last executing test programs: 20.02054758s ago: executing program 1 (id=1911): socket$nl_rdma(0x10, 0x3, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = memfd_create(&(0x7f00000000c0)='\xe9`\x10\x98[\x82?O3#\xfa\x02\xdc\x96\xa1\xbc\x80\x00+\xb6O', 0x0) write$binfmt_elf32(r1, &(0x7f0000001e80)=ANY=[], 0x38) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x4}, 0x0, &(0x7f00000002c0)={0x3ff, 0x100000, 0x0, 0x4}, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x200002, 0x0) 19.920938623s ago: executing program 1 (id=1913): r0 = timerfd_create(0x7, 0x800) timerfd_settime(r0, 0x3, &(0x7f00000003c0)={{}, {0x77359400}}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000040)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0xfffffffc}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = fsopen(0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000040000009900"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000001000040000000000000000000300000a20000000000a05000000000000000000070000000900010073797a300000000044000000090a010400000000000000000700ffff08000a40000000030900020073797a31000000000900010073797a3000000000080005400000002105000d40930000005c0000000c0a01020000000000000000070000000900020073797a31000000000900010073797a3000000000300003802c0000800400018024000b80100001800c000100636f756e7465720010000180090001006c617374"], 0xe8}, 0x1, 0x0, 0x0, 0x10}, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r5, 0x6, 0x0, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) syz_socket_connect_nvme_tcp() socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r8, &(0x7f0000000480)={0x0, 0x60, &(0x7f0000000140)={&(0x7f00000002c0)={0x1c, r9, 0x9c3fa077fa966179, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 19.61947606s ago: executing program 4 (id=1917): openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100), 0x6ad01, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @local}, 0x6f) r0 = syz_io_uring_setup(0x112, &(0x7f0000000140)={0x0, 0xf095, 0x0, 0x3, 0x7fe}, &(0x7f00000003c0)=0x0, &(0x7f0000000280)=0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='blkio.bfq.time\x00', 0x275a, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x1, 0x7}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r3, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0, 0x60, 0x185100}) io_uring_enter(r0, 0x7277, 0x0, 0x28, 0x0, 0x0) 18.945487259s ago: executing program 1 (id=1919): r0 = socket(0x10, 0x3, 0x6) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000c50000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x18) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newqdisc={0x88, 0x24, 0xf0b, 0x70bd26, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0xffff}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x58, 0x2, {{0x2, [], 0x0, [0x4, 0x2, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c4, 0x0, 0x0, 0x0, 0x3dc], [0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000]}}}}]}, 0x88}}, 0x20000000) 18.879670202s ago: executing program 4 (id=1920): socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r0, &(0x7f0000000040), 0x10) listen(r0, 0x0) r1 = socket(0x28, 0x5, 0x0) connect$vsock_stream(r1, &(0x7f0000000080), 0x10) r2 = getpid() sched_setscheduler(r2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000280)="fbb9", 0x2}], 0x1) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000140)={0x1, 0x9}, 0x8) close(r1) 18.672712887s ago: executing program 2 (id=1924): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1, 0x0, 0x200}, 0x18) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000000180)="1a", 0x1, 0x0, 0x0, 0x0) 18.598439934s ago: executing program 2 (id=1925): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) close(r0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x20008000) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000006c0)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1e6b0b725ad99b817fd98cd824498949714e32f21dcc4ae5437aca55f21f3ca9e822d182054d54d53cd2b6da714e4beb5447000001000000008f2b9000f22425e4097ed62cbc891061017cfa6fa26fa1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe6b1b8d9dbe87dcff414ed00000000000000000000000000000000000000006c63b40e0c00000000000000b347abe6352a080f8140e5fd10747b6ecdb3540546bf636e3d6e700e5b0500000000000000eb9e1403e6c8f79829c90bd2114252581567acae715cbe1b57d5cda432c5b9443999f7d24195405f2e76ba88454cc9227069ccb7b37b41215c000000003be991e5e897284cdd6043058cec00000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r2, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvmsg(r1, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000a80)=""/20, 0x14}], 0x1}, 0x0) 18.597513765s ago: executing program 0 (id=1926): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_io_uring_setup(0xbc3, &(0x7f0000001480)={0x0, 0x1064, 0x80, 0x4, 0x1af}, &(0x7f0000000040)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r0, 0x0, &(0x7f00000017c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000240)}], 0x1, 0x0, 0x28}, 0x0, 0x4800, 0x1}) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) io_uring_enter(r1, 0x47f8, 0x0, 0x0, 0x0, 0x0) 18.479239081s ago: executing program 1 (id=1927): add_key$keyring(0x0, &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r0, 0xe0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000380), &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x34, &(0x7f0000000680)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000006c0), &(0x7f00000007c0), 0x8, 0xa2, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r3}, 0x18) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) set_mempolicy(0x3, &(0x7f00000001c0)=0x6, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) r8 = socket$inet(0x2, 0x2, 0x0) sendmsg$inet(r8, &(0x7f0000000080)={&(0x7f0000000900)={0x2, 0x4e23, @empty}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x60000000}, 0x800) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'ip6_vti0\x00'}) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000304fcffffff3f00000000000000", @ANYRES32=0x0, @ANYBLOB="a5fdad8800000000180012800e0001007769726567756172640000000400028008000a00"], 0x40}, 0x1, 0x300000000000000, 0x0, 0x4004}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='kfree\x00', r7}, 0x10) r10 = socket$nl_rdma(0x10, 0x3, 0x14) r11 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16, @ANYBLOB="17090000000000000000010000000500070000000000080009000000001b08000a0000000000060002000100000014001f0000000000000000000100000000000000140020"], 0x64}}, 0x0) write(r4, &(0x7f0000000bc0)="ebf393cd26618bfbfc0ca849d6507daec39ca3f946451f95a56c613552bbd8dce7a7062dc156328f1932cccd1af51eb05360794c06afda098dd8a78e3d5fe284448aded4d88b9ec047a2d69fe5de616079e36a6b8ade387538d58f3c8cf5120cd710a9ca72268e07630ffa1e12b4dc7960a2bb85fc294518a8934e3e2f3f5743015a6bce32fccdff2a78357efa97f57123a55312c05df7699ea9bc82eaf01085cf8d1c91a356d1a5922cf2dcd63a14e36ac614135dda48ae394b4f63", 0xbc) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r10, &(0x7f0000000080)={0x0, 0x12, &(0x7f0000000000)={&(0x7f0000000240)={0x38, 0x1403, 0x1, 0x70bd2d, 0x25dfdbff, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'veth0_to_bridge\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0xc080}, 0x20000010) 18.366575553s ago: executing program 0 (id=1928): mount$cgroup2(0x0, &(0x7f0000001000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f00000020c0), 0x0, &(0x7f0000002140)={[{@memory_hugetlb_accounting}]}) 18.319651867s ago: executing program 2 (id=1929): r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000140)=@fragment={0xb6, 0x0, 0x92, 0x0, 0x0, 0x1b, 0x65}, 0x8) sendto$inet6(r0, 0x0, 0x0, 0x400c0, &(0x7f0000000040)={0xa, 0xcaa1, 0xffffff7c, @empty, 0xd}, 0x1c) 18.223519845s ago: executing program 2 (id=1930): openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100), 0x6ad01, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @local}, 0x6f) r0 = syz_io_uring_setup(0x112, &(0x7f0000000140)={0x0, 0xf095, 0x0, 0x3, 0x7fe}, &(0x7f00000003c0)=0x0, &(0x7f0000000280)=0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='blkio.bfq.time\x00', 0x275a, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x1, 0x7}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r3, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0, 0x60, 0x185100}) io_uring_enter(r0, 0x7277, 0x0, 0x28, 0x0, 0x0) 18.197875737s ago: executing program 0 (id=1931): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802"], 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000400396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000001badd6e6f474d655af241f5ea00186500000800040000000000020000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x9, 0x1, &(0x7f0000000340)=""/1, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000100)='kfree\x00', r0, 0x0, 0x8000000000}, 0x18) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[], 0x39) r1 = syz_io_uring_setup(0x10d, 0x0, &(0x7f0000000240)=0x0, 0x0) r3 = openat2(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffe08) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2f}}}, 0x48, 0x7}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000007c0)={r5, @in6={{0xa, 0x4e23, 0x3, @mcast1, 0xfffffe00}}, 0x3, 0x8}, 0x90) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) r6 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r6}, &(0x7f0000bbdffc)) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x50) creat(&(0x7f0000000300)='./file0\x00', 0xd931d3864d39dcca) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1b00000091e87325a42680", @ANYRESOCT=r7, @ANYRES16=r4, @ANYRES64=r1, @ANYRESDEC=r2], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f00000001c0)=ANY=[@ANYRES64=0x0, @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000080)='syzkaller\x00', 0x80, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r9}, 0x18) fremovexattr(0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) readv(0xffffffffffffffff, &(0x7f0000001340)=[{&(0x7f0000000580)=""/148, 0x94}], 0x1) readv(0xffffffffffffffff, &(0x7f0000001240)=[{&(0x7f0000000040)=""/73, 0x49}], 0x1) 18.167595282s ago: executing program 2 (id=1932): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080)={0x0, r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000200000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, 0x0, 0x0) syz_emit_ethernet(0x2b4, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x14, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 18.075862583s ago: executing program 2 (id=1933): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x61780, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$inet6(0xa, 0x805, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @loopback={0x0, 0xffff888101827518}, 0x0, 0x20, 0x10000, 0x10000}}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_JOIN_MESH(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="01030000000000000000320000000c00990000000000"], 0x28}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r8}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000008000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa106000000000000000000f8ffffffbfa400000000000007040000f0ffffffb7", @ANYRES32=r8, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$NFT_BATCH(r7, &(0x7f00000000c0)={0x0, 0x1b, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="14000000100001000b000000000000000000000a20000000000a03000000000000000000010000000900010073797a300000000044000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a3000000000080005400000001f08000340000000045c0000000c0a01020000000000000000010000000900020073797a32000000000900010073797a3000000000300003802c00008028000180230001"], 0xe8}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r8) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, &(0x7f0000000240)={'wlan0\x00', 0x0}) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r11 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[], 0x14}}, 0x0) write$tun(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0xfdef) sendmsg$NL80211_CMD_START_P2P_DEVICE(r4, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x28, r6, 0x100, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8, 0x3, r9}, @val={0xc, 0x99, {0x8, 0x3c}}}}, ["", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40081}, 0x40081) r12 = openat$rfkill(0xffffff9c, &(0x7f0000000180), 0xc81, 0x0) write$rfkill(r12, &(0x7f0000000080)={0x5, 0x8, 0x3, 0x1}, 0x8) ioctl$TIOCGPTPEER(r3, 0x5441, 0x0) capset(&(0x7f0000000000)={0x20080522}, 0x0) 17.987547964s ago: executing program 0 (id=1934): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="19000000040000000400000008"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'macvtap0\x00'}) sendmsg$nl_route_sched(r1, 0x0, 0x0) 17.936154844s ago: executing program 4 (id=1935): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1, 0x0, 0x200}, 0x18) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000000180)="1a", 0x1, 0x0, 0x0, 0x0) 17.845790637s ago: executing program 4 (id=1936): r0 = socket$inet_smc(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000a00)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'wg2\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000880)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0902000000000000000001000000050002000a000000"], 0x38}}, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000280)={@remote, r2}, 0x14) sendto$inet6(r1, &(0x7f00000000c0)="4d806da3b234cb63962e0eaec414f8b42a8f944541a15bf91b55e41479d4261d859d361d98725ad81a76de1e835e336293e0345a92770e4bdabdf330b85633d967cf633e12227ad4581917ae65390fa4a5eb9a6dce37d90d5e46176aa9e9d4c0becc67d6203caf5ddce9abf0e1c2a1496657a6b60f", 0x75, 0x800, &(0x7f0000000140)={0xa, 0x4e21, 0x4, @empty, 0x8001}, 0x1c) r5 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r5}, &(0x7f0000bbdffc)=0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r9, 0x0, r8, 0x0, 0x9, 0xc) splice(r7, 0x0, 0xffffffffffffffff, 0x0, 0x80, 0x7) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x8d) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r10}, 0x10) socket(0x18, 0x5, 0xfffffffd) timer_settime(r6, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x56) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 17.817991789s ago: executing program 0 (id=1937): socket$nl_rdma(0x10, 0x3, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = memfd_create(&(0x7f00000000c0)='\xe9`\x10\x98[\x82?O3#\xfa\x02\xdc\x96\xa1\xbc\x80\x00+\xb6O', 0x0) write$binfmt_elf32(r1, &(0x7f0000001e80)=ANY=[], 0x38) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x4}, 0x0, &(0x7f00000002c0)={0x3ff, 0x100000, 0x0, 0x4}, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x200002, 0x0) 17.751373058s ago: executing program 0 (id=1938): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = epoll_create1(0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40088a01, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0x0, r1}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=@deltaction={0x18, 0x31, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@TCA_ACT_TAB={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x52}, 0x0) msgsnd(0x0, &(0x7f0000002900)=ANY=[@ANYBLOB], 0xfd1, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioprio_get$pid(0x1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x5400, 0x0) 16.713199497s ago: executing program 1 (id=1939): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[], 0x60}}, 0x0) 16.684363215s ago: executing program 4 (id=1940): r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setscheduler(0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004180)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) sysinfo(&(0x7f0000000680)=""/26) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x6, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r4}, 0x18) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000002440)=ANY=[@ANYBLOB="3800000020000100000000000000000002000000000000000000"], 0x38}}, 0x0) 16.644618154s ago: executing program 1 (id=1942): openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100), 0x6ad01, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @local}, 0x6f) r0 = syz_io_uring_setup(0x112, &(0x7f0000000140)={0x0, 0xf095, 0x0, 0x3, 0x7fe}, &(0x7f00000003c0)=0x0, &(0x7f0000000280)=0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='blkio.bfq.time\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="06"], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r3, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0, 0x60, 0x185100}) io_uring_enter(r0, 0x7277, 0x0, 0x28, 0x0, 0x0) 16.441209088s ago: executing program 3 (id=1945): mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xb0a54e68b1cd2fdb, 0x103) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065fffff53000000800395032303030"], 0x15) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x70, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a}, 0x94) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x15) r0 = dup(0xffffffffffffffff) write$P9_RLERRORu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r0, 0x0, 0x7c8) mount$9p_fd(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000400)=ANY=[]) truncate(0x0, 0x401) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000280)="db", 0x1}], 0x1}, 0x41) r3 = socket$unix(0x1, 0x1, 0x0) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x5d, 0x0, &(0x7f00000003c0)) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) kexec_load(0x4, 0xa, 0x0, 0x0) recvmsg(r1, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x10001) sendmsg$inet(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="04", 0x1}], 0x1}, 0x41) recvmsg$unix(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x61) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 16.377250362s ago: executing program 3 (id=1946): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1, 0x0, 0x200}, 0x18) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000000180)="1a", 0x1, 0x0, 0x0, 0x0) 16.331597569s ago: executing program 3 (id=1947): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="19000000040000000400000008"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'macvtap0\x00'}) sendmsg$nl_route_sched(r1, 0x0, 0x0) 16.308952338s ago: executing program 3 (id=1948): sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000800)=@in6={0xa, 0x0, 0x0, @mcast2, 0x1a}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000780)="80005b020eaa4da2", 0x8}], 0x1, 0x0, 0x0, 0x900}, 0x0) 16.280907413s ago: executing program 3 (id=1949): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) setns(r1, 0x24020000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d0000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone(0x16040000, 0x0, 0x0, 0x0, 0x0, 0x0) 15.731448137s ago: executing program 4 (id=1950): add_key$keyring(0x0, &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r0, 0xe0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000380), &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x34, &(0x7f0000000680)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000006c0), &(0x7f00000007c0), 0x8, 0xa2, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r3}, 0x18) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) set_mempolicy(0x3, &(0x7f00000001c0)=0x6, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) r8 = socket$inet(0x2, 0x2, 0x0) sendmsg$inet(r8, &(0x7f0000000080)={&(0x7f0000000900)={0x2, 0x4e23, @empty}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x60000000}, 0x800) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'ip6_vti0\x00'}) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000304fcffffff3f00000000000000", @ANYRES32=0x0, @ANYBLOB="a5fdad8800000000180012800e0001007769726567756172640000000400028008000a00"], 0x40}, 0x1, 0x300000000000000, 0x0, 0x4004}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='kfree\x00', r7}, 0x10) r10 = socket$nl_rdma(0x10, 0x3, 0x14) r11 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16, @ANYBLOB="17090000000000000000010000000500070000000000080009000000001b08000a0000000000060002000100000014001f0000000000000000000100000000000000140020"], 0x64}}, 0x0) write(r4, &(0x7f0000000bc0)="ebf393cd26618bfbfc0ca849d6507daec39ca3f946451f95a56c613552bbd8dce7a7062dc156328f1932cccd1af51eb05360794c06afda098dd8a78e3d5fe284448aded4d88b9ec047a2d69fe5de616079e36a6b8ade387538d58f3c8cf5120cd710a9ca72268e07630ffa1e12b4dc7960a2bb85fc294518a8934e3e2f3f5743015a6bce32fccdff2a78357efa97f57123a55312c05df7699ea9bc82eaf01085cf8d1c91a356d1a5922cf2dcd63a14e36ac614135dda48ae394b4f63", 0xbc) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r10, &(0x7f0000000080)={0x0, 0x12, &(0x7f0000000000)={&(0x7f0000000240)={0x38, 0x1403, 0x1, 0x70bd2d, 0x25dfdbff, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'veth0_to_bridge\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0xc080}, 0x20000010) 15.384917067s ago: executing program 3 (id=1951): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r1) socket$netlink(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="89e7ee2c78dad9b4b473fec988cafb", 0x240}], 0x1) 2.993879961s ago: executing program 32 (id=1933): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x61780, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$inet6(0xa, 0x805, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @loopback={0x0, 0xffff888101827518}, 0x0, 0x20, 0x10000, 0x10000}}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_JOIN_MESH(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="01030000000000000000320000000c00990000000000"], 