last executing test programs: 2m52.937300061s ago: executing program 4 (id=739): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = syz_open_dev$evdev(&(0x7f0000000740), 0x3, 0x80000) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc0004}]}) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCGSW(r1, 0x80404531, &(0x7f0000000140)=""/4084) unshare(0x62040200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) 2m51.197794353s ago: executing program 4 (id=742): r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000100)={0x20000014}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000000)={0xa0000001}) epoll_wait(r3, &(0x7f0000000040)=[{}], 0x1, 0x400) syz_usb_connect$printer(0x5, 0x0, 0x0, 0x0) 2m46.689091433s ago: executing program 4 (id=755): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x100008b}, 0x0) sched_setaffinity(0x0, 0x11, &(0x7f0000000180)=0x1400200bce) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x1) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) ioctl$vim2m_VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) read$msr(r0, &(0x7f0000002700)=""/102392, 0x18ff8) r1 = syz_open_dev$vim2m(&(0x7f0000000080), 0x20001, 0x2) ioctl$vim2m_VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f00000000c0)={0x2, 0x1, 0x1}) ioctl$vim2m_VIDIOC_STREAMOFF(r1, 0x40045612, &(0x7f0000000000)=0x1) 2m45.790202417s ago: executing program 4 (id=762): shutdown(0xffffffffffffffff, 0x1) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) readv(r1, &(0x7f0000003400)=[{&(0x7f0000001080)=""/107, 0x7ffff000}, {&(0x7f0000004c00)=""/4096, 0x1000}], 0x2) 2m44.328415222s ago: executing program 4 (id=768): bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000740)={{}, 0x0, 0x0}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x4000000) r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000180)=ANY=[@ANYBLOB="1201fb0019030320d812010079de01ec020109021b0001000003000904000001785ecc00090585020004"], 0x0) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x8000000000) sendmsg$inet(0xffffffffffffffff, 0x0, 0xfc) clock_gettime(0x6, &(0x7f0000000100)) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0xc000) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x6000000) read$char_usb(r1, &(0x7f00000001c0)=""/188, 0xbc) syz_usb_disconnect(r0) 2m40.860403332s ago: executing program 4 (id=780): sync() sync() sync() sync() sync() sync() sync() sync() sync() sync() sync() 2m25.593166613s ago: executing program 32 (id=780): sync() sync() sync() sync() sync() sync() sync() sync() sync() sync() sync() 5.822137065s ago: executing program 5 (id=1638): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000240)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) madvise(&(0x7f000042f000/0x800000)=nil, 0x80fd00, 0x66) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000200)={0xb, 0xfffffffffffffff8}, 0x0) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000180)=0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0x2) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) move_pages(0x0, 0x1, &(0x7f0000006580)=[&(0x7f0000ffa000/0x4000)=nil], 0x0, &(0x7f0000000080), 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x11, 0x0, 0x27) 4.909640095s ago: executing program 5 (id=1645): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x400000bce) syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000680)={0x19b1, 0x0, 0x7, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1000, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xf4b}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000580)=""/104, 0x68}], 0x1) write$input_event(r0, &(0x7f0000000000)={{0x77359400}, 0x15}, 0xfe4f) 4.833961475s ago: executing program 5 (id=1647): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="780000001000830404000000fedbdf2500007400", @ANYRES32=r1, @ANYBLOB="0008000007500500580012800b0001006272696467650000480002800500190002000000050017000000000008001d00040000000c002200060000000000000008000400810000000500240001000000050016000100000005002c0002"], 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mq_open(&(0x7f0000000680)='\r\x00elinu\xef\xe3elinux\x00\x96\xf6\x92\n#*\xac\x05|\xf8D\\\x9a\xe6[]L+\xf6\v\xe8\xf2\xd3\b\x15\n\xb8F!Q9o\x1f#\xbdt\r\xfb\"\x18%\xfdM\xaf_t\xd2\xdcJ\x10\a\xbab\x1a\xdf\xb1\xbdU\xd7jo\xe7\xac\x81\x10k\xce-\xf5@\xbb\x9d;\xe8\xf6\xffQ\x04\xaai\x92k\x1b;\xddM\xa2\xe1-\x0e\xd8\xde\x00\xff\x18\xdd\bL\xfb\xa2\x1e\xd8\xdfJ\xcc\xd7\x9b\xfa\xf0\x0f\x05\xf1\xc4 \xde@\x80q\xf7\x04\xf5\x85T\x1f\xc2S]*\xc9lw\xd3J\xc5\xe8\x02\xcb\xbbAHxr\xac\xb77F\xdf\x1c\xcb\xd4\xce\x88L\xf1\xf9[\x98\xd4+pTx\x95\xb5\x1b]x\x1a\x95\xe1c6\xe7`83\xb7n#\xe0\xc1_\xec\xba\xec\x87\x1b\xde\a\x8b\xc5\x86woo\xbc\x1c\xa3r\x82\xf3enq-\x90/\xed\xff\xad+\x03\x10\t\xda\xfd\xa2\xd0\xef4\n%\xf1\xd8\x99$\xfb(\x9b5\xcbF4?O\x1d\xd7\x01*\xc9\xd6L\x86 \x1b\xab9\x1b\x12k\xf9\xec\xd8\x16E\x11-\xfd\x10\x89\x8d\xccbP\x14\x89w\xef\x90\x1d\xc9\x02\xeb\x01V\xfbm\x86\x8a\xc1.m\xd0\xa2\xa4\xc9\a;(\n\xc0\"\x1f\xe4\x1d\x85\xb3\x95\xec\xbb\x9b\x01\x85\xffx\xf2\a\f=\xd1\xcf\xec\xb8!\v\x958\xbf\x15b-\x92\xd6\xb5\xbf\xe2\x92\xc2\xa3}\xd0;\xd1\x96\x86\x8a\x1b\xe1w\xf9\xb0\xd2\xab\xc9\x8a\x19\n\xc5o\x1e\x13/\xe4\x91\x7f\xa5\xf1\xddW\xdb\x98\xcd\x94\xfc\x90\xa0\x05*', 0x6a4fa89c1c9e7661, 0x15b, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000040)={0x0, 0x1, 0xfa00, {0x0, &(0x7f0000000380), 0x2}}, 0x20) r4 = semget(0x1, 0x2, 0x0) r5 = socket(0x1, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) stat(&(0x7f0000000200)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@private2}}, &(0x7f0000000240)=0xe8) read$FUSE(0xffffffffffffffff, &(0x7f00000024c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) semctl$IPC_SET(r4, 0x0, 0x1, &(0x7f0000000940)={{0x1, r6, r7, r8, r9, 0x0, 0x40}, 0xfffffffffffffffc, 0x200, 0x0, 0x0, 0x0, 0x0, 0x60}) writev(r3, &(0x7f0000000000)=[{&(0x7f0000000080)}, {&(0x7f0000000100)="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", 0xff}, {&(0x7f0000001480)="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", 0xff9}], 0x3) 4.802032569s ago: executing program 2 (id=1648): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x149a82, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x60, 0x0, 0x0, 0x0, {0x0, 0x7}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0xc, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0x3, 0x4}]}}]}, 0x3c}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_linger(r4, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0xfffffffd, @local, 0x2}, 0x1c) sendmmsg$inet6(r4, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x4001c00) 4.676836067s ago: executing program 5 (id=1652): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000940)=@dellinkprop={0x20, 0x12, 0x201}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0}}], 0x400000000000193, 0x48, 0x0) 4.499385334s ago: executing program 5 (id=1655): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xc, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000004700)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000340)=@nat={'nat\x00', 0x670, 0x5, 0x350, 0x0, 0x140, 0xfeffffff, 0x210, 0x140, 0x2b8, 0x2b8, 0xffffffff, 0x2b8, 0x2b8, 0x5, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, 0x0, 0x0, 'pim6reg1\x00', 'caif0\x00', {}, {}, 0x6, 0x2}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}, {{@uncond, 0x0, 0x70, 0xa8}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x0, @broadcast, @remote, @icmp_id}}}}, {{@ip={@loopback, @rand_addr, 0x0, 0x0, 'lo\x00', 'ip6tnl0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@ttl={{0x28}, {0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @icmp_id, @icmp_id=0x68}}}}, {{@ip={@remote, @broadcast, 0xffffff, 0x0, 'pim6reg0\x00', 'wlan0\x00'}, 0x0, 0x70, 0xa8}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x8, @broadcast, @multicast1, @port=0x4e24, @icmp_id=0x68}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@ipv4_newroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}, 0x1c}}, 0x24040018) syz_open_procfs$userns(r0, &(0x7f0000000040)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) fcntl$lock(r4, 0x5, &(0x7f00000000c0)={0x1, 0x2, 0x400000000000006, 0x800040000000206b}) 3.287945479s ago: executing program 1 (id=1659): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) r1 = syz_open_dev$sndctrl(&(0x7f0000000e00), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc1105511, &(0x7f00000000c0)={{0xc, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, [0x0, 0x0, 0x7ffc, 0x0, 0x9, 0x100000000, 0x0, 0x4, 0x8, 0x0, 0x0, 0x7f, 0x3cb7, 0x0, 0x8000000, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x100000000, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0xfffffffe, 0x0, 0x80000, 0xfffffdfffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xd89, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xdf9cd90, 0x8000000, 0x6, 0x2, 0x0, 0x0, 0x0, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x7, 0x7ffffffd, 0x0, 0x0, 0xffffffffffff2328, 0xffffffffffffffff, 0x3, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, 0x0, 0x0, 0x3ff, 0x1, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800]}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r5 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000002c0)={'veth0_to_team\x00', &(0x7f0000000280)=@ethtool_channels={0x3d, 0x0, 0x0, 0x40000, 0x0, 0x2, 0x1}}) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000002c0)={'veth0_to_team\x00', &(0x7f0000000000)=@ethtool_cmd={0x2c, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}}) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'veth0_to_team\x00', 0x3fa1dc947ffe4b82}) ioctl$IOMMU_IOAS_ALLOC(r4, 0x3b81, &(0x7f0000000080)={0x19}) 3.2660405s ago: executing program 2 (id=1660): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x400000bce) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) clock_adjtime(0x0, &(0x7f0000000680)={0x19b1, 0x0, 0x7, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1000, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xf4b}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$uinput_user_dev(r1, &(0x7f0000000100)={'syz0\x00', {}, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200]}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000580)=""/104, 0x68}], 0x1) write$input_event(r1, &(0x7f0000000000)={{0x77359400}, 0x15}, 0xfe4f) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xb, 0x10, 0xffffffffffffffff, 0x0) 3.189196956s ago: executing program 5 (id=1661): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000200), 0x4) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) sync() sync() sync() sync() sync() sync() sync() socket$nl_route(0x10, 0x3, 0x0) 3.061489605s ago: executing program 1 (id=1662): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socket$alg(0x26, 0x5, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="180100000000000000000000000000008500"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) sched_setaffinity(0x0, 0xfffffef7, &(0x7f0000000740)=0x410000002) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000000c0)='rseq_update\x00', 0xffffffffffffffff, 0x0, 0x1}, 0x18) socket$inet6_sctp(0xa, 0x1, 0x84) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0x10) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0x6, 0xfffffffc, 0x1, 0x5, 0x15, "21d4bfbb359f45e4d65b6aa8fc399c5b305a98"}) 2.964563399s ago: executing program 2 (id=1663): syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000100), 0x2, 0x141121) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = syz_io_uring_setup(0x38fe, &(0x7f0000000300)={0x0, 0x1fffff, 0x10100}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000140)=@IORING_OP_POLL_ADD={0x6, 0x50, 0x0, @fd=r0}) io_uring_enter(r2, 0x2def, 0x4000, 0x0, 0x0, 0x0) open(0x0, 0x60840, 0x1d2) fchmod(r1, 0x1) syz_io_uring_submit(0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) r5 = userfaultfd(0x1) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r5, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffa000/0x3000)=nil, 0x3000}, 0x1}) syz_io_uring_setup(0x46a8, &(0x7f0000000000)={0x0, 0x7425, 0x4, 0x0, 0x211}, &(0x7f0000000100), &(0x7f0000000140)) 2.964263214s ago: executing program 1 (id=1664): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$alg(0x26, 0x5, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) accept4(r1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000780)=@ipv6_newrule={0x4c, 0x20, 0x1, 0xffffffff, 0x0, {0xa, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3, 0x12}, [@FRA_DST={0x14, 0x1, @private1}, @FIB_RULE_POLICY=@FRA_OIFNAME={0x14, 0x11, 'batadv_slave_1\x00'}, @FIB_RULE_POLICY=@FRA_IP_PROTO={0x5, 0x16, 0x6}]}, 0x4c}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000002c0)=@newlink={0x5c, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x3c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x2c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @private2}]}}}]}, 0x5c}}, 0x0) fsconfig$FSCONFIG_SET_STRING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) readv(r0, 0x0, 0x0) 2.901539816s ago: executing program 1 (id=1665): epoll_create1(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0x28f43000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x7f}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000005000/0x4000)=nil) 2.69116266s ago: executing program 3 (id=1666): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={0x0}}, 0x0) 2.298082909s ago: executing program 3 (id=1668): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x400000bce) syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000680)={0x19b1, 0x0, 0x7, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1000, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xf4b}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000580)=""/104, 0x68}], 0x1) write$input_event(r0, &(0x7f0000000000)={{0x77359400}, 0x15}, 0xfe4f) 2.194076648s ago: executing program 3 (id=1669): openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xb, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x3) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000bce) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102384, 0x18ff0) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e27, 0xffffffff, @mcast2, 0x5}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r1, 0x29, 0x3b, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x8) sendmmsg$inet6(r1, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x4001c00) 1.887483875s ago: executing program 2 (id=1670): r0 = socket(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) socket$key(0xf, 0x3, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) syz_open_procfs$namespace(0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) socket$nl_netfilter(0x10, 0x3, 0xc) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000300), 0x1, 0x102) ioctl$int_in(r2, 0x5452, 0x0) write$P9_RLOPEN(r2, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x38, 0x18, 0xa, 0x101, 0xb00, 0x0, {0x1}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}]}]}], {0x14, 0x10}}, 0xc0}}, 0x0) 1.81322851s ago: executing program 3 (id=1671): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000400)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) pipe2$watch_queue(&(0x7f0000001180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r5 = add_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000080)="f8", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_WATCH_KEY(0x20, r5, r3, 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, r5, r4, 0xffffffffffffffff) r6 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r6, 0x1, 0xf, &(0x7f0000000180)=0x80000004, 0x4) 1.738082776s ago: executing program 2 (id=1672): socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$vim2m_VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) socket$nl_route(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x401c2, 0x0) ftruncate(r1, 0x8800000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r3, &(0x7f00000034c0)=[{{0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000000b80)=""/4096, 0x20001b80}, {&(0x7f0000001b80)=""/112, 0x70}], 0x2, 0x0, 0xa0028cb4}}], 0x40000000000013c, 0x700, 0x0) sendfile(r2, r1, 0x0, 0x578410eb) 1.625901912s ago: executing program 1 (id=1673): bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYRES32=0x0], 0x50) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) read$msr(0xffffffffffffffff, &(0x7f0000000800)=""/112, 0x70) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000400)=@raw={'raw\x00', 0x3c1, 0x3, 0x380, 0x1c0, 0x12, 0x60a, 0x1c0, 0x202, 0x2b0, 0x2e8, 0x2e8, 0x2b0, 0x2c0, 0x4, 0x0, {[{{@ipv6={@private0, @ipv4={'\x00', '\xff\xff', @private}, [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x190, 0x1c0, 0x0, {}, [@common=@unspec=@string={{0xc0}, {0x0, 0x0, 'bm\x00', "000000000000000617ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcf07000000eca0a7b66c60c527bac2b5", 0x2}}, @inet=@rpfilter={{0x28}}]}, @common=@unspec=@CONNMARK={0x30}}, {{@uncond, 0x0, 0xa8, 0xf0}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000000)={0x4000000, {0x2, 0x4e22}, {0x2, 0x0, @local}, {0x2, 0x0, @empty}, 0x170, 0x0, 0x0, 0x0, 0xfff8, 0x0, 0x0, 0x5}) 687.721506ms ago: executing program 3 (id=1677): setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0xfffffdca, &(0x7f0000000200)=0x400000bce) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) syz_usb_connect(0x0, 0x24, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000db9d1b08d112e2fa8b70010203010902120001000014000904000000ff041a00"], 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000005c0)=ANY=[], 0x6c) openat$iommufd(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = inotify_init1(0x800) inotify_rm_watch(r1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) socket$inet(0x2, 0x802, 0x1) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 639.198089ms ago: executing program 1 (id=1678): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0x10}, 0x0) socket$nl_route(0x10, 0x3, 0x0) gettid() write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x882b087) tee(0xffffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffc01, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x60000000000, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xc, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x3) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000bce) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f0000000a00)=""/102384, 0x18ff0) r2 = socket(0x2, 0x80805, 0x0) getsockopt$bt_hci(r2, 0x84, 0x80, 0x0, &(0x7f0000001080)) 491.015491ms ago: executing program 2 (id=1681): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) epoll_create1(0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x118) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x20, &(0x7f0000001140)=[@in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e21, @multicast1}]}, &(0x7f0000000180)=0x10) getsockopt$bt_hci(r3, 0x84, 0x6d, &(0x7f0000000000)=""/4102, &(0x7f0000001040)=0x1006) syz_open_dev$vbi(&(0x7f0000000000), 0x0, 0x2) 427.862808ms ago: executing program 0 (id=1682): sendmsg$MPTCP_PM_CMD_SUBFLOW_CREATE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x1000c000) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x7ff}, 0xe) syz_init_net_socket$bt_hidp(0x1f, 0x3, 0x6) r1 = syz_init_net_socket$bt_hidp(0x1f, 0x3, 0x6) syz_init_net_socket$bt_hidp(0x1f, 0x3, 0x6) r2 = socket(0x10, 0x3, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = socket(0x400000000010, 0x3, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r6, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x0, 0x3}}}]}, 0x38}}, 0x40) sendmsg$nl_route_sched(r2, &(0x7f0000006040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=@newtfilter={0x44, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {0x0, 0x7}, {}, {0xffff}}, [@filter_kind_options=@f_route={{0xa}, {0x14, 0x2, [@TCA_ROUTE4_FROM={0x8, 0x3, 0xdc}, @TCA_ROUTE4_IIF={0x8, 0x4, r6}]}}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x800) r7 = openat$tun(0xffffffffffffff9c, 0x0, 0x40241, 0x0) write$tun(r7, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000280)={0x2, &(0x7f0000001240)=[{@none}, {@none}]}) 320.814427ms ago: executing program 0 (id=1683): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0xa4, 0x30, 0x1, 0x0, 0x0, {}, [{0x90, 0x1, [@m_ct={0x44, 0x2, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x9d, 0x11e41e7a, 0x20000000, 0x0, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0xfffffffe, 0x0, 0x1}}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000440), 0x4) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat$binfmt_format(0xffffffffffffff9c, &(0x7f0000001580)='/proc/sys/fs/binfmt_misc/syz0\x00', 0x2, 0x0) read(r3, 0x0, 0x0) r4 = syz_open_dev$vivid(&(0x7f0000000180), 0x3, 0x2) ioctl$VIDIOC_SUBSCRIBE_EVENT(r4, 0x4020565a, &(0x7f00000001c0)={0x3, 0xa07, 0x2}) 261.258545ms ago: executing program 0 (id=1684): syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101301) syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) fsopen(&(0x7f0000000080)='ext3\x00', 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x3, 0x8000000003c) socket$igmp6(0xa, 0x3, 0x2) r0 = syz_io_uring_setup(0x10d, &(0x7f0000000140)={0x0, 0x4, 0x0, 0xffffffff}, &(0x7f0000000340)=0x0, &(0x7f0000000280)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x100}, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r5, &(0x7f0000000180)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x9, 0x12, r5, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080), 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x10, 0x4007, @fd_index=0x8000000, 0x2, 0x0}) io_uring_enter(r0, 0x3f70, 0x0, 0x0, 0x0, 0x0) 142.015476ms ago: executing program 0 (id=1685): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x1e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) write$6lowpan_enable(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18050000000000fe000000004b64ffec850000007d00000004000000070000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000009c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) writev(r0, &(0x7f0000000200)=[{&(0x7f00000000c0)='X', 0x8030000}], 0x1) 116.699254ms ago: executing program 0 (id=1686): r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x20100, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) timerfd_create(0x0, 0x0) timer_create(0x4, &(0x7f0000000180)={0x0, 0x20}, 0x0) r2 = timerfd_create(0x3, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000200)) timerfd_settime(r2, 0x3, &(0x7f0000000440)={{0x0, 0x989680}}, 0x0) clock_adjtime(0x0, &(0x7f0000000480)={0xd54, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write(0xffffffffffffffff, &(0x7f0000000040)="05000000010001", 0x7) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001c0005ddffffffffffffff000a000000", @ANYRES32], 0x34}}, 0x0) 50.434093ms ago: executing program 0 (id=1687): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x400000bce) read$msr(0xffffffffffffffff, &(0x7f0000019680)=""/102392, 0x18ff8) clock_adjtime(0x0, &(0x7f0000000680)={0x19b1, 0x0, 0x7, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1000, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xf4b}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000580)=""/104, 0x68}], 0x1) write$input_event(r0, &(0x7f0000000000)={{0x77359400}, 0x15}, 0xfe4f) 0s ago: executing program 3 (id=1688): socket$inet6(0x10, 0x3, 0x0) ioprio_set$pid(0x1, 0x0, 0x4007) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000240)='xen_cpu_write_idt_entry\x00', r0}, 0x18) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) ioctl$SW_SYNC_IOC_INC(r1, 0x40045701, &(0x7f0000000300)=0x2) syz_emit_ethernet(0x4c, &(0x7f0000000140)={@link_local, @random="ece65fbcee55", @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "010100", 0x7, 0x11, 0x0, @remote, @local, {[], {0x0, 0x0, 0x16, 0x0, @gue={{0x2}, "30b00afe4e70"}}}}}}}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x8, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bind$inet6(0xffffffffffffffff, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioprio_get$pid(0x1, 0x0) kernel console output (not intermixed with test programs): vblank timer overrun [ 215.847262][ T8544] netlink: 'syz.3.852': attribute type 9 has an invalid length. [ 215.861463][ T29] audit: type=1400 audit(1738143723.769:2276): avc: denied { mount } for pid=8440 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 215.886953][ T29] audit: type=1400 audit(1738143723.779:2277): avc: denied { mounton } for pid=8440 comm="syz-executor" path="/root/syzkaller.lfvPSf/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 215.887115][ T8544] netlink: 'syz.3.852': attribute type 7 has an invalid length. [ 215.913657][ C0] vkms_vblank_simulate: vblank timer overrun [ 215.913943][ T29] audit: type=1400 audit(1738143723.779:2278): avc: denied { mounton } for pid=8440 comm="syz-executor" path="/root/syzkaller.lfvPSf/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=19935 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 215.954928][ C0] vkms_vblank_simulate: vblank timer overrun [ 215.963349][ T29] audit: type=1400 audit(1738143723.889:2279): avc: denied { mounton } for pid=8440 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=2724 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 215.987169][ T8544] netlink: 'syz.3.852': attribute type 8 has an invalid length. [ 216.036139][ T29] audit: type=1400 audit(1738143723.889:2280): avc: denied { mount } for pid=8440 comm="syz-executor" name="/" dev="gadgetfs" ino=6470 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 216.080951][ T8547] tipc: Enabled bearer , priority 0 [ 216.086856][ T29] audit: type=1400 audit(1738143723.889:2281): avc: denied { mounton } for pid=8440 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 216.099683][ T8547] syzkaller0: entered promiscuous mode [ 216.122816][ T8547] syzkaller0: entered allmulticast mode [ 216.203875][ T8547] tipc: Resetting bearer [ 216.243079][ T8545] tipc: Resetting bearer [ 216.282373][ T8545] tipc: Disabling bearer [ 219.712099][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 219.712112][ T29] audit: type=1400 audit(1738143727.669:2284): avc: denied { accept } for pid=8572 comm="syz.0.860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 220.298139][ T29] audit: type=1400 audit(1738143728.259:2285): avc: denied { watch } for pid=8582 comm="syz.5.864" path="/1" dev="tmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 221.231290][ T29] audit: type=1400 audit(1738143729.139:2286): avc: denied { create } for pid=8590 comm="syz.2.867" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 221.291562][ T29] audit: type=1400 audit(1738143729.149:2287): avc: denied { getopt } for pid=8590 comm="syz.2.867" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 221.544604][ T3160] block nbd0: Possible stuck request ffff88802652e000: control (read@0,4096B). Runtime 90 seconds [ 221.862248][ T29] audit: type=1400 audit(1738143729.819:2288): avc: denied { mount } for pid=8610 comm="syz.2.872" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 221.916378][ T29] audit: type=1400 audit(1738143729.869:2289): avc: denied { remount } for pid=8610 comm="syz.2.872" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 221.952757][ T8611] wg2: entered promiscuous mode [ 221.957828][ T8611] wg2: entered allmulticast mode [ 222.073051][ T29] audit: type=1400 audit(1738143730.039:2290): avc: denied { unmount } for pid=5816 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 222.210468][ T29] audit: type=1400 audit(1738143730.179:2291): avc: denied { append } for pid=8614 comm="syz.3.873" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 222.464926][ T29] audit: type=1400 audit(1738143730.389:2292): avc: denied { read } for pid=8619 comm="syz.2.875" name="snapshot" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 222.912874][ T8612] syz.5.870 (8612): drop_caches: 1 [ 223.434078][ T29] audit: type=1400 audit(1738143730.389:2293): avc: denied { open } for pid=8619 comm="syz.2.875" path="/dev/snapshot" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 223.472671][ T8623] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 223.520949][ T8623] Bluetooth: hci1: Opcode 0x0406 failed: -4 [ 223.544922][ T8623] Bluetooth: hci1: Opcode 0x0406 failed: -4 [ 223.553877][ T8623] Bluetooth: hci3: Opcode 0x0c1a failed: -4 [ 223.607217][ T8623] Bluetooth: hci3: Opcode 0x0406 failed: -4 [ 223.633323][ T8623] Bluetooth: hci4: Opcode 0x0c1a failed: -4 [ 223.650281][ T8623] Bluetooth: hci4: Opcode 0x0406 failed: -4 [ 223.664871][ T8623] Bluetooth: hci5: Opcode 0x0c1a failed: -4 [ 223.671513][ T8623] Bluetooth: hci5: Opcode 0x0406 failed: -4 [ 223.686805][ T8612] syz.5.870 (8612): drop_caches: 1 [ 223.688106][ T8623] Bluetooth: hci5: Opcode 0x0406 failed: -4 [ 225.189911][ T54] Bluetooth: hci1: command 0x0406 tx timeout [ 225.555740][ T8660] tipc: Enabled bearer , priority 0 [ 225.639464][ T54] Bluetooth: hci4: command 0x0406 tx timeout [ 225.645511][ T54] Bluetooth: hci3: command 0x0406 tx timeout [ 225.722457][ T5826] Bluetooth: hci5: command 0x0c1a tx timeout [ 225.819593][ T8659] tipc: Disabling bearer [ 225.926598][ T8666] xt_hashlimit: max too large, truncated to 1048576 [ 225.936337][ T8666] No such timeout policy "syz1" [ 227.240189][ T5826] Bluetooth: hci1: command 0x0406 tx timeout [ 228.023885][ T5826] Bluetooth: hci3: command 0x0406 tx timeout [ 228.023912][ T54] Bluetooth: hci4: command 0x0406 tx timeout [ 228.033875][ T5831] Bluetooth: hci5: command 0x0c1a tx timeout [ 229.319459][ T5831] Bluetooth: hci1: command 0x0406 tx timeout [ 229.323224][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 229.323237][ T29] audit: type=1400 audit(1738143737.289:2295): avc: denied { bind } for pid=8668 comm="syz.0.889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 230.189318][ T5831] Bluetooth: hci5: command 0x0c1a tx timeout [ 230.740028][ T25] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 230.856254][ T29] audit: type=1400 audit(1738143738.819:2296): avc: denied { write } for pid=8701 comm="syz.3.899" name="/" dev="9p" ino=1694025360095192279 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 230.924977][ T29] audit: type=1400 audit(1738143738.849:2297): avc: denied { add_name } for pid=8701 comm="syz.3.899" name="cpuacct.usage_percpu_user" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 230.957256][ T25] usb 1-1: Using ep0 maxpacket: 8 [ 230.974254][ T25] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 13 [ 230.988254][ T29] audit: type=1400 audit(1738143738.849:2298): avc: denied { create } for pid=8701 comm="syz.3.899" name="cpuacct.usage_percpu_user" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 230.991006][ T25] usb 1-1: New USB device found, idVendor=046d, idProduct=08ae, bcdDevice=11.58 [ 231.041702][ T25] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 231.075796][ T25] usb 1-1: Product: syz [ 231.094123][ T29] audit: type=1400 audit(1738143738.849:2299): avc: denied { associate } for pid=8701 comm="syz.3.899" name="cpuacct.usage_percpu_user" scontext=root:object_r:unlabeled_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 231.096435][ T25] usb 1-1: Manufacturer: syz [ 231.122059][ T29] audit: type=1400 audit(1738143739.019:2300): avc: denied { setopt } for pid=8704 comm="syz.5.901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 231.176708][ T25] usb 1-1: SerialNumber: syz [ 231.203163][ T25] usb 1-1: config 0 descriptor?? [ 231.217841][ T25] gspca_main: gspca_zc3xx-2.14.0 probing 046d:08ae [ 231.267962][ T8710] 9pnet_fd: Insufficient options for proto=fd [ 231.456450][ T29] audit: type=1400 audit(1738143739.419:2301): avc: denied { wake_alarm } for pid=8713 comm="syz.3.903" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 232.458623][ T25] gspca_zc3xx: reg_w_i err -110 [ 232.559352][ T29] audit: type=1400 audit(1738143740.509:2302): avc: denied { mount } for pid=8693 comm="syz.0.896" name="/" dev="configfs" ino=78 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 232.695086][ T29] audit: type=1400 audit(1738143740.529:2303): avc: denied { setattr } for pid=8693 comm="syz.0.896" name="/" dev="configfs" ino=78 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 233.489447][ T25] gspca_zc3xx: Unknown sensor - set to TAS5130C [ 233.495833][ T25] gspca_zc3xx 1-1:0.0: probe with driver gspca_zc3xx failed with error -110 [ 233.828002][ T29] audit: type=1400 audit(1738143741.789:2304): avc: denied { listen } for pid=8723 comm="syz.1.906" lport=53863 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 234.102475][ T8752] netlink: 24 bytes leftover after parsing attributes in process `syz.5.913'. [ 234.222421][ T8752] Bluetooth: MGMT ver 1.23 [ 234.307753][ T7553] usb 1-1: USB disconnect, device number 7 [ 234.352320][ T6089] Bluetooth: hci6: Frame reassembly failed (-84) [ 234.403742][ T8752] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 234.630678][ T8762] netlink: 16 bytes leftover after parsing attributes in process `syz.1.915'. [ 234.635558][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 234.635570][ T29] audit: type=1400 audit(1738143742.589:2309): avc: denied { ioctl } for pid=8760 comm="syz.3.916" path="mnt:[4026532937]" dev="nsfs" ino=4026532937 ioctlcmd=0x940b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 234.656619][ T8762] netlink: 12 bytes leftover after parsing attributes in process `syz.1.915'. [ 236.249686][ T29] audit: type=1400 audit(1738143744.209:2310): avc: denied { bind } for pid=8784 comm="syz.0.925" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 236.339931][ T29] audit: type=1400 audit(1738143744.219:2311): avc: denied { ioctl } for pid=8784 comm="syz.0.925" path="socket:[19395]" dev="sockfs" ino=19395 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 236.369295][ T5831] Bluetooth: hci6: Opcode 0x1003 failed: -110 [ 237.453895][ T29] audit: type=1400 audit(1738143745.389:2312): avc: denied { search } for pid=8786 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 238.117251][ T29] audit: type=1400 audit(1738143745.449:2313): avc: denied { read } for pid=8798 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=1706 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 238.272482][ T29] audit: type=1400 audit(1738143745.449:2314): avc: denied { open } for pid=8798 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=1706 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 238.506038][ T29] audit: type=1400 audit(1738143745.449:2315): avc: denied { getattr } for pid=8798 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=1706 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 238.581875][ T29] audit: type=1400 audit(1738143745.449:2316): avc: denied { getattr } for pid=8798 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf/eth0.dhcp" dev="tmpfs" ino=1744 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 238.719512][ T29] audit: type=1400 audit(1738143746.109:2317): avc: denied { read } for pid=8801 comm="sed" name="eth0.dhcp" dev="tmpfs" ino=1744 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 238.742922][ T29] audit: type=1400 audit(1738143746.109:2318): avc: denied { open } for pid=8801 comm="sed" path="/run/dhcpcd/hook-state/resolv.conf/eth0.dhcp" dev="tmpfs" ino=1744 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 239.179339][ T8838] overlayfs: failed to resolve 'fsuuid=fc06f03e-fb86-bc6f-7997-348d5372': -2 [ 239.933901][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 239.933916][ T29] audit: type=1400 audit(1738143747.889:2327): avc: denied { getopt } for pid=8845 comm="syz.0.937" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 240.070259][ T29] audit: type=1400 audit(1738143748.009:2328): avc: denied { map } for pid=8853 comm="syz.1.939" path="/dev/nullb0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 240.097723][ T29] audit: type=1400 audit(1738143748.009:2329): avc: denied { execute } for pid=8853 comm="syz.1.939" path="/dev/nullb0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 240.862651][ T29] audit: type=1326 audit(1738144004.601:2330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8845 comm="syz.0.937" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5e5118cda9 code=0x7fc00000 [ 240.905113][ T29] audit: type=1326 audit(1738144004.601:2331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8845 comm="syz.0.937" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f5e5118cda9 code=0x7fc00000 [ 240.934308][ T29] audit: type=1326 audit(1738144004.601:2332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8845 comm="syz.0.937" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5e5118cda9 code=0x7fc00000 [ 240.988754][ T29] audit: type=1326 audit(1738144004.611:2333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8845 comm="syz.0.937" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5e5118cda9 code=0x7fc00000 [ 241.077725][ T8864] Illegal XDP return value 512732719 on prog (id 105) dev N/A, expect packet loss! [ 241.263160][ T8867] ======================================================= [ 241.263160][ T8867] WARNING: The mand mount option has been deprecated and [ 241.263160][ T8867] and is ignored by this kernel. Remove the mand [ 241.263160][ T8867] option from the mount to silence this warning. [ 241.263160][ T8867] ======================================================= [ 242.179007][ T29] audit: type=1400 audit(1738144006.131:2334): avc: denied { setopt } for pid=8881 comm="syz.3.947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 242.418449][ T29] audit: type=1400 audit(1738144006.371:2335): avc: denied { create } for pid=8893 comm="syz.1.951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 242.452077][ T8895] net_ratelimit: 74 callbacks suppressed [ 242.452091][ T8895] blackhole_netdev_xmit(): Dropping skb. [ 242.483224][ T29] audit: type=1400 audit(1738144006.401:2336): avc: denied { setopt } for pid=8893 comm="syz.1.951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 242.535417][ T8895] blackhole_netdev_xmit(): Dropping skb. [ 242.559322][ T8895] blackhole_netdev_xmit(): Dropping skb. [ 242.575555][ T8895] blackhole_netdev_xmit(): Dropping skb. [ 242.585376][ T8895] blackhole_netdev_xmit(): Dropping skb. [ 242.622827][ T8895] blackhole_netdev_xmit(): Dropping skb. [ 242.641104][ T8895] blackhole_netdev_xmit(): Dropping skb. [ 242.688794][ T8895] blackhole_netdev_xmit(): Dropping skb. [ 242.716990][ T8895] blackhole_netdev_xmit(): Dropping skb. [ 242.738457][ T8895] blackhole_netdev_xmit(): Dropping skb. [ 243.686770][ T8911] tipc: Enabled bearer , priority 10 [ 245.819122][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 245.819137][ T29] audit: type=1400 audit(1738144009.731:2341): avc: denied { ioctl } for pid=8908 comm="syz.5.955" path="socket:[21546]" dev="sockfs" ino=21546 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 246.908013][ T29] audit: type=1400 audit(1738144010.861:2342): avc: denied { ioctl } for pid=8939 comm="syz.1.964" path="socket:[20802]" dev="sockfs" ino=20802 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 247.970988][ T8962] kvm: requested 4190 ns i8254 timer period limited to 200000 ns [ 248.176978][ T8955] kvm: pic: non byte read [ 248.194508][ T8955] kvm: pic: non byte read [ 248.209481][ T8955] kvm: pic: non byte read [ 248.226276][ T8955] kvm: pic: non byte read [ 248.250405][ T8955] kvm: pic: non byte read [ 248.295120][ T8955] kvm: pic: non byte read [ 248.313899][ T8955] kvm: pic: non byte read [ 248.329585][ T8955] kvm: pic: non byte read [ 248.334688][ T8955] kvm: pic: non byte read [ 248.347713][ T8955] kvm: pic: non byte read [ 248.371505][ T8955] pic_ioport_write: 22 callbacks suppressed [ 248.371515][ T8955] kvm: pic: single mode not supported [ 248.377473][ T8955] kvm: pic: level sensitive irq not supported [ 250.349934][ T8988] MTD: Attempt to mount non-MTD device "/dev/loop1" [ 250.366694][ T8988] syz.1.975: attempt to access beyond end of device [ 250.366694][ T8988] loop1: rw=0, sector=0, nr_sectors = 2 limit=0 [ 251.249493][ T29] audit: type=1400 audit(1738144015.161:2343): avc: denied { read write } for pid=8984 comm="syz.2.977" name="file0" dev="fuse" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 251.327229][ T29] audit: type=1400 audit(1738144015.161:2344): avc: denied { open } for pid=8984 comm="syz.2.977" path="/215/file0/file0" dev="fuse" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 251.403773][ T29] audit: type=1400 audit(1738144015.261:2345): avc: denied { ioctl } for pid=8996 comm="syz.1.979" path="socket:[20949]" dev="sockfs" ino=20949 ioctlcmd=0x7437 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 251.428443][ C1] vkms_vblank_simulate: vblank timer overrun [ 251.949142][ T9011] xt_bpf: check failed: parse error [ 252.123650][ T3160] block nbd0: Possible stuck request ffff88802652e000: control (read@0,4096B). Runtime 120 seconds [ 253.116462][ T29] audit: type=1400 audit(1738144017.051:2346): avc: denied { watch_reads } for pid=9016 comm="syz.1.987" path="/199" dev="tmpfs" ino=1079 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 253.140284][ T971] usb 4-1: new full-speed USB device number 8 using dummy_hcd [ 253.456421][ T971] usb 4-1: config 0 has an invalid interface number: 52 but max is 0 [ 253.491478][ T971] usb 4-1: config 0 has an invalid descriptor of length 102, skipping remainder of the config [ 253.625233][ T971] usb 4-1: config 0 has no interface number 0 [ 253.631620][ T7553] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 253.633662][ T29] audit: type=1400 audit(1738144017.591:2347): avc: denied { create } for pid=9026 comm="syz.1.990" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 253.659339][ T971] usb 4-1: config 0 interface 52 altsetting 1 endpoint 0x8A has invalid maxpacket 41033, setting to 64 [ 253.704305][ T971] usb 4-1: config 0 interface 52 altsetting 1 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 253.754878][ T29] audit: type=1400 audit(1738144017.621:2348): avc: denied { setopt } for pid=8993 comm="syz.5.980" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 253.829423][ T7553] usb 1-1: Using ep0 maxpacket: 32 [ 253.884047][ T29] audit: type=1400 audit(1738144017.841:2349): avc: denied { mounton } for pid=9026 comm="syz.1.990" path="/200/file0" dev="tmpfs" ino=1089 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 253.886507][ T7553] usb 1-1: config 0 has an invalid interface number: 1 but max is 0 [ 253.934818][ T971] usb 4-1: config 0 interface 52 has no altsetting 0 [ 253.972615][ T971] usb 4-1: New USB device found, idVendor=06cb, idProduct=0007, bcdDevice= 0.00 [ 253.989433][ T971] usb 4-1: New USB device strings: Mfr=0, Product=149, SerialNumber=35 [ 253.997695][ T971] usb 4-1: Product: syz [ 254.001960][ T7553] usb 1-1: config 0 has no interface number 0 [ 254.008057][ T7553] usb 1-1: config 0 interface 1 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 254.039172][ T971] usb 4-1: SerialNumber: syz [ 254.049953][ T7553] usb 1-1: config 0 interface 1 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 254.060500][ T971] usb 4-1: config 0 descriptor?? [ 254.084509][ T7553] usb 1-1: New USB device found, idVendor=28bd, idProduct=0094, bcdDevice= 0.00 [ 254.102879][ T7553] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 254.121107][ T7553] usb 1-1: config 0 descriptor?? [ 254.337917][ T9024] xt_CT: You must specify a L4 protocol and not use inversions on it [ 254.369547][ T971] input: syz (Stick) as /devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.52/input/input12 [ 254.775161][ T7553] input: HID 28bd:0094 Pen as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.1/0003:28BD:0094.0004/input/input13 [ 255.255567][ T8] usb 4-1: USB disconnect, device number 8 [ 255.324090][ T1293] ieee802154 phy0 wpan0: encryption failed: -22 [ 255.330567][ T1293] ieee802154 phy1 wpan1: encryption failed: -22 [ 255.591033][ T7553] uclogic 0003:28BD:0094.0004: input,hidraw0: USB HID v0.00 Device [HID 28bd:0094] on usb-dummy_hcd.0-1/input1 [ 255.661438][ T7553] usb 1-1: USB disconnect, device number 8 [ 255.738877][ T9050] tipc: Started in network mode [ 255.744826][ T9050] tipc: Node identity f2b3c1991d31, cluster identity 4711 [ 255.760602][ T9050] tipc: Enabled bearer , priority 0 [ 255.801696][ T9052] syzkaller0: entered promiscuous mode [ 255.829481][ T9052] syzkaller0: entered allmulticast mode [ 255.882778][ T9050] tipc: Resetting bearer [ 255.944124][ T9049] tipc: Resetting bearer [ 256.064381][ T9049] tipc: Disabling bearer [ 256.276750][ T9068] binder: BINDER_SET_CONTEXT_MGR already set [ 256.288842][ T9068] binder: 9067:9068 ioctl 4018620d 20000040 returned -16 [ 256.493205][ T7553] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 257.193179][ T7553] usb 1-1: config 0 has 0 interfaces, different from the descriptor's value: 1 [ 257.263179][ T7553] usb 1-1: New USB device found, idVendor=9710, idProduct=7730, bcdDevice=96.33 [ 257.288226][ T7553] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 257.307364][ T7553] usb 1-1: config 0 descriptor?? [ 257.694170][ T9087] x_tables: unsorted underflow at hook 3 [ 258.890966][ T9103] kvm: pic: level sensitive irq not supported [ 258.891175][ T9103] kvm: pic: single mode not supported [ 259.179044][ T29] audit: type=1400 audit(1738144023.121:2350): avc: denied { ioctl } for pid=9106 comm="syz.1.1013" path="socket:[21255]" dev="sockfs" ino=21255 ioctlcmd=0x8905 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 259.215602][ T5863] usb 1-1: USB disconnect, device number 9 [ 260.029293][ T7553] usb 6-1: new high-speed USB device number 2 using dummy_hcd [ 260.309463][ T7553] usb 6-1: Using ep0 maxpacket: 8 [ 260.611960][ T7553] usb 6-1: New USB device found, idVendor=0ccd, idProduct=10a3, bcdDevice=23.a2 [ 260.624410][ T7553] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 260.639520][ T7553] usb 6-1: Product: syz [ 260.643823][ T7553] usb 6-1: Manufacturer: syz [ 260.648517][ T7553] usb 6-1: SerialNumber: syz [ 260.659941][ T7553] usb 6-1: config 0 descriptor?? [ 260.872944][ T7553] usb 6-1: dvb_usb_v2: found a 'Terratec H7' in warm state [ 260.989293][ T5863] usb 4-1: new full-speed USB device number 9 using dummy_hcd [ 261.029379][ T5823] usb 3-1: new high-speed USB device number 7 using dummy_hcd [ 261.156144][ T5863] usb 4-1: unable to get BOS descriptor or descriptor too short [ 261.164654][ T5863] usb 4-1: not running at top speed; connect to a high speed hub [ 261.177231][ T5863] usb 4-1: config 129 has an invalid interface number: 135 but max is 0 [ 261.185739][ T5863] usb 4-1: config 129 has no interface number 0 [ 261.192246][ T5823] usb 3-1: Using ep0 maxpacket: 32 [ 261.203089][ T5863] usb 4-1: config 129 interface 135 has no altsetting 0 [ 261.212582][ T5823] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 261.226172][ T5823] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 261.236571][ T5823] usb 3-1: New USB device found, idVendor=0403, idProduct=6030, bcdDevice= 0.00 [ 261.236638][ T5863] usb 4-1: New USB device found, idVendor=2040, idProduct=721f, bcdDevice=f2.62 [ 261.255472][ T5823] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 261.264833][ T5863] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 261.275521][ T5823] usb 3-1: config 0 descriptor?? [ 261.282121][ T5863] usb 4-1: Product: syz [ 261.286538][ T5863] usb 4-1: Manufacturer: syz [ 261.292776][ T5863] usb 4-1: SerialNumber: syz [ 261.496390][ T9125] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 261.524132][ T5863] usb 4-1: USB disconnect, device number 9 [ 261.709122][ T5823] usbhid 3-1:0.0: can't add hid device: -71 [ 261.715213][ T5823] usbhid 3-1:0.0: probe with driver usbhid failed with error -71 [ 261.728457][ T5823] usb 3-1: USB disconnect, device number 7 [ 262.089975][ T7553] usb write operation failed. (-71) [ 262.108709][ T7553] usb 6-1: dvb_usb_v2: will pass the complete MPEG2 transport stream to the software demuxer [ 262.132423][ T7553] dvbdev: DVB: registering new adapter (Terratec H7) [ 262.139136][ T7553] usb 6-1: media controller created [ 262.159249][ T29] audit: type=1400 audit(1738144026.111:2351): avc: denied { execute } for pid=9127 comm="syz.1.1031" path="/dev/dsp" dev="devtmpfs" ino=1283 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 262.190635][ T7553] usb read operation failed. (-71) [ 262.196317][ T7553] usb write operation failed. (-71) [ 262.205432][ T7553] dvb_usb_az6007 6-1:0.0: probe with driver dvb_usb_az6007 failed with error -5 [ 262.288156][ T7553] usb 6-1: USB disconnect, device number 2 [ 262.359529][ T29] audit: type=1400 audit(1738144026.301:2352): avc: denied { setopt } for pid=9128 comm="syz.0.1030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 263.013955][ T9138] mkiss: ax0: crc mode is auto. [ 264.333780][ T9154] overlayfs: failed to get index nlink (file1/bus, err=-61) [ 267.172590][ T9194] block nbd2: NBD_DISCONNECT [ 267.174396][ T9190] block nbd2: shutting down sockets [ 267.177243][ T9194] block nbd2: Send disconnect failed -32 [ 267.474046][ T7553] usb 2-1: new high-speed USB device number 9 using dummy_hcd [ 267.654231][ T7553] usb 2-1: config 1 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 267.880729][ T7553] usb 2-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 8 [ 267.892008][ T7553] usb 2-1: config 1 interface 1 has no altsetting 0 [ 267.901314][ T7553] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 267.910856][ T7553] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 267.918853][ T7553] usb 2-1: Product: syz [ 267.923281][ T7553] usb 2-1: Manufacturer: syz [ 267.927904][ T7553] usb 2-1: SerialNumber: syz [ 267.941484][ T7553] cdc_ncm 2-1:1.0: NCM or ECM functional descriptors missing [ 267.950048][ T7553] cdc_ncm 2-1:1.0: bind() failure [ 269.132671][ T29] audit: type=1400 audit(1738144032.411:2353): avc: denied { write } for pid=9200 comm="syz.2.1039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 269.625146][ T7553] cdc_mbim 2-1:1.1: probe with driver cdc_mbim failed with error -71 [ 269.685329][ T7553] usb 2-1: USB disconnect, device number 9 [ 272.499283][ T5865] usb 6-1: new high-speed USB device number 3 using dummy_hcd [ 272.649406][ T5865] usb 6-1: Using ep0 maxpacket: 8 [ 272.665669][ T5865] usb 6-1: New USB device found, idVendor=1557, idProduct=7720, bcdDevice=b7.eb [ 272.677954][ T5865] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 272.704599][ T29] audit: type=1400 audit(1738144036.661:2354): avc: denied { create } for pid=9242 comm="syz.0.1053" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 272.751709][ T5865] usb 6-1: config 0 descriptor?? [ 272.774220][ T29] audit: type=1400 audit(1738144036.691:2355): avc: denied { audit_write } for pid=9242 comm="syz.0.1053" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 273.206130][ T9253] netlink: 'syz.0.1056': attribute type 2 has an invalid length. [ 273.225460][ T9251] veth1_vlan: left promiscuous mode [ 273.320578][ T29] audit: type=1400 audit(1738144037.281:2356): avc: denied { read write } for pid=9254 comm="syz.2.1059" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 273.349107][ T29] audit: type=1400 audit(1738144037.281:2357): avc: denied { open } for pid=9254 comm="syz.2.1059" path="/dev/vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 273.406405][ T9259] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=io+mem,decodes=none:owns=io+mem [ 273.960578][ T29] audit: type=1400 audit(1738144037.841:2358): avc: denied { nlmsg_read } for pid=9263 comm="syz.1.1060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 275.531475][ T29] audit: type=1404 audit(1738144039.481:2359): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 275.547694][ T5865] asix 6-1:0.0 (unnamed net_device) (uninitialized): Failed to write reg index 0x0000: -71 [ 275.577329][ T5865] asix 6-1:0.0: probe with driver asix failed with error -71 Jan 29 09:47:19 syzkaller kern.notice kernel: [ 275.531475][ T29] audit: type[ 275.599416][ T29] audit: type=1400 audit(1738144039.541:2360): avc: denied { setopt } for pid=9276 comm="syz.2.1064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 =1404 audit(1738144039.481:2359): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 Jan 29 09:47:19 syzkaller kern.warn kernel: [ 275.547694][ T5865] asix [ 275.636541][ T5865] usb 6-1: USB disconnect, device number 3 6-1:0.0 (unnamed net_device) (uninitialized): Failed to write reg index 0x0000: -71 Jan 29 09:47:19 syzkaller kern.err kernel: [ 275.577329][ T5865] asix 6-1:0.0: probe with driver asix fail[ 275.659379][ T29] audit: type=1400 audit(1738144039.551:2361): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ed with error -71 Jan 29 09:47:19 syzkaller kern.notice kernel: [ 275.599416][ T29] audit: type=1400 audit(1738144039.541:2360): avc: denied { setopt } for pid=9276 comm="syz.2.1064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 Jan 29 09:47:19 syzkaller kern.info kernel: [ 275.636541][ T5865] usb 6-1: USB disconnect, device number 3 Jan 29 09:47:19 syzkaller kern.notice kernel: [ 275.