41] audit: type=1400 audit(1771264744.702:900): avc: denied { read write } for pid=5925 comm="syz-executor" name="loop2" dev="devtmpfs" ino=660 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 74.455500][ T6686] netlink: 'syz.1.289': attribute type 13 has an invalid length. [ 74.512221][ T6688] syzkaller0: entered promiscuous mode [ 74.514100][ T6688] syzkaller0: entered allmulticast mode [ 74.983463][ T6714] syzkaller0: entered promiscuous mode [ 74.985312][ T6714] syzkaller0: entered allmulticast mode [ 75.168786][ T6719] syzkaller0: entered promiscuous mode [ 75.170598][ T6719] syzkaller0: entered allmulticast mode [ 76.234445][ T1418] ieee802154 phy0 wpan0: encryption failed: -22 [ 76.237107][ T1418] ieee802154 phy1 wpan1: encryption failed: -22 [ 77.779917][ T6819] syzkaller0: entered promiscuous mode [ 77.789925][ T6819] syzkaller0: entered allmulticast mode [ 78.958262][ T6860] syzkaller0: entered promiscuous mode [ 78.960067][ T6860] syzkaller0: entered allmulticast mode [ 79.102434][ T6867] syzkaller0: entered promiscuous mode [ 79.104291][ T6867] syzkaller0: entered allmulticast mode [ 79.243761][ T41] kauditd_printk_skb: 230 callbacks suppressed [ 79.243776][ T41] audit: type=1400 audit(1771264749.612:1131): avc: denied { execmem } for pid=6868 comm="syz.3.369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 79.272131][ T41] audit: type=1400 audit(1771264749.642:1132): avc: denied { read } for pid=6868 comm="syz.3.369" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 79.364656][ T41] audit: type=1400 audit(1771264749.732:1133): avc: denied { read write } for pid=5924 comm="syz-executor" name="loop3" dev="devtmpfs" ino=661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 79.444601][ T41] audit: type=1400 audit(1771264749.812:1134): avc: denied { read } for pid=6871 comm="syz.3.370" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 79.454711][ T41] audit: type=1400 audit(1771264749.822:1135): avc: denied { create } for pid=6871 comm="syz.3.370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 79.466909][ T41] audit: type=1400 audit(1771264749.832:1136): avc: denied { create } for pid=6871 comm="syz.3.370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 79.475932][ T41] audit: type=1400 audit(1771264749.842:1137): avc: denied { create } for pid=6871 comm="syz.3.370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 79.492827][ T41] audit: type=1400 audit(1771264749.862:1138): avc: denied { create } for pid=6871 comm="syz.3.370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 79.510930][ T41] audit: type=1400 audit(1771264749.872:1139): avc: denied { create } for pid=6871 comm="syz.3.370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 79.522127][ T41] audit: type=1400 audit(1771264749.892:1140): avc: denied { read write } for pid=5926 comm="syz-executor" name="loop1" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.407227][ T6906] syzkaller0: entered promiscuous mode [ 80.409018][ T6906] syzkaller0: entered allmulticast mode [ 81.192055][ T5930] Bluetooth: hci1: Controller not accepting commands anymore: ncmd = 0 [ 81.194846][ T5930] Bluetooth: hci1: Injecting HCI hardware error event [ 81.197942][ T5930] Bluetooth: hci1: hardware error 0x00 [ 81.316089][ T6929] syzkaller0: entered promiscuous mode [ 81.317962][ T6929] syzkaller0: entered allmulticast mode [ 82.313424][ T6952] syzkaller0: entered promiscuous mode [ 82.315285][ T6952] syzkaller0: entered allmulticast mode [ 82.912690][ T6977] syzkaller0: entered promiscuous mode [ 82.914624][ T6977] syzkaller0: entered allmulticast mode [ 83.033023][ T6983] netlink: 17 bytes leftover after parsing attributes in process `syz.2.420'. [ 83.035912][ T6983] netlink: 17 bytes leftover after parsing attributes in process `syz.2.420'. [ 83.156697][ T6996] IPv6: NLM_F_CREATE should be specified when creating new route [ 83.229786][ T7001] syzkaller0: entered promiscuous mode [ 83.233169][ T7001] syzkaller0: entered allmulticast mode [ 83.255865][ T7003] syzkaller0: entered promiscuous mode [ 83.257730][ T7003] syzkaller0: entered allmulticast mode [ 83.274168][ T5930] Bluetooth: hci1: Opcode 0x0c03 failed: -110 [ 83.758301][ T7023] syzkaller0: entered promiscuous mode [ 83.760469][ T7023] syzkaller0: entered allmulticast mode [ 83.888976][ T7027] syzkaller0: entered promiscuous mode [ 83.890965][ T7027] syzkaller0: entered allmulticast mode [ 84.267616][ T41] kauditd_printk_skb: 202 callbacks suppressed [ 84.267627][ T41] audit: type=1400 audit(1771264754.632:1343): avc: denied { read write } for pid=5925 comm="syz-executor" name="loop2" dev="devtmpfs" ino=660 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 84.303028][ T41] audit: type=1400 audit(1771264754.672:1344): avc: denied { read write } for pid=7039 comm="syz.2.446" name="nullb0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 84.313677][ T41] audit: type=1400 audit(1771264754.672:1345): avc: denied { allowed } for pid=7039 comm="syz.2.446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 84.322217][ T41] audit: type=1400 audit(1771264754.672:1346): avc: denied { execmem } for pid=7039 comm="syz.2.446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 84.330491][ T41] audit: type=1400 audit(1771264754.682:1347): avc: denied { read write } for pid=5926 comm="syz-executor" name="loop1" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 84.341214][ T41] audit: type=1400 audit(1771264754.682:1348): avc: denied { read write } for pid=5925 comm="syz-executor" name="loop2" dev="devtmpfs" ino=660 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 84.354552][ T41] audit: type=1400 audit(1771264754.692:1349): avc: denied { read write } for pid=7041 comm="syz.1.447" name="vbi6" dev="devtmpfs" ino=1016 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 [ 84.363111][ T41] audit: type=1400 audit(1771264754.692:1350): avc: denied { create } for pid=7041 comm="syz.1.447" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 84.370994][ T41] audit: type=1400 audit(1771264754.692:1351): avc: denied { read } for pid=7041 comm="syz.1.447" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 84.378422][ T41] audit: type=1400 audit(1771264754.712:1352): avc: denied { read write } for pid=5926 comm="syz-executor" name="loop1" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 84.389498][ T7048] syzkaller0: entered promiscuous mode [ 84.394028][ T7048] syzkaller0: entered allmulticast mode [ 84.484885][ T7057] serio: Serial port ptm0 [ 84.522357][ T7060] syzkaller0: entered promiscuous mode [ 84.524192][ T7060] syzkaller0: entered allmulticast mode [ 84.542707][ T7057] mmap: syz.2.454 (7057) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 84.826200][ T7078] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 84.872312][ T7080] syzkaller0: entered promiscuous mode [ 84.874440][ T7080] syzkaller0: entered allmulticast mode [ 85.246671][ T7095] syzkaller0: entered promiscuous mode [ 85.248948][ T7095] syzkaller0: entered allmulticast mode [ 85.343423][ T7100] syzkaller0: entered promiscuous mode [ 85.345337][ T7100] syzkaller0: entered allmulticast mode [ 85.717590][ T7118] syzkaller0: entered promiscuous mode [ 85.719449][ T7118] syzkaller0: entered allmulticast mode [ 85.738546][ T7120] syzkaller0: entered promiscuous mode [ 85.740336][ T7120] syzkaller0: entered allmulticast mode [ 85.877785][ T7126] netdevsim netdevsim2: loading /lib/firmware/. failed with error -22 [ 85.880609][ T7126] netdevsim netdevsim2: Direct firmware load for . failed with error -22 [ 86.180638][ T7142] syzkaller0: entered promiscuous mode [ 86.182539][ T7142] syzkaller0: entered allmulticast mode [ 86.288179][ T7145] syzkaller0: entered promiscuous mode [ 86.290589][ T7145] syzkaller0: entered allmulticast mode [ 86.482907][ T29] cfg80211: failed to load regulatory.db [ 86.828427][ T7162] syzkaller0: entered promiscuous mode [ 86.830519][ T7162] syzkaller0: entered allmulticast mode [ 86.929173][ T7164] syzkaller0: entered promiscuous mode [ 86.931051][ T7164] syzkaller0: entered allmulticast mode [ 87.598836][ T7185] syzkaller0: entered promiscuous mode [ 87.600449][ T7185] syzkaller0: entered allmulticast mode [ 87.743902][ T7187] syzkaller0: entered promiscuous mode [ 87.745582][ T7187] syzkaller0: entered allmulticast mode [ 87.902495][ T7191] syzkaller0: entered promiscuous mode [ 87.904940][ T7191] syzkaller0: entered allmulticast mode [ 88.273188][ T7212] syzkaller0: entered promiscuous mode [ 88.275229][ T7212] syzkaller0: entered allmulticast mode [ 89.288475][ T41] kauditd_printk_skb: 256 callbacks suppressed [ 89.288487][ T41] audit: type=1400 audit(1771264759.652:1609): avc: denied { read write } for pid=5924 comm="syz-executor" name="loop3" dev="devtmpfs" ino=661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 89.301508][ T41] audit: type=1400 audit(1771264759.652:1610): avc: denied { prog_load } for pid=7227 comm="syz.1.529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 89.309832][ T41] audit: type=1400 audit(1771264759.662:1611): avc: denied { read write } for pid=5927 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 89.320765][ T41] audit: type=1400 audit(1771264759.682:1612): avc: denied { execmem } for pid=7233 comm="syz.0.530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 89.347758][ T41] audit: type=1400 audit(1771264759.712:1613): avc: denied { read } for pid=7233 comm="syz.0.530" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 89.358952][ T7236] syzkaller0: entered promiscuous mode [ 89.359187][ T41] audit: type=1400 audit(1771264759.722:1614): avc: denied { create } for pid=7233 comm="syz.0.530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 89.367098][ T7236] syzkaller0: entered allmulticast mode [ 89.391846][ T41] audit: type=1400 audit(1771264759.752:1615): avc: denied { read write } for pid=5927 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 89.436602][ T41] audit: type=1400 audit(1771264759.802:1616): avc: denied { read } for pid=7238 comm="syz.0.533" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 89.496126][ T41] audit: type=1400 audit(1771264759.862:1617): avc: denied { read write } for pid=5927 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 89.551073][ T41] audit: type=1400 audit(1771264759.912:1618): avc: denied { read write } for pid=5924 comm="syz-executor" name="loop3" dev="devtmpfs" ino=661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 89.709971][ T7254] syzkaller0: entered promiscuous mode [ 89.711898][ T7254] syzkaller0: entered allmulticast mode [ 90.581910][ T7276] syzkaller0: entered promiscuous mode [ 90.584029][ T7276] syzkaller0: entered allmulticast mode [ 90.985500][ T7304] capability: warning: `syz.0.561' uses 32-bit capabilities (legacy support in use) [ 92.829657][ T7361] syzkaller0: entered promiscuous mode [ 92.831492][ T7361] syzkaller0: entered allmulticast mode [ 93.243205][ T7383] syzkaller0: entered promiscuous mode [ 93.244997][ T7383] syzkaller0: entered allmulticast mode [ 94.298203][ T41] kauditd_printk_skb: 258 callbacks suppressed [ 94.298215][ T41] audit: type=1400 audit(1771264764.662:1877): avc: denied { read write } for pid=5924 comm="syz-executor" name="loop3" dev="devtmpfs" ino=661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 94.311480][ T41] audit: type=1400 audit(1771264764.682:1878): avc: denied { read write } for pid=7417 comm="syz.3.609" name="fuse" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 94.319164][ T41] audit: type=1400 audit(1771264764.682:1879): avc: denied { mounton } for pid=7417 comm="syz.3.609" path="/165/file0" dev="tmpfs" ino=867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=0 [ 94.431082][ T41] audit: type=1400 audit(1771264764.792:1880): avc: denied { allowed } for pid=7416 comm="syz.2.608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 94.447385][ T41] audit: type=1400 audit(1771264764.812:1881): avc: denied { read write } for pid=7416 