0x28}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r8}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000008000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa106000000000000000000f8ffffffbfa400000000000007040000f0ffffffb7", @ANYRES32=r8, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$NFT_BATCH(r7, &(0x7f00000000c0)={0x0, 0x1b, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="14000000100001000b000000000000000000000a20000000000a03000000000000000000010000000900010073797a300000000044000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a3000000000080005400000001f08000340000000045c0000000c0a01020000000000000000010000000900020073797a32000000000900010073797a3000000000300003802c00008028000180230001"], 0xe8}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r8) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, &(0x7f0000000240)={'wlan0\x00', 0x0}) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r11 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[], 0x14}}, 0x0) write$tun(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0xfdef) sendmsg$NL80211_CMD_START_P2P_DEVICE(r4, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x28, r6, 0x100, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8, 0x3, r9}, @val={0xc, 0x99, {0x8, 0x3c}}}}, ["", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40081}, 0x40081) r12 = openat$rfkill(0xffffff9c, &(0x7f0000000180), 0xc81, 0x0) write$rfkill(r12, &(0x7f0000000080)={0x5, 0x8, 0x3, 0x1}, 0x8) ioctl$TIOCGPTPEER(r3, 0x5441, 0x0) capset(&(0x7f0000000000)={0x20080522}, 0x0) 2.499374574s ago: executing program 33 (id=1938): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = epoll_create1(0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40088a01, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0x0, r1}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=@deltaction={0x18, 0x31, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@TCA_ACT_TAB={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x52}, 0x0) msgsnd(0x0, &(0x7f0000002900)=ANY=[@ANYBLOB], 0xfd1, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioprio_get$pid(0x1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x5400, 0x0) 1.501247659s ago: executing program 34 (id=1942): openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100), 0x6ad01, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @local}, 0x6f) r0 = syz_io_uring_setup(0x112, &(0x7f0000000140)={0x0, 0xf095, 0x0, 0x3, 0x7fe}, &(0x7f00000003c0)=0x0, &(0x7f0000000280)=0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='blkio.bfq.time\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="06"], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r3, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0, 0x60, 0x185100}) io_uring_enter(r0, 0x7277, 0x0, 0x28, 0x0, 0x0) 498.445834ms ago: executing program 35 (id=1950): add_key$keyring(0x0, &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r0, 0xe0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000380), &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x34, &(0x7f0000000680)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000006c0), &(0x7f00000007c0), 0x8, 0xa2, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r3}, 0x18) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) set_mempolicy(0x3, &(0x7f00000001c0)=0x6, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) r8 = socket$inet(0x2, 0x2, 0x0) sendmsg$inet(r8, &(0x7f0000000080)={&(0x7f0000000900)={0x2, 0x4e23, @empty}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x60000000}, 0x800) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'ip6_vti0\x00'}) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000304fcffffff3f00000000000000", @ANYRES32=0x0, @ANYBLOB="a5fdad8800000000180012800e0001007769726567756172640000000400028008000a00"], 0x40}, 0x1, 0x300000000000000, 0x0, 0x4004}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='kfree\x00', r7}, 0x10) r10 = socket$nl_rdma(0x10, 0x3, 0x14) r11 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16, @ANYBLOB="17090000000000000000010000000500070000000000080009000000001b08000a0000000000060002000100000014001f0000000000000000000100000000000000140020"], 0x64}}, 0x0) write(r4, &(0x7f0000000bc0)="ebf393cd26618bfbfc0ca849d6507daec39ca3f946451f95a56c613552bbd8dce7a7062dc156328f1932cccd1af51eb05360794c06afda098dd8a78e3d5fe284448aded4d88b9ec047a2d69fe5de616079e36a6b8ade387538d58f3c8cf5120cd710a9ca72268e07630ffa1e12b4dc7960a2bb85fc294518a8934e3e2f3f5743015a6bce32fccdff2a78357efa97f57123a55312c05df7699ea9bc82eaf01085cf8d1c91a356d1a5922cf2dcd63a14e36ac614135dda48ae394b4f63", 0xbc) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r10, &(0x7f0000000080)={0x0, 0x12, &(0x7f0000000000)={&(0x7f0000000240)={0x38, 0x1403, 0x1, 0x70bd2d, 0x25dfdbff, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'veth0_to_bridge\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0xc080}, 0x20000010) 0s ago: executing program 36 (id=1951): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r1) socket$netlink(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="89e7ee2c78dad9b4b473fec988cafb", 0x240}], 0x1) kernel console output (not intermixed with test programs): adm_r:sysadm_t tclass=packet_socket permissive=1 [ 94.900694][ T6479] bridge_slave_0: left allmulticast mode [ 94.928135][ T6479] bridge_slave_0: left promiscuous mode [ 94.938439][ T6479] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.028442][ T6479] bridge_slave_1: left allmulticast mode [ 95.040078][ T6479] bridge_slave_1: left promiscuous mode [ 95.048572][ T30] audit: type=1400 audit(1751570828.393:317): avc: denied { create } for pid=6485 comm="syz.4.201" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 95.079974][ T6479] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.108479][ T30] audit: type=1400 audit(1751570828.423:318): avc: denied { mounton } for pid=6485 comm="syz.4.201" path="/39/file0" dev="tmpfs" ino=215 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 95.141959][ T6479] bond0: (slave bond_slave_0): Releasing backup interface [ 95.159882][ T30] audit: type=1400 audit(1751570828.443:319): avc: denied { mount } for pid=6485 comm="syz.4.201" name="/" dev="9p" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 95.185309][ T6479] bond0: (slave bond_slave_1): Releasing backup interface [ 95.196017][ T30] audit: type=1400 audit(1751570828.443:320): avc: denied { write } for pid=6485 comm="syz.4.201" dev="9p" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 95.225083][ T30] audit: type=1400 audit(1751570828.443:321): avc: denied { open } for pid=6485 comm="syz.4.201" path="/39/file0" dev="9p" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 95.256705][ T6479] team0: Port device team_slave_0 removed [ 95.275124][ T6479] team0: Port device team_slave_1 removed [ 95.281682][ T6479] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 95.310947][ T30] audit: type=1400 audit(1751570828.503:322): avc: denied { unmount } for pid=5808 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 95.340017][ T6479] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 95.349772][ T30] audit: type=1400 audit(1751570828.643:323): avc: denied { unlink } for pid=5808 comm="syz-executor" name="file0" dev="tmpfs" ino=215 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 95.377844][ T6479] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 95.385493][ T6479] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 95.483894][ T6488] netlink: 96 bytes leftover after parsing attributes in process `syz.1.200'. [ 95.626360][ T6496] bond1: entered promiscuous mode [ 95.631569][ T6496] bond1: entered allmulticast mode [ 95.638948][ T6496] 8021q: adding VLAN 0 to HW filter on device bond1 [ 95.873702][ T6496] bond1 (unregistering): Released all slaves [ 95.876878][ T6515] random: crng reseeded on system resumption [ 95.886885][ T30] audit: type=1400 audit(1751570829.223:324): avc: denied { write } for pid=6514 comm="syz.1.212" name="snapshot" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 95.956781][ T6520] netlink: 12 bytes leftover after parsing attributes in process `syz.0.213'. [ 95.968252][ T6515] Restarting kernel threads ... [ 95.998918][ T6515] Done restarting kernel threads. [ 96.050937][ T6523] netlink: 96 bytes leftover after parsing attributes in process `syz.4.216'. [ 96.176034][ T6528] netlink: 192 bytes leftover after parsing attributes in process `syz.4.218'. [ 96.564278][ T6544] random: crng reseeded on system resumption [ 96.601580][ T6546] netlink: 12 bytes leftover after parsing attributes in process `syz.1.225'. [ 97.369937][ T6557] netlink: 96 bytes leftover after parsing attributes in process `syz.4.229'. [ 97.549944][ T6559] netlink: 4 bytes leftover after parsing attributes in process `syz.0.231'. [ 97.615026][ T6565] netlink: 28 bytes leftover after parsing attributes in process `syz.4.234'. [ 97.638400][ T6559] netlink: 4 bytes leftover after parsing attributes in process `syz.0.231'. [ 97.668332][ T6565] netlink: 28 bytes leftover after parsing attributes in process `syz.4.234'. [ 98.217796][ T6586] usb usb1: usbfs: interface 0 claimed by hub while 'syz.1.242' sets config #1 [ 98.508727][ T6601] openvswitch: netlink: Flow key attr not present in new flow. [ 99.507594][ T6625] random: crng reseeded on system resumption [ 99.943124][ T6638] 9pnet_fd: Insufficient options for proto=fd [ 100.685777][ T6659] pim6reg1: entered promiscuous mode [ 100.707875][ T6659] pim6reg1: entered allmulticast mode [ 100.763563][ T6662] __nla_validate_parse: 5 callbacks suppressed [ 100.763583][ T6662] netlink: 12 bytes leftover after parsing attributes in process `syz.1.272'. [ 100.790897][ T6664] random: crng reseeded on system resumption [ 100.813679][ T6664] Restarting kernel threads ... [ 100.819795][ T6664] Done restarting kernel threads. [ 101.453791][ T6686] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 101.482786][ T30] kauditd_printk_skb: 40 callbacks suppressed [ 101.482803][ T30] audit: type=1400 audit(1751570834.833:365): avc: denied { bind } for pid=6685 comm="syz.2.284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 101.536116][ T30] audit: type=1400 audit(1751570834.863:366): avc: denied { name_bind } for pid=6685 comm="syz.2.284" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 101.561786][ T30] audit: type=1400 audit(1751570834.863:367): avc: denied { node_bind } for pid=6685 comm="syz.2.284" saddr=ff02::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 101.618573][ T30] audit: type=1400 audit(1751570834.963:368): avc: denied { block_suspend } for pid=6685 comm="syz.2.284" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 102.691740][ T30] audit: type=1400 audit(1751570836.033:369): avc: denied { bind } for pid=6716 comm="syz.0.290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 103.214019][ T6715] netlink: 4 bytes leftover after parsing attributes in process `syz.1.289'. [ 103.249492][ T6715] veth0_macvtap: left promiscuous mode [ 103.598227][ T30] audit: type=1400 audit(1751570836.943:370): avc: denied { write } for pid=6730 comm="syz.1.294" name="rt_acct" dev="proc" ino=4026532979 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 103.656901][ T30] audit: type=1400 audit(1751570836.983:371): avc: denied { write } for pid=6730 comm="syz.1.294" path="socket:[10160]" dev="sockfs" ino=10160 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 103.845630][ T6746] netlink: 4 bytes leftover after parsing attributes in process `syz.0.296'. [ 103.881137][ T6552] Set syz1 is full, maxelem 65536 reached [ 104.051283][ T30] audit: type=1400 audit(1751570837.393:372): avc: denied { mount } for pid=6751 comm="syz.1.299" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 104.103026][ T30] audit: type=1400 audit(1751570837.453:373): avc: denied { unmount } for pid=5807 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 104.157683][ T30] audit: type=1400 audit(1751570837.473:374): avc: denied { unmount } for pid=5807 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 104.362954][ T6769] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 104.452023][ T6771] xt_CT: You must specify a L4 protocol and not use inversions on it [ 105.512573][ T6774] netlink: 256 bytes leftover after parsing attributes in process `syz.3.306'. [ 105.521564][ T6774] ksmbd: Unknown IPC event: 3, ignore. [ 106.873506][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 106.873524][ T30] audit: type=1326 audit(1751570840.223:387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6797 comm="syz.2.313" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9138b8e929 code=0x7ffc0000 [ 106.949438][ T6801] bridge1: entered allmulticast mode [ 107.006957][ T30] audit: type=1326 audit(1751570840.253:388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6797 comm="syz.2.313" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f9138b8e929 code=0x7ffc0000 [ 107.070270][ T6805] audit: audit_backlog=65 > audit_backlog_limit=64 [ 107.077494][ T6805] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 107.102540][ T6805] audit: backlog limit exceeded [ 107.113861][ T6805] audit: audit_backlog=65 > audit_backlog_limit=64 [ 107.127733][ T6805] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 107.132007][ T30] audit: type=1326 audit(1751570840.253:389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6797 comm="syz.2.313" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9138b8e929 code=0x7ffc0000 [ 107.150487][ T6807] bridge_slave_0: left promiscuous mode [ 107.167206][ T6805] audit: backlog limit exceeded [ 107.179667][ T6807] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.339588][ T30] audit: type=1326 audit(1751570840.253:390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6797 comm="syz.2.313" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9138b8e929 code=0x7ffc0000 [ 107.344931][ T6807] bridge_slave_1: left allmulticast mode [ 107.370698][ T6807] bridge_slave_1: left promiscuous mode [ 107.389730][ T6807] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.472923][ T6807] bond0: (slave bond_slave_0): Releasing backup interface [ 107.493539][ T6807] bond0: (slave bond_slave_1): Releasing backup interface [ 107.545080][ T6807] team0: Port device team_slave_0 removed [ 107.586825][ T6807] team0: Port device team_slave_1 removed [ 107.608078][ T6807] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 107.632500][ T6807] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 107.643008][ T6819] SELinux: failed to load policy [ 107.651897][ T6807] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 107.660550][ T6807] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 107.685116][ T6815] tipc: Enabled bearer , priority 0 [ 107.701936][ T3493] tipc: Resetting bearer [ 107.710548][ T6821] netlink: 156 bytes leftover after parsing attributes in process `syz.3.321'. [ 107.825126][ T6827] 9pnet_fd: Insufficient options for proto=fd [ 108.026426][ T6843] netlink: 12 bytes leftover after parsing attributes in process `syz.0.329'. [ 108.270273][ T6861] tipc: Resetting bearer [ 108.340083][ T6866] tipc: Enabling of bearer rejected, already enabled [ 108.498936][ T6878] random: crng reseeded on system resumption [ 108.513888][ T6878] Restarting kernel threads ... [ 108.520563][ T6878] Done restarting kernel threads. [ 108.695915][ T6884] netlink: 4 bytes leftover after parsing attributes in process `syz.2.349'. [ 108.707773][ T24] tipc: Node number set to 3459143179 [ 108.818936][ T6899] netlink: 24 bytes leftover after parsing attributes in process `syz.2.354'. [ 108.879557][ T6902] tipc: Resetting bearer [ 108.896336][ T6904] IPv6: Can't replace route, no match found [ 108.922681][ T6902] tipc: Enabling of bearer rejected, already enabled [ 108.998163][ T6906] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 109.241599][ T6906] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 109.377677][ T6906] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 109.524103][ T6906] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 109.599112][ T6931] sg_write: data in/out 124/1 bytes for SCSI command 0x1c-- guessing data in; [ 109.599112][ T6931] program syz.3.368 not setting count and/or reply_len properly [ 109.701189][ T6906] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 109.719805][ T6906] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 109.748468][ T6906] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 109.776630][ T6906] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 110.005266][ T6943] capability: warning: `syz.3.373' uses deprecated v2 capabilities in a way that may be insecure [ 110.547519][ T6957] SELinux: failed to load policy [ 110.689955][ T6967] 9pnet_fd: Insufficient options for proto=fd [ 110.856834][ T6971] netlink: 4 bytes leftover after parsing attributes in process `syz.4.380'. [ 111.215214][ T6976] random: crng reseeded on system resumption [ 111.364998][ T6976] Restarting kernel threads ... [ 111.378779][ T6976] Done restarting kernel threads. [ 111.690707][ T6985] SELinux: policydb version 0 does not match my version range 15-34 [ 111.728099][ T6985] SELinux: failed to load policy [ 112.626524][ T7000] netlink: 3 bytes leftover after parsing attributes in process `syz.1.392'. [ 112.679605][ T7002] netlink: 3 bytes leftover after parsing attributes in process `syz.1.392'. [ 112.705375][ T7000] batadv1: entered promiscuous mode [ 112.710807][ T7000] batadv1: entered allmulticast mode [ 112.731338][ T7002] batadv1: entered promiscuous mode [ 112.753502][ T7002] batadv1: entered allmulticast mode [ 112.930266][ T7004] bridge_slave_0: left promiscuous mode [ 112.939111][ T7004] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.951130][ T7004] bridge_slave_1: left allmulticast mode [ 112.968253][ T7004] bridge_slave_1: left promiscuous mode [ 113.009056][ T7004] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.090137][ T7004] bond0: (slave bond_slave_0): Releasing backup interface [ 113.126396][ T7011] hub 6-0:1.0: USB hub found [ 113.131694][ T7011] hub 6-0:1.0: 1 port detected [ 113.176551][ T7004] bond0: (slave bond_slave_1): Releasing backup interface [ 113.231524][ T7004] team0: Port device team_slave_0 removed [ 113.287129][ T7004] team0: Port device team_slave_1 removed [ 113.314752][ T7004] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 113.330676][ T7004] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 113.339522][ T7004] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 113.347488][ T7004] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 113.379037][ T7005] tipc: Started in network mode [ 113.388347][ T7005] tipc: Node identity aaaaaaaaaa1a, cluster identity 4711 [ 113.400230][ T7005] tipc: Enabled bearer , priority 0 [ 113.458593][ T3547] tipc: Resetting bearer [ 113.527435][ T30] kauditd_printk_skb: 201 callbacks suppressed [ 113.527452][ T30] audit: type=1326 audit(1751570846.873:592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7030 comm="syz.4.402" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff84f98e929 code=0x7ffc0000 [ 113.575430][ T30] audit: type=1326 audit(1751570846.903:593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7030 comm="syz.4.402" exe="/root/syz-executor" sig=0 arch=c000003e syscall=68 compat=0 ip=0x7ff84f98e929 code=0x7ffc0000 [ 113.744349][ T30] audit: type=1326 audit(1751570846.903:594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7030 comm="syz.4.402" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff84f98e929 code=0x7ffc0000 [ 113.768511][ T30] audit: type=1326 audit(1751570846.903:595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7030 comm="syz.4.402" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff84f98e929 code=0x7ffc0000 [ 113.793277][ T30] audit: type=1326 audit(1751570846.913:596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7030 comm="syz.4.402" exe="/root/syz-executor" sig=0 arch=c000003e syscall=69 compat=0 ip=0x7ff84f98e929 code=0x7ffc0000 [ 113.820538][ T30] audit: type=1326 audit(1751570847.073:597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7030 comm="syz.4.402" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff84f98e929 code=0x7ffc0000 [ 113.846083][ T30] audit: type=1326 audit(1751570847.073:598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7030 comm="syz.4.402" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff84f98e929 code=0x7ffc0000 [ 114.035909][ T30] audit: type=1326 audit(1751570847.073:599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7030 comm="syz.4.402" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff84f98e929 code=0x7ffc0000 [ 114.063070][ T30] audit: type=1326 audit(1751570847.073:600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7030 comm="syz.4.402" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff84f98e929 code=0x7ffc0000 [ 114.265582][ T30] audit: type=1326 audit(1751570847.073:601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7030 comm="syz.4.402" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff84f98e929 code=0x7ffc0000 [ 114.482897][ T5867] tipc: Node number set to 11578026 [ 115.558276][ T7113] tipc: Enabled bearer , priority 0 [ 115.595310][ T7115] random: crng reseeded on system resumption [ 115.883708][ T7115] Restarting kernel threads ... [ 115.962230][ T7115] Done restarting kernel threads. [ 116.415104][ T7134] netlink: 20 bytes