[ 275.720647][ T29] audit: type=1400 audit(1738144039.551:2362): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 659379][ T29] audit: type=1400 audit(1738144039.551:2361): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Jan 29 09:47:19 syzkaller kern.notice kernel: [ [ 275.767101][ T29] audit: type=1400 audit(1738144039.551:2363): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 275.720647][ T29] audit: type=1400 audit(1738144039.551:2362): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Jan 29 09:47:19 syzkaller kern.notice kernel: [ 275.767101][ T29] audit: type=1400 audit(1738144039.551:2363): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 275.869008][ T29] audit: type=1400 audit(1738144039.551:2364): avc: denied { setopt } for pid=9276 comm="syz.2.1064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 Jan 29 09:47:19 syzkaller kern.notice kernel: [ 275.869008][ T29] audit: type=1400 audit(1738144039.551:2364): avc: denied { setopt } for pid=9276 comm="syz.2.1064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 275.919294][ T29] audit: type=1400 audit(1738144039.551:2365): avc: denied { setopt } for pid=9276 comm="syz.2.1064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 Jan 29 09:47:19 syzkaller kern.notice kernel: [ 275.919294][ T29] audit: type=1400 audit(1738144039.551:2365): avc: denied { setopt } for pid=9276 comm="syz.2.1064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_[ 275.957553][ T29] audit: type=1400 audit(1738144039.551:2366): avc: denied { bind } for pid=9276 comm="syz.2.1064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 r:sysadm_t tclass=xdp_socket permissive=0 Jan 29 09:47:19 syzkaller kern.notice kernel: [ 275.957553][ T29] audit: type=1400 audit(1738144039.551:2366): avc: denied { bind } for pid=9276 comm="syz.2.1064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 276.026887][ T29] audit: type=1400 audit(1738144039.561:2367): avc: denied { bind } for pid=9276 comm="syz.2.1064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 Jan 29 09:47:20 syzkaller kern.notice kernel: [ 276.026887][ T29] audit: type=1400 audit(1738144039.561:2367): avc: denied { bind } for pid=9276 comm="syz.2.1064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 276.170391][ T29] audit: type=1400 audit(1738144039.581:2368): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 29 09:47:20 syzkaller kern.notice kernel: [ 276.170391][ T29] audit: type=1400 audit(1738144039.581:2368): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 277.268248][ T9326] ptrace attach of ""[9327] was attempted by "./syz-executor exec"[9326] Jan 29 09:47:21 syzkaller kern.notice kernel: [ 277.268248][ T9326] ptrace attach of ""[9327] was attempted by "./syz-executor exec"[9326] [ 278.794094][ T5191] udevd[5191]: worker [7219] /devices/virtual/block/nbd0 is taking a long time Jan 29 09:47:22 syzkaller daemon.warn kernel: [ 278.794094][ T5191] udevd[5191]: worker [7219] /devices/virtual/block/nbd0 is taking a long time [ 280.604722][ T29] kauditd_printk_skb: 164 callbacks suppressed [ 280.604736][ T29] audit: type=1400 audit(1738144044.561:2533): avc: denied { map_create } for pid=9399 comm="syz.0.1106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 29 09:47:24 syzkaller kern.warn kernel: [ 280.604722][ T29] kauditd_printk_skb: 164 callbacks suppressed Jan 29 09:47:24 syzkaller kern.notice kernel: [ 280.604736][ T29] audit: typ[ 280.647888][ T29] audit: type=1400 audit(1738144044.571:2534): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 e=1400 audit(1738144044.561:2533): avc: denied { map_create } for pid=9399 comm="syz.0.1106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 29 09:47:24 syzkaller kern.notice kernel: [ 280.647888][ T29] audit: type=1400 audit(1738144044.571:2534): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 280.779397][ T29] audit: type=1400 audit(1738144044.591:2535): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 29 09:47:24 syzkaller kern.notice kernel: [ 280.779397][ T29] audit: type=1400 audit(1738144044.591:2535): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 280.913855][ T29] audit: type=1400 audit(1738144044.591:2536): avc: denied { execmem } for pid=9399 comm="syz.0.1106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Jan 29 09:47:24 syzkaller kern.notice kernel: [ 280.913855][ T29] audit: type=1400 audit(1738144044.591:2536): avc: denied { execmem } for pid=9399 comm="syz.0.1106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 281.239315][ T29] audit: type=1400 audit(1738144044.641:2537): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 29 09:47:25 syzkaller kern.notice kernel: [ 281.239315][ T29] audit: type[ 281.267848][ T29] audit: type=1400 audit(1738144044.641:2538): avc: denied { read } for pid=9399 comm="syz.0.1106" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 =1400 audit(1738144044.641:2537): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Jan 29 09:47:25 syzkaller kern.notice kernel: [ 281.267848][ T29] audit: type=1400 audit(1738144044.641:2538): avc: denied { read } for pid=9399 comm="syz.0.1106" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t [ 281.444453][ T29] audit: type=1400 audit(1738144044.641:2539): avc: denied { read } for pid=9399 comm="syz.0.1106" dev="nsfs" ino=4026533156 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 Jan 29 09:47:25 syzkaller kern.notice kernel: [ 281.444453][ T29] audit: type=1400 audit(1738144044.641:2539): avc: denied { read } for pid=9399 comm="syz.0.1106" dev="nsfs" ino=4026533156 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file p [ 281.551754][ T29] audit: type=1400 audit(1738144044.681:2540): avc: denied { read write } for pid=8440 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 281.579060][ T9417] syzkaller0: entered allmulticast mode Jan 29 09:47:25 syzkaller kern.notice kernel: [ 281.551754][ T29] audit: type=1400 audit(1738144044.681:2540): avc: denied { read write } for pid=8440 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Jan 29 09:47:25 syzkaller kern.info kernel: [ 281.579060][ T9417] syzkaller0: entered allmulticast mode [ 281.638551][ T29] audit: type=1400 audit(1738144044.761:2541): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 29 09:47:25 syzkaller kern.n[ 281.667625][ T29] audit: type=1400 audit(1738144044.771:2542): avc: denied { execmem } for pid=9403 comm="syz.5.1107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 otice kernel: [ 281.638551][ T29] audit: type=1400 audit(1738144044.761:2541): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Jan 29 09:47:25 syzkaller kern.notice kernel: [ 281.667625][ T29] audit: type=1400 audit(1738144044.771:2542): avc: denied { execmem } for pid=9403 comm="syz.5.1107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 282.079917][ T9430] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.1117'. Jan 29 09:47:26 syzkaller kern.warn kernel: [ 282.079917][ T9430] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.1117'. [ 282.220523][ T3160] block nbd0: Possible stuck request ffff88802652e000: control (read@0,4096B). Runtime 150 seconds Jan 29 09:47:26 syzkaller kern.info kernel: [ 282.220523][ T3160] block nbd0: Possible stuck request ffff88802652e000: control (read@0,4096B). Runtime 150 seconds [ 285.488853][ T5826] Bluetooth: hci5: unexpected event for opcode 0x204e Jan 29 09:47:29 syzkaller kern.err kernel: [ 285.488853][ T5826] Bluetooth: hci5: unexpected event for opcode 0x204e [ 285.666705][ T29] kauditd_printk_skb: 194 callbacks suppressed [ 285.666720][ T29] audit: type=1400 audit(1738144049.621:2731): avc: denied { prog_load } for pid=9502 comm="syz.0.1144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 285.698719][ T29] audit: type=1400 audit(1738144049.631:2732): avc: denied { prog_load } for pid=9502 comm="syz.0.1144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 285.698806][ T29] audit: type=1400 audit(1738144049.651:2733): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 285.702818][ T29] audit: type=1400 audit(1738144049.661:2734): avc: denied { create } for pid=9505 comm="syz.3.1145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 285.746524][ T29] audit: type=1400 audit(1738144049.711:2735): avc: denied { create } for pid=9505 comm="syz.3.1145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 285.886790][ T29] audit: type=1400 audit(1738144049.811:2736): avc: denied { create } for pid=9505 comm="syz.3.1145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 286.068605][ T29] audit: type=1400 audit(1738144050.021:2737): avc: denied { read write } for pid=8440 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 286.107034][ T29] audit: type=1400 audit(1738144050.061:2738): avc: denied { read write } for pid=9511 comm="syz.5.1146" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 286.181884][ T29] audit: type=1400 audit(1738144050.141:2739): avc: denied { prog_load } for pid=9511 comm="syz.5.1146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 286.188099][ T29] audit: type=1400 audit(1738144050.141:2740): avc: denied { read write } for pid=5819 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Jan 29 09:47:29 [ 286.620333][ T9506] ttyS ttyS3: ldisc open failed (-12), clearing slot 3 syzkaller kern.w[ 286.628710][ T9508] ttyS ttyS3: ldisc open failed (-12), clearing slot 3 arn kernel: [ 285.666705][ T29] kauditd_printk_skb: 194 callbacks suppressed Jan 29 09:47:29 syzkaller kern.notice kernel: [ 285.666720][ T29] audit: type=1400 audit(1738144049.621:2731): avc: denied { prog_load } for pid=9502 comm="syz.0.1144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 29 09:47:29 syzkaller kern.notice kernel: [ 285.698719][ T29] audit: type=1400 audit(1738144049.631:2732): avc: denied { prog_load } for pid=9502 comm="syz.0.1144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 29 09:47:29 syzkaller kern.notice kernel: [ 285.698806][ T29] audit: type=1400 audit(1738144049.651:2733): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Jan 29 09:47:29 syzkaller kern.notice kernel: [ 285.702818][ T29] audit: type=1400 audit(1738144049.661:2734): avc: denied { create } for pid=9505 comm="syz.3.1145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissiv Jan 29 09:47:29 syzkaller kern.notice kernel: [ 285.746524][ T29] audit: type=1400 audit(1738144049.711:2735): avc: denied { create } for pid=9505 comm="syz.3.1145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 Jan 29 09:47:29 syzkaller kern.notice kernel: [ 285.886790][ T29] audit: type=1400 audit(1738144049.811:2736): avc: denied { create } for pid=9505 comm="syz.3.1145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissiv Jan 29 09:47:30 syzkaller kern.notice kernel: [ 286.068605][ T29] audit: type=1400 audit(1738144050.021:2737): avc: denied { read write } for pid=8440 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Jan 29 09:47:30 syzkaller kern.notice kernel: [ 286.107034][ T29] audit: type=1400 audit(1738144050.061:2738): avc: denied { read write } for pid=9511 comm="syz.5.1146" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r Jan 29 09:47:30 syzkaller kern.notice kernel: [ 286.181884][ T29] audit: type=1400 audit(1738144050.141:2739): avc: denied { prog_load } for pid=9511 comm="syz.5.1146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 29 09:47:30 syzkaller kern.notice kernel: [ 286.188099][ T29] audit: type=1400 audit(1738144050.141:2740): avc: denied { read write } for pid=5819 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Jan 29 09:47:30 syzkaller kern.info kernel: [ 286.620333][ T9506] ttyS ttyS3: ldisc open failed (-12), clearing slot 3 Jan 29 09:47:30 syzkaller kern.info kernel: [ 286.628710][ T9508] ttyS ttyS3: ldisc open failed (-12), clearing slot 3 [ 290.710883][ T29] kauditd_printk_skb: 108 callbacks suppressed [ 290.710899][ T29] audit: type=1400 audit(1738144054.671:2849): avc: denied { execmem } for pid=9594 comm="syz.3.1175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Jan 29 09:47:34 syzkaller kern.warn kernel: [ 290.710883][ T29] kauditd_printk_skb: 108 callbacks suppressed Jan 29 09:47:34 syzkaller kern.notice kernel: [ 290.710899][ T29] audit: type=1400 audit(1738144054.671:2849): avc: denied { execmem } for pid=9594 comm="syz.3.1175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 290.805489][ T29] audit: type=1400 audit(1738144054.701:2850): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 29 09:47:34 syzkaller kern.notice kernel: [ 290.805489][ T29] audit: type=1400 audit(1738144054.701:2850): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 290.865130][ T29] audit: type=1400 audit(1738144054.701:2851): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 29 09:47:34 syzkaller kern.notice kernel: [ 290.865130][ T29] audit: type=1400 audit(1738144054.701:2851): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 290.924593][ T29] audit: type=1400 audit(1738144054.721:2852): avc: denied { create } for pid=9594 comm="syz.3.1175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 Jan 29 09:47:34 syzkaller kern.notice kernel: [ 290.924593][ T29] audit: type=1400 audit(1738144054.721:2852): avc: denied { create } for pid=9594 comm="syz.3.1175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 290.997655][ T29] audit: type=1400 audit(1738144054.721:2853): avc: denied { create } for pid=9594 comm="syz.3.1175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 Jan 29 09:47:34 syzkaller kern.notice kernel: [ 290.997655][ T29] audit: type=1400 audit(1738144054.721:2853): avc: denied { create } for pid=9594 comm="syz.3.1175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 291.059512][ T29] audit: type=1400 audit(1738144054.751:2854): avc: denied { read write } for pid=5817 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 291.083677][ C1] vkms_vblank_simulate: vblank timer overrun Jan 29 09:47:35 syzkaller kern.notice kernel: [ 291.059512][ T29] audit: type=1400 audit(1738144054.751:2854): avc: denied { read write } for pid=5817 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Jan 29 09:47:35 syzkaller kern.warn kernel: [ 291.083677][ C1] vkms_vblank_simulate: vblank timer overrun [ 291.133638][ T29] audit: type=1400 audit(1738144054.791:2855): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 29 09:47:35 syzkaller kern.notice kernel: [ 291.133638][ T29] audit: type=1400 audit(1738144054.791:2855): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 291.192520][ T29] audit: type=1400 audit(1738144054.801:2856): avc: denied { read } for pid=9597 comm="syz.0.1176" name="userio" dev="devtmpfs" ino=914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 291.215118][ C1] vkms_vblank_simulate: vblank timer overrun Jan 29 09:47:35 syzkaller kern.notice kernel: [ 291.192520][ T29] audit: type=1400 audit(1738144054.801:2856): avc: denied { read } for pid=9597 comm="syz.0.1176" name="userio" dev="devtmpfs" ino=914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t Jan 29 09:47:35 syzkaller kern.warn kernel: [ 291.215118][ C1] vkms_vblank_simulate: vblank timer overrun [ 291.278817][ T29] audit: type=1400 audit(1738144054.811:2857): avc: denied { read write } for pid=9597 comm="syz.0.1176" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 291.302272][ C1] vkms_vblank_simulate: vblank timer overrun Jan 29 09:47:35 syzkaller kern.notice kernel: [ 291.278817][ T29] audit: type=1400 audit(1738144054.811:2857): avc: denied { read write } for pid=9597 comm="syz.0.1176" name="raw-gadget" dev="devtmpfs" [ 291.327517][ T29] audit: type=1400 audit(1738144054.851:2858): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ino=820 scontext[ 291.350082][ C1] vkms_vblank_simulate: vblank timer overrun =root:sysadm_r:sysadm_t tcontext=system_u:object_r Jan 29 09:47:35 syzkaller kern.warn kernel: [ 291.302272][ C1] vkms_vblank_simulate: vblank timer overrun Jan 29 09:47:35 syzkaller kern.notice kernel: [ 291.327517][ T29] audit: type=1400 audit(1738144054.851:2858): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Jan 29 09:47:35 syzkaller kern.warn kernel: [ 291.350082][ C1] vkms_vblank_simulate: vblank timer overrun [ 292.079978][ T9622] sp0: Synchronizing with TNC Jan 29 09:47:36 syzkaller kern.info kernel: [ 292.079978][ T9622] sp0: Synchronizing with TNC [ 295.940417][ T29] kauditd_printk_skb: 91 callbacks suppressed [ 295.940428][ T29] audit: type=1400 audit(1738144059.901:2950): avc: denied { map_create } for pid=9661 comm="syz.0.1197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 29 09:47:39 syzkaller kern.warn kernel: [ 295.940417][ T29] kauditd_printk_skb: 91 callbacks suppressed Jan 29 09:47:39 syzkaller kern.notice kernel: [ 295.940428][ T29] audit: type=1400 audit(1738144059.901:2950): avc: denied { map_create } for pid=9661 comm="syz.0.1197" scontext=root:sysadm_r:sysadm_t t[ 295.995287][ T29] audit: type=1400 audit(1738144059.931:2951): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 context=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 29 09:47:40 syzkaller kern.notice kernel: [ 295.995287][ T29] audit: type=1400 audit(1738144059.931:2951): avc: denied { read } for pid=5173 comm="sys[ 296.087549][ T29] audit: type=1400 audit(1738144059.931:2952): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 logd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Jan 29 09:47:40 syzkaller kern.notice kernel: [ 296.087549][ T29] audit: type=1400 audit(1738144059.931:2952): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 296.148627][ T29] audit: type=1400 audit(1738144059.931:2953): avc: denied { create } for pid=9671 comm="syz.1.1200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 Jan 29 09:47:40 syzkaller kern.notice kernel: [ 296.148627][ T29] audit: type=1400 audit(1738144059.931:2953): avc: denied { create } for pid=9671 comm="syz.1.1200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 296.312282][ T29] audit: type=1400 audit(1738144059.941:2954): avc: denied { prog_load } for pid=9671 comm="syz.1.1200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 29 09:47:40 syzkaller kern.notice kernel: [ 296.312282][ T29] audit: type=1400 audit(1738144059.941:2954): avc: denied { prog_load } for pid=9671 comm="syz.1.1200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 296.406413][ T29] audit: type=1400 audit(1738144060.031:2955): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 29 09:47:40 syzkaller kern.notice kernel: [ 296.406413][ T29] audit: type=1400 audit(1738144060.031:2955): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 296.559908][ T29] audit: type=1400 audit(1738144060.041:2956): avc: denied { read write } for pid=5819 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Jan 29 09:47:40 syzkaller kern.notice kernel: [ 296.559908][ T29] audit: type=1400 audit(1738144060.041:2956): avc: denied { read write } for pid=5819 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 296.665101][ T29] audit: type=1400 audit(1738144060.081:2957): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 29 09:47:40 [ 296.697807][ T29] audit: type=1400 audit(1738144060.081:2958): avc: denied { read write } for pid=8440 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 syzkaller kern.notice kernel: [ 296.665101][ T29] audit: type=1400 audit(1738144060.081:2957): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Jan 29 09:47:40 syzkaller kern.notice kernel: [ 296.697807][ [ 296.909154][ T29] audit: type=1400 audit(1738144060.131:2959): avc: denied { read } for pid=9673 comm="syz.1.1201" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 T29] audit: type=1400 audit(1738144060.081:2958): avc: denied { read write } for pid=8440 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Jan 29 09:47:40 syzkaller kern.notice kernel: [ 296.909154][ T29] audit: type=1400 audit(1738144060.131:2959): avc: denied { read } for pid=9673 comm="syz.1.1201" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t [ 297.489522][ T5826] Bluetooth: hci1: command 0x0406 tx timeout Jan 29 09:47:41 syzkaller kern.err kernel: [ 297.489522][ T5826] Bluetooth: hci1: command 0x0406 tx timeout [ 298.140093][ T9704] Process accounting resumed Jan 29 09:47:42 syzkaller kern.info kernel: [ 298.140093][ T9704] Process accounting resumed [ 298.883027][ T9742] syzkaller0: entered promiscuous mode [ 298.888527][ T9742] syzkaller0: entered allmulticast mode Jan 29 09:47:42 syzkaller kern.info kernel: [ 298.883027][ T9742] syzkaller0: entered promiscuous mode Jan 29 09:47:42 syzkaller kern.info kernel: [ 298.888527][ T9742] syzkaller0: entered allmulticast mode [ 301.149249][ T5831] Bluetooth: hci4: command 0x0406 tx timeout Jan 29 09:47:45 syzkaller kern.err kernel: [ 301.149249][ T5831] Bluetooth: hci4: command 0x0406 tx timeout [ 301.319294][ T29] kauditd_printk_skb: 190 callbacks suppressed [ 301.319313][ T29] audit: type=1400 audit(1738144065.251:3150): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 29 09:47:45 syzkaller kern.warn kernel: [ 301.319294][ T29] kauditd_printk_skb: 190 callbacks suppressed Jan 29 09:47:45 syzkaller kern.notice kernel: [ 301.319313][ T29] audit: type=1400 audit(1738144065.251:3150): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 301.678910][ T29] audit: type=1400 audit(1738144065.491:3151): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 29 09:47:45 syzkaller kern.notice kernel: [ 301.678910][ T29] audit: type=1400 audit(1738144065.491:3151): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 301.740068][ T29] audit: type=1400 audit(1738144065.491:3152): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 29 09:47:45 syzkaller kern.notice kernel: [ 301.740068][ T29] audit: type=1400 audit(1738144065.491:3152): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 301.811144][ T5831] Bluetooth: hci5: unexpected event for opcode 0x2043 [ 301.818064][ T29] audit: type=1400 audit(1738144065.531:3153): avc: denied { read write } for pid=5819 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 301.843167][ T29] audit: type=1400 audit(1738144065.641:3154): avc: denied { execmem } for pid=9794 comm="syz.1.1248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Jan 29 09:47:45 [ 301.862527][ T29] audit: type=1400 audit(1738144065.661:3155): avc: denied { read write } for pid=5819 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 syzkaller kern.e[ 301.889391][ T29] audit: type=1400 audit(1738144065.661:3156): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 rr kernel: [ 301.811144][ T5831] Bluetooth: hci5: unexpected event for opcode 0x2043[ 301.954741][ T29] audit: type=1400 audit(1738144065.661:3157): avc: denied { read write } for pid=8440 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Jan 29 09:47:45 syzkaller kern.notice kernel: [ 301.818064][ T29] audit: type=1400 audit(1738144065.531:3153): avc: denied { read write } for pid=5819 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=ro[ 302.072964][ T29] audit: type=1400 audit(1738144065.731:3158): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ot:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Jan 29 09:47:45 syzkaller kern.notice kernel: [ 301.843167][ T29] audit: type=1400 audit(1738144065.641:3154): avc: denied { execmem } for pid=9794 comm="syz.1.1248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Jan 29 09:47:45 syzkaller kern.notice kernel: [ 301.862527][ T29] audit: type=1400 audit(1738144065.661:3155): avc: denied { read write } for pid=5819 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Jan 29 09:47:45 syzkaller kern.notice kernel: [ 301.889391][ T29] audit: typ[ 302.153401][ T29] audit: type=1400 audit(1738144065.731:3159): avc: denied { execmem } for pid=9796 comm="syz.1.1250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 e=1400 audit(1738144065.661:3156): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Jan 29 09:47:45 syzkaller kern.notice kernel: [ 301.954741][ T29] audit: type=1400 audit(1738144065.661:3157): avc: denied { read write } for pid=8440 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Jan 29 09:47:46 syzkaller kern.notice kernel: [ 302.072964][ T29] audit: type=1400 audit(1738144065.731:3158): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Jan 29 09:47:46 syzkaller kern.notice kernel: [ 302.153401][ T29] audit: type=1400 audit(1738144065.731:3159): avc: denied { execmem } for pid=9796 comm="syz.1.1250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 303.568512][ T5831] Bluetooth: hci1: Ignoring connect complete event for invalid link type Jan 29 09:47:47 syzkaller kern.err kernel: [ 303.568512][ T5831] Bluetooth: hci1: Ignoring connect complete event for invalid link type [ 304.985455][ T9852] net_ratelimit: 595 callbacks suppressed [ 304.985470][ T9852] TCP: out of memory -- consider tuning tcp_mem Jan 29 09:47:48 syzkaller kern.warn kernel: [ 304.985455][ T9852] net_ratelimit: 595 callbacks suppressed Jan 29 09:47:48 syzkaller kern.info kernel: [ 304.985470][ T9852] TCP: out of memory -- consider tuning tcp_mem [ 305.144402][ T9856] bridge0: port 1(erspan0) entered blocking state [ 305.169502][ T9856] bridge0: port 1(erspan0) entered disabled state Jan 29 09:47:49 syzkaller kern.info kernel: [ 305.144402][ T9856] bridge0: port 1(erspan0) entered blocking sta[ 305.194712][ T9856] erspan0: entered allmulticast mode te Jan 29 09:47:49 syzkaller kern.info kernel: [ 305.169502][ T9856] bridge0: port 1(erspan0) entered disabled state Jan 29 09:47:49 syzkaller kern.info kernel: [ 305.194712][ T9856] erspan0: entered allmulticast mode [ 305.221048][ T9856] erspan0: entered promiscuous mode Jan 29 09:47:49 syzkaller kern.info kernel: [ 305.221048][ T9856] erspan0: entered promiscuous mode [ 305.566044][ T5831] Bluetooth: hci4: unexpected event for opcode 0x041c [ 305.649284][ T5831] Bluetooth: hci1: command 0x0406 tx timeout Jan 29 09:47:49 syzkaller kern.err kernel: [ 305.566044][ T5831] Bluetooth: hci4: unexpected event for opcode 0x041c Jan 29 09:47:49 syzkaller kern.err kernel: [ 305.649284][ T5831] Bluetooth: hci1: command 0x0406 tx timeout [ 305.879824][ T5831] Bluetooth: hci5: Controller not accepting commands anymore: ncmd = 0 [ 305.888479][ T5831] Bluetooth: hci5: Injecting HCI hardware error event Jan 29 09:47:49 syzkaller kern.err kernel: [ 30[ 305.899180][ T5831] Bluetooth: hci5: hardware error 0x00 5.879824][ T5831] Bluetooth: hci5: Controller not accepting commands anymore: ncmd = 0 Jan 29 09:47:49 syzkaller kern.err kernel: [ 305.888479][ T5831] Bluetooth: hci5: Injecting HCI hardware error event Jan 29 09:47:49 syzkaller kern.err kernel: [ 305.899180][ T5831] Bluetooth: hci5: hardware error 0x00 [ 306.329275][ T29] kauditd_printk_skb: 151 callbacks suppressed [ 306.329290][ T29] audit: type=1400 audit(1738144070.281:3311): avc: denied { read write } for pid=5819 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 306.340741][ T29] audit: type=1400 audit(1738144070.291:3312): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 306.383116][ T29] audit: type=1400 audit(1738144070.341:3313): avc: denied { prog_load } for pid=9892 comm="syz.1.1285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 306.385873][ T29] audit: type=1400 audit(1738144070.341:3314): avc: denied { read } for pid=9892 comm="syz.1.1285" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 306.386328][ T29] audit: type=1400 audit(1738144070.341:3315): avc: denied { read write } for pid=9892 comm="syz.1.1285" name="vbi5" dev="devtmpfs" ino=979 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 [ 306.386555][ T29] audit: type=1400 audit(1738144070.341:3316): avc: denied { create } for pid=9892 comm="syz.1.1285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 306.437263][ T29] audit: type=1400 audit(1738144070.391:3317): avc: denied { read write } for pid=5819 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 306.472211][ T29] audit: type=1400 audit(1738144070.431:3318): avc: denied { read } for pid=9895 comm="syz.1.1286" dev="nsfs" ino=4026532802 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 306.476374][ T29] audit: type=1400 audit(1738144070.431:3319): avc: denied { read } for pid=9895 comm="syz.1.1286" dev="nsfs" ino=4026532802 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 306.477892][ T29] audit: type=1400 audit(1738144070.431:3320): avc: denied { map_create } for pid=9895 comm="syz.1.1286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 306.670922][ T9899] Cannot find add_set index 0 as target Jan 29 09:47:50 syzkaller kern.warn kernel: [ 306.329275][ T29] kauditd_printk_skb: 151 callbacks suppressed Jan 29 09:47:50 syzkaller kern.notice kernel: [ 306.329290][ T29] audit: type=1400 audit(1738144070.281:3311): avc: denied { read write } for pid=5819 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Jan 29 09:47:50 syzkaller kern.notice kernel: [ 306.340741][ T29] audit: type=1400 audit(1738144070.291:3312): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Jan 29 09:47:50 syzkaller kern.notice kernel: [ 306.383116][ T29] audit: type=1400 audit(1738144070.341:3313): avc: denied { prog_load } for pid=9892 comm="syz.1.1285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 29 09:47:50 syzkaller kern.notice kernel: [ 306.385873][ T29] audit: type=1400 audit(1738144070.341:3314): avc: denied { read } for pid=9892 comm="syz.1.1285" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t Jan 29 09:47:50 syzkaller kern.notice kernel: [ 306.386328][ T29] audit: type=1400 audit(1738144070.341:3315): avc: denied { read write } for pid=9892 comm="syz.1.1285" name="vbi5" dev="devtmpfs" ino=979 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_d Jan 29 09:47:50 syzkaller kern.notice kernel: [ 306.386555][ T29] audit: type=1400 audit(1738144070.341:3316): avc: denied { create } for pid=9892 comm="syz.1.1285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissiv Jan 29 09:47:50 syzkaller kern.notice kernel: [ 306.437263][ T29] audit: type=1400 audit(1738144070.391:3317): avc: denied { read write } for pid=5819 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Jan 29 09:47:50 syzkaller kern.notice kernel: [ 306.472211][ T29] audit: type=1400 audit(1738144070.431:3318): avc: denied { read } for pid=9895 comm="syz.1.1286" dev="nsfs" ino=4026532802 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file p Jan 29 09:47:50 syzkaller kern.notice kernel: [ 306.476374][ T29] audit: type=1400 audit(1738144070.431:3319): avc: denied { read } for pid=9895 comm="syz.1.1286" dev="nsfs" ino=4026532802 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file p Jan 29 09:47:50 syzkaller kern.notice kernel: [ 306.477892][ T29] audit: type=1400 audit(1738144070.431:3320): avc: denied { map_create } for pid=9895 comm="syz.1.1286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 29 09:47:50 syzkaller kern.info kernel: [ 306.670922][ T9899] Cannot find add_set index 0 as target [ 307.292419][ T9919] xt_CT: You must specify a L4 protocol and not use inversions on it Jan 29 09:47:51 syzkaller kern.info kernel: [ 307.292419][ T9919] xt_CT: You must specify a L4 protocol and not use inversions on it [ 308.015534][ T5831] Bluetooth: hci5: Opcode 0x0c03 failed: -110 Jan 29 09:47:51 syzkaller kern.err kernel: [ 308.015534][ T5831] Bluetooth: hci5: Opcode 0x0c03 failed: -110 [ 309.487285][ T9957] syzkaller0: entered promiscuous mode [ 309.510888][ T9957] syzkaller0: entered allmulticast mode Jan 29 09:47:53 syzkaller kern.info kernel: [ 309.487285][ T9957] syzkaller0: entered promiscuous mode Jan 29 09:47:53 syzkaller kern.info kernel: [ 309.510888][ T9957] syzkaller0: entered allmulticast mode [ 309.639586][ T5831] Bluetooth: hci4: Controller not accepting commands anymore: ncmd = 0 [ 309.648170][ T5831] Bluetooth: hci4: Injecting HCI hardware error event [ 309.657174][ T5826] Bluetooth: hci4: hardware error 0x00 Jan 29 09:47:53 syzkaller kern.err kernel: [ 309.639586][ T5831] Bluetooth: hci4: Controller not accepting commands anymore: ncmd = 0 Jan 29 09:47:53 syzkaller kern.err kernel: [ 309.648170][ T5831] Bluetooth: hci4: Injecting HCI hardware error event Jan 29 09:47:53 syzkaller kern.err kernel: [ 309.657174][ T5826] Bluetooth: hci4: hardware error 0x00 [ 309.828385][ T9973] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=816 sclass=netlink_route_socket pid=9973 comm=syz.1.1314 Jan 29 09:47:53 syzkaller kern.warn kernel: [ 309.828385][ T9973] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=816 sclass=netlink_route_socket pid=9973 comm=syz.1.1314 [ 311.685667][ T29] kauditd_printk_skb: 160 callbacks suppressed [ 311.685682][ T29] audit: type=1400 audit(1738144075.641:3481): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Jan 29 09:47:55 syzkaller kern.warn kernel: [ 311.685667][ T29] kauditd_printk_skb: 160 callbacks suppressed Jan 29 09:47:55 syzkaller kern.notice kernel: [ 311.685682][ T29] audit: type=1400 audit(1738144075.641:3481[ 311.742542][ T29] audit: type=1400 audit(1738144075.671:3482): avc: denied { read } for pid=10006 comm="syz.3.1325" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 ): avc: denied [ 311.742840][ T5826] Bluetooth: hci4: Opcode 0x0c03 failed: -110 { read write } for pid=5813 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=s[ 311.788164][ T29] audit: type=1400 audit(1738144075.681:3483): avc: denied { mounton } for pid=10006 comm="syz.3.1325" path="/252" dev="tmpfs" ino=1352 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 ystem_u:object_r[ 311.810892][ T29] audit: type=1400 audit(1738144075.681:3484): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 :fi Jan 29 09:47:55 syzkaller k[ 311.835490][ T29] audit: type=1400 audit(1738144075.681:3485): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ern.notice kernel: [ 311.742542][ T29] audit: type=1400 audit(1738144075.671:[ 311.864206][ T29] audit: type=1400 audit(1738144075.741:3486): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 3482): avc: denied { read } for pid=10006 comm="syz.3.1325" n[ 311.892153][ T29] audit: type=1400 audit(1738144075.741:3487): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ame="msr" dev="devtmpfs" ino=87 [ 311.915374][ T29] audit: type=1400 audit(1738144075.801:3488): avc: denied { prog_load } for pid=10006 comm="syz.3.1325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t Jan 29 09:47:55 syzkaller kern.err kernel: [ 311.742840][ T5826] Bluetooth: hci4: Opcode 0x0c03 failed: -110 Jan 29 09:47:55 syzkaller kern.notice kernel: [ 311.788164][ T29] audit: type=1400 audit(1738144075.681:3483): avc: [ 311.915405][ T29] audit: type=1400 audit(1738144075.801:3489): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 denied { mounton } for pid=10006 comm="syz.3.1325" path="/252" dev="tmpfs" ino=1352 scontext=r[ 311.915436][ T29] audit: type=1400 audit(1738144075.821:3490): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 oot:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t Jan 29 09:47:55 syzkaller kern.notice kernel: [ 311.810892][ T29] audit: type=1400 audit(1738144075.681:3484): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Jan 29 09:47:55 syzkaller kern.notice kernel: [ 311.835490][ T29] audit: type=1400 audit(1738144075.681:3485): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Jan 29 09:47:55 syzkaller kern.notice kernel: [ 311.864206][ T29] audit: type=1400 audit(1738144075.741:3486): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Jan 29 09:47:55 syzkaller kern.notice kernel: [ 311.892153][ T29] audit: type=1400 audit(1738144075.741:3487): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Jan 29 09:47:55 syzkaller kern.notice kernel: [ 311.915374][ T29] audit: type=1400 audit(1738144075.801:3488): avc: denied { prog_load } for pid=10006 comm="syz.3.1325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 29 09:47:55 syzkaller kern.notice kernel: [ 311.915405][ T29] audit: type=1400 audit(1738144075.801:3489): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Jan 29 09:47:55 syzkaller kern.notice kernel: [ 311.915436][ T29] audit: type=1400 audit(1738144075.821:3490): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 312.283867][ T3160] block nbd0: Possible stuck request ffff88802652e000: control (read@0,4096B). Runtime 180 seconds Jan 29 09:47:56 syzkaller kern.info kernel: [ 312.283867][ T3160] block nbd0: Possible stuck request ffff88802652e000: control (read@0,4096B). Runtime 180 seconds [ 312.536808][T10007] Falling back ldisc for ptm0. Jan 29 09:47:56 syzkaller kern.warn kernel: [ 312.536808][T10007] Falling back ldisc for ptm0. [ 312.706614][ T5191] udevd[5191]: worker [7219] /devices/virtual/block/nbd0 timeout; kill it [ 312.716228][ T5191] udevd[5191]: seq 11629 '/devices/virtual/block/nbd0' killed Jan 29 09:47:56 syzkaller daemon.err kernel: [ 312.706614][ T5191] udevd[5191]: worker [7219] /devices/virtual/block/nbd0 timeout; kill it Jan 29 09:47:56 syzkaller daemon.err kernel: [ 312.716228][ T5191] udevd[5191]: seq 11629 '/devices/virtual/block/nbd0' killed [ 314.693817][T10085] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 314.700541][T10085] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) Feb 1 10:41:18 syzkaller kern.info kernel: [ 314.693817][T10085] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) Feb 1 10:41:18 syzkaller kern.info kernel: [ 314.700541][T10085] vhci_hcd[ 314.732235][T10085] vhci_hcd vhci_hcd.0: Device attached vhci_hcd.0: devid(0) speed(4) speed_str(wireless) Feb 1 10:41:18 syzkaller kern.info kernel: [ 314.732235][T10085] vhci_hcd vhci_hcd.0: Device attached [ 314.759803][T10085] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN Feb 1 10:41:18 syzkaller kern.e[ 314.771937][T10085] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN rr kernel: [ 314.759803][T10085[ 314.783386][T10085] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN ] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN Feb 1 10:41:18 syzkaller [ 314.799497][T10085] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN kern.err kernel: [ 314.771937][T10085] vhci_hcd[ 314.812468][T10085] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN : Failed attach request for unsu[ 314.822574][T10085] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN pported USB speed: UNKNOWN Feb 1 10:41:18 syzk[ 314.834286][T10085] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN aller kern.err kernel: [ 314.783386][T10085] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN Feb 1 10:41:18 syzkaller kern.err kernel: [ 314.799497][T10085] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN Feb 1 10:41:18 syzkalle[ 314.867013][T10085] vhci_hcd vhci_hcd.0: port 0 already used r kern.err kernel: [ 314.812468][T10085] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN Feb 1 10:41:18 syzkaller kern.err kernel: [ 314.822574][T10085] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN Feb 1 10:41:18 syzkaller kern.err kernel: [ 314.834286][T10085] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN Feb 1 10:41:18 syzkaller kern.err kernel: [ 314.8670[ 314.909346][ T5865] vhci_hcd: vhci_device speed not set 13][T10085] vhci_hcd vhci_hcd.0: port 0 already used Feb 1 10:41:18 syzkaller kern.err kernel: [ 314.909346][ T5865] vhci_hcd: vhci_device speed not set [ 314.969285][ T5865] usb 37-1: new full-speed USB device number 2 using vhci_hcd Feb 1 10:41:19 syzkaller kern.info kernel: [ 314.969285][ T5865] usb 37-1: new full-speed USB device number 2 using vhci_hcd [ 315.519701][T10086] vhci_hcd: connection reset by peer [ 315.547285][ T6028] vhci_hcd: stop threads Feb 1 10:41:19 syzkaller kern.info kernel: [ 315.519701][T1008[ 315.558213][ T6028] vhci_hcd: release socket 6] vhci_hcd: connection reset by peer Feb 1 10:41:19 syzkaller[ 315.568416][ T6028] vhci_hcd: disconnect device kern.info kernel: [ 315.547285][ T6028] vhci_hcd: stop threads Feb 1 10:41:19 syzkaller kern.info kernel: [ 315.558213][ T6028] vhci_hcd: release socket Feb 1 10:41:19 syzkaller kern.info kernel: [ 315.568416][ T6028] vhci_hcd: disconnect device [ 316.768119][ T1293] ieee802154 phy0 wpan0: encryption failed: -22 [ 316.788312][ T29] kauditd_printk_skb: 179 callbacks suppressed [ 316.788325][ T29] audit: type=1400 audit(1738406480.748:3670): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 316.815098][ T1293] ieee802154 phy1 wpan1: encryption failed: -22 Feb 1 10:41:20 syzkaller kern.warn kernel: [ 316.768119][ T1293] ieee802154 phy0 wpan0: encryption failed: -22 Feb 1 10:41:20 syzkaller kern[ 316.835754][ T29] audit: type=1400 audit(1738406480.788:3671): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 .warn kernel: [ 316.788312][ [ 316.860287][ T29] audit: type=1400 audit(1738406480.788:3672): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 T29] kauditd_printk_skb: 179 cal[ 316.886050][ T29] audit: type=1400 audit(1738406480.788:3673): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 lbacks suppressed Feb 1 10:41:[ 316.910941][ T29] audit: type=1400 audit(1738406480.848:3674): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 20 syzkaller kern.notice kernel:[ 316.934360][ T29] audit: type=1400 audit(1738406480.848:3675): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 316.788325][[ 316.958964][ T29] audit: type=1400 audit(1738406480.878:3676): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 T29] audit: t[ 316.982261][ T29] audit: type=1400 audit(1738406480.898:3677): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ype=1400 audit(1[ 317.005531][ T29] audit: type=1400 audit(1738406480.928:3678): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 738406480.748:36[ 317.028601][ T29] audit: type=1400 audit(1738406480.948:3679): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 70): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Feb 1 10:41:20 syzkaller kern.warn kernel: [ 316.815098][ T1293] ieee802154 phy1 wpan1: encryption failed: -22 Feb 1 10:41:20 syzkaller kern.notice kernel: [ 316.835754][ T29] audit: type=1400 audit(1738406480.788:3671): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Feb 1 10:41:20 syzkaller kern.notice kernel: [ 316.860287][ T29] audit: type=1400 audit(1738406480.788:3672): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Feb 1 10:41:20 syzkaller kern.notice kernel: [ 316.886050][ T29] audit: type=1400 audit(1738406480.788:3673): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Feb 1 10:41:20 syzkaller kern.notice kernel: [ 316.910941][ T29] audit: type=1400 audit(1738406480.848:3674): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Feb 1 10:41:20 syzkaller kern.notice kernel: [ 316.934360][ T29] audit: type=1400 audit(1738406480.848:3675): avc: denied { read } for pid=5173 comm="syslogd" n[ 317.184868][T10123] libceph: resolve '0.0' (ret=-3): failed ame="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Feb 1 10:41:20 syzkaller kern.notice kernel: [ 316.958964][ T29] audit: type=1400 audit(1738406480.878:3676): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Feb 1 10:41:20 syzkaller kern.notice kernel: [ 316.982261][ T29] audit: type=1400 audit(1738406480.898:3677): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Feb 1 10:41:20 syzkaller kern.notice kernel: [ 317.005531][ T29] audit: type=1400 audit(1738406480.928:3678): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Feb 1 10:41:21 syzkaller kern.notice kernel: [ 317.02[ 317.276589][T10126] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING 8601][ T29] audit: type=1400 audit(1738406480.948:3679): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Feb 1 10:41:21 syzkaller kern.info kernel: [ 317.184868][T10123] libceph: resolve '0.0' (ret=-3): failed Feb 1 10:41:21 syzkaller kern.info kernel: [ 317.276589][T10126] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 318.164346][T10150] block device autoloading is deprecated and will be removed. [ 318.176393][T10150] syz.1.1377: attempt to access beyond end of device [ 318.176393][T10150] md2: rw=2048, sector=0, nr_sectors = 8 limit=0 Feb 1 10:41:22 syzkaller kern.warn kernel: [ 318.164346][T10150] block device autoloading is deprecated and will be removed. Feb 1 10:41:22 syzkaller kern.info kernel: [ 318.176393][T10150] syz.1.1377: attempt to access beyond end of device Feb 1 10:41:22 syzkaller kern.info kernel: [ 318.176393][T10150] md2: rw=2048, sector=0, nr_sectors = 8 limit=0 Feb 1 10:41:22 syzkaller kern.debug kernel: [ 318.193645][T10150] PM: Image not found (code -5) [ 318.234829][T10157] Cannot find add_set index 0 as target Feb 1 10:41:22 syzkaller kern.info kernel: [ 318.234829][T10157] Cannot find add_set index 0 as target [ 318.598439][ T5826] Bluetooth: hci1: Unknown advertising packet type: 0x18 Feb 1 10:41:22 syzkaller kern.err kernel: [ 318.598439][ T5826] Bluetooth: hci1: Unknown advertising packet type: 0x18 [ 318.598468][ T5826] Bluetooth: hci1: Unknown advertising packet type: 0x1e [ 320.355376][ T5865] vhci_hcd: vhci_device speed not set Feb 1 10:41:24 syzkaller kern.err kernel: [ 318.598468][ T5826] Bluetooth: hci1: Unknown advertising packet type: 0x1e Feb 1 10:41:24 syzkaller kern.err kernel: [ 320.355376][ T5865] vhci_hcd: vhci_device speed not set [ 321.881195][ T29] kauditd_printk_skb: 220 callbacks suppressed [ 321.881212][ T29] audit: type=1400 audit(1738406485.837:3900): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 321.949625][ T29] audit: type=1400 audit(1738406485.917:3901): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Feb 1 10:41:25 syzkaller kern.warn kernel: [ 321.881195][ T29] kauditd_printk_skb: 220 callbacks suppressed[ 321.981174][ T29] audit: type=1400 audit(1738406485.937:3902): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Feb 1 10:41:25[ 322.005032][ T29] audit: type=1400 audit(1738406485.967:3903): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.notice kernel: [ 321.881212][ T29] audit: type=1400 audit(1738406485.837:3900): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Feb 1 10:41:25 syzkaller kern.notice kernel: [ 321.949625][ T29] audit: type=1400 audit(1738406485.917:3901): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Feb 1 10:41:25 syzkaller kern.notice kernel: [ 321.981174][ T29] audit: type=1400 audit(1738406485.937:3902): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Feb 1 10:41:25 syzkaller kern.notice kernel: [ 322.005032][ T29] audit: type=1400 audit(1738406485.967:3903): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 322.126526][ T29] audit: type=1400 audit(1738406485.967:3904): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Feb 1 10:41:26 syzkaller kern.notice kernel: [ 322.126526][ T29] audit: type=1400 audit(1738406485.967:3904): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 322.244297][ T29] audit: type=1400 audit(1738406485.987:3905): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 322.279757][ T29] audit: type=1400 audit(1738406486.017:3906): avc: denied { map_create } for pid=10265 comm="syz.5.1422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Feb 1 10:41:26 syzkaller kern.notice kernel: [ 322.244297][ T29] audit: type=1400 audit(1738406485.987:3905): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Feb 1 10:41:26 syzkaller kern.notice kernel: [ 322.279757][ T29] audit: type=1400 audit(1738406486.017:3906): avc: denied { map_create } for pid=10265 comm="syz.5.14[ 322.336839][ T29] audit: type=1400 audit(1738406486.067:3907): avc: denied { prog_load } for pid=10267 comm="syz.3.1423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Feb 1 10:41:26 syzkaller kern.notice kernel: [ 322.336839][ T29] audit: type=1400 audit(1738406486.067:3907): avc: denied { prog_load } for pid=10267 comm="syz.3.1423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 322.483483][ T29] audit: type=1400 audit(1738406486.117:3908): avc: denied { execmem } for pid=10267 comm="syz.3.1423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Feb 1 10:41:26 syzkaller kern.notice kernel: [ 322.483483][ T29] audit: type=1400 audit(1738406486.117:3908): avc: denied { execmem } for pid=10267 comm="syz.3.1423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 322.529625][ T29] audit: type=1400 audit(1738406486.147:3909): avc: denied { create } for pid=10267 comm="syz.3.1423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 Feb 1 10:41:26 syzkaller kern.notice kernel: [ 322.529625][ T29] audit: type=1400 audit(1738406486.147:3909): avc: denied { create } for pid=10267 comm="syz.3.1423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive= [ 326.399917][T10377] xt_CT: No such helper "netbios-ns" May 4 21:23:38 syzkaller kern.info kernel: [ 326.399917][T10377] xt_CT: No such helper "netbios-ns" [ 326.783968][T10379] syzkaller0: entered allmulticast mode May 4 21:23:38 syzkaller kern.info kernel: [ 326.783968][T10379] syzkaller0: entered allmulticast mode [ 326.904981][ T29] kauditd_printk_skb: 209 callbacks suppressed [ 326.904996][ T29] audit: type=1400 audit(1872624218.868:4119): avc: denied { read write } for pid=5817 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 4 21:23:38 syzkaller kern.warn kernel: [ 326.904981][ T29] kauditd_printk_skb: 209 callbacks suppressed May 4 21:23:38 syzkaller kern.notice kernel: [ 326.904996][ T29] audit: type=1400 audit(1872624218.868:4119): avc: denied { read write } for pid=5817 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 327.000065][ T29] audit: type=1400 audit(1872624218.878:4120): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 4 21:23:38 syzkaller kern.notice kernel: [ 327.000065][ T29] audit: type=1400 audit(1872624218.878:4120): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 327.093621][ T29] audit: type=1400 audit(1872624218.898:4121): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 4 21:23:39 syzkaller kern.notice kernel: [ 327.093621][ T29] audit: type=1400 audit(1872624218.898:4121): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 327.151351][ T29] audit: type=1400 audit(1872624218.928:4122): avc: denied { prog_load } for pid=10380 comm="syz.5.1467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 May 4 21:23:39 syzkaller kern.notice kernel: [ 327.151351][ T29] audit: type=1400 audit(1872624218.928:4122): avc: denied { prog_load } for pid=10380 comm="syz.5.1467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 327.208312][ T29] audit: type=1326 audit(1872624218.928:4123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10380 comm="syz.5.1467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd8bdf8cda9 code=0x7ffc0000 May 4 21:23:39 syzkaller kern.notice kernel: [ 327.208312][ T29] audit: type=1326 audit(1872624218.928:4123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10380 comm="syz.5.1467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 comp [ 327.277096][ T29] audit: type=1326 audit(1872624218.928:4124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10380 comm="syz.5.1467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd8bdf8cda9 code=0x7ffc0000 May 4 21:23:39 syzkaller kern.notice kernel: [ 327.277096][ T29] audit: type=1326 audit(1872624218.928:4124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10380 comm="syz.5.1467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 comp [ 327.361952][ T29] audit: type=1326 audit(1872624218.928:4125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10380 comm="syz.5.1467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=111 compat=0 ip=0x7fd8bdf8cda9 code=0x7ffc0000 May 4 21:23:39 syzkaller kern.notice kernel: [ 327.361952][ T29] audit: type=1326 audit(1872624218.928:4125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10380 comm="syz.5.1467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=111 comp [ 327.426162][T10400] audit: audit_backlog=65 > audit_backlog_limit=64 [ 327.432820][T10400] audit: audit_lost=11 audit_rate_limit=0 audit_backlog_limit=64 [ 327.440820][ T5173] audit: audit_backlog=65 > audit_backlog_limit=64 May 4 21:23:39 syzkaller kern.warn kernel: [ 327.426162][T10400] audit: audit_backlog=65 > audit_backlog_limit=64 May 4 21:23:39 syzkaller kern.warn kernel: [ 327.432820][T10400] audit: audit_lost=11 audit_rate_limit=0 audit_backlog_limit=64 May 4 21:23:39 syzkaller kern.warn kernel: [ 327.440820][ T5173] audit: audit_backlog=65 > audit_backlog_limit=64 [ 329.301982][T10406] Process accounting paused May 4 21:23:41 syzkaller kern.info kernel: [ 329.301982][T10406] Process accounting paused [ 330.514240][T10466] tun0: tun_chr_ioctl cmd 1074025675 [ 330.519736][T10466] tun0: persist disabled May 4 21:23:42 syzkaller kern.info kernel: [ 330.514240][T10466] tun0: tun_chr_ioctl cmd 1074025675 May 4 21:23:42 syzkaller kern.info kernel: [ 330.519736][T10466] tun0: persist disabled [ 331.922387][ T29] kauditd_printk_skb: 251 callbacks suppressed [ 331.922401][ T29] audit: type=1400 audit(1872624223.885:4362): avc: denied { read write } for pid=5817 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 4 21:23:43 syzkaller kern.warn kernel: [ 331.922387][ T29] kauditd_printk_skb: 251 callbacks suppressed May 4 21:23:43 syzkaller kern.notice kernel: [ 331.922401][ T29] audit: type=1400 audit(1872624223.885:4362): avc: denied { read write } for pid=5817 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 332.036727][ T29] audit: type=1400 audit(1872624223.945:4363): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 4 21:23:44 syzkaller kern.notice kernel: [ 332.036727][ T29] audit: type=1400 audit(1872624223.945:4363): avc: denied { read } for pid=5173 comm="syslogd" name="log"[ 332.078031][ T29] audit: type=1400 audit(1872624223.945:4364): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 dev="sda1" ino=1915 scontext=system_u:system_r:[ 332.104422][ T29] audit: type=1400 audit(1872624223.975:4365): avc: denied { create } for pid=10503 comm="syz.1.1514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 syslogd_t tcontext=system_u:object_r:var_t tclass= May 4 21:23:44 syzkaller kern.notice kernel: [ 332.078031][ T29] audit: type=1400 audit(1872624223.945:4[ 332.136693][ T29] audit: type=1400 audit(1872624223.995:4366): avc: denied { read } for pid=10505 comm="syz.0.1515" name="loop-control" dev="devtmpfs" ino=646 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=0 364): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" [ 332.167589][ T29] audit: type=1400 audit(1872624224.025:4367): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 4 21:23:44 syzkaller kern.notice kernel: [ 332.104422][ T29] audit: type=1400 audit(1872624223.975:4365): avc: denied { create } for pid=10503 comm="syz.1.1514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 May 4 21:23:44 syzkaller kern.notice kernel[ 332.224448][ T29] audit: type=1400 audit(1872624224.035:4368): avc: denied { execmem } for pid=10505 comm="syz.0.1515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 : [ 332.136693][ T29] audit: type=1400 audit(1872624223.995:4366): avc: denied { read } for pid=10505 comm="syz.0.1515" name="loop-control" dev="devtmpfs" ino=646 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:lo May 4 21:23:44 syzkaller kern.notice kernel: [ 332.167589][ T29] audit: type=1400 audit(1872624224.025:4367): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 4 21:23:44 syzkaller kern.notice kernel: [ 332.224448][ T29] audit: type=1400 audit(1872624224.035:4368): avc: denied { execmem } for pid=10505 comm="syz.0.1515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 332.407078][ T29] audit: type=1400 audit(1872624224.065:4369): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 4 21:23:44 syzkaller kern.notice kernel: [ 332.407078][ T29] audit: type=1400 audit(1872624224.065:4369): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 332.550825][ T29] audit: type=1400 audit(1872624224.085:4370): avc: denied { map_create } for pid=10505 comm="syz.0.1515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 May 4 21:23:44 syzkaller kern.notice kernel: [ 332.550825][ T29] audit: type=1400 audit(1872624224.085:4370): avc: denied { map_create } for pid=10505 comm="syz.0.1515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 332.749274][ T29] audit: type=1400 audit(1872624224.085:4371): avc: denied { prog_load } for pid=10505 comm="syz.0.1515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 May 4 21:23:44 syzkaller kern.notice kernel: [ 332.749274][ T29] audit: type=1400 audit(1872624224.085:4371): avc: denied { prog_load } for pid=10505 comm="syz.0.1515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 333.663806][T10548] ALSA: seq fatal error: cannot create timer (-19) May 4 21:23:45 syzkaller kern.err kernel: [ 333.663806][T10548] ALSA: seq fatal error: cannot create timer (-19) [ 334.399693][T10565] x_tables: ip_tables: osf match: only valid for protocol 6 May 4 21:23:46 syzkaller kern.info kernel: [ 334.399693][T10565] x_tables: ip_tables: osf match: only valid for protocol 6 [ 334.540148][T10567] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(5) [ 334.546684][T10567] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) May 4 21:23:46 syzkaller kern.info kernel: [ 334.540148][T10567] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(5) May 4 21:23:46 syzkaller kern.info kernel: [ 334.546684][T10567] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-s[ 334.587262][T10567] vhci_hcd vhci_hcd.0: Device attached peed) May 4 21:23:46 syzkaller kern.info kernel: [ 334.587262][T10567] vhci_hcd vhci_hcd.0: Device attached [ 334.601453][T10568] vhci_hcd: connection closed [ 334.612081][ T6088] vhci_hcd: stop threads [ 334.815920][ T6088] vhci_hcd: release socket May 4 21:23:46 [ 334.821265][ T6088] vhci_hcd: disconnect device syzkaller kern.info kernel: [ 334.601453][T10568] vhci_hcd: connection closed May 4 21:23:46 syzkaller kern.info kernel: [ 334.612081][ T6088] vhci_hcd: stop threads May 4 21:23:46 syzkaller kern.info kernel: [ 334.815920][ T6088] vhci_hcd: release