comm="syz.2.608" name="video1" dev="devtmpfs" ino=956 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 [ 94.783995][ T41] audit: type=1400 audit(1771264765.152:1882): avc: denied { read write } for pid=5926 comm="syz-executor" name="loop1" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 94.797698][ T41] audit: type=1400 audit(1771264765.162:1883): avc: denied { execmem } for pid=7424 comm="syz.1.610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 94.850334][ T41] audit: type=1400 audit(1771264765.212:1884): avc: denied { create } for pid=7424 comm="syz.1.610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 94.856073][ T41] audit: type=1400 audit(1771264765.212:1885): avc: denied { read write } for pid=7424 comm="syz.1.610" name="sg0" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=0 [ 94.863402][ T41] audit: type=1400 audit(1771264765.222:1886): avc: denied { create } for pid=7424 comm="syz.1.610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 95.377473][ T7438] syzkaller0: entered promiscuous mode [ 95.379572][ T7438] syzkaller0: entered allmulticast mode [ 95.968728][ T7456] team0 (unregistering): Port device team_slave_0 removed [ 95.974443][ T7456] team0 (unregistering): Port device team_slave_1 removed [ 96.676745][ T7466] syzkaller0: entered promiscuous mode [ 96.678580][ T7466] syzkaller0: entered allmulticast mode [ 96.842050][ T7476] netlink: 20 bytes leftover after parsing attributes in process `syz.3.631'. [ 97.145392][ T7496] syzkaller0: entered promiscuous mode [ 97.147231][ T7496] syzkaller0: entered allmulticast mode [ 97.636216][ T7517] syzkaller0: entered promiscuous mode [ 97.638122][ T7517] syzkaller0: entered allmulticast mode [ 98.093976][ T7539] syzkaller0: entered promiscuous mode [ 98.096408][ T7539] syzkaller0: entered allmulticast mode [ 98.377233][ T7547] xt_connbytes: Forcing CT accounting to be enabled [ 98.380229][ T7547] Cannot find set identified by id 0 to match [ 98.776503][ T7560] syzkaller0: entered promiscuous mode [ 98.778409][ T7560] syzkaller0: entered allmulticast mode [ 99.319517][ T41] kauditd_printk_skb: 217 callbacks suppressed [ 99.319533][ T41] audit: type=1400 audit(1771264769.682:2104): avc: denied { allowed } for pid=7573 comm="syz.1.674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 99.383388][ T41] audit: type=1400 audit(1771264769.752:2105): avc: denied { read write } for pid=5924 comm="syz-executor" name="loop3" dev="devtmpfs" ino=661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 99.404238][ T41] audit: type=1400 audit(1771264769.772:2106): avc: denied { read } for pid=7576 comm="syz.3.675" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 99.414436][ T41] audit: type=1400 audit(1771264769.782:2107): avc: denied { read } for pid=7576 comm="syz.3.675" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 99.425800][ T41] audit: type=1400 audit(1771264769.792:2108): avc: denied { read write } for pid=5924 comm="syz-executor" name="loop3" dev="devtmpfs" ino=661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 99.435196][ T41] audit: type=1400 audit(1771264769.802:2109): avc: denied { read write } for pid=5927 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 99.446146][ T41] audit: type=1400 audit(1771264769.812:2110): avc: denied { create } for pid=7578 comm="syz.3.676" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 99.454632][ T41] audit: type=1400 audit(1771264769.822:2111): avc: denied { read } for pid=7578 comm="syz.3.676" dev="nsfs" ino=4026533000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 99.461907][ T41] audit: type=1400 audit(1771264769.832:2112): avc: denied { create } for pid=7578 comm="syz.3.676" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 99.468558][ T41] audit: type=1400 audit(1771264769.832:2113): avc: denied { execmem } for pid=7578 comm="syz.3.676" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 101.107688][ T7626] syzkaller0: entered promiscuous mode [ 101.109943][ T7626] syzkaller0: entered