leftover after parsing attributes in process `syz.3.424'. [ 116.476984][ T7134] netlink: 8 bytes leftover after parsing attributes in process `syz.3.424'. [ 118.263594][ T7171] netlink: 20 bytes leftover after parsing attributes in process `syz.3.435'. [ 118.297098][ T7175] netlink: 4 bytes leftover after parsing attributes in process `syz.1.433'. [ 118.426245][ T7185] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 118.497519][ T7187] netlink: 4 bytes leftover after parsing attributes in process `syz.3.439'. [ 118.626895][ T7190] random: crng reseeded on system resumption [ 118.674657][ T7190] Restarting kernel threads ... [ 118.710900][ T7190] Done restarting kernel threads. [ 118.916278][ T7199] netlink: 96 bytes leftover after parsing attributes in process `syz.4.445'. [ 119.390240][ T7211] 9pnet_fd: Insufficient options for proto=fd [ 119.499105][ T30] kauditd_printk_skb: 27 callbacks suppressed [ 119.499121][ T30] audit: type=1400 audit(1751570852.843:629): avc: denied { bind } for pid=7213 comm="syz.3.449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 119.920712][ T7230] loop9: detected capacity change from 0 to 7 [ 119.932277][ T7230] Buffer I/O error on dev loop9, logical block 0, async page read [ 119.940881][ T7230] Buffer I/O error on dev loop9, logical block 0, async page read [ 119.949246][ T7230] Buffer I/O error on dev loop9, logical block 0, async page read [ 119.958540][ T7230] Buffer I/O error on dev loop9, logical block 0, async page read [ 119.967304][ T7230] Buffer I/O error on dev loop9, logical block 0, async page read [ 119.975743][ T7230] Buffer I/O error on dev loop9, logical block 0, async page read [ 119.984036][ T7230] Buffer I/O error on dev loop9, logical block 0, async page read [ 119.992113][ T7230] ldm_validate_partition_table(): Disk read failed. [ 119.998942][ T7230] Buffer I/O error on dev loop9, logical block 0, async page read [ 120.007557][ T7230] Buffer I/O error on dev loop9, logical block 0, async page read [ 120.015983][ T7230] Buffer I/O error on dev loop9, logical block 0, async page read [ 120.025261][ T7230] Dev loop9: unable to read RDB block 0 [ 120.031780][ T7230] loop9: unable to read partition table [ 120.038782][ T7230] loop9: partition table beyond EOD, truncated [ 120.045091][ T7230] loop_reread_partitions: partition scan of loop9 (þ被xüŸÑø éÚ¬§½dG¤´à–ƒÝ¡¯ â·û [ 120.045091][ T7230] ) failed (rc=-5) [ 120.641999][ T30] audit: type=1400 audit(1751570853.983:630): avc: denied { connect } for pid=7237 comm="syz.4.458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 120.682545][ T30] audit: type=1400 audit(1751570854.013:631): avc: denied { ioctl } for pid=7237 comm="syz.4.458" path="socket:[10926]" dev="sockfs" ino=10926 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 120.733992][ T7244] syzkaller0: entered promiscuous mode [ 120.738993][ T30] audit: type=1400 audit(1751570854.013:632): avc: denied { ioctl } for pid=7215 comm="syz.2.450" path="socket:[10929]" dev="sockfs" ino=10929 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 120.747576][ T7244] syzkaller0: entered allmulticast mode [ 120.931982][ T7246] pim6reg1: entered promiscuous mode [ 120.953110][ T7246] pim6reg1: entered allmulticast mode [ 121.234883][ T7265] netlink: 4 bytes leftover after parsing attributes in process `syz.2.467'. [ 122.217317][ T7269] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7269 comm=syz.1.468 [ 122.502337][ T30] audit: type=1326 audit(1751570855.843:633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7278 comm="syz.1.473" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f7d4018e929 code=0x0 [ 122.527455][ T7288] netlink: 4 bytes leftover after parsing attributes in process `syz.0.474'. [ 123.130457][ T7292] capability: warning: `syz.4.475' uses 32-bit capabilities (legacy support in use) [ 123.475959][ T7297] syzkaller1: entered promiscuous mode [ 123.493570][ T7297] syzkaller1: entered allmulticast mode [ 123.572494][ T30] audit: type=1400 audit(1751570856.913:634): avc: denied { execute } for pid=7303 comm="syz.0.479" path="/109/cpu.stat" dev="tmpfs" ino=576 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 123.800317][ T30] audit: type=1400 audit(1751570857.143:635): avc: denied { name_bind } for pid=7317 comm="syz.0.486" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 123.835637][ T7306] tipc: Enabled bearer , priority 0 [ 123.859530][ T30] audit: type=1400 audit(1751570857.203:636): avc: denied { getopt } for pid=7320 comm="syz.2.487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 123.894322][ T7305] tipc: Resetting bearer [ 123.917924][ T7327] netlink: 'syz.2.489': attribute type 1 has an invalid length. [ 124.059699][ T7331] netlink: 44 bytes leftover after parsing attributes in process `syz.2.489'. [ 124.844946][ T7305] tipc: Disabling bearer [ 124.855282][ T7327] workqueue: Failed to create a rescuer kthread for wq "bond1": -EINTR [ 124.855668][ T7329] netlink: 96 bytes leftover after parsing attributes in process `syz.0.490'. [ 124.907331][ T7330] veth3: entered promiscuous mode [ 125.670013][ T7344] syzkaller1: entered promiscuous mode [ 125.682555][ T7344] syzkaller1: entered allmulticast mode [ 125.747097][ T7356] SELinux: failed to load policy [ 125.765250][ T7358] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 125.773576][ T7359] pimreg: entered allmulticast mode [ 125.812154][ T7358] SELinux: failed to load policy [ 125.988361][ T7369] netlink: 96 bytes leftover after parsing attributes in process `syz.1.504'. [ 126.106781][ T7372] IPVS: stopping master sync thread 7370 ... [ 126.113913][ T7370] IPVS: sync thread started: state = MASTER, mcast_ifn = veth0_virt_wifi, syncid = 33554432, id = 0 [ 126.134647][ T30] audit: type=1326 audit(1751570859.453:637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7375 comm="syz.1.505" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 126.161101][ T7378] netlink: 1204 bytes leftover after parsing attributes in process `syz.0.503'. [ 126.188908][ T30] audit: type=1326 audit(1751570859.453:638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7375 comm="syz.1.505" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 126.233178][ T30] audit: type=1326 audit(1751570859.453:639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7375 comm="syz.1.505" exe="/root/syz-executor" sig=0 arch=c000003e syscall=68 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 126.260734][ T30] audit: type=1326 audit(1751570859.453:640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7375 comm="syz.1.505" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 126.287551][ T7378] netlink: 4 bytes leftover after parsing attributes in process `syz.0.503'. [ 126.322657][ T30] audit: type=1326 audit(1751570859.453:641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7375 comm="syz.1.505" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 126.349540][ T30] audit: type=1326 audit(1751570859.453:642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7375 comm="syz.1.505" exe="/root/syz-executor" sig=0 arch=c000003e syscall=69 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 126.375837][ T7378] netlink: 12 bytes leftover after parsing attributes in process `syz.0.503'. [ 126.432556][ T30] audit: type=1326 audit(1751570859.563:643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7375 comm="syz.1.505" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 126.547580][ T30] audit: type=1326 audit(1751570859.563:644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7375 comm="syz.1.505" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 126.578395][ T30] audit: type=1326 audit(1751570859.563:645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7375 comm="syz.1.505" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 126.604880][ T30] audit: type=1326 audit(1751570859.563:646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7375 comm="syz.1.505" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 127.232176][ T7419] SELinux: failed to load policy [ 127.278811][ T7410] wireguard1: entered promiscuous mode [ 127.373274][ T7421] pimreg: entered allmulticast mode [ 127.417054][ T7424] netlink: 96 bytes leftover after parsing attributes in process `syz.3.520'. [ 128.518526][ T7452] wireguard1: entered promiscuous mode [ 128.529691][ T7452] siw: device registration error -23 [ 128.807241][ T7465] netlink: 4 bytes leftover after parsing attributes in process `syz.4.534'. [ 128.831589][ T7465] veth0_macvtap: left promiscuous mode [ 128.871247][ T7479] Driver unsupported XDP return value 0 on prog (id 317) dev N/A, expect packet loss! [ 129.142564][ T7493] sd 0:0:1:0: device reset [ 129.148275][ T7488] wireguard0: entered promiscuous mode [ 129.173219][ T7488] siw: device registration error -23 [ 129.257248][ T7505] netlink: 165 bytes leftover after parsing attributes in process `syz.0.553'. [ 129.268298][ T7505] netlink: 277 bytes leftover after parsing attributes in process `syz.0.553'. [ 129.315523][ T7507] tipc: Enabling of bearer rejected, already enabled [ 129.352675][ T7511] netlink: 4 bytes leftover after parsing attributes in process `syz.3.555'. [ 129.385768][ T7511] veth0_macvtap: left promiscuous mode [ 129.542528][ T7525] program syz.0.560 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 129.614195][ T7533] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 129.621158][ T7533] hsr_slave_1: hsr_addr_subst_dest: Unknown node [ 129.712046][ T7542] IPVS: sync thread started: state = MASTER, mcast_ifn = veth0_virt_wifi, syncid = 33554432, id = 0 [ 129.713115][ T7541] IPVS: stopping master sync thread 7542 ... [ 129.756759][ T7538] SELinux: failed to load policy [ 129.927080][ T7547] random: crng reseeded on system resumption [ 130.536887][ T7565] infiniband syz!: set down [ 130.545083][ T7565] infiniband syz!: added team_slave_0 [ 130.704239][ T10] kernel write not supported for file /vcs (pid: 10 comm: kworker/0:1) [ 130.755519][ T7565] RDS/IB: syz!: added [ 130.762001][ T7565] smc: adding ib device syz! with port count 1 [ 130.846688][ T7565] smc: ib device syz! port 1 has pnetid [ 131.268510][ T7597] syz.0.586 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 131.363750][ T30] kauditd_printk_skb: 60 callbacks suppressed [ 131.363768][ T30] audit: type=1326 audit(1751570864.713:707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7598 comm="syz.2.587" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9138b8e929 code=0x7ffc0000 [ 131.414357][ T7599] sd 0:0:1:0: device reset [ 131.475551][ T30] audit: type=1326 audit(1751570864.743:708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7598 comm="syz.2.587" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9138b8e929 code=0x7ffc0000 [ 131.504927][ T30] audit: type=1326 audit(1751570864.763:709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7598 comm="syz.2.587" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f9138b8d290 code=0x7ffc0000 [ 131.531073][ T30] audit: type=1326 audit(1751570864.763:710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7598 comm="syz.2.587" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9138b8e929 code=0x7ffc0000 [ 131.602072][ T30] audit: type=1326 audit(1751570864.763:711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7598 comm="syz.2.587" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f9138b8e929 code=0x7ffc0000 [ 131.651979][ T30] audit: type=1326 audit(1751570864.783:712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7598 comm="syz.2.587" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9138b8e929 code=0x7ffc0000 [ 131.727516][ T30] audit: type=1326 audit(1751570864.793:713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7598 comm="syz.2.587" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9138b8e929 code=0x7ffc0000 [ 131.776936][ T30] audit: type=1326 audit(1751570865.103:714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7610 comm="syz.3.593" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 131.806732][ T30] audit: type=1326 audit(1751570865.103:715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7610 comm="syz.3.593" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 131.831797][ T7612] wireguard2: entered promiscuous mode [ 131.840948][ T30] audit: type=1326 audit(1751570865.123:716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7610 comm="syz.3.593" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 132.153948][ T7629] netlink: 8 bytes leftover after parsing attributes in process `syz.4.600'. [ 132.251586][ T7634] random: crng reseeded on system resumption [ 132.293319][ T7634] Restarting kernel threads ... [ 132.309267][ T7634] Done restarting kernel threads. [ 132.756284][ T1295] ieee802154 phy0 wpan0: encryption failed: -22 [ 133.268586][ T7644] netlink: 8 bytes leftover after parsing attributes in process `syz.0.605'. [ 133.556478][ T7606] siw: device registration error -23 [ 133.627653][ T7659] netlink: 'syz.0.611': attribute type 10 has an invalid length. [ 133.668749][ T7659] netlink: 55 bytes leftover after parsing attributes in process `syz.0.611'. [ 134.577289][ T7668] DRBG: could not allocate digest TFM handle: hmac(sha512) [ 134.923046][ T7705] siw: device registration error -23 [ 134.938802][ T7711] wireguard1: entered promiscuous mode [ 134.959242][ T7720] tipc: Started in network mode [ 134.995774][ T7720] tipc: Node identity aaaaaaaaaa1a, cluster identity 4711 [ 135.034859][ T7720] tipc: Enabled bearer , priority 0 [ 136.065845][ T5867] tipc: Node number set to 11578026 [ 136.120624][ T7747] sd 0:0:1:0: device reset [ 136.383458][ T30] kauditd_printk_skb: 314 callbacks suppressed [ 136.383492][ T30] audit: type=1400 audit(1751570869.623:1031): avc: denied { read } for pid=7741 comm="syz.0.638" dev="nsfs" ino=4026532809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 136.646362][ T30] audit: type=1400 audit(1751570869.623:1032): avc: denied { open } for pid=7741 comm="syz.0.638" path="net:[4026532809]" dev="nsfs" ino=4026532809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 136.690336][ T30] audit: type=1400 audit(1751570869.803:1033): avc: denied { module_request } for pid=7741 comm="syz.0.638" kmod=6E66742D657870722D372D6C617374CB scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 136.819534][ T30] audit: type=1400 audit(1751570870.163:1034): avc: denied { prog_run } for pid=7755 comm="syz.1.644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 136.889740][ T30] audit: type=1400 audit(1751570870.193:1035): avc: denied { create } for pid=7758 comm="syz.4.645" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 136.943930][ T30] audit: type=1400 audit(1751570870.263:1036): avc: denied { write } for pid=7758 comm="syz.4.645" name="file0" dev="tmpfs" ino=644 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 136.983399][ T30] audit: type=1400 audit(1751570870.263:1037): avc: denied { open } for pid=7758 comm="syz.4.645" path="/123/file0" dev="tmpfs" ino=644 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 137.040431][ T30] audit: type=1400 audit(1751570870.283:1038): avc: denied { create } for pid=7763 comm="syz.1.647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 137.094040][ T7762] block device autoloading is deprecated and will be removed. [ 137.114331][ T30] audit: type=1400 audit(1751570870.413:1039): avc: denied { setopt } for pid=7768 comm="syz.2.649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 137.164128][ T30] audit: type=1400 audit(1751570870.423:1040): avc: denied { name_bind } for pid=7768 comm="syz.2.649" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 137.228133][ T7774] netlink: 12 bytes leftover after parsing attributes in process `syz.1.650'. [ 137.298582][ T7777] wireguard3: entered promiscuous mode [ 137.462366][ T7792] netlink: 4 bytes leftover after parsing attributes in process `syz.3.656'. [ 137.959785][ T7777] siw: device registration error -23 [ 138.118226][ T7817] netlink: 12 bytes leftover after parsing attributes in process `syz.1.664'. [ 138.184071][ T7818] netlink: 'syz.2.666': attribute type 4 has an invalid length. [ 138.222626][ T7818] netlink: 152 bytes leftover after parsing attributes in process `syz.2.666'. [ 138.236740][ T7820] 9pnet_fd: Insufficient options for proto=fd [ 138.281038][ T7818] : renamed from bond0 (while UP) [ 138.698560][ T7843] netlink: 96 bytes leftover after parsing attributes in process `syz.3.677'. [ 138.777552][ T7849] syzkaller1: entered promiscuous mode [ 138.786132][ T7849] syzkaller1: entered allmulticast mode [ 139.196934][ T7875] netlink: 96 bytes leftover after parsing attributes in process `syz.0.691'. [ 139.366279][ T7884] SELinux: Context system_u:object_r:dhcp_state_t:s0 is not valid (left unmapped). [ 139.478669][ T7890] syzkaller1: entered promiscuous mode [ 139.492773][ T7890] syzkaller1: entered allmulticast mode [ 139.813782][ T7913] 9pnet_fd: p9_fd_create_tcp (7913): problem connecting socket to 127.0.0.1 [ 140.099350][ T7924] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 140.110290][ T7924] SELinux: failed to load policy [ 141.237551][ T7935] 9pnet_fd: Insufficient options for proto=fd [ 141.503588][ T30] kauditd_printk_skb: 55 callbacks suppressed [ 141.503604][ T30] audit: type=1400 audit(1751570874.853:1096): avc: denied { create } for pid=7955 comm="syz.1.727" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 141.544347][ T7948] syzkaller0: entered promiscuous mode [ 141.549886][ T7948] syzkaller0: entered allmulticast mode [ 141.760469][ T7970] netlink: 4 bytes leftover after parsing attributes in process `syz.2.732'. [ 141.769644][ T7970] openvswitch: netlink: Flow key attr not present in new flow. [ 142.312184][ T7977] 9pnet_fd: Insufficient options for proto=fd [ 142.321595][ T7975] random: crng reseeded on system resumption [ 142.325165][ T30] audit: type=1400 audit(1751570875.663:1097): avc: denied { write } for pid=7974 comm="syz.1.735" name="snapshot" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 142.352302][ T30] audit: type=1400 audit(1751570875.663:1098): avc: denied { open } for pid=7974 comm="syz.1.735" path="/dev/snapshot" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 142.494193][ T7975] Restarting kernel threads ... [ 142.499198][ T30] audit: type=1400 audit(1751570875.843:1099): avc: denied { ioctl } for pid=7974 comm="syz.1.735" path="/dev/snapshot" dev="devtmpfs" ino=92 ioctlcmd=0x3305 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 142.529586][ T7975] Done restarting kernel threads. [ 142.547356][ T7982] siw: device registration error -23 [ 142.971564][ T30] audit: type=1400 audit(1751570876.313:1100): avc: denied { create } for pid=8007 comm="syz.2.747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 143.009063][ T30] audit: type=1400 audit(1751570876.353:1101): avc: denied { setopt } for pid=8007 comm="syz.2.747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 143.850332][ T7979] workqueue: Failed to create a rescuer kthread for wq "wg-crypt-wireguard%d": -EINTR [ 144.115222][ T30] audit: type=1400 audit(1751570877.463:1102): avc: denied { bind } for pid=8018 comm="syz.0.750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 144.163904][ T8027] netlink: 24 bytes leftover after parsing attributes in process `syz.2.752'. [ 144.537107][ T8024] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 144.595177][ T30] audit: type=1400 audit(1751570877.463:1103): avc: denied { setopt } for pid=8018 comm="syz.0.750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 144.617331][ T30] audit: type=1400 audit(1751570877.763:1104): avc: denied { ioctl } for pid=8018 comm="syz.0.750" path="socket:[14085]" dev="sockfs" ino=14085 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 144.657977][ T8033] netlink: 96 bytes leftover after parsing attributes in process `syz.4.755'. [ 144.715854][ T8024] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 144.885043][ T8041] siw: device registration error -23 [ 144.926298][ T8024] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 145.003434][ T8045] wireguard4: entered promiscuous mode [ 145.060716][ T30] audit: type=1400 audit(1751570878.403:1105): avc: denied { getopt } for pid=8053 comm="syz.4.763" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 145.116887][ T8024] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 145.227494][ T8063] IPVS: sync thread started: state = MASTER, mcast_ifn = veth0_virt_wifi, syncid = 33554432, id = 0 [ 145.294742][ T8024] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 145.309373][ T8066] netlink: 24 bytes leftover after parsing attributes in process `syz.1.768'. [ 145.330068][ T8024] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 145.368980][ T8024] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 145.409894][ T8024] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 146.254232][ T8095] IPVS: sync thread started: state = MASTER, mcast_ifn = veth0_virt_wifi, syncid = 33554432, id = 0 [ 146.364066][ T8103] netlink: 24 bytes leftover after parsing attributes in process `syz.0.783'. [ 146.604036][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 146.604054][ T30] audit: type=1400 audit(1751570879.953:1108): avc: denied { map } for pid=8116 comm="syz.1.791" path="/dev/bus/usb/006/001" dev="devtmpfs" ino=736 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 146.884956][ T30] audit: type=1400 audit(1751570880.223:1109): avc: denied { bind } for pid=8118 comm="syz.3.792" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 