socket May 4 21:23:46 syzkaller kern.info kern[ 334.854381][ T6089] Bluetooth: hci6: Frame reassembly failed (-84) el: [ 334.821265][ T6088] vhci_hcd: disconnect device May 4 21:23:46 syzkaller kern.err kernel: [ 334.854381][ T6089] Bluetooth: hci6: Frame reassembly failed (-84) [ 336.919696][ T5831] Bluetooth: hci6: command 0x1003 tx timeout [ 336.920281][ T5826] Bluetooth: hci6: Opcode 0x1003 failed: -110 [ 336.932520][ T29] kauditd_printk_skb: 195 callbacks suppressed [ 336.932531][ T29] audit: type=1400 audit(1872624228.885:4567): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 337.140400][ T29] audit: type=1400 audit(1872624229.085:4568): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 337.165219][ T29] audit: type=1400 audit(1872624229.125:4569): avc: denied { read write } for pid=5819 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 337.165260][ T29] audit: type=1400 audit(1872624229.125:4570): avc: denied { prog_load } for pid=10625 comm="syz.2.1560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 337.165288][ T29] audit: type=1400 audit(1872624229.125:4571): avc: denied { prog_load } for pid=10625 comm="syz.2.1560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 337.166602][ T29] audit: type=1400 audit(1872624229.125:4572): avc: denied { execmem } for pid=10625 comm="syz.2.1560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 337.169841][ T29] audit: type=1400 audit(1872624229.135:4573): avc: denied { prog_load } for pid=10625 comm="syz.2.1560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 337.169959][ T29] audit: type=1400 audit(1872624229.135:4574): avc: denied { create } for pid=10625 comm="syz.2.1560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 337.170076][ T29] audit: type=1400 audit(1872624229.135:4575): avc: denied { create } for pid=10625 comm="syz.2.1560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 337.170285][ T29] audit: type=1400 audit(1872624229.135:4576): avc: denied { read write } for pid=10625 comm="syz.2.1560" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 May 4 21:23:48 syzkaller kern.err kernel: [ 336.919696][ T5831] Bluetooth: hci6: command 0x1003 tx timeout May 4 21:23:48 syzkaller kern.err kernel: [ 336.920281][ T5826] Bluetooth: hci6: Opcode 0x1003 failed: -110 May 4 21:23:48 syzkaller kern.warn kernel: [ 336.932520][ T29] kauditd_printk_skb: 195 callbacks suppressed May 4 21:23:48 syzkaller kern.notice kernel: [ 336.932531][ T29] audit: type=1400 audit(1872624228.885:4567): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 4 21:23:49 syzkaller kern.notice kernel: [ 337.140400][ T29] audit: type=1400 audit(1872624229.085:4568): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 4 21:23:49 syzkaller kern.notice kernel: [ 337.165219][ T29] audit: type=1400 audit(1872624229.125:4569): avc: denied { read write } for pid=5819 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 4 21:23:49 syzkaller kern.notice kernel: [ 337.165260][ T29] audit: type=1400 audit(1872624229.125:4570): avc: denied { prog_load } for pid=10625 comm="syz.2.1560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 May 4 21:23:49 syzkaller kern.notice kernel: [ 337.165288][ T29] audit: type=1400 audit(1872624229.125:4571): avc: denied { prog_load } for pid=10625 comm="syz.2.1560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 May 4 21:23:49 syzkaller kern.notice kernel: [ 337.166602][ T29] audit: type=1400 audit(1872624229.125:4572): avc: denied { execmem } for pid=10625 comm="syz.2.1560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 May 4 21:23:49 syzkaller kern.notice kernel: [ 337.169841][ T29] audit: type=1400 audit(1872624229.135:4573): avc: denied { prog_load } for pid=10625 comm="syz.2.1560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 May 4 21:23:49 syzkaller kern.notice kernel: [ 337.169959][ T29] audit: type=1400 audit(1872624229.135:4574): avc: denied { create } for pid=10625 comm="syz.2.1560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 May 4 21:23:49 syzkaller kern.notice kernel: [ 337.170076][ T29] audit: type=1400 audit(1872624229.135:4575): avc: denied { create } for pid=10625 comm="syz.2.1560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 May 4 21:23:49 syzkaller kern.notice kernel: [ 337.170285][ T29] audit: type=1400 audit(1872624229.135:4576): avc: denied { read write } for pid=10625 comm="syz.2.1560" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_ [ 341.856125][T10746] kernel profiling enabled (shift: 17) May 4 21:23:53 syzkaller kern.info kernel: [ 341.856125][T10746] kernel profiling enabled (shift: 17) [ 341.953803][ T29] kauditd_printk_skb: 180 callbacks suppressed [ 341.953819][ T29] audit: type=1400 audit(1872624233.910:4757): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 4 21:23:53 syzkaller kern.warn kernel: [ 341.953803][ T29] kauditd_printk_skb: 180 callbacks suppressed May 4 21:23:53 syzkaller kern.notice kernel: [ 341.953819][ T29] audit: type=1400 audit(1872624233.910:4757): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 342.071436][ T29] audit: type=1400 audit(1872624233.950:4758): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 4 21:23:54 syzkaller kern.notice kernel: [ 342.071436][ T29] audit: type=1400 audit(1872624233.950:4758): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 342.128667][ T29] audit: type=1400 audit(1872624233.950:4759): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 4 21:23:54 syzkaller kern.notice kernel: [ 342.128667][ T29] audit: type=1400 audit(1872624233.950:4759): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 342.186762][ T29] audit: type=1400 audit(1872624233.960:4760): avc: denied { prog_load } for pid=10748 comm="syz.3.1604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 May 4 21:23:54 syzkaller kern.notice kernel: [ 342.186762][ T29] audit: type=1400 audit(1872624233.960:4760): avc: denied { prog_load } for pid=10748 com[ 342.219624][ T29] audit: type=1400 audit(1872624233.960:4761): avc: denied { read } for pid=10748 comm="syz.3.1604" dev="nsfs" ino=4026532940 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 m="syz.3.1604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t t[ 342.248252][ T29] audit: type=1400 audit(1872624234.020:4762): avc: denied { read } for pid=10752 comm="syz.2.1607" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 class=bpf permissive=0 May 4 21:23:54 syzkaller kern.notice kernel: [ 342.219624][ T29] audit: type=1400 audit(1872624233.960:4761): avc: denied { read } for pid=10748 comm="syz.3.1604" dev="nsfs" ino=4026532940 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file May 4 21:23:54 syzkaller kern.notice kernel: [ 342.248252][ T29] audit: type=1400 audit(1872624234.020:4762): avc: denied { read } for pid=10[ 342.310532][ T29] audit: type=1400 audit(1872624234.020:4763): avc: denied { create } for pid=10752 comm="syz.2.1607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 752 comm="syz.2.1607" name="msr" dev="devtmpfs" ino=87 scontext=[ 342.336444][ T29] audit: type=1400 audit(1872624234.020:4764): avc: denied { create } for pid=10752 comm="syz.2.1607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t [ 342.363090][ T29] audit: type=1400 audit(1872624234.030:4765): avc: denied { mount } for pid=10752 comm="syz.2.1607" name="/" dev="nfsd" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfsd_fs_t tclass=filesystem permissive=0 May 4 21:23:54 [ 342.365581][ T3160] block nbd0: Possible stuck request ffff88802652e000: control (read@0,4096B). Runtime 210 seconds syzkaller kern.n[ 342.386019][ T29] audit: type=1400 audit(1872624234.060:4766): avc: denied { create } for pid=10745 comm="syz.0.1605" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 otice kernel: [ 342.310532][ T29] audit: type=1400 audit(1872624234.020:4763): avc: denied { create } for pid=10752 comm="syz.2.1607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissi May 4 21:23:54 syzkaller kern.notice kernel: [ 342.336444][ T29] audit: type=1400 audit(1872624234.020:4764): avc: denied { create } for pid=10752 comm="syz.2.1607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissi May 4 21:23:54 syzkaller kern.notice kernel: [ 342.363090][ T29] audit: type=1400 audit(1872624234.030:4765): avc: denied { mount } for pid=10752 comm="syz.2.1607" name="/" dev="nfsd" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfsd_fs_t tclass=f May 4 21:23:54 syzkaller kern.info kernel: [ 342.365581][ T3160] block nbd0: Possible stuck request ffff88802652e000: control (read@0,4096B). Runtime 210 seconds May 4 21:23:54 syzkaller kern.notice kernel: [ 342.386019][ T29] audit: type=1400 audit(1872624234.060:4766): avc: denied { create } for pid=10745 comm="syz.0.1605" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissi [ 343.596109][ T7553] libceph: connect (1)[c::]:6789 error -101 [ 343.603421][ T7553] libceph: mon0 (1)[c::]:6789 connect error Aug 5 08:06:03 syzkaller kern.err kernel: [ 343.596109][ T7553] libceph: connect (1)[c::]:6789 error -101 Aug 5 08:06:03 syzkaller kern.warn kernel: [ 343.603421][ T7553] libceph: mon0 (1)[c::]:6789 connect error [ 343.871912][ T7553] libceph: connect (1)[c::]:6789 error -101 [ 343.878048][ T7553] libceph: mon0 (1)[c::]:6789 connect error Aug 5 08:06:03 syzkaller kern.err kernel: [ 343.871912][ T7553] libceph: connect (1)[c::]:6789 error -101 Aug 5 08:06:03 syzkaller kern.warn kernel: [ 343.878048][ T7553] libceph: mon0 (1)[c::]:6789 connect error [ 344.401540][T10801] ceph: No mds server is up or the cluster is laggy [ 344.409627][ T7553] libceph: connect (1)[c::]:6789 error -101 [ 344.415622][ T7553] libceph: mon0 (1)[c::]:6789 connect error Aug 5 08:06:04 syzkaller kern.info kernel: [ 344.401540][T10801] ceph: No mds server is up or the cluster is laggy Aug 5 08:06:04 syzkaller kern.err kernel: [ 344.409627][ T7553] libceph: connect (1)[c::]:6789 error -101 Aug 5 08:06:04 syzkaller kern.warn kernel: [ 344.415622][ T7553] libceph: mon0 (1)[c::]:6789 connect error [ 346.432926][T10882] xt_TCPMSS: Only works on TCP SYN packets Aug 5 08:06:06 syzkaller kern.info kernel: [ 346.432926][T10882] xt_TCPMSS: Only works on TCP SYN packets [ 347.291256][ T29] kauditd_printk_skb: 205 callbacks suppressed [ 347.291272][ T29] audit: type=1400 audit(2006841967.251:4972): avc: denied { read write } for pid=5817 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 5 08:06:07 syzkaller kern.warn kernel: [ 347.291256][ T29] kauditd_printk_skb: 205 callbacks suppressed Aug 5 08:06:07 syzkaller kern.notice kernel: [ 347.291272][ T29] audit: type=1400 audit(2006841967.251:4972): avc: denied { read write } for pid=5817 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r[ 347.354249][ T29] audit: type=1400 audit(2006841967.291:4973): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 :fi Aug 5 08:06:07 syzkaller kern.notice kernel: [ 347.354249][ T29] audit: type=1400 audit(2006841967.291:4973): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tconte[ 347.418142][ T29] audit: type=1400 audit(2006841967.291:4974): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 xt=system_u:object_r:var_t tclass= Aug 5 08:06:07 syzkaller kern.notice kernel: [ 347.418142][ T29] audit: type=1400 audit(2006841967.291:4974): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 347.489315][ T29] audit: type=1400 audit(2006841967.351:4975): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 5 08:06:07 syzkaller kern.notice kernel: [ 347.489315][ T29] audit: type=1400 audit(2006841967.351:4975): avc: denied { read } for pid=5173 comm="sys[ 347.526711][T10893] veth0_to_team: entered promiscuous mode logd" name="log"[ 347.527757][ T29] audit: type=1400 audit(2006841967.361:4976): avc: denied { prog_load } for pid=10890 comm="syz.0.1658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:obje[ 347.559080][T10893] veth0_to_team: entered allmulticast mode ct_r:var_t tclas[ 347.559098][ T29] audit: type=1400 audit(2006841967.371:4977): avc: denied { read write } for pid=5819 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 s= Aug 5 08:06:07 syzkaller kern.info kernel: [ 347.526711][T10893] veth0_to_team: entered promiscuous mode Aug 5 08:06:07 syzkaller kern.n[ 347.603254][ T29] audit: type=1400 audit(2006841967.411:4978): avc: denied { execmem } for pid=10890 comm="syz.0.1658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 otice kernel: [ 347.527757][ T29] audit: type=1400 audit(2006841967.361:4976): avc: denied { prog_load } for pid=10890 comm="syz.0.1658" scontext=root:sys[ 347.636303][ T29] audit: type=1400 audit(2006841967.411:4979): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 adm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Aug 5 08:06:07 syzkaller kern.info kernel: [ 347.559080][T10893] veth0_to_team: entered allmulticast mode Aug 5 08:06:07 syzkaller kern.notice kernel: [ 347.559098][ T29] audit: type=1400 audit(2006841967.371:4977): avc: denied { read write } for pid=5819 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Aug 5 08:06:07 syzkaller kern.notice kernel: [ 347.603254][ T29] audit: type=1400 audit(2006841967.411:4978): avc: denied { execmem } for pid=10890 comm="syz.0.[ 347.711775][ T29] audit: type=1400 audit(2006841967.421:4980): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 1658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pro[ 347.745001][ T29] audit: type=1400 audit(2006841967.441:4981): avc: denied { execmem } for pid=10892 comm="syz.1.1659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 cess permissive=0 Aug 5 08:06:07 syzkaller kern.notice kernel: [ 347.636303][ T29] audit: type=1400 audit(2006841967.411:4979): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 5 08:06:07 syzkaller kern.notice kernel: [ 347.711775][ T29] audit: type=1400 audit(2006841967.421:4980): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Aug 5 08:06:07 syzkaller kern.notice kernel: [ 347.745001][ T29] audit: type=1400 audit(2006841967.441:4981): avc: denied { execmem } for pid=10892 comm="syz.1.1659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 350.679507][ T30] INFO: task syz.4.780:8284 blocked for more than 143 seconds. [ 350.694024][ T30] Not tainted 6.13.0-syzkaller-08265-g9c5968db9e62 #0 Feb 6 05:30:26 syzkaller kern.err kernel: [ 350.679507][ T30] INFO: task syz.4.780:8284 blocked for more than 143 seconds. Feb 6 05:30:26 syzkaller kern.err kernel: [ 350.694024][ T30[ 350.717958][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. ] Not tainted 6.13.0-syzkaller-08265-g9c5968db9e62 #0 Feb 6 05:30:26 syzkaller kern.err kernel: [ 350.717958][ T30] "echo 0 > /proc/sys/kernel/hung_t[ 350.740536][ T30] task:syz.4.780 state:D stack:27856 pid:8284 tgid:8283 ppid:5818 task_flags:0x400040 flags:0x00004004 ask_timeout_secs" disables this message. Feb 6[ 350.756585][ T30] Call Trace: 05:30:26 syzkaller kern.info kernel: [ 350.740536][ T30] task:syz.4.780 state:D stack:27856 pid:8284 tgid:8283 ppid:5818 task_flags:0x400040 flags:0x00004004 Feb 6 05:30:26 syzkaller kern.info kernel: [ 350.[ 350.778710][ T30] 756585][ T30] Call Trace: Feb 6 05:30:26 syzkaller kern.i[ 350.786996][ T30] __schedule+0xf43/0x5890 nfo kernel: [ 350.778710][ T30] Feb [ 350.795431][ T30] ? __pfx___lock_acquire+0x10/0x10 6 05:30:26 syzkaller kern.info [ 350.803312][ T30] ? __pfx___lock_acquire+0x10/0x10 kernel: [ 350.7[ 350.805131][ T5826] Bluetooth: hci1: unexpected event for opcode 0x0c2d 86996][ T30] __schedule+0xf43/0x5890 Feb 6 [ 350.822604][ T30] ? __pfx___schedule+0x10/0x10 05:30:26 syzkall[ 350.827919][ T30] ? schedule+0x298/0x350 er kern.info kernel: [ 350.795431][ T30] ? _[ 350.836923][ T30] ? __pfx_lock_release+0x10/0x10 _pfx___lock_acquire+0x10/0x10 Feb 6 05:30:26 s[ 350.845695][ T30] ? __mutex_trylock_common+0x78/0x250 yzkaller kern.info kernel: [ 35[ 350.854011][ T30] ? lock_acquire+0x2f/0xb0 0.803312][ T30] ? __pfx___loc[ 350.861164][ T30] ? schedule+0x1fd/0x350 k_acquire+0x10/0[ 350.866600][ T30] schedule+0xe7/0x350 x10 Feb 6 05:3[ 350.873298][ T30] schedule_preempt_disabled+0x13/0x30 0:26 syzkaller k[ 350.878997][ T30] __mutex_lock+0x6bd/0xb10 ern.err kernel: [ 350.879032][ T30] ? sync_bdevs+0xfd/0x360 [ 350.805131][ [ 350.879054][ T30] ? __pfx___mutex_lock+0x10/0x10 T5826] Bluetooth: hci1: unexpected event for opcode 0x0c2d Feb [ 350.901775][ T30] ? sync_bdevs+0xc7/0x360 6 05:30:26 syzk[ 350.906850][ T30] ? _atomic_dec_and_lock+0xa2/0x120 aller kern.info [ 350.914857][ T30] ? iput+0xd3/0x890 kernel: [ 350.8[ 350.918745][ T30] ? sync_bdevs+0xfd/0x360 22604][ T30] ? __pfx___schedu[ 350.926840][ T30] sync_bdevs+0xfd/0x360 le+0x10/0x10 Fe[ 350.932437][ T30] ksys_sync+0xb3/0x150 b 6 05:30:26 sy[ 350.937015][ T30] ? __pfx_ksys_sync+0x10/0x10 zkaller kern.info kernel: [ 350[ 350.945549][ T30] ? do_user_addr_fault+0x83d/0x13f0 .827919][ T30][ 350.945582][ T30] ? do_syscall_64+0x91/0x250 [ 350.945601][ T30] __do_sys_sync+0xe/0x20 ? schedule+0x298/0x350 Feb 6 05:30:26 syzkaller kern.info kernel: [ 350.836923][ T30] ? [ 350.964489][ T30] do_syscall_64+0xcd/0x250 __pfx_lock_relea[ 350.974357][ T30] entry_SYSCALL_64_after_hwframe+0x77/0x7f se+0x10/0x10 Feb 6 05:30:26 syzkaller kern.info kernel: [ 350.845695][ T30][ 350.987773][ T30] RIP: 0033:0x7f037e38cda9 ? __mutex_tryl[ 350.993028][ T30] RSP: 002b:00007f037f17f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a2 ock_common+0x78/0x250 Feb 6 05:30:26 syzkaller kern.info kernel: [ 350.854011[ 351.003003][ T30] RAX: ffffffffffffffda RBX: 00007f037e5a5fa0 RCX: 00007f037e38cda9 ][ T30] ? loc[ 351.003018][ T30] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 k_acquire+0x2f/0[ 351.003030][ T30] RBP: 00007f037e5a5fa0 R08: 0000000000000000 R09: 0000000000000000 xb0 Feb 6 05:3[ 351.003041][ T30] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 0:26 syzkaller k[ 351.003053][ T30] R13: 0000000000000001 R14: 00007f037e5a5fa0 R15: 00007ffe51ae3778 ern.info kernel:[ 351.003079][ T30] [ 350.861164][[ 351.003098][ T30] INFO: task syz.4.780:8285 blocked for more than 143 seconds. T30] ? sched[ 351.003110][ T30] Not tainted 6.13.0-syzkaller-08265-g9c5968db9e62 #0 ule+0x1fd/0x350[ 351.003122][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Feb 6 05:30:26[ 351.003145][ T30] task:syz.4.780 state:D stack:28064 pid:8285 tgid:8283 ppid:5818 task_flags:0x400040 flags:0x00004004 syzkaller kern.