allmulticast mode [ 101.411601][ T7644] syzkaller0: entered promiscuous mode [ 101.413521][ T7644] syzkaller0: entered allmulticast mode [ 101.555440][ T7654] netlink: 14 bytes leftover after parsing attributes in process `syz.3.710'. [ 101.787033][ T7670] capability: warning: `syz.0.716' uses deprecated v2 capabilities in a way that may be insecure [ 101.811509][ T7674] syzkaller0: entered promiscuous mode [ 101.824115][ T7674] syzkaller0: entered allmulticast mode [ 102.967116][ T7706] syzkaller0: entered promiscuous mode [ 102.969465][ T7706] syzkaller0: entered allmulticast mode [ 103.175970][ T7717] syzkaller0: entered promiscuous mode [ 103.177761][ T7717] syzkaller0: entered allmulticast mode [ 103.304764][ T7731] syzkaller0: entered promiscuous mode [ 103.306751][ T7731] syzkaller0: entered allmulticast mode [ 104.329551][ T7772] syzkaller0: entered promiscuous mode [ 104.331765][ T7772] syzkaller0: entered allmulticast mode [ 104.338252][ T41] kauditd_printk_skb: 248 callbacks suppressed [ 104.338264][ T41] audit: type=1400 audit(1771264774.702:2362): avc: denied { read write } for pid=5926 comm="syz-executor" name="loop1" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 104.441231][ T41] audit: type=1400 audit(1771264774.802:2363): avc: denied { read write } for pid=5927 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 104.452958][ T41] audit: type=1400 audit(1771264774.822:2364): avc: denied { read } for pid=7776 comm="syz.0.760" dev="nsfs" ino=4026532905 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 104.459663][ T41] audit: type=1400 audit(1771264774.822:2365): avc: denied { prog_load } for pid=7776 comm="syz.0.760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 104.472772][ T41] audit: type=1400 audit(1771264774.842:2366): avc: denied { create } for pid=7773 comm="syz.1.758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 104.479048][ T41] audit: type=1400 audit(1771264774.842:2367): avc: denied { allowed } for pid=7773 comm="syz.1.758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 104.485540][ T41] audit: type=1400 audit(1771264774.842:2368): avc: denied { read write } for pid=7773 comm="syz.1.758" name="raw-gadget" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 104.521368][ T41] audit: type=1400 audit(1771264774.882:2369): avc: denied { prog_load } for pid=7776 comm="syz.0.760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 104.552854][ T41] audit: type=1400 audit(1771264774.912:2370): avc: denied { read write } for pid=5927 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 104.566827][ T41] audit: type=1400 audit(1771264774.932:2371): avc: denied { create } for pid=7780 comm="syz.0.761" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 105.450526][ T7808] netlink: 8 bytes leftover after parsing attributes in process `syz.0.770'. [ 106.723514][ T7841] netlink: 24 bytes leftover after parsing attributes in process `syz.0.785'. [ 107.089981][ T7851] syzkaller0: entered promiscuous mode [ 107.092018][ T7851] syzkaller0: entered allmulticast mode [ 107.311417][ T7859] syzkaller0: entered promiscuous mode [ 107.313440][ T7859] syzkaller0: entered allmulticast mode [ 107.927341][ T7884] syzkaller0: entered promiscuous mode [ 107.929086][ T7884] syzkaller0: entered allmulticast mode [ 108.240678][ T7905] netlink: 12 bytes leftover after parsing attributes in process `syz.2.812'. [ 108.696272][ T7915] syzkaller0: entered promiscuous mode [ 108.698145][ T7915] syzkaller0: entered allmulticast mode [ 108.859980][ T12] [ 108.860803][ T12] ============================================ [ 108.862895][ T12] WARNING: possible recursive locking detected [ 108.864812][ T12] syzkaller #0 Tainted: G L [ 108.866919][ T12] -------------------------------------------- [ 108.868893][ T12] kworker/u32:0/12 is trying to acquire lock: [ 108.870801][ T12] ffff88803fe144a0 (k-sk_lock-AF_INET6){+.+.}-{0:0}, at: inet6_getname+0x1a2/0x860 [ 108.873696][ T12] [ 108.873696][ T12] but task is already holding lock: [ 108.876038][ T12] ffff88803fe144a0 (k-sk_lock-AF_INET6){+.