147.800876][ T30] audit: type=1400 audit(1751570881.143:1110): avc: denied { write } for pid=8150 comm="syz.3.805" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 147.851078][ T30] audit: type=1400 audit(1751570881.183:1111): avc: denied { read } for pid=8150 comm="syz.3.805" name="rdma_cm" dev="devtmpfs" ino=1271 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 147.882642][ T30] audit: type=1400 audit(1751570881.183:1112): avc: denied { open } for pid=8150 comm="syz.3.805" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=1271 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 147.930297][ T30] audit: type=1400 audit(1751570881.273:1113): avc: denied { create } for pid=8157 comm="syz.2.808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 148.131042][ T30] audit: type=1400 audit(1751570881.463:1114): avc: denied { connect } for pid=8157 comm="syz.2.808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 148.159854][ T30] audit: type=1400 audit(1751570881.463:1115): avc: denied { name_connect } for pid=8157 comm="syz.2.808" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 148.659572][ T8177] xt_CT: You must specify a L4 protocol and not use inversions on it [ 148.765851][ T30] audit: type=1400 audit(1751570881.993:1116): avc: denied { create } for pid=8170 comm="syz.1.814" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 149.063942][ T30] audit: type=1400 audit(1751570882.003:1117): avc: denied { setopt } for pid=8170 comm="syz.1.814" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 149.267093][ T8182] SELinux: ebitmap: truncated map [ 149.350473][ T8182] SELinux: failed to load policy [ 149.388880][ T8191] netlink: 24 bytes leftover after parsing attributes in process `syz.4.823'. [ 149.968580][ T8219] xt_CT: You must specify a L4 protocol and not use inversions on it [ 150.657270][ T8229] wireguard2: entered promiscuous mode [ 151.480261][ T8248] syzkaller0: entered promiscuous mode [ 151.489923][ T8248] syzkaller0: entered allmulticast mode [ 151.511787][ T8256] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.849'. [ 151.706427][ T8259] 9pnet: Could not find request transport: fd0x0000000000000003 [ 151.938680][ T8269] siw: device registration error -23 [ 152.069991][ T8275] netlink: 4 bytes leftover after parsing attributes in process `syz.2.858'. [ 152.841535][ T8154] Set syz1 is full, maxelem 65536 reached [ 153.408632][ T8252] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.849'. [ 153.427394][ T8268] wireguard2: entered promiscuous mode [ 153.436772][ T8275] veth0_macvtap: left promiscuous mode [ 153.722487][ T30] kauditd_printk_skb: 26 callbacks suppressed [ 153.722507][ T30] audit: type=1400 audit(1751570887.053:1144): avc: denied { kexec_image_load } for pid=8293 comm="syz.0.865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 154.237233][ T8305] netlink: 24 bytes leftover after parsing attributes in process `syz.1.867'. [ 154.380248][ T8309] netlink: 132 bytes leftover after parsing attributes in process `syz.1.870'. [ 154.436906][ T8295] SELinux: failed to load policy [ 154.649409][ T8313] syzkaller0: entered promiscuous mode [ 154.660345][ T8313] syzkaller0: entered allmulticast mode [ 154.745505][ T8320] siw: device registration error -23 [ 155.392491][ T30] audit: type=1400 audit(1751570888.733:1145): avc: denied { create } for pid=8332 comm="syz.0.879" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 155.414521][ T30] audit: type=1400 audit(1751570888.733:1146): avc: denied { write } for pid=8332 comm="syz.0.879" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 156.128438][ T8324] workqueue: Failed to create a rescuer kthread for wq "wg-crypt-wireguard%d": -EINTR [ 156.239847][ T8348] netlink: 4 bytes leftover after parsing attributes in process `syz.2.884'. [ 156.242857][ T30] audit: type=1400 audit(1751570889.583:1147): avc: denied { ioctl } for pid=8344 comm="syz.2.884" path="socket:[15722]" dev="sockfs" ino=15722 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 156.292619][ T8348] bridge_slave_1: left allmulticast mode [ 156.298328][ T8348] bridge_slave_1: left promiscuous mode [ 156.361170][ T8348] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.381831][ T8348] bridge_slave_0: left allmulticast mode [ 156.394599][ T8356] netlink: 172 bytes leftover after parsing attributes in process `syz.3.887'. [ 156.403818][ T8348] bridge_slave_0: left promiscuous mode [ 156.409716][ T8348] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.497702][ T8352] netlink: 96 bytes leftover after parsing attributes in process `syz.0.885'. [ 156.526787][ T30] audit: type=1400 audit(1751570889.873:1148): avc: denied { append } for pid=8361 comm="syz.1.891" name="sg0" dev="devtmpfs" ino=764 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 156.693591][ T8372] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 156.732660][ T8372] SELinux: failed to load policy [ 156.805117][ T8379] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 156.811654][ T8379] hsr_slave_1: hsr_addr_subst_dest: Unknown node [ 157.026285][ T8392] netlink: 4 bytes leftover after parsing attributes in process `syz.2.902'. [ 157.983265][ T30] audit: type=1400 audit(1751570891.333:1149): avc: denied { create } for pid=8414 comm="syz.2.912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 158.002927][ T30] audit: type=1400 audit(1751570891.333:1150): avc: denied { write } for pid=8414 comm="syz.2.912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 158.048700][ T8418] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 158.055223][ T8418] hsr_slave_1: hsr_addr_subst_dest: Unknown node [ 158.488305][ T8439] netlink: 96 bytes leftover after parsing attributes in process `syz.0.922'. [ 158.532498][ T8375] syz.3.894: vmalloc error: size 2101248, failed to allocated page array size 4104, mode:0xdc2(GFP_KERNEL|__GFP_HIGHMEM|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0-1 [ 158.559209][ T8375] CPU: 0 UID: 0 PID: 8375 Comm: syz.3.894 Not tainted 6.16.0-rc4-syzkaller-00108-g17bbde2e1716 #0 PREEMPT(full) [ 158.559239][ T8375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 158.559249][ T8375] Call Trace: [ 158.559255][ T8375] [ 158.559262][ T8375] dump_stack_lvl+0x16c/0x1f0 [ 158.559294][ T8375] warn_alloc+0x248/0x3a0 [ 158.559317][ T8375] ? __pfx_warn_alloc+0x10/0x10 [ 158.559348][ T8375] ? hash_netiface_create+0x3ec/0x1250 [ 158.559374][ T8375] ? __vmalloc_node_noprof+0xad/0xf0 [ 158.559396][ T8375] __vmalloc_node_range_noprof+0x101b/0x14b0 [ 158.559423][ T8375] ? hash_netiface_create+0x3ec/0x1250 [ 158.559454][ T8375] ? __pfx___vmalloc_node_range_noprof+0x10/0x10 [ 158.559482][ T8375] ? hash_netiface_create+0x3ec/0x1250 [ 158.559507][ T8375] __vmalloc_node_noprof+0xad/0xf0 [ 158.559526][ T8375] ? hash_netiface_create+0x3ec/0x1250 [ 158.559555][ T8375] __vmalloc_node_range_noprof+0xb73/0x14b0 [ 158.559574][ T8375] ? nfnetlink_rcv_msg+0x9f9/0x1200 [ 158.559601][ T8375] ? hash_netiface_create+0x3ec/0x1250 [ 158.559627][ T8375] ? __pfx___vmalloc_node_range_noprof+0x10/0x10 [ 158.559646][ T8375] ? __alloc_pages_noprof+0xb/0x1b0 [ 158.559665][ T8375] ? ___kmalloc_large_node+0x84/0x1e0 [ 158.559687][ T8375] __kvmalloc_node_noprof+0x30a/0x620 [ 158.559709][ T8375] ? hash_netiface_create+0x3ec/0x1250 [ 158.559736][ T8375] ? hash_netiface_create+0x3ec/0x1250 [ 158.559766][ T8375] ? hash_netiface_create+0x3ec/0x1250 [ 158.559789][ T8375] hash_netiface_create+0x3ec/0x1250 [ 158.559822][ T8375] ? __nla_validate+0x3b/0x50 [ 158.559853][ T8375] ? __pfx_hash_netiface_create+0x10/0x10 [ 158.559879][ T8375] ip_set_create+0x7e1/0x14d0 [ 158.559912][ T8375] ? __pfx_ip_set_create+0x10/0x10 [ 158.559953][ T8375] ? find_held_lock+0x2b/0x80 [ 158.559983][ T8375] nfnetlink_rcv_msg+0x9f9/0x1200 [ 158.560014][ T8375] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 158.560044][ T8375] ? __lock_acquire+0x622/0x1c90 [ 158.560091][ T8375] ? avc_has_perm_noaudit+0x149/0x3b0 [ 158.560128][ T8375] netlink_rcv_skb+0x155/0x420 [ 158.560147][ T8375] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 158.560170][ T8375] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 158.560200][ T8375] ? ns_capable+0xd7/0x110 [ 158.560223][ T8375] nfnetlink_rcv+0x1b3/0x430 [ 158.560245][ T8375] ? __pfx_nfnetlink_rcv+0x10/0x10 [ 158.560266][ T8375] ? netlink_deliver_tap+0x1ae/0xd30 [ 158.560299][ T8375] netlink_unicast+0x53d/0x7f0 [ 158.560320][ T8375] ? __pfx_netlink_unicast+0x10/0x10 [ 158.560345][ T8375] netlink_sendmsg+0x8d1/0xdd0 [ 158.560365][ T8375] ? __pfx_netlink_sendmsg+0x10/0x10 [ 158.560391][ T8375] ____sys_sendmsg+0xa98/0xc70 [ 158.560411][ T8375] ? copy_msghdr_from_user+0x10a/0x160 [ 158.560436][ T8375] ? __pfx_____sys_sendmsg+0x10/0x10 [ 158.560453][ T8375] ? preempt_schedule_thunk+0x16/0x30 [ 158.560479][ T8375] ? try_to_wake_up+0xa2f/0x1680 [ 158.560505][ T8375] ___sys_sendmsg+0x134/0x1d0 [ 158.560531][ T8375] ? __pfx____sys_sendmsg+0x10/0x10 [ 158.560554][ T8375] ? __lock_acquire+0x622/0x1c90 [ 158.560612][ T8375] __sys_sendmsg+0x16d/0x220 [ 158.560637][ T8375] ? __pfx___sys_sendmsg+0x10/0x10 [ 158.560661][ T8375] ? __x64_sys_futex+0x1e0/0x4c0 [ 158.560704][ T8375] do_syscall_64+0xcd/0x4c0 [ 158.560733][ T8375] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 158.560751][ T8375] RIP: 0033:0x7fb078b8e929 [ 158.560767][ T8375] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 158.560783][ T8375] RSP: 002b:00007fb0799d1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 158.560809][ T8375] RAX: ffffffffffffffda RBX: 00007fb078db6080 RCX: 00007fb078b8e929 [ 158.560820][ T8375] RDX: 0000000000000800 RSI: 0000200000000040 RDI: 0000000000000004 [ 158.560830][ T8375] RBP: 00007fb078c10b39 R08: 0000000000000000 R09: 0000000000000000 [ 158.560840][ T8375] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 158.560850][ T8375] R13: 0000000000000000 R14: 00007fb078db6080 R15: 00007ffc3c70ed18 [ 158.560874][ T8375] [ 158.560973][ T8375] Mem-Info: [ 158.607447][ T30] audit: type=1326 audit(1751570891.943:1151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8440 comm="syz.1.923" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 158.649711][ T8375] active_anon:10041 inactive_anon:0 isolated_anon:0 [ 158.649711][ T8375] active_file:1588 inactive_file:40568 isolated_file:0 [ 158.649711][ T8375] unevictable:768 dirty:386 writeback:0 [ 158.649711][ T8375] slab_reclaimable:11502 slab_unreclaimable:102658 [ 158.649711][ T8375] mapped:29603 shmem:1367 pagetables:1178 [ 158.649711][ T8375] sec_pagetables:0 bounce:0 [ 158.649711][ T8375] kernel_misc_reclaimable:0 [ 158.649711][ T8375] free:1279353 free_pcp:19390 free_cma:0 [ 158.668232][ T30] audit: type=1326 audit(1751570891.943:1152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8440 comm="syz.1.923" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 158.680768][ T8375] Node 0 active_anon:40064kB inactive_anon:0kB active_file:6352kB inactive_file:162068kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:118412kB dirty:1544kB writeback:0kB shmem:3932kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:12340kB pagetables:4544kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 158.684480][ T30] audit: type=1326 audit(1751570891.943:1153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8440 comm="syz.1.923" exe="/root/syz-executor" sig=0 arch=c000003e syscall=68 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 158.792511][ T8375] Node 1 active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:204kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:1536kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:48kB pagetables:168kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 158.797527][ T30] audit: type=1326 audit(1751570891.943:1154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8440 comm="syz.1.923" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 158.799333][ T8375] Node 0 [ 158.804721][ T30] audit: type=1326 audit(1751570891.943:1155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8440 comm="syz.1.923" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 158.809928][ T8375] DMA free:15360kB boost:0kB min:208kB low:260kB high:312kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 158.813775][ T30] audit: type=1326 audit(1751570891.943:1156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8440 comm="syz.1.923" exe="/root/syz-executor" sig=0 arch=c000003e syscall=69 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 158.839126][ T8375] lowmem_reserve[]: [ 158.842071][ T30] audit: type=1400 audit(1751570892.113:1157): avc: denied { read append } for pid=8440 comm="syz.1.923" name="virtual_nci" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 158.849790][ T8375] 0 [ 158.856575][ T30] audit: type=1400 audit(1751570892.113:1158): avc: denied { open } for pid=8440 comm="syz.1.923" path="/dev/virtual_nci" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 158.898679][ T8375] 2481 [ 158.930988][ T30] audit: type=1326 audit(1751570892.143:1159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8440 comm="syz.1.923" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 158.955556][ T8375] 2482 [ 158.989694][ T8452] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 159.137876][ T8375] 2482 [ 159.168890][ T30] audit: type=1326 audit(1751570892.143:1160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8440 comm="syz.1.923" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 159.212444][ T8375] 2482 [ 159.261980][ T30] audit: type=1400 audit(1751570892.383:1161): avc: granted { setsecparam } for pid=8445 comm="syz.0.925" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 159.391287][ T8375] [ 159.394146][ T8375] Node 0 DMA32 free:1197028kB boost:0kB min:34076kB low:42592kB high:51108kB reserved_highatomic:0KB free_highatomic:0KB active_anon:23656kB inactive_anon:0kB active_file:6352kB inactive_file:160744kB unevictable:1536kB writepending:1548kB present:3129332kB managed:2540572kB mlocked:0kB bounce:0kB free_pcp:76472kB local_pcp:28800kB free_cma:0kB [ 159.426575][ T8375] lowmem_reserve[]: 0 0 1 1 1 [ 159.431347][ T8375] Node 0 Normal free:12kB boost:0kB min:16kB low:20kB high:24kB reserved_highatomic:0KB free_highatomic:0KB active_anon:16kB inactive_anon:0kB active_file:0kB inactive_file:1324kB unevictable:0kB writepending:0kB present:1048580kB managed:1388kB mlocked:0kB bounce:0kB free_pcp:36kB local_pcp:8kB free_cma:0kB [ 159.462002][ T30] audit: type=1326 audit(1751570892.593:1162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8454 comm="syz.1.926" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 159.487413][ T8375] lowmem_reserve[]: 0 0 0 0 0 [ 159.488223][ T8458] sd 0:0:1:0: device reset [ 159.492157][ T8375] Node 1 Normal free:3904788kB boost:0kB min:55804kB low:69752kB high:83700kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:204kB unevictable:1536kB writepending:0kB present:4194300kB managed:4111164kB mlocked:0kB bounce:0kB free_pcp:17388kB local_pcp:7456kB free_cma:0kB [ 159.528806][ T30] audit: type=1326 audit(1751570892.593:1163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8454 comm="syz.1.926" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 159.591172][ T8375] lowmem_reserve[]: 0 0 0 0 0 [ 159.601275][ T8375] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 159.678417][ T8471] netlink: 4 bytes leftover after parsing attributes in process `syz.1.929'. [ 159.712699][ T8375] Node 0 DMA32: 2*4kB (ME) 3*8kB (UME) 2*16kB (UE) 3*32kB (E) 2*64kB (UM) 2*128kB (ME) 2*256kB (UM) 10*512kB (ME) 6*1024kB (M) 1*2048kB (M) 287*4096kB (M) = 1189920kB [ 159.736552][ T8470] syzkaller0: entered promiscuous mode [ 159.746622][ T8375] Node 0 Normal: 1*4kB (M) 1*8kB (M) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 159.766151][ T8470] syzkaller0: entered allmulticast mode [ 159.773564][ T8375] Node 1 Normal: 106*4kB (UE) 41*8kB (UME) 43*16kB (UME) 76*32kB (UME) 31*64kB (UME) 6*128kB (UME) 5*256kB (UME) 3*512kB (ME) 2*1024kB (ME) 1*2048kB (E) 950*4096kB (M) = 3904736kB [ 159.791645][ T8375] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 159.801474][ T8375] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 159.810858][ T8375] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 159.820740][ T8375] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 159.830212][ T8375] 46366 total pagecache pages [ 159.835046][ T8375] 0 pages in swap cache [ 159.839282][ T8375] Free swap = 124996kB [ 159.843527][ T8375] Total swap = 124996kB [ 159.847716][ T8375] 2097051 pages RAM [ 159.851620][ T8375] 0 pages HighMem/MovableOnly [ 159.857512][ T8375] 429930 pages reserved [ 159.861708][ T8375] 0 pages cma reserved [ 160.482324][ T8476] platform regulatory.0: loading /lib/firmware/regulatory.db failed with error -12 [ 160.495524][ T8476] platform regulatory.0: Direct firmware load for regulatory.db failed with error -12 [ 160.507332][ T8476] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 160.906655][ T8487] xt_CT: You must specify a L4 protocol and not use inversions on it [ 162.857811][ T8501] netlink: 4 bytes leftover after parsing attributes in process `syz.3.936'. [ 163.641359][ T8492] platform regulatory.0: loading /lib/firmware/regulatory.db failed with error -12 [ 163.651699][ T8492] platform regulatory.0: Direct firmware load for regulatory.db failed with error -12 [ 163.661468][ T8492] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 163.965569][ T8510] syzkaller0: entered promiscuous mode [ 163.971098][ T8510] syzkaller0: entered allmulticast mode [ 164.032827][ T8508] SELinux: failed to load policy [ 164.777801][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 164.777819][ T30] audit: type=1400 audit(1751570898.123:1176): avc: denied { create } for pid=8516 comm="syz.0.940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 164.857621][ T30] audit: type=1400 audit(1751570898.153:1177): avc: denied { write } for pid=8516 comm="syz.0.940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 169.038367][ T30] audit: type=1326 audit(1751570902.383:1178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8587 comm="syz.0.967" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0675f8e929 code=0x7ffc0000 [ 169.097445][ T30] audit: type=1326 audit(1751570902.383:1179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8587 comm="syz.0.967" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0675f8e929 code=0x7ffc0000 [ 169.849487][ T8604] netlink: 24 bytes leftover after parsing attributes in process `syz.2.975'. [ 169.934651][ T8608] tipc: Enabled bearer , priority 0 [ 169.944402][ T8483] Set syz1 is full, maxelem 65536 reached [ 169.971622][ T8606] tipc: Disabling bearer [ 169.985015][ T8612] netlink: 96 bytes leftover after parsing attributes in process `syz.2.978'. [ 170.051715][ T8617] pimreg: entered allmulticast mode [ 170.318990][ T8610] SELinux: failed to load policy [ 171.987054][ T30] audit: type=1326 audit(1751570905.333:1180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8647 comm="syz.1.991" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 172.012063][ T8648] sd 0:0:1:0: device reset [ 172.051824][ T30] audit: type=1326 audit(1751570905.363:1181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8647 comm="syz.1.991" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f7d4018d290 code=0x7ffc0000 [ 172.078448][ T30] audit: type=1326 audit(1751570905.363:1182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8647 comm="syz.1.991" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 172.085322][ T8652] netlink: 24 bytes leftover after parsing attributes in process `syz.3.993'. [ 172.105665][ T30] audit: type=1326 audit(1751570905.363:1183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8647 comm="syz.1.991" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 172.152554][ T30] audit: type=1326 audit(1751570905.363:1184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8647 comm="syz.1.991" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 172.176670][ T30] audit: type=1326 audit(1751570905.363:1185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8647 comm="syz.1.991" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 172.278676][ T8663] pimreg: entered allmulticast mode [ 172.318102][ T8664] wireguard3: entered promiscuous mode [ 172.332693][ T8661] siw: device registration error -23 [ 172.380634][ T8656] SELinux: failed to load policy [ 172.407900][ T8670] 9pnet_fd: p9_fd_create_tcp (8670): problem connecting socket to 127.0.0.1 [ 172.508176][ T8674] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 172.598589][ T8674] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 172.710859][ T8674] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 172.848996][ T8674] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 173.332811][ T8686] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1004'. [ 173.448426][ T30] audit: type=1326 audit(1751570906.793:1186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8689 comm="syz.1.1005" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 173.527387][ T30] audit: type=1326 audit(1751570906.793:1187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8689 comm="syz.1.1005" exe="/root/syz-executor" sig=0 arch=c000003e syscall=68 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 173.570735][ T30] audit: type=1326 audit(1751570906.793:1188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8689 comm="syz.1.1005" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 173.629310][ T8697] netlink: 24 bytes leftover after parsing attributes in process `syz.3.1006'. [ 173.640885][ T30] audit: type=1326 audit(1751570906.793:1189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8689 comm="syz.1.1005" exe="/root/syz-executor" sig=0 arch=c000003e syscall=69 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 173.764315][ T8674] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 173.811980][ T8674] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 173.840329][ T8674] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 173.894589][ T8674] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 173.915228][ T8708] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1010'. [ 174.221826][ T8716] siw: device registration error -23 [ 174.239277][ T8722] wireguard4: entered promiscuous mode [ 174.819628][ T8729] pimreg: entered allmulticast mode [ 175.249490][ T8725] SELinux: failed to load policy [ 176.121056][ T8762] netlink: 96 bytes leftover after parsing attributes in process `syz.2.1029'. [ 176.125146][ T8764] netlink: 24 bytes leftover after parsing attributes in process `syz.1.1030'. [ 177.076296][ T8784] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1036'. [ 177.223911][ T8792] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1041'. [ 177.327967][ T30] kauditd_printk_skb: 35 callbacks suppressed [ 177.327984][ T30] audit: type=1326 audit(1751570910.673:1225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8795 comm="syz.4.1043" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff84f98e929 code=0x7ffc0000 [ 177.366084][ T8796] sd 0:0:1:0: device reset [ 177.405181][ T30] audit: type=1326 audit(1751570910.713:1226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8795 comm="syz.4.1043" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff84f98e929 code=0x7ffc0000 [ 177.449619][ T8806] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1044'. [ 177.498185][ T30] audit: type=1326 audit(1751570910.713:1227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8795 comm="syz.4.1043" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7ff84f98d290 code=0x7ffc0000 [ 177.534937][ T8811] random: crng reseeded on system resumption [ 177.553114][ T8811] Restarting kernel threads ... [ 177.558952][ T8811] Done restarting kernel threads. [ 177.565901][ T30] audit: type=1326 audit(1751570910.713:1228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8795 comm="syz.4.1043" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff84f98e929 code=0x7ffc0000 [ 177.649088][ T30] audit: type=1326 audit(1751570910.713:1229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8795 comm="syz.4.1043" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff84f98e929 code=0x7ffc0000 [ 177.707771][ T30] audit: type=1326 audit(1751570910.713:1230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8795 comm="syz.4.1043" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7ff84f98e929 code=0x7ffc0000 [ 177.731760][ T30] audit: type=1326 audit(1751570910.713:1231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8795 comm="syz.4.1043" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff84f98e929 code=0x7ffc0000 [ 177.780644][ T30] audit: type=1326 audit(1751570910.713:1232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8795 comm="syz.4.1043" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff84f98e929 code=0x7ffc0000 [ 177.859523][ T30] audit: type=1400 audit(1751570910.743:1233): avc: denied { write } for pid=8798 comm="syz.1.1044" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 177.897060][ T8823] netlink: 96 bytes leftover after parsing attributes in process `syz.4.1051'. [ 178.765872][ T8839] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1053'. [ 178.777467][ T8838] sd 0:0:1:0: device reset [ 178.784737][ T30] audit: type=1326 audit(1751570912.123:1234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8836 comm="syz.2.1057" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9138b8e929 code=0x7ffc0000 [ 178.913837][ T8844] SELinux: policydb magic number 0x3dfb1000 does not match expected magic number 0xf97cff8c [ 178.932752][ T8844] SELinux: failed to load policy [ 179.223165][ T8865] tipc: Enabling of bearer rejected, failed to enable media [ 180.645958][ T8908] SELinux: failed to load policy [ 181.145554][ T8924] tipc: Enabling of bearer rejected, failed to enable media [ 182.039792][ T8941] syzkaller0: entered promiscuous mode [ 182.052079][ T8946] siw: device registration error -23 [ 182.071619][ T8941] syzkaller0: entered allmulticast mode [ 182.098634][ T8951] 9pnet_virtio: no channels available for device 127.0.0.1 [ 182.135603][ T8939] wireguard5: entered promiscuous mode [ 182.391531][ T30] kauditd_printk_skb: 94 callbacks suppressed [ 182.391549][ T30] audit: type=1326 audit(1751570915.733:1329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8967 comm="syz.2.1103" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9138b8e929 code=0x7ffc0000 [ 182.423965][ T30] audit: type=1326 audit(1751570915.753:1330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8967 comm="syz.2.1103" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9138b8e929 code=0x7ffc0000 [ 182.450128][ T30] audit: type=1326 audit(1751570915.773:1331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8967 comm="syz.2.1103" exe="/root/syz-executor" sig=0 arch=c000003e syscall=42 compat=0 ip=0x7f9138b8e929 code=0x7ffc0000 [ 182.527829][ T30] audit: type=1326 audit(1751570915.773:1332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8967 comm="syz.2.1103" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9138b8e929 code=0x7ffc0000 [ 182.568801][ T30] audit: type=1326 audit(1751570915.773:1333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8967 comm="syz.2.1103" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9138b8e929 code=0x7ffc0000 [ 182.593620][ T30] audit: type=1326 audit(1751570915.803:1334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8967 comm="syz.2.1103" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f9138b8e929 code=0x7ffc0000 [ 182.620371][ T30] audit: type=1326 audit(1751570915.803:1335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8967 comm="syz.2.1103" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9138b8e929 code=0x7ffc0000 [ 182.707427][ T30] audit: type=1326 audit(1751570915.803:1336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8967 comm="syz.2.1103" exe="/root/syz-executor" sig=0 arch=c000003e syscall=69 compat=0 ip=0x7f9138b8e929 code=0x7ffc0000 [ 182.731160][ T30] audit: type=1326 audit(1751570915.853:1337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8967 comm="syz.2.1103" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9138b8e929 code=0x7ffc0000 [ 182.754866][ T30] audit: type=1326 audit(1751570915.853:1338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8967 comm="syz.2.1103" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9138b8e929 code=0x7ffc0000 [ 182.776072][ T8974] SELinux: failed to load policy [ 184.644015][ T9004] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1116'. [ 184.730337][ T9009] siw: device registration error -23 [ 184.752019][ T8995] wireguard6: entered promiscuous mode [ 184.783890][ T9004] tipc: Enabling of bearer rejected, already enabled [ 185.596410][ T9038] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1126'. [ 185.612172][ T9038] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1126'. [ 185.720661][ T9047] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1130'. [ 185.763903][ T9047] veth0_macvtap: left promiscuous mode [ 185.837484][ T9057] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1132'. [ 186.036089][ T5819] Bluetooth: hci3: command 0x0406 tx timeout [ 186.042344][ T5815] Bluetooth: hci2: command 0x0406 tx timeout [ 186.048670][ T5815] Bluetooth: hci1: command 0x0406 tx timeout [ 186.054892][ T5814] Bluetooth: hci4: command 0x0406 tx timeout [ 186.062227][ T5819] Bluetooth: hci0: command 0x0406 tx timeout [ 186.832734][ T9086] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1141'. [ 186.901939][ T9086] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1141'. [ 187.037888][ T9089] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1145'. [ 187.123442][ T9098] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1147'. [ 187.588961][ T30] kauditd_printk_skb: 30 callbacks suppressed [ 187.588977][ T30] audit: type=1326 audit(1751570920.933:1369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9099 comm="syz.2.1149" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9138b8e929 code=0x7ffc0000 [ 187.645426][ T9105] random: crng reseeded on system resumption [ 187.688784][ T9104] Restarting kernel threads ... [ 187.705006][ T30] audit: type=1326 audit(1751570920.943:1370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9099 comm="syz.2.1149" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9138b8e929 code=0x7ffc0000 [ 187.722810][ T9104] Done restarting kernel threads. [ 187.734013][ T30] audit: type=1400 audit(1751570920.993:1371): avc: denied { write } for pid=9102 comm="syz.4.1148" name="snapshot" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 187.760159][ T30] audit: type=1400 audit(1751570920.993:1372): avc: denied { open } for pid=9102 comm="syz.4.1148" path="/dev/snapshot" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 187.784122][ T30] audit: type=1400 audit(1751570921.033:1373): avc: denied { ioctl } for pid=9102 comm="syz.4.1148" path="/dev/snapshot" dev="devtmpfs" ino=92 ioctlcmd=0x3305 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 187.975702][ T9110] syzkaller0: entered promiscuous mode [ 187.981906][ T9110] syzkaller0: entered allmulticast mode [ 188.001651][ T9120] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1155'. [ 188.038359][ T9107] SELinux: failed to load policy [ 188.084361][ T30] audit: type=1400 audit(1751570921.423:1374): avc: denied { connect } for pid=9119 comm="syz.0.1155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 188.121970][ T30] audit: type=1400 audit(1751570921.433:1375): avc: denied { write } for pid=9119 comm="syz.0.1155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 189.380091][ T9146] random: crng reseeded on system resumption [ 189.395007][ T9146] Restarting kernel threads ... [ 189.400494][ T9146] Done restarting kernel threads. [ 189.510570][ T30] audit: type=1326 audit(1751570922.853:1376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9149 comm="syz.2.1166" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9138b8e929 code=0x7ffc0000 [ 189.567286][ T30] audit: type=1326 audit(1751570922.883:1377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9149 comm="syz.2.1166" exe="/root/syz-executor" sig=0 arch=c000003e syscall=42 compat=0 ip=0x7f9138b8e929 code=0x7ffc0000 [ 189.595884][ T30] audit: type=1326 audit(1751570922.883:1378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9149 comm="syz.2.1166" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9138b8e929 code=0x7ffc0000 [ 190.590542][ T9176] sd 0:0:1:0: device reset [ 190.705410][ T9171] SELinux: failed to load policy [ 191.610977][ T9204] __nla_validate_parse: 2 callbacks suppressed [ 191.610994][ T9204] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1184'. [ 191.942830][ T9186] macsec1: entered allmulticast mode [ 191.967770][ T9186] bond0: entered allmulticast mode [ 192.016953][ T9186] bond0: left allmulticast mode [ 192.048362][ T9214] tipc: Enabling of bearer rejected, already enabled [ 192.231057][ T9226] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1195'. [ 192.472061][ T9234] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1198'. [ 193.502018][ T9247] 9pnet_fd: p9_fd_create_tcp (9247): problem connecting socket to 127.0.0.1 [ 193.770300][ T9256] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1202'. [ 194.006824][ T9266] tipc: Enabling of bearer rejected, already enabled [ 194.195643][ T1295] ieee802154 phy0 wpan0: encryption failed: -22 [ 194.737253][ T9284] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1211'. [ 195.751119][ T30] kauditd_printk_skb: 49 callbacks suppressed [ 195.751136][ T30] audit: type=1400 audit(1751570929.093:1428): avc: denied { read write } for pid=5820 comm="syz-executor" name="loop0" dev="devtmpfs" ino=2798 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 195.792165][ T30] audit: type=1400 audit(1751570929.093:1429): avc: denied { open } for pid=5820 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=2798 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 195.839377][ T30] audit: type=1400 audit(1751570929.093:1430): avc: denied { ioctl } for pid=5820 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=2798 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 196.156254][ T9315] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1219'. [ 196.613065][ T9320] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1221'. [ 196.638787][ T9320] tipc: Enabling of bearer rejected, already enabled [ 196.794770][ T30] audit: type=1400 audit(1751570930.133:1431): avc: denied { read } for pid=9327 comm="syz.2.1224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 196.857281][ T30] audit: type=1400 audit(1751570930.183:1432): avc: denied { create } for pid=9333 comm="syz.0.1229" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 196.879851][ T30] audit: type=1400 audit(1751570930.203:1433): avc: denied { create } for pid=9333 comm="syz.0.1229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 197.124121][ T9350] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1233'. [ 197.760661][ T9359] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1235'. [ 197.772960][ T9359] tipc: Enabling of bearer rejected, already enabled [ 198.003096][ T30] audit: type=1400 audit(1751570931.343:1434): avc: denied { unlink } for pid=5820 comm="syz-executor" name="file0" dev="tmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 198.324181][ T9382] netlink: 536 bytes leftover after parsing attributes in process `syz.2.1244'. [ 198.351248][ T9388] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1247'. [ 198.374727][ T9387] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1248'. [ 198.407119][ T9387] tipc: Enabling of bearer rejected, already enabled [ 198.551397][ T9402] 9pnet_fd: p9_fd_create_tcp (9402): problem connecting socket to 127.0.0.1 [ 199.193678][ T9405] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 199.659490][ T9435] netlink: 16 bytes leftover after parsing attributes in process `syz.4.1264'. [ 199.694027][ T9435] tipc: Enabling of bearer rejected, already enabled [ 199.741078][ T9440] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1265'. [ 199.760271][ T30] audit: type=1400 audit(1751570933.103:1435): avc: denied { setopt } for pid=9438 comm="syz.0.1266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 200.030918][ T30] audit: type=1400 audit(1751570933.373:1436): avc: denied { create } for pid=9445 comm="syz.1.1268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 200.054755][ T30] audit: type=1400 audit(1751570933.403:1437): avc: denied { write } for pid=9445 comm="syz.1.1268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 200.291847][ T9457] netlink: 'syz.4.1272': attribute type 298 has an invalid length. [ 200.406597][ T9460] random: crng reseeded on system resumption [ 200.450959][ T9460] Restarting kernel threads ... [ 200.456488][ T9460] Done restarting kernel threads. [ 200.512498][ T9466] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1277'. [ 201.550546][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 201.550563][ T30] audit: type=1400 audit(1751570934.893:1445): avc: denied { watch watch_reads } for pid=9481 comm="syz.1.1283" path="/266" dev="tmpfs" ino=1369 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 201.715892][ T9493] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1288'. [ 201.834492][ T9497] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1290'. [ 201.963344][ T30] audit: type=1400 audit(1751570935.313:1446): avc: denied { getopt } for pid=9503 comm="syz.0.1293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 202.137138][ T9511] netlink: 16 bytes leftover after parsing attributes in process `syz.3.1296'. [ 202.139743][ T9511] tipc: Enabling of bearer rejected, already enabled [ 202.147700][ T30] audit: type=1400 audit(1751570935.443:1447): avc: denied { ioctl } for pid=9503 comm="syz.0.1293" path="socket:[19556]" dev="sockfs" ino=19556 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 202.485112][ T9523] netlink: 536 bytes leftover after parsing attributes in process `syz.4.1302'. [ 202.485142][ T9523] netlink: 40 bytes leftover after parsing attributes in process `syz.4.1302'. [ 202.610057][ T9527] random: crng reseeded on system resumption [ 202.620351][ T9527] Restarting kernel threads ... [ 202.626281][ T9527] Done restarting kernel threads. [ 203.002460][ T30] audit: type=1326 audit(1751570936.343:1448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9535 comm="syz.4.1308" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff84f98e929 code=0x7ffc0000 [ 203.062457][ T30] audit: type=1326 audit(1751570936.383:1449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9535 comm="syz.4.1308" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff84f98e929 code=0x7ffc0000 [ 203.085865][ C0] vkms_vblank_simulate: vblank timer overrun [ 203.107148][ T9541] netlink: 16 bytes leftover after parsing attributes in process `syz.1.1310'. [ 203.118863][ T9541] tipc: Enabling of bearer rejected, already enabled [ 203.138092][ T30] audit: type=1326 audit(1751570936.483:1450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9538 comm="syz.0.1309" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0675f8e929 code=0x7ffc0000 [ 203.184607][ T30] audit: type=1326 audit(1751570936.483:1451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9538 comm="syz.0.1309" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0675f8e929 code=0x7ffc0000 [ 203.211829][ T30] audit: type=1326 audit(1751570936.483:1452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9538 comm="syz.0.1309" exe="/root/syz-executor" sig=0 arch=c000003e syscall=42 compat=0 ip=0x7f0675f8e929 code=0x7ffc0000 [ 203.229080][ T9543] sd 0:0:1:0: device reset [ 203.241207][ T30] audit: type=1326 audit(1751570936.483:1453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9538 comm="syz.0.1309" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0675f8e929 code=0x7ffc0000 [ 203.269408][ T30] audit: type=1326 audit(1751570936.483:1454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9538 comm="syz.0.1309" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0675f8e929 code=0x7ffc0000 [ 203.694570][ T9574] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1322'. [ 204.034035][ T9589] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1326'. [ 205.044829][ T9604] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 205.045947][ T9604] Bluetooth: hci0: Opcode 0x0406 failed: -4 [ 205.063956][ T9604] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 205.064020][ T9604] Bluetooth: hci1: Opcode 0x0406 failed: -4 [ 205.067944][ T9604] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 205.068006][ T9604] Bluetooth: hci2: Opcode 0x0406 failed: -4 [ 205.068911][ T9604] Bluetooth: hci3: Opcode 0x0c1a failed: -4 [ 205.068963][ T9604] Bluetooth: hci3: Opcode 0x0406 failed: -4 [ 205.069889][ T9604] Bluetooth: hci4: Opcode 0x0c1a failed: -4 [ 205.069940][ T9604] Bluetooth: hci4: Opcode 0x0406 failed: -4 [ 205.298223][ T9617] wireguard5: entered promiscuous mode [ 205.314026][ T9625] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1337'. [ 205.316806][ T9617] siw: device registration error -23 [ 206.043601][ T9651] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1343'. [ 206.753368][ T5823] Bluetooth: hci0: command 0x0406 tx timeout [ 206.921499][ T9701] __nla_validate_parse: 1 callbacks suppressed [ 206.921518][ T9701] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1355'. [ 207.072817][ T5823] Bluetooth: hci4: command 0x0406 tx timeout [ 207.073870][ T5818] Bluetooth: hci2: command 0x0406 tx timeout [ 207.078876][ T5823] Bluetooth: hci1: command 0x0406 tx timeout [ 207.086129][ T5825] Bluetooth: hci3: command 0x0406 tx timeout [ 207.961355][ T9723] netlink: 24 bytes leftover after parsing attributes in process `syz.0.1365'. [ 207.962714][ T30] kauditd_printk_skb: 73 callbacks suppressed [ 207.962727][ T30] audit: type=1400 audit(1751570941.303:1528): avc: denied { associate } for pid=9722 comm="syz.0.1365" name="686" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 208.073358][ T9732] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=9732 comm=syz.0.1365 [ 208.199299][ T9745] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1369'. [ 208.366561][ T9753] sd 0:0:1:0: device reset [ 208.373825][ T30] audit: type=1326 audit(1751570941.713:1529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9752 comm="syz.3.1375" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 208.413118][ T30] audit: type=1326 audit(1751570941.713:1530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9752 comm="syz.3.1375" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 208.442562][ T30] audit: type=1326 audit(1751570941.713:1531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9752 comm="syz.3.1375" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fb078b8d290 