+.}-{0:0}, at: rds_tcp_recv_path+0x88/0xf0 [ 108.878985][ T12] [ 108.878985][ T12] other info that might help us debug this: [ 108.881489][ T12] Possible unsafe locking scenario: [ 108.881489][ T12] [ 108.883804][ T12] CPU0 [ 108.884893][ T12] ---- [ 108.885993][ T12] lock(k-sk_lock-AF_INET6); [ 108.887474][ T12] lock(k-sk_lock-AF_INET6); [ 108.888966][ T12] [ 108.888966][ T12] *** DEADLOCK *** [ 108.888966][ T12] [ 108.891485][ T12] May be due to missing lock nesting notation [ 108.891485][ T12] [ 108.894049][ T12] 3 locks held by kworker/u32:0/12: [ 108.895699][ T12] #0: ffff888029ed1948 ((wq_completion)krds_cp_wq#2/0){+.+.}-{0:0}, at: process_one_work+0x1287/0x1920 [ 108.899164][ T12] #1: ffffc900000f7d08 ((work_completion)(&(&cp->cp_recv_w)->work)){+.+.}-{0:0}, at: process_one_work+0x93c/0x1920 [ 108.902886][ T12] #2: ffff88803fe144a0 (k-sk_lock-AF_INET6){+.+.}-{0:0}, at: rds_tcp_recv_path+0x88/0xf0 [ 108.906044][ T12] [ 108.906044][ T12] stack backtrace: [ 108.907865][ T12] CPU: 2 UID: 0 PID: 12 Comm: kworker/u32:0 Tainted: G L syzkaller #0 PREEMPT(full) [ 108.907881][ T12] Tainted: [L]=SOFTLOCKUP [ 108.907884][ T12] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 108.907892][ T12] Workqueue: krds_cp_wq#2/0 rds_recv_worker [ 108.907910][ T12] Call Trace: [ 108.907914][ T12] [ 108.907918][ T12] dump_stack_lvl+0x100/0x190 [ 108.907936][ T12] print_deadlock_bug.cold+0xbd/0xca [ 108.907953][ T12] __lock_acquire+0x12bb/0x2630 [ 108.907971][ T12] ? check_irq_usage+0xe5/0x810 [ 108.907987][ T12] lock_acquire+0x1cf/0x380 [ 108.908003][ T12] ? inet6_getname+0x1a2/0x860 [ 108.908017][ T12] lock_sock_nested+0x41/0xf0 [ 108.908029][ T12] ? inet6_getname+0x1a2/0x860 [ 108.908042][ T12] inet6_getname+0x1a2/0x860 [ 108.908056][ T12] rds_tcp_get_peer_sport+0x7c/0x110 [ 108.908068][ T12] ? __pfx_rds_tcp_get_peer_sport+0x10/0x10 [ 108.908082][ T12] ? find_held_lock+0x2b/0x80 [ 108.908095][ T12] ? rds_addr_cmp+0x10d/0x150 [ 108.908115][ T12] rds_tcp_conn_slots_available+0x279/0x390 [ 108.908128][ T12] ? __pfx_rds_tcp_conn_slots_available+0x10/0x10 [ 108.908142][ T12] rds_recv_hs_exthdrs+0x5cb/0x7e0 [ 108.908157][ T12] ? __pfx_rds_recv_hs_exthdrs+0x10/0x10 [ 108.908172][ T12] rds_recv_incoming+0xd6c/0x1150 [ 108.908187][ T12] ? __pfx_rds_recv_incoming+0x10/0x10 [ 108.908201][ T12] ? skb_copy_bits+0x5c8/0x8d0 [ 108.908213][ T12] rds_tcp_data_recv+0x278/0xce0 [ 108.908227][ T12] __tcp_read_sock+0x204/0x8d0 [ 108.908245][ T12] ? __pfx_rds_tcp_data_recv+0x10/0x10 [ 108.908257][ T12] ? __pfx___tcp_read_sock+0x10/0x10 [ 108.908275][ T12] rds_tcp_read_sock+0x12e/0x280 [ 108.908287][ T12] ? __pfx_rds_tcp_read_sock+0x10/0x10 [ 108.908300][ T12] ? __local_bh_enable_ip+0x9e/0x120 [ 108.908314][ T12] rds_tcp_recv_path+0x95/0xf0 [ 108.908327][ T12] rds_recv_worker+0xf9/0x3b0 [ 108.908343][ T12] process_one_work+0x9d7/0x1920 [ 108.908355][ T12] ? __pfx_process_one_work+0x10/0x10 [ 108.908367][ T12] ? __pfx_rds_recv_worker+0x10/0x10 [ 108.908383][ T12] worker_thread+0x5da/0xe40 [ 108.908395][ T12] ? kthread+0x13a/0x450 [ 108.908403][ T12] ? __pfx_worker_thread+0x10/0x10 [ 108.908413][ T12] kthread+0x370/0x450 [ 108.908421][ T12] ? __pfx_kthread+0x10/0x10 [ 108.908430][ T12] ret_from_fork+0x754/0xd80 [ 108.908440][ T12] ? __pfx_ret_from_fork+0x10/0x10 [ 108.908450][ T12] ? __switch_to+0x7b4/0x1120 [ 108.908463][ T12] ? __pfx_kthread+0x10/0x10 [ 108.908472][ T12] ret_from_fork_asm+0x1a/0x30 [ 108.908486][ T12] [ 110.429490][ T41] kauditd_printk_skb: 200 callbacks suppressed [ 110.429502][ T41] audit: type=1400 audit(1771264780.792:2572): avc: denied { read write } for pid=5926 comm="syz-executor" name="loop1" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 111.190678][ T41] audit: type=1400 audit(1771264781.552:2573): avc: denied { read write } for pid=5924 comm="syz-executor" name="loop3" dev="devtmpfs" ino=661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0