code=0x7ffc0000 [ 208.502432][ T30] audit: type=1326 audit(1751570941.713:1532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9752 comm="syz.3.1375" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 208.652644][ T30] audit: type=1326 audit(1751570941.713:1533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9752 comm="syz.3.1375" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 208.731432][ T30] audit: type=1326 audit(1751570941.713:1534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9752 comm="syz.3.1375" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 208.806480][ T30] audit: type=1326 audit(1751570941.753:1535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9752 comm="syz.3.1375" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 208.847078][ T5825] Bluetooth: hci0: command 0x0406 tx timeout [ 208.866071][ T30] audit: type=1326 audit(1751570941.753:1536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9752 comm="syz.3.1375" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 208.892047][ T30] audit: type=1400 audit(1751570941.783:1537): avc: denied { mounton } for pid=9754 comm="syz.4.1376" path="/276/file0" dev="tmpfs" ino=1420 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 208.980404][ T9790] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1386'. [ 209.152599][ T5825] Bluetooth: hci2: command 0x0406 tx timeout [ 209.158888][ T5818] Bluetooth: hci1: command 0x0406 tx timeout [ 209.165126][ T5823] Bluetooth: hci4: command 0x0406 tx timeout [ 209.182242][ T9799] tipc: Enabled bearer , priority 0 [ 209.223840][ T9794] tipc: Resetting bearer [ 209.390285][ T9811] siw: device registration error -23 [ 209.392494][ T5825] Bluetooth: hci3: command 0x0406 tx timeout [ 209.899642][ T9816] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1397'. [ 210.497708][ T9794] tipc: Disabling bearer [ 210.506750][ T9809] workqueue: Failed to create a rescuer kthread for wq "wg-crypt-wireguard%d": -EINTR [ 210.609551][ T9824] sd 0:0:1:0: device reset [ 210.773185][ T9836] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1402'. [ 211.136601][ T9855] netlink: 536 bytes leftover after parsing attributes in process `syz.3.1409'. [ 211.202196][ T9855] netlink: 32 bytes leftover after parsing attributes in process `syz.3.1409'. [ 211.562813][ T9872] random: crng reseeded on system resumption [ 211.595283][ T9872] Restarting kernel threads ... [ 211.602345][ T9877] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1418'. [ 211.610868][ T9872] Done restarting kernel threads. [ 212.157699][ T9910] random: crng reseeded on system resumption [ 212.237891][ T9910] Restarting kernel threads ... [ 212.257188][ T9910] Done restarting kernel threads. [ 212.473998][ T9923] netlink: 'syz.4.1434': attribute type 10 has an invalid length. [ 212.507482][ T9923] netlink: 'syz.4.1434': attribute type 10 has an invalid length. [ 212.544607][ T9923] netlink: 40 bytes leftover after parsing attributes in process `syz.4.1434'. [ 212.822802][ T9948] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1444'. [ 212.832069][ T9947] random: crng reseeded on system resumption [ 212.848573][ T9947] Restarting kernel threads ... [ 212.856281][ T9947] Done restarting kernel threads. [ 212.996912][ T30] kauditd_printk_skb: 109 callbacks suppressed [ 212.996928][ T30] audit: type=1400 audit(1751570946.343:1647): avc: denied { write } for pid=9952 comm="syz.4.1449" path="socket:[20166]" dev="sockfs" ino=20166 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 213.320373][ T9968] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1455'. [ 213.729917][ T9977] sd 0:0:1:0: device reset [ 213.925064][ T30] audit: type=1326 audit(1751570947.053:1648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9976 comm="syz.3.1459" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 213.952291][ T30] audit: type=1326 audit(1751570947.053:1649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9976 comm="syz.3.1459" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 214.165323][ T30] audit: type=1400 audit(1751570947.513:1650): avc: denied { write } for pid=9997 comm="syz.4.1466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 214.445029][T10014] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1471'. [ 215.426594][T10030] serio: Serial port pts0 [ 216.032736][T10061] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1485'. [ 216.355713][T10078] netlink: 'syz.2.1493': attribute type 1 has an invalid length. [ 216.418253][ T30] audit: type=1326 audit(1751570949.763:1651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10080 comm="syz.0.1496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0675f8e929 code=0x7ffc0000 [ 216.462579][ T30] audit: type=1326 audit(1751570949.793:1652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10080 comm="syz.0.1496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f0675f8d290 code=0x7ffc0000 [ 216.487407][ T30] audit: type=1326 audit(1751570949.793:1653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10080 comm="syz.0.1496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0675f8e929 code=0x7ffc0000 [ 216.535339][ T30] audit: type=1326 audit(1751570949.793:1654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10080 comm="syz.0.1496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f0675f8e929 code=0x7ffc0000 [ 216.573604][T10088] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1498'. [ 216.603142][ T30] audit: type=1326 audit(1751570949.793:1655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10080 comm="syz.0.1496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0675f8e929 code=0x7ffc0000 [ 216.694274][ T30] audit: type=1400 audit(1751570950.043:1656): avc: denied { execute } for pid=10092 comm="syz.4.1501" path="/299/pids.events" dev="tmpfs" ino=1538 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 216.851427][T10108] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1502'. [ 217.589350][T10161] netlink: 'syz.3.1526': attribute type 4 has an invalid length. [ 218.148427][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 218.148447][ T30] audit: type=1326 audit(1751570951.493:1667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10193 comm="syz.3.1541" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 218.193288][ T30] audit: type=1326 audit(1751570951.493:1668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10193 comm="syz.3.1541" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 218.218637][ T30] audit: type=1326 audit(1751570951.493:1669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10193 comm="syz.3.1541" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fb078b8d290 code=0x7ffc0000 [ 218.250130][ T30] audit: type=1326 audit(1751570951.493:1670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10193 comm="syz.3.1541" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 218.279863][ T30] audit: type=1326 audit(1751570951.493:1671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10193 comm="syz.3.1541" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 218.333174][T10208] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1542'. [ 218.410471][ T30] audit: type=1326 audit(1751570951.493:1672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10193 comm="syz.3.1541" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 218.505500][ T30] audit: type=1326 audit(1751570951.493:1673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10193 comm="syz.3.1541" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 218.571589][ T30] audit: type=1326 audit(1751570951.493:1674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10193 comm="syz.3.1541" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 218.695665][T10220] syzkaller0: entered promiscuous mode [ 218.697721][T10230] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1553'. [ 218.711410][T10220] syzkaller0: entered allmulticast mode [ 218.769396][ T30] audit: type=1326 audit(1751570952.073:1675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10227 comm="syz.1.1555" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 218.797749][ T30] audit: type=1326 audit(1751570952.073:1676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10227 comm="syz.1.1555" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 220.767732][T10271] netlink: 'syz.1.1566': attribute type 10 has an invalid length. [ 220.793159][T10271] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 220.800338][T10275] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1564'. [ 220.811969][T10271] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 220.867080][T10271] netlink: 'syz.1.1566': attribute type 10 has an invalid length. [ 220.875308][T10271] netlink: 40 bytes leftover after parsing attributes in process `syz.1.1566'. [ 220.890416][T10271] batadv0: entered promiscuous mode [ 220.896664][T10271] batadv0: entered allmulticast mode [ 220.918119][T10271] bond0: (slave batadv0): Releasing backup interface [ 220.935549][T10271] A link change request failed with some changes committed already. Interface batadv0 may have been left with an inconsistent configuration, please check. [ 223.907475][T10340] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1582'. [ 224.073083][ T30] kauditd_printk_skb: 45 callbacks suppressed [ 224.073100][ T30] audit: type=1400 audit(1751570957.423:1722): avc: denied { setopt } for pid=10344 comm="syz.0.1584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 224.140412][ T30] audit: type=1400 audit(1751570957.443:1723): avc: denied { bind } for pid=10344 comm="syz.0.1584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 224.214120][ T30] audit: type=1400 audit(1751570957.443:1724): avc: denied { name_bind } for pid=10344 comm="syz.0.1584" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 224.279906][ T30] audit: type=1400 audit(1751570957.443:1725): avc: denied { node_bind } for pid=10344 comm="syz.0.1584" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 224.318865][T10349] usb usb1: usbfs: process 10349 (syz.4.1586) did not claim interface 0 before use [ 224.349362][ T30] audit: type=1400 audit(1751570957.443:1726): avc: denied { getopt } for pid=10344 comm="syz.0.1584" laddr=::ffff:0.0.0.0 lport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 224.372284][T10352] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1587'. [ 224.407832][ T30] audit: type=1400 audit(1751570957.663:1727): avc: denied { append } for pid=10347 comm="syz.4.1586" name="001" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 224.546100][T10356] tipc: Enabling of bearer rejected, already enabled [ 224.653065][T10364] siw: device registration error -23 [ 224.666219][ T30] audit: type=1326 audit(1751570958.003:1728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10361 comm="syz.1.1591" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 224.727520][ T30] audit: type=1326 audit(1751570958.023:1729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10361 comm="syz.1.1591" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f7d4018d290 code=0x7ffc0000 [ 224.776317][ T30] audit: type=1326 audit(1751570958.023:1730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10361 comm="syz.1.1591" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 224.818042][ T30] audit: type=1326 audit(1751570958.043:1731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10361 comm="syz.1.1591" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f7d4018e929 code=0x7ffc0000 [ 225.833336][T10384] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1596'. [ 227.096771][T10358] workqueue: Failed to create a rescuer kthread for wq "wg-crypt-wireguard%d": -EINTR [ 227.111036][T10379] platform regulatory.0: loading /lib/firmware/regulatory.db failed with error -12 [ 227.131507][T10379] platform regulatory.0: Direct firmware load for regulatory.db failed with error -12 [ 227.141344][T10379] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 227.502795][T10403] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1602'. [ 227.987387][T10433] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1610'. [ 228.202063][T10436] ======================================================= [ 228.202063][T10436] WARNING: The mand mount option has been deprecated and [ 228.202063][T10436] and is ignored by this kernel. Remove the mand [ 228.202063][T10436] option from the mount to silence this warning. [ 228.202063][T10436] ======================================================= [ 228.730096][T10443] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1612'. [ 228.875282][T10449] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1613'. [ 229.071201][T10466] netlink: 76 bytes leftover after parsing attributes in process `syz.1.1619'. [ 231.148819][ T30] kauditd_printk_skb: 11 callbacks suppressed [ 231.148834][ T30] audit: type=1326 audit(1751570964.493:1743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10492 comm="syz.3.1624" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 231.381924][ T30] audit: type=1326 audit(1751570964.493:1744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10492 comm="syz.3.1624" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 231.412408][ T30] audit: type=1326 audit(1751570964.523:1745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10492 comm="syz.3.1624" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 232.037569][T10505] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1625'. [ 232.064192][ T30] audit: type=1326 audit(1751570964.523:1746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10492 comm="syz.3.1624" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 232.088076][ T30] audit: type=1326 audit(1751570964.523:1747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10492 comm="syz.3.1624" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 232.113409][ T30] audit: type=1326 audit(1751570964.523:1748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10492 comm="syz.3.1624" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 232.139799][ T30] audit: type=1326 audit(1751570964.533:1749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10492 comm="syz.3.1624" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 232.253568][ T30] audit: type=1326 audit(1751570964.533:1750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10492 comm="syz.3.1624" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 232.277746][ T30] audit: type=1326 audit(1751570964.533:1751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10492 comm="syz.3.1624" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 232.305414][ T30] audit: type=1326 audit(1751570964.533:1752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10492 comm="syz.3.1624" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 232.881520][T10529] netlink: 'syz.4.1635': attribute type 6 has an invalid length. [ 233.602967][T10537] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1638'. [ 233.637497][T10526] delete_channel: no stack [ 235.271873][T10547] platform regulatory.0: loading /lib/firmware/regulatory.db failed with error -12 [ 235.281400][T10547] platform regulatory.0: Direct firmware load for regulatory.db failed with error -12 [ 235.292491][T10547] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 235.643273][T10573] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10573 comm=syz.2.1648 [ 235.661323][T10573] netlink: 'syz.2.1648': attribute type 1 has an invalid length. [ 235.720610][T10573] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1648'. [ 235.739204][T10578] netlink: 340 bytes leftover after parsing attributes in process `syz.3.1650'. [ 235.748084][T10573] bond0: (slave bridge0): making interface the new active one [ 235.757675][T10573] bond0: (slave bridge0): Enslaving as an active interface with an up link [ 235.787403][T10578] netlink: 36 bytes leftover after parsing attributes in process `syz.3.1650'. [ 236.009113][T10590] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1655'. [ 238.065731][T10604] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1658'. [ 238.198286][ T30] kauditd_printk_skb: 76 callbacks suppressed [ 238.198302][ T30] audit: type=1400 audit(1751570971.543:1829): avc: denied { create } for pid=10619 comm="syz.3.1664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 238.290314][ T30] audit: type=1400 audit(1751570971.573:1830): avc: denied { bind } for pid=10619 comm="syz.3.1664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 238.315180][T10628] wireguard6: entered promiscuous mode [ 238.340065][T10632] veth0: entered promiscuous mode [ 238.341321][ T30] audit: type=1400 audit(1751570971.573:1831): avc: denied { connect } for pid=10619 comm="syz.3.1664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 238.366129][ T30] audit: type=1400 audit(1751570971.633:1832): avc: denied { create } for pid=10625 comm="syz.2.1666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 238.386879][ T30] audit: type=1400 audit(1751570971.663:1833): avc: denied { connect } for pid=10625 comm="syz.2.1666" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 238.391085][T10622] siw: device registration error -23 [ 238.408690][ T30] audit: type=1400 audit(1751570971.663:1834): avc: denied { ioctl } for pid=10625 comm="syz.2.1666" path="socket:[22556]" dev="sockfs" ino=22556 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 238.440622][ T30] audit: type=1400 audit(1751570971.673:1835): avc: denied { write } for pid=10625 comm="syz.2.1666" name="kcm" dev="proc" ino=4026533135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 238.470766][T10632] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1668'. [ 238.476457][ T30] audit: type=1400 audit(1751570971.733:1836): avc: denied { create } for pid=10627 comm="syz.0.1667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 238.585818][ T30] audit: type=1400 audit(1751570971.763:1837): avc: denied { write } for pid=10627 comm="syz.0.1667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 239.567262][T10671] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1681'. [ 239.655882][T10675] netlink: 36 bytes leftover after parsing attributes in process `syz.1.1679'. [ 239.694782][T10675] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1679'. [ 240.158569][T10694] wireguard7: entered promiscuous mode [ 240.180147][T10694] siw: device registration error -23 [ 240.270625][ T30] audit: type=1400 audit(1751570973.613:1838): avc: denied { read } for pid=10689 comm="syz.2.1688" name="autofs" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 240.450918][T10713] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=10713 comm=syz.3.1694 [ 240.487530][T10713] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10713 comm=syz.3.1694 [ 241.776095][T10745] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1703'. [ 242.186213][T10758] syzkaller0: entered promiscuous mode [ 242.191739][T10758] syzkaller0: entered allmulticast mode [ 243.758328][T10795] siw: device registration error -23 [ 244.052016][T10794] wireguard1: entered promiscuous mode [ 244.112550][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 244.112564][ T30] audit: type=1400 audit(1751570977.453:1841): avc: denied { setcurrent } for pid=10797 comm="syz.4.1716" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 244.241266][ T30] audit: type=1401 audit(1751570977.453:1842): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 244.288236][ T30] audit: type=1326 audit(1751570977.463:1843): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10799 comm="syz.3.1717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 244.312250][ T30] audit: type=1326 audit(1751570977.463:1844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10799 comm="syz.3.1717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 244.339295][ T30] audit: type=1326 audit(1751570977.463:1845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10799 comm="syz.3.1717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 244.367224][ T30] audit: type=1326 audit(1751570977.463:1846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10799 comm="syz.3.1717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 244.391930][ T30] audit: type=1326 audit(1751570977.463:1847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10799 comm="syz.3.1717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 244.496958][ T30] audit: type=1326 audit(1751570977.463:1848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10799 comm="syz.3.1717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 244.582572][ T30] audit: type=1326 audit(1751570977.463:1849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10799 comm="syz.3.1717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 244.629454][ T30] audit: type=1326 audit(1751570977.463:1850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10799 comm="syz.3.1717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 244.878087][T10832] syzkaller0: entered promiscuous mode [ 244.894042][T10832] syzkaller0: entered allmulticast mode [ 246.953392][T10927] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1763'. [ 248.260042][T10960] process 'syz.3.1773' launched '/dev/fd/6' with NULL argv: empty string added [ 248.565786][T10981] vlan2: entered allmulticast mode [ 248.571127][T10981] batadv0: entered allmulticast mode [ 248.607473][T10984] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1784'. [ 248.761778][T10989] netlink: 180 bytes leftover after parsing attributes in process `syz.3.1786'. [ 249.454048][ T30] kauditd_printk_skb: 30 callbacks suppressed [ 249.454065][ T30] audit: type=1326 audit(1751570982.803:1881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10998 comm="syz.3.1789" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 249.518885][ T30] audit: type=1326 audit(1751570982.803:1882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10998 comm="syz.3.1789" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 249.548130][ T30] audit: type=1326 audit(1751570982.803:1883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10998 comm="syz.3.1789" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 249.573260][ T30] audit: type=1326 audit(1751570982.803:1884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10998 comm="syz.3.1789" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 249.597276][ T30] audit: type=1326 audit(1751570982.803:1885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10998 comm="syz.3.1789" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 249.645074][ T30] audit: type=1326 audit(1751570982.803:1886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10998 comm="syz.3.1789" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 249.691886][ T30] audit: type=1326 audit(1751570982.803:1887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10998 comm="syz.3.1789" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 249.730567][ T30] audit: type=1326 audit(1751570982.803:1888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10998 comm="syz.3.1789" exe="/root/syz-executor" sig=0 arch=c000003e syscall=67 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 249.774661][ T30] audit: type=1326 audit(1751570982.803:1889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10998 comm="syz.3.1789" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 249.798899][ T30] audit: type=1326 audit(1751570982.803:1890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10998 comm="syz.3.1789" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078b8e929 code=0x7ffc0000 [ 249.961453][T11019] netlink: 224 bytes leftover after parsing attributes in process `syz.2.1799'. [ 249.991205][T11019] ksmbd: Unknown IPC event: 3, ignore. [ 250.160617][T11023] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1801'. [ 252.253850][T11064] netlink: 36 bytes leftover after parsing attributes in process `syz.4.1814'. [ 252.980576][T11036] platform regulatory.0: loading /lib/firmware/regulatory.db failed with error -12 [ 252.990017][T11036] platform regulatory.0: Direct firmware load for regulatory.db failed with error -12 [ 253.000048][T11036] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 253.229399][T11080] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 253.260328][T11080] openvswitch: netlink: Flow key attr not present in new flow. [ 253.431708][ T5894] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 253.459613][ T5894] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 253.494690][ T5894] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 253.544958][ T5894] hid-generic 0003:0004:0000.0001: hidraw0: USB HID v0.00 Device [syz0] on syz1 [ 253.577328][T11108] tipc: Resetting bearer [ 254.745931][T11138] netlink: 24 bytes leftover after parsing attributes in process `syz.0.1837'. [ 255.635548][ T1295] ieee802154 phy0 wpan0: encryption failed: -22 [ 255.783785][ T5894] usb 5-1: new high-speed USB device number 2 using dummy_hcd [ 257.105574][ T5894] usb 5-1: config 0 has an invalid interface number: 156 but max is 0 [ 257.380739][ T5894] usb 5-1: config 0 has no interface number 0 [ 257.399267][ T5894] usb 5-1: New USB device found, idVendor=abcd, idProduct=cdee, bcdDevice= 5.b9 [ 257.409093][ T5894] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 257.642046][ T5894] usb 5-1: config 0 descriptor?? [ 257.654940][ T5894] gspca_main: spca561-2.14.0 probing abcd:cdee [ 258.629951][ T5894] spca561 5-1:0.156: probe with driver spca561 failed with error -22 [ 258.641655][ T5894] usb 5-1: Quirk or no altset; falling back to MIDI 1.0 [ 258.649119][ T5894] usb 5-1: MIDIStreaming interface descriptor not found [ 258.729178][T11208] usb usb7: usbfs: process 11208 (syz.1.1863) did not claim interface 0 before use [ 259.007831][ T5894] usb 5-1: USB disconnect, device number 2 [ 259.900422][T11227] netlink: 52 bytes leftover after parsing attributes in process `syz.3.1867'. [ 260.558757][ T30] kauditd_printk_skb: 115 callbacks suppressed [ 260.558773][ T30] audit: type=1400 audit(1751570993.903:2006): avc: denied { write } for pid=11249 comm="syz.0.1880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 260.773449][T11261] netlink: 'syz.1.1884': attribute type 39 has an invalid length. [ 260.785243][T11259] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1885'. [ 261.565123][T11291] lo speed is unknown, defaulting to 1000 [ 261.571267][T11291] lo speed is unknown, defaulting to 1000 [ 261.582130][T11291] lo speed is unknown, defaulting to 1000 [ 261.650768][T11291] infiniband syz2: RDMA CMA: cma_listen_on_dev, error -98 [ 261.801300][T11291] lo speed is unknown, defaulting to 1000 [ 261.816987][T11291] lo speed is unknown, defaulting to 1000 [ 261.832898][T11291] lo speed is unknown, defaulting to 1000 [ 261.849571][T11291] lo speed is unknown, defaulting to 1000 [ 261.867181][T11291] lo speed is unknown, defaulting to 1000 [ 262.511477][T11302] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=11302 comm=syz.0.1899 [ 262.576401][T11302] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11302 comm=syz.0.1899 [ 262.975768][T11320] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1905'. [ 263.091173][T11323] SELinux: ebitmap: truncated map [ 263.143567][T11323] SELinux: failed to load policy [ 263.246211][T11330] wireguard8: entered promiscuous mode [ 263.271846][T11330] siw: device registration error -23 [ 263.376385][T11340] tipc: Enabled bearer , priority 0 [ 263.419600][T11340] tipc: Disabling bearer [ 264.253683][ T30] audit: type=1400 audit(1751570997.603:2007): avc: denied { ioctl } for pid=11357 comm="syz.1.1919" path="socket:[24245]" dev="sockfs" ino=24245 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 264.359810][ T30] audit: type=1400 audit(1751570997.703:2008): avc: denied { setopt } for pid=11361 comm="syz.4.1920" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 265.141776][T11398] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1933'. [ 265.198629][ T30] audit: type=1400 audit(1751570998.543:2009): avc: denied { ioctl } for pid=11393 comm="syz.2.1933" path="socket:[24859]" dev="sockfs" ino=24859 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 265.304362][T11406] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1936'. [ 266.366136][T11381] workqueue: Failed to create a rescuer kthread for wq "wg-crypt-wireguard%d": -EINTR [ 266.497977][T11428] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1941'. [ 266.520818][T11428] openvswitch: netlink: Flow key attr not present in new flow. [ 266.693132][T11432] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1940'. [ 267.402652][T11451] wireguard9: entered promiscuous mode [ 267.410960][T11451] siw: device registration error -23 [ 280.227462][ T30] audit: type=1400 audit(1751571013.573:2010): avc: denied { read write } for pid=11458 comm="syz-executor" name="vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 280.251657][ T30] audit: type=1400 audit(1751571013.573:2011): avc: denied { open } for pid=11458 comm="syz-executor" path="/dev/vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 317.075907][ T1295] ieee802154 phy0 wpan0: encryption failed: -22 [ 357.669015][ T30] audit: type=1400 audit(1751571091.013:2012): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.169 src=33916 daddr=10.128.1.227 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 378.526047][ T1295] ieee802154 phy0 wpan0: encryption failed: -22 [ 425.872463][ T31] INFO: task kworker/0:2:974 blocked for more than 143 seconds. [ 425.880129][ T31] Not tainted 6.16.0-rc4-syzkaller-00108-g17bbde2e1716 #0 [ 425.888026][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 425.897750][ T31] task:kworker/0:2 state:D stack:24232 pid:974 tgid:974 ppid:2 task_flags:0x4208060 flags:0x00004000 [ 425.909830][ T31] Workqueue: events rfkill_global_led_trigger_worker [ 425.917623][ T31] Call Trace: SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 425.920972][ T31] [ 425.924049][ T31] __schedule+0x116a/0x5de0 [ 425.928583][ T31] ? __lock_acquire+0xb8a/0x1c90 [ 425.932484][ T30] audit: type=1400 audit(1751571159.273:2013): avc: denied { write } for pid=5797 comm="syz-executor" path="pipe:[4251]" dev="pipefs" ino=4251 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 425.935235][ T31] ? __pfx___schedule+0x10/0x10 [ 425.962340][ T31] ? find_held_lock+0x2b/0x80 [ 425.967740][ T31] ? schedule+0x2d7/0x3a0 [ 426.004078][ T31] schedule+0xe7/0x3a0 [ 426.008211][ T31] schedule_preempt_disabled+0x13/0x30 [ 426.025140][ T31] __mutex_lock+0x6c7/0xb90 [ 426.029715][ T31] ? rfkill_global_led_trigger_worker+0x1b/0x160 [ 426.036088][ T31] ? __pfx___mutex_lock+0x10/0x10 [ 426.041114][ T31] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 426.047104][ T31] ? finish_task_switch.isra.0+0x221/0xc10 [ 426.052943][ T31] ? rfkill_global_led_trigger_worker+0x1b/0x160 [ 426.059279][ T31] rfkill_global_led_trigger_worker+0x1b/0x160 [ 426.065443][ T31] process_one_work+0x9cf/0x1b70 [ 426.070379][ T31] ? __pfx_process_one_work+0x10/0x10 [ 426.075937][ T31] ? assign_work+0x1a0/0x250 [ 426.080531][ T31] worker_thread+0x6c8/0xf10 [ 426.085132][ T31] ? __kthread_parkme+0x19e/0x250 [ 426.090166][ T31] ? __pfx_worker_thread+0x10/0x10 [ 426.095955][ T31] kthread+0x3c2/0x780 [ 426.100038][ T31] ? __pfx_kthread+0x10/0x10 [ 426.104807][ T31] ? rcu_is_watching+0x12/0xc0 [ 426.109564][ T31] ? __pfx_kthread+0x10/0x10 [ 426.114219][ T31] ret_from_fork+0x5d4/0x6f0 [ 426.118848][ T31] ? __pfx_kthread+0x10/0x10 [ 426.123485][ T31] ret_from_fork_asm+0x1a/0x30 [ 426.128287][ T31] [ 426.131566][ T31] INFO: task syz.2.1933:11412 blocked for more than 143 seconds. [ 426.139502][ T31] Not tainted 6.16.0-rc4-syzkaller-00108-g17bbde2e1716 #0 [ 426.147165][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 426.155900][ T31] task:syz.2.1933 state:D stack:28696 pid:11412 tgid:11393 ppid:5809 task_flags:0x400040 flags:0x00004006 [ 426.168102][ T31] Call Trace: [ 426.171381][ T31] [ 426.174357][ T31] __schedule+0x116a/0x5de0 [ 426.178883][ T31] ? __lock_acquire+0x622/0x1c90 [ 426.183850][ T31] ? __pfx___schedule+0x10/0x10 [ 426.188699][ T31] ? find_held_lock+0x2b/0x80 [ 426.193703][ T31] ? schedule+0x2d7/0x3a0 [ 426.198766][ T31] schedule+0xe7/0x3a0 [ 426.202913][ T31] schedule_preempt_disabled+0x13/0x30 [ 426.208392][ T31] __mutex_lock+0x6c7/0xb90 [ 426.212925][ T31] ? nfc_dev_down+0x2d/0x2e0 [ 426.217541][ T31] ? __pfx___mutex_lock+0x10/0x10 [ 426.222932][ T31] ? do_raw_spin_lock+0x12c/0x2b0 [ 426.227963][ T31] ? nfc_dev_down+0x2d/0x2e0 [ 426.232594][ T31] ? mark_held_locks+0x49/0x80 [ 426.237358][ T31] nfc_dev_down+0x2d/0x2e0 [ 426.241758][ T31] nfc_rfkill_set_block+0x39/0xe0 [ 426.246820][ T31] ? __pfx_nfc_rfkill_set_block+0x10/0x10 [ 426.252893][ T31] rfkill_set_block+0x1fe/0x550 [ 426.257764][ T31] rfkill_fop_write+0x2c0/0x580 [ 426.262647][ T31] ? __pfx_rfkill_fop_write+0x10/0x10 [ 426.268027][ T31] ? bpf_lsm_inode_setsecurity+0x10/0x20 [ 426.273799][ T31] ? security_file_permission+0x71/0x210 [ 426.279436][ T31] ? rw_verify_area+0xcf/0x680 [ 426.284410][ T31] ? __pfx_rfkill_fop_write+0x10/0x10 [ 426.289765][ T31] vfs_write+0x29d/0x1150 [ 426.294121][ T31] ? __pfx_vfs_write+0x10/0x10 [ 426.299751][ T31] ? find_held_lock+0x2b/0x80 [ 426.304554][ T31] ? __fget_files+0x204/0x3c0 [ 426.309219][ T31] ? __fget_files+0x20e/0x3c0 [ 426.314091][ T31] ksys_write+0x1f8/0x250 [ 426.318439][ T31] ? __pfx_ksys_write+0x10/0x10 [ 426.323333][ T31] do_syscall_64+0xcd/0x4c0 [ 426.327838][ T31] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 426.333726][ T31] RIP: 0033:0x7f9138b8e929 [ 426.338118][ T31] RSP: 002b:00007f91399e9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 426.346718][ T31] RAX: ffffffffffffffda RBX: 00007f9138db6320 RCX: 00007f9138b8e929 [ 426.354711][ T31] RDX: 0000000000000008 RSI: 0000200000000080 RDI: 000000000000000f [ 426.362693][ T31] RBP: 00007f9138c10b39 R08: 0000000000000000 R09: 0000000000000000 [ 426.370677][ T31] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 426.378944][ T31] R13: 0000000000000000 R14: 00007f9138db6320 R15: 00007ffe6e117048 [ 426.386984][ T31] [ 426.390012][ T31] INFO: task syz.0.1938:11411 blocked for more than 143 seconds. [ 426.397781][ T31] Not tainted 6.16.0-rc4-syzkaller-00108-g17bbde2e1716 #0 [ 426.406680][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 426.415383][ T31] task:syz.0.1938 state:D stack:26392 pid:11411 tgid:11410 ppid:5820 task_flags:0x400140 flags:0x00004004 [ 426.427300][ T31] Call Trace: [ 426.430558][ T31] [ 426.433930][ T31] __schedule+0x116a/0x5de0 [ 426.438466][ T31] ? __lock_acquire+0x622/0x1c90 [ 426.443649][ T31] ? __pfx___schedule+0x10/0x10 [ 426.448588][ T31] ? find_held_lock+0x2b/0x80 [ 426.453324][ T31] ? schedule+0x2d7/0x3a0 [ 426.457641][ T31] schedule+0xe7/0x3a0 [ 426.461691][ T31] schedule_preempt_disabled+0x13/0x30 [ 426.467328][ T31] __mutex_lock+0x6c7/0xb90 [ 426.471817][ T31] ? rfkill_unregister+0xec/0x2c0 [ 426.476856][ T31] ? __pfx___mutex_lock+0x10/0x10 [ 426.481865][ T31] ? device_del+0x6b6/0x9f0 [ 426.486376][ T31] ? __pfx_device_del+0x10/0x10 [ 426.491228][ T31] ? rfkill_unregister+0xec/0x2c0 [ 426.496447][ T31] rfkill_unregister+0xec/0x2c0 [ 426.501297][ T31] nfc_unregister_device+0x94/0x330 [ 426.507503][ T31] ? __pfx_virtual_ncidev_close+0x10/0x10 [ 426.513289][ T31] virtual_ncidev_close+0x4b/0xa0 [ 426.518327][ T31] __fput+0x402/0xb70 [ 426.522552][ T31] task_work_run+0x150/0x240 [ 426.527124][ T31] ? __pfx_task_work_run+0x10/0x10 [ 426.532225][ T31] exit_to_user_mode_loop+0xeb/0x110 [ 426.537518][ T31] do_syscall_64+0x3f6/0x4c0 [ 426.542097][ T31] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 426.547992][ T31] RIP: 0033:0x7f0675f8e929 [ 426.552568][ T31] RSP: 002b:00007f0676d42038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 426.560962][ T31] RAX: ffffffffffffffea RBX: 00007f06761b5fa0 RCX: 00007f0675f8e929 [ 426.568965][ T31] RDX: 0000000000005400 RSI: 0000200000000080 RDI: ffffffffffffff9c [ 426.576954][ T31] RBP: 00007f0676010b39 R08: 0000000000000000 R09: 0000000000000000 [ 426.585087][ T31] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 426.593113][ T31] R13: 0000000000000000 R14: 00007f06761b5fa0 R15: 00007fffd5a07c88 [ 426.601096][ T31] [ 426.604145][ T31] INFO: task syz.1.1942:11426 blocked for more than 144 seconds. [ 426.612953][ T31] Not tainted 6.16.0-rc4-syzkaller-00108-g17bbde2e1716 #0 [ 426.620599][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 426.629400][ T31] task:syz.1.1942 state:D stack:28888 pid:11426 tgid:11425 ppid:5807 task_flags:0x400040 flags:0x00004004 [ 426.641379][ T31] Call Trace: [ 426.644679][ T31] [ 426.647692][ T31] __schedule+0x116a/0x5de0 [ 426.652211][ T31] ? __lock_acquire+0x622/0x1c90 [ 426.657200][ T31] ? __pfx___schedule+0x10/0x10 [ 426.662041][ T31] ? find_held_lock+0x2b/0x80 [ 426.666798][ T31] ? schedule+0x2d7/0x3a0 [ 426.671139][ T31] schedule+0xe7/0x3a0 [ 426.675465][ T31] schedule_preempt_disabled+0x13/0x30 [ 426.681018][ T31] __mutex_lock+0x6c7/0xb90 [ 426.685599][ T31] ? rfkill_fop_open+0x136/0x750 [ 426.690543][ T31] ? __pfx___mutex_lock+0x10/0x10 [ 426.695652][ T31] ? lockdep_init_map_type+0x5c/0x280 [ 426.701041][ T31] ? lockdep_init_map_type+0x5c/0x280 [ 426.706485][ T31] ? __pfx_rfkill_fop_open+0x10/0x10 [ 426.712537][ T31] ? rfkill_fop_open+0x136/0x750 [ 426.717509][ T31] rfkill_fop_open+0x136/0x750 [ 426.722420][ T31] ? kobject_get_unless_zero+0x156/0x1e0 [ 426.728065][ T31] ? __pfx_rfkill_fop_open+0x10/0x10 [ 426.733478][ T31] misc_open+0x35a/0x420 [ 426.737735][ T31] ? __pfx_misc_open+0x10/0x10 [ 426.742675][ T31] chrdev_open+0x234/0x6a0 [ 426.747080][ T31] ? __pfx_chrdev_open+0x10/0x10 [ 426.752006][ T31] ? file_set_fsnotify_mode_from_watchers+0x163/0x640 [ 426.758775][ T31] do_dentry_open+0x744/0x1c10 [ 426.763550][ T31] ? __pfx_chrdev_open+0x10/0x10 [ 426.768471][ T31] vfs_open+0x82/0x3f0 [ 426.772862][ T31] path_openat+0x1de4/0x2cb0 [ 426.777495][ T31] ? __pfx_path_openat+0x10/0x10 [ 426.782480][ T31] ? __lock_acquire+0xb8a/0x1c90 [ 426.787440][ T31] do_filp_open+0x20b/0x470 [ 426.791977][ T31] ? __pfx_do_filp_open+0x10/0x10 [ 426.797076][ T31] ? alloc_fd+0x471/0x7d0 [ 426.801399][ T31] do_sys_openat2+0x11b/0x1d0 [ 426.806286][ T31] ? __pfx_do_sys_openat2+0x10/0x10 [ 426.812615][ T31] ? find_held_lock+0x2b/0x80 [ 426.817329][ T31] ? handle_mm_fault+0x2ab/0xd10 [ 426.822372][ T31] __x64_sys_openat+0x174/0x210 [ 426.827233][ T31] ? __pfx___x64_sys_openat+0x10/0x10 [ 426.833002][ T31] ? do_user_addr_fault+0x843/0x1370 [ 426.838318][ T31] do_syscall_64+0xcd/0x4c0 [ 426.842999][ T31] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 426.848906][ T31] RIP: 0033:0x7f7d4018e929 [ 426.853436][ T31] RSP: 002b:00007f7d40f13038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 426.861846][ T31] RAX: ffffffffffffffda RBX: 00007f7d403b5fa0 RCX: 00007f7d4018e929 [ 426.869853][ T31] RDX: 000000000006ad01 RSI: 0000200000000100 RDI: ffffffffffffff9c [ 426.877860][ T31] RBP: 00007f7d40210b39 R08: 0000000000000000 R09: 0000000000000000 [ 426.885881][ T31] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 426.894052][ T31] R13: 0000000000000001 R14: 00007f7d403b5fa0 R15: 00007fffdff81e28 [ 426.902024][ T31] [ 426.905067][ T31] INFO: task syz.4.1950:11450 blocked for more than 144 seconds. [ 426.915037][ T31] Not tainted 6.16.0-rc4-syzkaller-00108-g17bbde2e1716 #0 [ 426.922789][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 426.931470][ T31] task:syz.4.1950 state:D stack:27096 pid:11450 tgid:11449 ppid:5808 task_flags:0x400140 flags:0x00004004 [ 426.943511][ T31] Call Trace: [ 426.946805][ T31] [ 426.949723][ T31] __schedule+0x116a/0x5de0 [ 426.954235][ T31] ? __lock_acquire+0x622/0x1c90 [ 426.959158][ T31] ? __pfx___schedule+0x10/0x10 [ 426.964035][ T31] ? find_held_lock+0x2b/0x80 [ 426.968692][ T31] ? schedule+0x2d7/0x3a0 [ 426.973047][ T31] schedule+0xe7/0x3a0 [ 426.977114][ T31] schedule_preempt_disabled+0x13/0x30 [ 426.982586][ T31] __mutex_lock+0x6c7/0xb90 [ 426.987071][ T31] ? misc_open+0x63/0x420 [ 426.991377][ T31] ? __pfx___mutex_lock+0x10/0x10 [ 426.996403][ T31] ? __pfx_avc_has_perm+0x10/0x10 [ 427.001421][ T31] ? kobject_get_unless_zero+0x156/0x1e0 [ 427.007324][ T31] ? __pfx_misc_open+0x10/0x10 [ 427.012110][ T31] ? misc_open+0x63/0x420 [ 427.017144][ T31] misc_open+0x63/0x420 [ 427.021317][ T31] ? __pfx_misc_open+0x10/0x10 [ 427.026098][ T31] chrdev_open+0x234/0x6a0 [ 427.030502][ T31] ? __pfx_chrdev_open+0x10/0x10 [ 427.035467][ T31] ? file_set_fsnotify_mode_from_watchers+0x163/0x640 [ 427.042229][ T31] do_dentry_open+0x744/0x1c10 [ 427.047054][ T31] ? __pfx_chrdev_open+0x10/0x10 [ 427.052008][ T31] vfs_open+0x82/0x3f0 [ 427.056093][ T31] path_openat+0x1de4/0x2cb0 [ 427.060671][ T31] ? __pfx_path_openat+0x10/0x10 [ 427.065654][ T31] ? __lock_acquire+0xb8a/0x1c90 [ 427.070578][ T31] do_filp_open+0x20b/0x470 [ 427.075085][ T31] ? __pfx_do_filp_open+0x10/0x10 [ 427.080101][ T31] ? alloc_fd+0x471/0x7d0 [ 427.084451][ T31] do_sys_openat2+0x11b/0x1d0 [ 427.089115][ T31] ? __pfx_do_sys_openat2+0x10/0x10 [ 427.094314][ T31] __x64_sys_openat+0x174/0x210 [ 427.099140][ T31] ? __pfx___x64_sys_openat+0x10/0x10 [ 427.104519][ T31] do_syscall_64+0xcd/0x4c0 [ 427.109006][ T31] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 427.114980][ T31] RIP: 0033:0x7ff84f98e929 [ 427.120196][ T31] RSP: 002b:00007ff850711038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 427.128800][ T31] RAX: ffffffffffffffda RBX: 00007ff84fbb5fa0 RCX: 00007ff84f98e929 [ 427.136998][ T31] RDX: 0000000000000000 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 427.145800][ T31] RBP: 00007ff84fa10b39 R08: 0000000000000000 R09: 0000000000000000 [ 427.153836][ T31] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 427.161807][ T31] R13: 0000000000000000 R14: 00007ff84fbb5fa0 R15: 00007fffe9acc4e8 [ 427.170221][ T31] [ 427.173319][ T31] INFO: task syz.3.1951:11454 blocked for more than 144 seconds. [ 427.181029][ T31] Not tainted 6.16.0-rc4-syzkaller-00108-g17bbde2e1716 #0 [ 427.188692][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 427.197592][ T31] task:syz.3.1951 state:D stack:28888 pid:11454 tgid:11453 ppid:5822 task_flags:0x400140 flags:0x00004004 [ 427.209525][ T31] Call Trace: [ 427.212804][ T31] [ 427.215718][ T31] __schedule+0x116a/0x5de0 [ 427.221185][ T31] ? __lock_acquire+0x622/0x1c90 [ 427.226338][ T31] ? __pfx___schedule+0x10/0x10 [ 427.231180][ T31] ? find_held_lock+0x2b/0x80 [ 427.235935][ T31] ? schedule+0x2d7/0x3a0 [ 427.240277][ T31] schedule+0xe7/0x3a0 [ 427.244342][ T31] schedule_preempt_disabled+0x13/0x30 [ 427.249792][ T31] __mutex_lock+0x6c7/0xb90 [ 427.254504][ T31] ? misc_open+0x63/0x420 [ 427.258834][ T31] ? __pfx___mutex_lock+0x10/0x10 [ 427.263873][ T31] ? __pfx_avc_has_perm+0x10/0x10 [ 427.268905][ T31] ? kobject_get_unless_zero+0x156/0x1e0 [ 427.274551][ T31] ? __pfx_misc_open+0x10/0x10 [ 427.279296][ T31] ? misc_open+0x63/0x420 [ 427.283924][ T31] misc_open+0x63/0x420 [ 427.288095][ T31] ? __pfx_misc_open+0x10/0x10 [ 427.292890][ T31] chrdev_open+0x234/0x6a0 [ 427.297307][ T31] ? __pfx_chrdev_open+0x10/0x10 [ 427.302241][ T31] ? file_set_fsnotify_mode_from_watchers+0x163/0x640 [ 427.309026][ T31] do_dentry_open+0x744/0x1c10 [ 427.314046][ T31] ? __pfx_chrdev_open+0x10/0x10 [ 427.318993][ T31] vfs_open+0x82/0x3f0 [ 427.324033][ T31] path_openat+0x1de4/0x2cb0 [ 427.328640][ T31] ? __pfx_path_openat+0x10/0x10 [ 427.333583][ T31] ? __lock_acquire+0xb8a/0x1c90 [ 427.338519][ T31] do_filp_open+0x20b/0x470 [ 427.343330][ T31] ? __pfx_do_filp_open+0x10/0x10 [ 427.348374][ T31] ? alloc_fd+0x471/0x7d0 [ 427.352723][ T31] do_sys_openat2+0x11b/0x1d0 [ 427.357378][ T31] ? __pfx_do_sys_openat2+0x10/0x10 [ 427.362608][ T31] __x64_sys_openat+0x174/0x210 [ 427.367462][ T31] ? __pfx___x64_sys_openat+0x10/0x10 [ 427.373112][ T31] do_syscall_64+0xcd/0x4c0 [ 427.377600][ T31] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 427.383501][ T31] RIP: 0033:0x7fb078b8e929 [ 427.387908][ T31] RSP: 002b:00007fb0799f2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 427.396319][ T31] RAX: ffffffffffffffda RBX: 00007fb078db5fa0 RCX: 00007fb078b8e929 [ 427.404460][ T31] RDX: 00000000001c1341 RSI: 0000200000000080 RDI: ffffffffffffff9c [ 427.412439][ T31] RBP: 00007fb078c10b39 R08: 0000000000000000 R09: 0000000000000000 [ 427.420402][ T31] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 427.429397][ T31] R13: 0000000000000000 R14: 00007fb078db5fa0 R15: 00007ffc3c70ed18 [ 427.437577][ T31] [ 427.440594][ T31] INFO: task syz.3.1951:11455 blocked for more than 144 seconds. [ 427.448689][ T31] Not tainted 6.16.0-rc4-syzkaller-00108-g17bbde2e1716 #0 [ 427.456315][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 427.465148][ T31] task:syz.3.1951 state:D stack:28184 pid:11455 tgid:11453 ppid:5822 task_flags:0x400040 flags:0x00004004 [ 427.477344][ T31] Call Trace: [ 427.480644][ T31] [ 427.483616][ T31] __schedule+0x116a/0x5de0 [ 427.488133][ T31] ? __lock_acquire+0x622/0x1c90 [ 427.493295][ T31] ? __pfx___schedule+0x10/0x10 [ 427.498133][ T31] ? find_held_lock+0x2b/0x80 [ 427.502829][ T31] ? schedule+0x2d7/0x3a0 [ 427.507161][ T31] schedule+0xe7/0x3a0 [ 427.511215][ T31] schedule_preempt_disabled+0x13/0x30 [ 427.516686][ T31] __mutex_lock+0x6c7/0xb90 [ 427.521173][ T31] ? misc_open+0x63/0x420 [ 427.525690][ T31] ? __pfx___mutex_lock+0x10/0x10 [ 427.531397][ T31] ? __pfx_avc_has_perm+0x10/0x10 [ 427.536475][ T31] ? kobject_get_unless_zero+0x156/0x1e0 [ 427.542102][ T31] ? __pfx_misc_open+0x10/0x10 [ 427.546884][ T31] ? misc_open+0x63/0x420 [ 427.551219][ T31] misc_open+0x63/0x420 [ 427.555575][ T31] ? __pfx_misc_open+0x10/0x10 [ 427.560338][ T31] chrdev_open+0x234/0x6a0 [ 427.564799][ T31] ? __pfx_chrdev_open+0x10/0x10 [ 427.569719][ T31] ? file_set_fsnotify_mode_from_watchers+0x163/0x640 [ 427.576507][ T31] do_dentry_open+0x744/0x1c10 [ 427.581257][ T31] ? __pfx_chrdev_open+0x10/0x10 [ 427.586365][ T31] vfs_open+0x82/0x3f0 [ 427.590432][ T31] path_openat+0x1de4/0x2cb0 [ 427.595065][ T31] ? __pfx_path_openat+0x10/0x10 [ 427.600020][ T31] ? __lock_acquire+0xb8a/0x1c90 [ 427.605019][ T31] do_filp_open+0x20b/0x470 [ 427.609508][ T31] ? __pfx_do_filp_open+0x10/0x10 [ 427.614720][ T31] ? alloc_fd+0x471/0x7d0 [ 427.619037][ T31] do_sys_openat2+0x11b/0x1d0 [ 427.623722][ T31] ? __pfx_do_sys_openat2+0x10/0x10 [ 427.628897][ T31] ? find_held_lock+0x2b/0x80 [ 427.634642][ T31] __x64_sys_openat+0x174/0x210 [ 427.639480][ T31] ? __pfx___x64_sys_openat+0x10/0x10 [ 427.645177][ T31] do_syscall_64+0xcd/0x4c0 [ 427.649725][ T31] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 427.655623][ T31] RIP: 0033:0x7fb078b8e929 [ 427.660023][ T31] RSP: 002b:00007fb0799d1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 427.668454][ T31] RAX: ffffffffffffffda RBX: 00007fb078db6080 RCX: 00007fb078b8e929 [ 427.676611][ T31] RDX: 0000000000000000 RSI: 0000200000000280 RDI: ffffffffffffff9c [ 427.684585][ T31] RBP: 00007fb078c10b39 R08: 0000000000000000 R09: 0000000000000000 [ 427.692650][ T31] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 427.700626][ T31] R13: 0000000000000000 R14: 00007fb078db6080 R15: 00007ffc3c70ed18 [ 427.708806][ T31] [ 427.711820][ T31] INFO: task syz-executor:11458 blocked for more than 145 seconds. [ 427.719762][ T31] Not tainted 6.16.0-rc4-syzkaller-00108-g17bbde2e1716 #0 [ 427.727426][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 427.737027][ T31] task:syz-executor state:D stack:28216 pid:11458 tgid:11458 ppid:1 task_flags:0x400040 flags:0x00004000 [ 427.748989][ T31] Call Trace: [ 427.752249][ T31] [ 427.755206][ T31] __schedule+0x116a/0x5de0 [ 427.759696][ T31] ? lockdep_hardirqs_on+0x7c/0x110 [ 427.765061][ T31] ? audit_log_end+0x14a/0x2b0 [ 427.769829][ T31] ? __lock_acquire+0x622/0x1c90 [ 427.774784][ T31] ? __pfx___schedule+0x10/0x10 [ 427.779619][ T31] ? find_held_lock+0x2b/0x80 [ 427.784301][ T31] ? schedule+0x2d7/0x3a0 [ 427.788613][ T31] schedule+0xe7/0x3a0 [ 427.793362][ T31] schedule_preempt_disabled+0x13/0x30 [ 427.798843][ T31] __mutex_lock+0x6c7/0xb90 [ 427.803354][ T31] ? misc_open+0x63/0x420 [ 427.807672][ T31] ? __pfx___mutex_lock+0x10/0x10 [ 427.812713][ T31] ? __pfx_avc_has_perm+0x10/0x10 [ 427.817739][ T31] ? kobject_get_unless_zero+0x156/0x1e0 [ 427.823771][ T31] ? __pfx_misc_open+0x10/0x10 [ 427.828572][ T31] ? misc_open+0x63/0x420 [ 427.832929][ T31] misc_open+0x63/0x420 [ 427.837826][ T31] ? __pfx_misc_open+0x10/0x10 [ 427.842645][ T31] chrdev_open+0x234/0x6a0 [ 427.847073][ T31] ? __pfx_chrdev_open+0x10/0x10 [ 427.851992][ T31] ? file_set_fsnotify_mode_from_watchers+0x163/0x640 [ 427.859097][ T31] do_dentry_open+0x744/0x1c10 [ 427.863883][ T31] ? __pfx_chrdev_open+0x10/0x10 [ 427.868805][ T31] vfs_open+0x82/0x3f0 [ 427.872894][ T31] path_openat+0x1de4/0x2cb0 [ 427.877486][ T31] ? __pfx___up_read+0x10/0x10 [ 427.882257][ T31] ? __pfx_path_openat+0x10/0x10 [ 427.887570][ T31] do_filp_open+0x20b/0x470 [ 427.892061][ T31] ? __pfx_do_filp_open+0x10/0x10 [ 427.897120][ T31] ? rcu_is_watching+0x12/0xc0 [ 427.901873][ T31] ? alloc_fd+0x471/0x7d0 [ 427.906216][ T31] do_sys_openat2+0x11b/0x1d0 [ 427.910873][ T31] ? __pfx_do_sys_openat2+0x10/0x10 [ 427.916251][ T31] ? fd_install+0x244/0x750 [ 427.920740][ T31] __x64_sys_openat+0x174/0x210 [ 427.925589][ T31] ? __pfx___x64_sys_openat+0x10/0x10 [ 427.930938][ T31] ? do_user_addr_fault+0x843/0x1370 [ 427.937260][ T31] do_syscall_64+0xcd/0x4c0 [ 427.941786][ T31] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 427.947856][ T31] RIP: 0033:0x7f798358d211 [ 427.952266][ T31] RSP: 002b:00007ffc254163d0 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 [ 427.960711][ T31] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f798358d211 [ 427.968702][ T31] RDX: 0000000000000002 RSI: 00007f7983611506 RDI: 00000000ffffff9c [ 427.977031][ T31] RBP: 00007f7983611506 R08: 0000000000000000 R09: 00007f79842ed6c0 [ 427.985003][ T31] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000008 [ 427.992978][ T31] R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000 [ 428.000939][ T31] [ 428.004246][ T31] INFO: task syz-executor:11460 blocked for more than 145 seconds. [ 428.012140][ T31] Not tainted 6.16.0-rc4-syzkaller-00108-g17bbde2e1716 #0 [ 428.019774][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 428.028450][ T31] task:syz-executor state:D stack:28712 pid:11460 tgid:11460 ppid:1 task_flags:0x400040 flags:0x00004000 [ 428.041247][ T31] Call Trace: [ 428.044589][ T31] [ 428.047517][ T31] __schedule+0x116a/0x5de0 [ 428.052012][ T31] ? __lock_acquire+0x622/0x1c90 [ 428.056998][ T31] ? __pfx___schedule+0x10/0x10 [ 428.061849][ T31] ? find_held_lock+0x2b/0x80 [ 428.066714][ T31] ? schedule+0x2d7/0x3a0 [ 428.071051][ T31] schedule+0xe7/0x3a0 [ 428.075210][ T31] schedule_preempt_disabled+0x13/0x30 [ 428.080676][ T31] __mutex_lock+0x6c7/0xb90 [ 428.085272][ T31] ? misc_open+0x63/0x420 [ 428.089625][ T31] ? __pfx___mutex_lock+0x10/0x10 [ 428.094844][ T31] ? __pfx_avc_has_perm+0x10/0x10 [ 428.099869][ T31] ? kobject_get_unless_zero+0x156/0x1e0 [ 428.105510][ T31] ? __pfx_misc_open+0x10/0x10 [ 428.110259][ T31] ? misc_open+0x63/0x420 [ 428.114611][ T31] misc_open+0x63/0x420 [ 428.118765][ T31] ? __pfx_misc_open+0x10/0x10 [ 428.123725][ T31] chrdev_open+0x234/0x6a0 [ 428.128126][ T31] ? __pfx_chrdev_open+0x10/0x10 [ 428.133074][ T31] ? file_set_fsnotify_mode_from_watchers+0x163/0x640 [ 428.139845][ T31] do_dentry_open+0x744/0x1c10 [ 428.145320][ T31] ? __pfx_chrdev_open+0x10/0x10 [ 428.150296][ T31] vfs_open+0x82/0x3f0 [ 428.154567][ T31] path_openat+0x1de4/0x2cb0 [ 428.159165][ T31] ? __pfx___up_read+0x10/0x10 [ 428.163955][ T31] ? __pfx_path_openat+0x10/0x10 [ 428.168877][ T31] do_filp_open+0x20b/0x470 [ 428.173381][ T31] ? __pfx_do_filp_open+0x10/0x10 [ 428.178398][ T31] ? rcu_is_watching+0x12/0xc0 [ 428.183484][ T31] ? alloc_fd+0x471/0x7d0 [ 428.187822][ T31] do_sys_openat2+0x11b/0x1d0 [ 428.192547][ T31] ? __pfx_do_sys_openat2+0x10/0x10 [ 428.197753][ T31] ? fd_install+0x244/0x750 [ 428.202261][ T31] __x64_sys_openat+0x174/0x210 [ 428.207152][ T31] ? __pfx___x64_sys_openat+0x10/0x10 [ 428.212737][ T31] ? do_user_addr_fault+0x843/0x1370 [ 428.218025][ T31] do_syscall_64+0xcd/0x4c0 [ 428.222561][ T31] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 428.228445][ T31] RIP: 0033:0x7f9bbe58d211 [ 428.232865][ T31] RSP: 002b:00007ffedbf45850 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 [ 428.241285][ T31] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f9bbe58d211 [ 428.250414][ T31] RDX: 0000000000000002 RSI: 00007f9bbe611506 RDI: 00000000ffffff9c [ 428.258433][ T31] RBP: 00007f9bbe611506 R08: 0000000000000000 R09: 00007f9bbf2ed6c0 [ 428.266528][ T31] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000008 [ 428.274809][ T31] R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000 [ 428.282848][ T31] [ 428.285867][ T31] INFO: task syz-executor:11462 blocked for more than 145 seconds. [ 428.293757][ T31] Not tainted 6.16.0-rc4-syzkaller-00108-g17bbde2e1716 #0 [ 428.301363][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 428.310331][ T31] task:syz-executor state:D stack:28712 pid:11462 tgid:11462 ppid:1 task_flags:0x400040 flags:0x00004000 [ 428.322312][ T31] Call Trace: [ 428.325599][ T31] [ 428.328540][ T31] __schedule+0x116a/0x5de0 [ 428.333434][ T31] ? __lock_acquire+0x622/0x1c90 [ 428.338390][ T31] ? __pfx___schedule+0x10/0x10 [ 428.343270][ T31] ? find_held_lock+0x2b/0x80 [ 428.348676][ T31] ? schedule+0x2d7/0x3a0 [ 428.353114][ T31] schedule+0xe7/0x3a0 [ 428.357166][ T31] schedule_preempt_disabled+0x13/0x30 [ 428.362899][ T31] __mutex_lock+0x6c7/0xb90 [ 428.367423][ T31] ? misc_open+0x63/0x420 [ 428.371733][ T31] ? __pfx___mutex_lock+0x10/0x10 [ 428.376780][ T31] ? __pfx_avc_has_perm+0x10/0x10 [ 428.381798][ T31] ? kobject_get_unless_zero+0x156/0x1e0 [ 428.387447][ T31] ? __pfx_misc_open+0x10/0x10 [ 428.392200][ T31] ? misc_open+0x63/0x420 [ 428.396706][ T31] misc_open+0x63/0x420 [ 428.400864][ T31] ? __pfx_misc_open+0x10/0x10 [ 428.405617][ T31] chrdev_open+0x234/0x6a0 [ 428.410102][ T31] ? __pfx_chrdev_open+0x10/0x10 [ 428.415055][ T31] ? file_set_fsnotify_mode_from_watchers+0x163/0x640 [ 428.421799][ T31] do_dentry_open+0x744/0x1c10 [ 428.426740][ T31] ? __pfx_chrdev_open+0x10/0x10 [ 428.431663][ T31] vfs_open+0x82/0x3f0 [ 428.435788][ T31] path_openat+0x1de4/0x2cb0 [ 428.440624][ T31] ? __pfx___up_read+0x10/0x10 [ 428.445431][ T31] ? __pfx_path_openat+0x10/0x10 [ 428.451121][ T31] do_filp_open+0x20b/0x470 [ 428.455997][ T31] ? __pfx_do_filp_open+0x10/0x10 [ 428.461030][ T31] ? rcu_is_watching+0x12/0xc0 [ 428.465821][ T31] ? alloc_fd+0x471/0x7d0 [ 428.470137][ T31] do_sys_openat2+0x11b/0x1d0 [ 428.474831][ T31] ? __pfx_do_sys_openat2+0x10/0x10 [ 428.480007][ T31] ? fd_install+0x244/0x750 [ 428.484841][ T31] __x64_sys_openat+0x174/0x210 [ 428.489693][ T31] ? __pfx___x64_sys_openat+0x10/0x10 [ 428.495067][ T31] ? do_user_addr_fault+0x843/0x1370 [ 428.500359][ T31] do_syscall_64+0xcd/0x4c0 [ 428.504878][ T31] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 428.510758][ T31] RIP: 0033:0x7fa3fc18d211 [ 428.515487][ T31] RSP: 002b:00007ffe0835dcb0 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 [ 428.524047][ T31] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007fa3fc18d211 [ 428.532022][ T31] RDX: 0000000000000002 RSI: 00007fa3fc211506 RDI: 00000000ffffff9c [ 428.540025][ T31] RBP: 00007fa3fc211506 R08: 0000000000000000 R09: 00007fa3fceed6c0 [ 428.548188][ T31] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000008 [ 428.556920][ T31] R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000 [ 428.564943][ T31] [ 428.567942][ T31] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 428.577161][ T31] [ 428.577161][ T31] Showing all locks held in the system: [ 428.584902][ T31] 1 lock held by khungtaskd/31: [ 428.589743][ T31] #0: ffffffff8e5c4940 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x36/0x1c0 [ 428.599611][ T31] 3 locks held by kworker/0:2/974: [ 428.604933][ T31] #0: ffff88801b878d48 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x12a2/0x1b70 [ 428.615379][ T31] #1: ffffc90003b17d10 ((work_completion)(&rfkill_global_led_trigger_work)){+.+.}-{0:0}, at: process_one_work+0x929/0x1b70 [ 428.628254][ T31] #2: ffffffff907ee708 (rfkill_global_mutex){+.+.}-{4:4}, at: rfkill_global_led_trigger_worker+0x1b/0x160 [ 428.639850][ T31] 2 locks held by getty/5567: [ 428.644533][ T31] #0: ffff8880374420a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 [ 428.655288][ T31] #1: ffffc9000332b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x41b/0x14f0 [ 428.665631][ T31] 2 locks held by syz.2.1933/11412: [ 428.670806][ T31] #0: ffffffff907ee708 (rfkill_global_mutex){+.+.}-{4:4}, at: rfkill_fop_write+0x166/0x580 [ 428.680902][ T31] #1: ffff888022f6b100 (&dev->mutex){....}-{4:4}, at: nfc_dev_down+0x2d/0x2e0 [ 428.689870][ T31] 2 locks held by syz.0.1938/11411: [ 428.695231][ T31] #0: ffff888022f6b100 (&dev->mutex){....}-{4:4}, at: nfc_unregister_device+0x60/0x330 [ 428.705032][ T31] #1: ffffffff907ee708 (rfkill_global_mutex){+.+.}-{4:4}, at: rfkill_unregister+0xec/0x2c0 [ 428.715148][ T31] 2 locks held by syz.1.1942/11426: [ 428.720328][ T31] #0: ffffffff8f302268 (misc_mtx){+.+.}-{4:4}, at: misc_open+0x63/0x420 [ 428.728936][ T31] #1: ffffffff907ee708 (rfkill_global_mutex){+.+.}-{4:4}, at: rfkill_fop_open+0x136/0x750 [ 428.738972][ T31] 1 lock held by syz.4.1950/11450: [ 428.744087][ T31] #0: ffffffff8f302268 (misc_mtx){+.+.}-{4:4}, at: misc_open+0x63/0x420 [ 428.752863][ T31] 1 lock held by syz.3.1951/11454: [ 428.758674][ T31] #0: ffffffff8f302268 (misc_mtx){+.+.}-{4:4}, at: misc_open+0x63/0x420 [ 428.767182][ T31] 1 lock held by syz.3.1951/11455: [ 428.772267][ T31] #0: ffffffff8f302268 (misc_mtx){+.+.}-{4:4}, at: misc_open+0x63/0x420 [ 428.780749][ T31] 1 lock held by syz-executor/11458: [ 428.786350][ T31] #0: ffffffff8f302268 (misc_mtx){+.+.}-{4:4}, at: misc_open+0x63/0x420 [ 428.794831][ T31] 1 lock held by syz-executor/11460: [ 428.800113][ T31] #0: ffffffff8f302268 (misc_mtx){+.+.}-{4:4}, at: misc_open+0x63/0x420 [ 428.808546][ T31] 1 lock held by syz-executor/11462: [ 428.814142][ T31] #0: ffffffff8f302268 (misc_mtx){+.+.}-{4:4}, at: misc_open+0x63/0x420 [ 428.822636][ T31] 1 lock held by syz-executor/11464: [ 428.827909][ T31] #0: ffffffff8f302268 (misc_mtx){+.+.}-{4:4}, at: misc_open+0x63/0x420 [ 428.836406][ T31] 1 lock held by syz-executor/11466: [ 428.841676][ T31] #0: ffffffff8f302268 (misc_mtx){+.+.}-{4:4}, at: misc_open+0x63/0x420 [ 428.850325][ T31] 1 lock held by syz-executor/11474: [ 428.855680][ T31] #0: ffffffff8f302268 (misc_mtx){+.+.}-{4:4}, at: misc_open+0x63/0x420 [ 428.864924][ T31] 1 lock held by syz-executor/11476: [ 428.870216][ T31] #0: ffffffff8f302268 (misc_mtx){+.+.}-{4:4}, at: misc_open+0x63/0x420 [ 428.878877][ T31] 1 lock held by syz-executor/11478: [ 428.884222][ T31] #0: ffffffff8f302268 (misc_mtx){+.+.}-{4:4}, at: misc_open+0x63/0x420 [ 428.892708][ T31] 1 lock held by syz-executor/11481: [ 428.897971][ T31] #0: ffffffff8f302268 (misc_mtx){+.+.}-{4:4}, at: misc_open+0x63/0x420 [ 428.906588][ T31] 1 lock held by syz-executor/11482: [ 428.911857][ T31] #0: ffffffff8f302268 (misc_mtx){+.+.}-{4:4}, at: misc_open+0x63/0x420 [ 428.920301][ T31] 1 lock held by syz-executor/11492: [ 428.925589][ T31] #0: ffffffff8f302268 (misc_mtx){+.+.}-{4:4}, at: misc_open+0x63/0x420 [ 428.934357][ T31] 1 lock held by syz-executor/11493: [ 428.939633][ T31] #0: ffffffff8f302268 (misc_mtx){+.+.}-{4:4}, at: misc_open+0x63/0x420 [ 428.948076][ T31] 1 lock held by syz-executor/11495: [ 428.953361][ T31] #0: ffffffff8f302268 (misc_mtx){+.+.}-{4:4}, at: misc_open+0x63/0x420 [ 428.962985][ T31] 1 lock held by syz-executor/11498: [ 428.968282][ T31] #0: ffffffff8f302268 (misc_mtx){+.+.}-{4:4}, at: misc_open+0x63/0x420 [ 428.976750][ T31] 1 lock held by syz-executor/11499: [ 428.982007][ T31] #0: ffffffff8f302268 (misc_mtx){+.+.}-{4:4}, at: misc_open+0x63/0x420 [ 428.990480][ T31] [ 428.993127][ T31] ============================================= [ 428.993127][ T31] [ 429.001524][ T31] NMI backtrace for cpu 0 [ 429.001534][ T31] CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Not tainted 6.16.0-rc4-syzkaller-00108-g17bbde2e1716 #0 PREEMPT(full) [ 429.001548][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 429.001554][ T31] Call Trace: [ 429.001557][ T31] [ 429.001563][ T31] dump_stack_lvl+0x116/0x1f0 [ 429.001583][ T31] nmi_cpu_backtrace+0x27b/0x390 [ 429.001596][ T31] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 429.001611][ T31] nmi_trigger_cpumask_backtrace+0x29c/0x300 [ 429.001624][ T31] watchdog+0xf70/0x12c0 [ 429.001638][ T31] ? __pfx_watchdog+0x10/0x10 [ 429.001648][ T31] ? lockdep_hardirqs_on+0x7c/0x110 [ 429.001663][ T31] ? __kthread_parkme+0x19e/0x250 [ 429.001679][ T31] ? __pfx_watchdog+0x10/0x10 [ 429.001689][ T31] kthread+0x3c2/0x780 [ 429.001699][ T31] ? __pfx_kthread+0x10/0x10 [ 429.001709][ T31] ? rcu_is_watching+0x12/0xc0 [ 429.001722][ T31] ? __pfx_kthread+0x10/0x10 [ 429.001731][ T31] ret_from_fork+0x5d4/0x6f0 [ 429.001749][ T31] ? __pfx_kthread+0x10/0x10 [ 429.001758][ T31] ret_from_fork_asm+0x1a/0x30 [ 429.001775][ T31] [ 429.001779][ T31] Sending NMI from CPU 0 to CPUs 1: [ 429.121207][ C1] NMI backtrace for cpu 1 [ 429.121222][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted 6.16.0-rc4-syzkaller-00108-g17bbde2e1716 #0 PREEMPT(full) [ 429.121239][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 429.121247][ C1] RIP: 0010:pv_native_safe_halt+0xf/0x20 [ 429.121272][ C1] Code: ab 71 02 c3 cc cc cc cc 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d 53 20 29 00 fb f4 0c fb 02 00 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 [ 429.121285][ C1] RSP: 0018:ffffc90000197df8 EFLAGS: 000002c6 [ 429.121298][ C1] RAX: 00000000001795c7 RBX: 0000000000000001 RCX: ffffffff8b80ec69 [ 429.121307][ C1] RDX: 0000000000000000 RSI: ffffffff8de1a6a6 RDI: ffffffff8c157da0 [ 429.121316][ C1] RBP: ffffed1003c5c488 R08: 0000000000000001 R09: ffffed10170a6645 [ 429.121326][ C1] R10: ffff8880b853322b R11: 0000000000000001 R12: 0000000000000001 [ 429.121334][ C1] R13: ffff88801e2e2440 R14: ffffffff90a81850 R15: 0000000000000000 [ 429.121343][ C1] FS: 0000000000000000(0000) GS:ffff888124852000(0000) knlGS:0000000000000000 [ 429.121358][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 429.121367][ C1] CR2: 0000564f14f37168 CR3: 000000000e382000 CR4: 00000000003526f0 [ 429.121376][ C1] Call Trace: [ 429.121381][ C1] [ 429.121386][ C1] default_idle+0x13/0x20 [ 429.121398][ C1] default_idle_call+0x6d/0xb0 [ 429.121410][ C1] do_idle+0x391/0x510 [ 429.121429][ C1] ? __pfx_do_idle+0x10/0x10 [ 429.121445][ C1] ? trace_sched_exit_tp+0x31/0x130 [ 429.121464][ C1] cpu_startup_entry+0x4f/0x60 [ 429.121480][ C1] start_secondary+0x21d/0x2b0 [ 429.121499][ C1] ? __pfx_start_secondary+0x10/0x10 [ 429.121518][ C1] common_startup_64+0x13e/0x148 [ 429.121535][ C1] [ 429.123318][ T31] Kernel panic - not syncing: hung_task: blocked tasks [ 429.123332][ T31] CPU: 1 UID: 0 PID: 31 Comm: khungtaskd Not tainted 6.16.0-rc4-syzkaller-00108-g17bbde2e1716 #0 PREEMPT(full) [ 429.123351][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 429.123360][ T31] Call Trace: [ 429.123366][ T31] [ 429.123373][ T31] dump_stack_lvl+0x3d/0x1f0 [ 429.123398][ T31] panic+0x71c/0x800 [ 429.123419][ T31] ? __pfx___irq_work_queue_local+0x10/0x10 [ 429.123438][ T31] ? __pfx_panic+0x10/0x10 [ 429.123459][ T31] ? preempt_schedule_thunk+0x16/0x30 [ 429.123481][ T31] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 429.123501][ T31] ? preempt_schedule_thunk+0x16/0x30 [ 429.123520][ T31] ? watchdog+0xdda/0x12c0 [ 429.123537][ T31] ? watchdog+0xdcd/0x12c0 [ 429.123556][ T31] watchdog+0xdeb/0x12c0 [ 429.123575][ T31] ? __pfx_watchdog+0x10/0x10 [ 429.123591][ T31] ? lockdep_hardirqs_on+0x7c/0x110 [ 429.123612][ T31] ? __kthread_parkme+0x19e/0x250 [ 429.123634][ T31] ? __pfx_watchdog+0x10/0x10 [ 429.123650][ T31] kthread+0x3c2/0x780 [ 429.123664][ T31] ? __pfx_kthread+0x10/0x10 [ 429.123679][ T31] ? rcu_is_watching+0x12/0xc0 [ 429.123697][ T31] ? __pfx_kthread+0x10/0x10 [ 429.123712][ T31] ret_from_fork+0x5d4/0x6f0 [ 429.123737][ T31] ? __pfx_kthread+0x10/0x10 [ 429.123751][ T31] ret_from_fork_asm+0x1a/0x30 [ 429.123776][ T31] [ 429.431691][ T31] Kernel Offset: disabled [ 429.435995][ T31] Rebooting in 86400 seconds..