[ 351.003204][ T30] Call Trace: info kernel: [ [ 351.003210][ T30] 350.866600][ T[ 351.003222][ T30] __schedule+0xf43/0x5890 30] schedule+0x[ 351.003248][ T30] ? __pfx___lock_acquire+0x10/0x10 e7/0x350 Feb 6[ 351.003275][ T30] ? __pfx___lock_acquire+0x10/0x10 05:30:26 syzkal[ 351.003308][ T30] ? __pfx___schedule+0x10/0x10 ler kern.info ke[ 351.003339][ T30] ? schedule+0x298/0x350 rnel: [ 350.873[ 351.003362][ T30] ? __pfx_lock_release+0x10/0x10 298][ T30] sc[ 351.003394][ T30] ? __mutex_trylock_common+0x78/0x250 hedule_preempt_d[ 351.003420][ T30] ? lock_acquire+0x2f/0xb0 isabled+0x13/0x3[ 351.003443][ T30] ? schedule+0x1fd/0x350 0 Feb 6 05:30:[ 351.003470][ T30] schedule+0xe7/0x350 26 syzkaller ker[ 351.003494][ T30] schedule_preempt_disabled+0x13/0x30 n.info kernel: [[ 351.003519][ T30] __mutex_lock+0x6bd/0xb10 350.878997][ [ 351.003548][ T30] ? sync_bdevs+0xfd/0x360 T30] __mutex_l[ 351.003568][ T30] ? __pfx___mutex_lock+0x10/0x10 ock+0x6bd/0xb10[ 351.003597][ T30] ? sync_bdevs+0xc7/0x360 Feb 6 05:30:26[ 351.003617][ T30] ? _atomic_dec_and_lock+0xa2/0x120 syzkaller kern.[ 351.003644][ T30] ? iput+0xd3/0x890 info kernel: [ [ 351.003667][ T30] ? sync_bdevs+0xfd/0x360 350.879032][ T[ 351.003684][ T30] sync_bdevs+0xfd/0x360 30] ? sync_bdev[ 351.003705][ T30] ksys_sync+0xb3/0x150 s+0xfd/0x360 Fe[ 351.003721][ T30] ? __pfx_ksys_sync+0x10/0x10 b 6 05:30:26 sy[ 351.003739][ T30] ? do_user_addr_fault+0x83d/0x13f0 zkaller kern.inf[ 351.003765][ T30] ? do_syscall_64+0x91/0x250 o kernel: [ 350[ 351.003782][ T30] __do_sys_sync+0xe/0x20 .879054][ T30][ 351.003798][ T30] do_syscall_64+0xcd/0x250 ? __pfx___mute[ 351.003816][ T30] entry_SYSCALL_64_after_hwframe+0x77/0x7f x_lock+0x10/0x10[ 351.003840][ T30] RIP: 0033:0x7f037e38cda9 Feb 6 05:30:2[ 351.003855][ T30] RSP: 002b:00007f037f15e038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a2 6 syzkaller kern[ 351.003873][ T30] RAX: ffffffffffffffda RBX: 00007f037e5a6080 RCX: 00007f037e38cda9 .info kernel: [ [ 351.003896][ T30] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 350.901775][ [ 351.003907][ T30] RBP: 00007f037e5a6080 R08: 0000000000000000 R09: 0000000000000000 T30] ? sync_bde[ 351.003919][ T30] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 vs+0xc7/0x360 F[ 351.003930][ T30] R13: 0000000000000001 R14: 00007f037e5a6080 R15: 00007ffe51ae3778 eb 6 05:30:26 s[ 351.003954][ T30] yzkaller kern.in[ 351.003962][ T30] INFO: task syz.4.780:8286 blocked for more than 143 seconds. fo kernel: [ 35[ 351.003973][ T30] Not tainted 6.13.0-syzkaller-08265-g9c5968db9e62 #0 0.906850][ T30[ 351.003984][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. ] ? _atomic_dec[ 351.003992][ T30] task:syz.4.780 state:D stack:28064 pid:8286 tgid:8283 ppid:5818 task_flags:0x400040 flags:0x00004004 _and_lock+0xa2/0[ 351.004047][ T30] Call Trace: x120 Feb 6 05:[ 351.004054][ T30] 30:26 syzkaller [ 351.004064][ T30] __schedule+0xf43/0x5890 kern.info kernel[ 351.004087][ T30] ? __pfx___lock_acquire+0x10/0x10 : [ 350.914857][ 351.004113][ T30] ? __pfx___lock_acquire+0x10/0x10 [ T30] ? iput[ 351.004144][ T30] ? __pfx___schedule+0x10/0x10 +0xd3/0x890 Feb[ 351.004167][ T30] ? schedule+0x298/0x350 6 05:30:26 syz[ 351.004187][ T30] ? __pfx_lock_release+0x10/0x10 kaller kern.info[ 351.004209][ T30] ? __mutex_trylock_common+0x78/0x250 kernel: [ 350.[ 351.004232][ T30] ? lock_acquire+0x2f/0xb0 918745][ T30] [ 351.004252][ T30] ? schedule+0x1fd/0x350 ? sync_bdevs+0x[ 351.004278][ T30] schedule+0xe7/0x350 fd/0x360 Feb 6[ 351.004301][ T30] schedule_preempt_disabled+0x13/0x30 05:30:26 syzkal[ 351.004332][ T30] __mutex_lock+0x6bd/0xb10 ler kern.info ke[ 351.004360][ T30] ? sync_bdevs+0xfd/0x360 rnel: [ 350.926[ 351.004379][ T30] ? __pfx___mutex_lock+0x10/0x10 840][ T30] sy[ 351.004407][ T30] ? sync_bdevs+0xc7/0x360 nc_bdevs+0xfd/0x[ 351.004427][ T30] ? _atomic_dec_and_lock+0xa2/0x120 360 Feb 6 05:3[ 351.004453][ T30] ? iput+0xd3/0x890 0:26 syzkaller k[ 351.004477][ T30] ? sync_bdevs+0xfd/0x360 ern.info kernel:[ 351.004493][ T30] sync_bdevs+0xfd/0x360 [ 350.932437][[ 351.004514][ T30] ksys_sync+0xb3/0x150 T30] ksys_sy[ 351.004530][ T30] ? __pfx_ksys_sync+0x10/0x10 nc+0xb3/0x150 F[ 351.004548][ T30] ? do_user_addr_fault+0x83d/0x13f0 eb 6 05:30:26 s[ 351.004574][ T30] ? do_syscall_64+0x91/0x250 yzkaller kern.in[ 351.004592][ T30] __do_sys_sync+0xe/0x20 fo kernel: [ 35[ 351.004608][ T30] do_syscall_64+0xcd/0x250 0.937015][ T30[ 351.004626][ T30] entry_SYSCALL_64_after_hwframe+0x77/0x7f ] ? __pfx_ksys_[ 351.004650][ T30] RIP: 0033:0x7f037e38cda9 sync+0x10/0x10 [ 351.004663][ T30] RSP: 002b:00007f037f13d038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a2 Feb 6 05:30:26 [ 351.004682][ T30] RAX: ffffffffffffffda RBX: 00007f037e5a6160 RCX: 00007f037e38cda9 syzkaller kern.i[ 351.004694][ T30] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 nfo kernel: [ 3[ 351.004705][ T30] RBP: 00007f037e5a6160 R08: 0000000000000000 R09: 0000000000000000 50.945549][ T3[ 351.004717][ T30] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 0] ? do_user_ad[ 351.004729][ T30] R13: 0000000000000001 R14: 00007f037e5a6160 R15: 00007ffe51ae3778 dr_fault+0x83d/0[ 351.004753][ T30] x13f0 Feb 6 05[ 351.004760][ T30] INFO: task syz.4.780:8287 blocked for more than 143 seconds. :30:26 syzkaller[ 351.004772][ T30] Not tainted 6.13.0-syzkaller-08265-g9c5968db9e62 #0 kern.info kerne[ 351.004782][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. l: [ 350.945582[ 351.004790][ T30] task:syz.4.780 state:D stack:28064 pid:8287 tgid:8283 ppid:5818 task_flags:0x400040 flags:0x00004004 ][ T30] ? do_[ 351.004844][ T30] Call Trace: syscall_64+0x91/[ 351.004851][ T30] 0x250 Feb 6 05[ 351.004861][ T30] __schedule+0xf43/0x5890 :30:26 syzkaller[ 351.004885][ T30] ? __pfx___lock_acquire+0x10/0x10 kern.info kerne[ 351.004919][ T30] ? __pfx___schedule+0x10/0x10 l: [ 350.945601[ 351.004944][ T30] ? schedule+0x298/0x350 ][ T30] __do_[ 351.004967][ T30] ? __pfx_lock_release+0x10/0x10 sys_sync+0xe/0x2[ 351.004992][ T30] ? __mutex_trylock_common+0x78/0x250 0 Feb 6 05:30:[ 351.005018][ T30] ? lock_acquire+0x2f/0xb0 26 syzkaller ker[ 351.005040][ T30] ? schedule+0x1fd/0x350 n.info kernel: [[ 351.005065][ T30] schedule+0xe7/0x350 350.964489][ [ 351.005089][ T30] schedule_preempt_disabled+0x13/0x30 T30] do_syscal[ 351.005114][ T30] __mutex_lock+0x6bd/0xb10 l_64+0xcd/0x250[ 351.005143][ T30] ? sync_bdevs+0xfd/0x360 Feb 6 05:30:26[ 351.005163][ T30] ? __pfx___mutex_lock+0x10/0x10 syzkaller kern.[ 351.005191][ T30] ? sync_bdevs+0xc7/0x360 info kernel: [ [ 351.005212][ T30] ? _atomic_dec_and_lock+0xa2/0x120 350.974357][ T[ 351.005240][ T30] ? iput+0xd3/0x890 30] entry_SYSCA[ 351.005264][ T30] ? sync_bdevs+0xfd/0x360 LL_64_after_hwfr[ 351.005281][ T30] sync_bdevs+0xfd/0x360 ame+0x77/0x7f F[ 351.005301][ T30] ksys_sync+0xb3/0x150 eb 6 05:30:26 s[ 351.005323][ T30] ? __pfx_ksys_sync+0x10/0x10 yzkaller kern.in[ 351.005341][ T30] ? do_user_addr_fault+0x83d/0x13f0 fo kernel: [ 35[ 351.005367][ T30] ? do_syscall_64+0x91/0x250 0.987773][ T30[ 351.005385][ T30] __do_sys_sync+0xe/0x20 ] RIP: 0033:0x7f[ 351.005400][ T30] do_syscall_64+0xcd/0x250 037e38cda9 [ 351.005418][ T30] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 351.005442][ T30] RIP: 0033:0x7f037e38cda9 [ 351.005455][ T30] RSP: 002b:00007f037f11c038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a2 [ 351.005473][ T30] RAX: ffffffffffffffda RBX: 00007f037e5a6240 RCX: 00007f037e38cda9 [ 351.005485][ T30] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 351.005496][ T30] RBP: 00007f037e5a6240 R08: 0000000000000000 R09: 0000000000000000 [ 351.005508][ T30] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 351.005519][ T30] R13: 0000000000000001 R14: 00007f037e5a6240 R15: 00007ffe51ae3778 [ 351.005543][ T30] [ 351.005550][ T30] INFO: task syz.4.780:8290 blocked for more than 143 seconds. [ 351.005560][ T30] Not tainted 6.13.0-syzkaller-08265-g9c5968db9e62 #0 [ 351.005569][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 351.005576][ T30] task:syz.4.780 state:D stack:28656 pid:8290 tgid:8283 ppid:5818 task_flags:0x400040 flags:0x00004004 [ 351.005623][ T30] Call Trace: [ 351.005629][ T30] [ 351.005638][ T30] __schedule+0xf43/0x5890 [ 351.005661][ T30] ? __pfx___lock_acquire+0x10/0x10 [ 351.005697][ T30] ? __pfx___schedule+0x10/0x10 [ 351.005721][ T30] ? schedule+0x298/0x350 [ 351.005745][ T30] ? __pfx_lock_release+0x10/0x10 [ 351.005770][ T30] ? __mutex_trylock_common+0x78/0x250 [ 351.005797][ T30] ? lock_acquire+0x2f/0xb0 [ 351.005819][ T30] ? schedule+0x1fd/0x350 [ 351.005846][ T30] schedule+0xe7/0x350 [ 351.005870][ T30] schedule_preempt_disabled+0x13/0x30 [ 351.005895][ T30] __mutex_lock+0x6bd/0xb10 [ 351.005924][ T30] ? sync_bdevs+0xfd/0x360 [ 351.005943][ T30] ? __pfx___mutex_lock+0x10/0x10 [ 351.005971][ T30] ? sync_bdevs+0xc7/0x360 [ 351.005991][ T30] ? _atomic_dec_and_lock+0xa2/0x120 [ 351.006019][ T30] ? iput+0xd3/0x890 [ 351.006043][ T30] ? sync_bdevs+0xfd/0x360 [ 351.006059][ T30] sync_bdevs+0xfd/0x360 [ 351.006079][ T30] ksys_sync+0xb3/0x150 [ 351.006096][ T30] ? __pfx_ksys_sync+0x10/0x10 [ 351.006113][ T30] ? do_user_addr_fault+0x83d/0x13f0 [ 351.006140][ T30] ? do_syscall_64+0x91/0x250 [ 351.006157][ T30] __do_sys_sync+0xe/0x20 [ 351.006173][ T30] do_syscall_64+0xcd/0x250 [ 351.006191][ T30] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 351.006215][ T30] RIP: 0033:0x7f037e38cda9 [ 351.006228][ T30] RSP: 002b:00007f037b9f2038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a2 [ 351.006245][ T30] RAX: ffffffffffffffda RBX: 00007f037e5a6320 RCX: 00007f037e38cda9 [ 351.006258][ T30] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 351.006269][ T30] RBP: 00007f037e5a6320 R08: 0000000000000000 R09: 0000000000000000 [ 351.006281][ T30] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 351.006293][ T30] R13: 0000000000000001 R14: 00007f037e5a6320 R15: 00007ffe51ae3778 [ 351.006323][ T30] [ 351.006330][ T30] INFO: task syz.4.780:8291 blocked for more than 143 seconds. [ 351.006341][ T30] Not tainted 6.13.0-syzkaller-08265-g9c5968db9e62 #0 [ 351.006352][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 351.006359][ T30] task:syz.4.780 state:D stack:27856 pid:8291 tgid:8283 ppid:5818 task_flags:0x400040 flags:0x00004004 [ 351.006414][ T30] Call Trace: [ 351.006420][ T30] [ 351.006431][ T30] __schedule+0xf43/0x5890 [ 351.006455][ T30] ? __pfx___lock_acquire+0x10/0x10 [ 351.006481][ T30] ? __pfx___lock_acquire+0x10/0x10 [ 351.006512][ T30] ? __pfx___schedule+0x10/0x10 [ 351.006538][ T30] ? schedule+0x298/0x350 [ 351.006561][ T30] ? __pfx_lock_release+0x10/0x10 [ 351.006586][ T30] ? __mutex_trylock_common+0x78/0x250 [ 351.006613][ T30] ? lock_acquire+0x2f/0xb0 [ 351.006635][ T30] ? schedule+0x1fd/0x350 [ 351.006662][ T30] schedule+0xe7/0x350 [ 351.006686][ T30] schedule_preempt_disabled+0x13/0x30 [ 351.006710][ T30] __mutex_lock+0x6bd/0xb10 [ 351.006739][ T30] ? sync_bdevs+0xfd/0x360 [ 351.006758][ T30] ? __pfx___mutex_lock+0x10/0x10 [ 351.006786][ T30] ? sync_bdevs+0xc7/0x360 [ 351.006807][ T30] ? _atomic_dec_and_lock+0xa2/0x120 [ 351.006834][ T30] ? iput+0xd3/0x890 [ 351.006858][ T30] ? sync_bdevs+0xfd/0x360 [ 351.006875][ T30] sync_bdevs+0xfd/0x360 [ 351.006896][ T30] ksys_sync+0xb3/0x150 [ 351.006912][ T30] ? __pfx_ksys_sync+0x10/0x10 [ 351.006930][ T30] ? do_user_addr_fault+0x83d/0x13f0 [ 351.006953][ T30] ? do_syscall_64+0x91/0x250 [ 351.006969][ T30] __do_sys_sync+0xe/0x20 [ 351.006983][ T30] do_syscall_64+0xcd/0x250 [ 351.006999][ T30] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 351.007020][ T30] RIP: 0033:0x7f037e38cda9 [ 351.007031][ T30] RSP: 002b:00007f037b5cf038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a2 [ 351.007049][ T30] RAX: ffffffffffffffda RBX: 00007f037e5a6400 RCX: 00007f037e38cda9 [ 351.007061][ T30] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 351.007071][ T30] RBP: 00007f037e5a6400 R08: 0000000000000000 R09: 0000000000000000 [ 351.007083][ T30] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 351.007095][ T30] R13: 0000000000000001 R14: 00007f037e5a6400 R15: 00007ffe51ae3778 [ 351.007119][ T30] [ 351.007127][ T30] INFO: task syz.4.780:8297 blocked for more than 143 seconds. [ 351.007138][ T30] Not tainted 6.13.0-syzkaller-08265-g9c5968db9e62 #0 [ 351.007148][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 351.007156][ T30] task:syz.4.780 state:D stack:27392 pid:8297 tgid:8283 ppid:5818 task_flags:0x400040 flags:0x00004004 [ 351.007210][ T30] Call Trace: [ 351.007216][ T30] [ 351.007227][ T30] __schedule+0xf43/0x5890 [ 351.007251][ T30] ? __pfx___lock_acquire+0x10/0x10 [ 351.007286][ T30] ? __pfx___schedule+0x10/0x10 [ 351.007311][ T30] ? schedule+0x298/0x350 [ 351.007342][ T30] ? __pfx_lock_release+0x10/0x10 [ 351.007367][ T30] ? __mutex_trylock_common+0x78/0x250 [ 351.007393][ T30] ? lock_acquire+0x2f/0xb0 [ 351.007415][ T30] ? schedule+0x1fd/0x350 [ 351.007442][ T30] schedule+0xe7/0x350 [ 351.007466][ T30] schedule_preempt_disabled+0x13/0x30 [ 351.007490][ T30] __mutex_lock+0x6bd/0xb10 [ 351.007519][ T30] ? sync_bdevs+0xfd/0x360 [ 351.007539][ T30] ? __pfx___mutex_lock+0x10/0x10 [ 351.007572][ T30] ? _atomic_dec_and_lock+0xa2/0x120 [ 351.007600][ T30] ? iput+0xd3/0x890 [ 351.007623][ T30] ? sync_bdevs+0xfd/0x360 [ 351.007640][ T30] sync_bdevs+0xfd/0x360 [ 351.007661][ T30] ksys_sync+0xb3/0x150 [ 351.007678][ T30] ? __pfx_ksys_sync+0x10/0x10 [ 351.007695][ T30] ? do_user_addr_fault+0x83d/0x13f0 [ 351.007721][ T30] ? do_syscall_64+0x91/0x250 [ 351.007739][ T30] __do_sys_sync+0xe/0x20 [ 351.007754][ T30] do_syscall_64+0xcd/0x250 [ 351.007804][ T30] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 351.007829][ T30] RIP: 0033:0x7f037e38cda9 [ 351.007843][ T30] RSP: 002b:00007f037b1ac038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a2 [ 351.007860][ T30] RAX: ffffffffffffffda RBX: 00007f037e5a64e0 RCX: 00007f037e38cda9 [ 351.007873][ T30] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 351.007884][ T30] RBP: 00007f037e5a64e0 R08: 0000000000000000 R09: 0000000000000000 [ 351.007895][ T30] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 351.007907][ T30] R13: 0000000000000001 R14: 00007f037e5a64e0 R15: 00007ffe51ae3778 [ 351.007931][ T30] [ 351.007939][ T30] INFO: task syz.4.780:8298 blocked for more than 143 seconds. [ 351.007950][ T30] Not tainted 6.13.0-syzkaller-08265-g9c5968db9e62 #0 [ 351.007961][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 351.007968][ T30] task:syz.4.780 state:D stack:28064 pid:8298 tgid:8283 ppid:5818 task_flags:0x400040 flags:0x00004004 [ 351.008025][ T30] Call Trace: [ 351.008031][ T30] [ 351.008042][ T30] __schedule+0xf43/0x5890 [ 351.008065][ T30] ? __pfx___lock_acquire+0x10/0x10 [ 351.008100][ T30] ? __pfx___schedule+0x10/0x10 [ 351.008125][ T30] ? schedule+0x298/0x350 [ 351.008147][ T30] ? __pfx_lock_release+0x10/0x10 [ 351.008172][ T30] ? __mutex_trylock_common+0x78/0x250 [ 351.008198][ T30] ? lock_acquire+0x2f/0xb0 [ 351.008221][ T30] ? schedule+0x1fd/0x350 [ 351.008248][ T30] schedule+0xe7/0x350 [ 351.008272][ T30] schedule_preempt_disabled+0x13/0x30 [ 351.008297][ T30] __mutex_lock+0x6bd/0xb10 [ 351.008330][ T30] ? sync_bdevs+0xfd/0x360 [ 351.008347][ T30] ? __pfx___mutex_lock+0x10/0x10 [ 351.008376][ T30] ? _atomic_dec_and_lock+0xa2/0x120 [ 351.008400][ T30] ? iput+0xd3/0x890 [ 351.008420][ T30] ? sync_bdevs+0xfd/0x360 [ 351.008437][ T30] sync_bdevs+0xfd/0x360 [ 351.008458][ T30] ksys_sync+0xb3/0x150 [ 351.008475][ T30] ? __pfx_ksys_sync+0x10/0x10 [ 351.008492][ T30] ? do_user_addr_fault+0x83d/0x13f0 [ 351.008519][ T30] ? do_syscall_64+0x91/0x250 [ 351.008536][ T30] __do_sys_sync+0xe/0x20 [ 351.008552][ T30] do_syscall_64+0xcd/0x250 [ 351.008570][ T30] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 351.008594][ T30] RIP: 0033:0x7f037e38cda9 [ 351.008607][ T30] RSP: 002b:00007f037ad89038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a2 [ 351.008624][ T30] RAX: ffffffffffffffda RBX: 00007f037e5a65c0 RCX: 00007f037e38cda9 [ 351.008637][ T30] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 351.008648][ T30] RBP: 00007f037e5a65c0 R08: 0000000000000000 R09: 0000000000000000 [ 351.008659][ T30] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 351.008671][ T30] R13: 0000000000000001 R14: 00007f037e5a65c0 R15: 00007ffe51ae3778 [ 351.008696][ T30] [ 351.008712][ T30] [ 351.008712][ T30] Showing all locks held in the system: [ 351.008724][ T30] 1 lock held by khungtaskd/30: [ 351.008734][ T30] #0: ffffffff8e1be000 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x7f/0x390 [ 351.008818][ T30] 1 lock held by syslogd/5173: [ 351.008830][ T30] 2 locks held by getty/5567: [ 351.008840][ T30] #0: ffff8880375920a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 [ 351.008894][ T30] #1: ffffc90002fde2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0xfba/0x1480 [ 351.008957][ T30] 2 locks held by kworker/u8:52/6089: [ 351.008969][ T30] 1 lock held by udevd/7219: [ 351.008979][ T30] #0: ffff88802645a4c8 (&disk->open_mutex){+.+.}-{4:4}, at: bdev_open+0x41a/0xe20 [ 351.009024][ T30] 1 lock held by syz.4.780/8284: [ 351.009035][ T30] #0: ffff88802645a4c8 (&disk->open_mutex){+.+.}-{4:4}, at: sync_bdevs+0xfd/0x360 [ 351.009078][ T30] 1 lock held by syz.4.780/8285: [ 351.009089][ T30] #0: ffff88802645a4c8 (&disk->open_mutex){+.+.}-{4:4}, at: sync_bdevs+0xfd/0x360 [ 351.009133][ T30] 1 lock held by syz.4.780/8286: Feb 6 05:30:26 syzkaller kern.info kernel: [ 350.993028][ T30] RSP: 002b:00007f037f17f038 EFLAGS: 00000246 O[ 351.009144][ T30] #0: ffff88802645a4c8 (&disk->open_mutex){+.+.}-{4:4}, at: sync_bdevs+0xfd/0x360 RIG_RAX: 0000000[ 352.844262][ T30] 1 lock held by syz.4.780/8287: 0000000a2 Feb [ 352.844883][ T29] kauditd_printk_skb: 168 callbacks suppressed 6 05:30:26 syzka[ 352.844893][ T29] audit: type=1400 audit(2275277428.785:5150): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ller kern.info k[ 352.850621][ T30] #0: ernel: [ 351.00[ 352.859276][ T29] audit: type=1400 audit(2275277428.795:5151): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 3003][ T30] RA[ 352.881411][ T30] ffff88802645a4c8 (&disk->open_mutex){+.+.}-{4:4}, at: sync_bdevs+0xfd/0x360 [ 352.881465][ T30] 1 lock held by syz.4.780/8290: X: fffffffffffff[ 352.881477][ T30] #0: ffff88802645a4c8 fda RBX: 00007f0[ 352.914748][ T29] audit: type=1400 audit(2275277428.795:5152): avc: denied { read } for pid=5173 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 37e5a5fa0 RCX: 00007f037e38cda9[ 352.924167][ T30] (&disk->open_mutex){+.+.}-{4:4}, at: sync_bdevs+0xfd/0x360 [ 352.953035][ T30] 1 lock held by syz.4.780/8291: [ 352.953048][ T30] #0: ffff88802645a4c8 (&disk->open_mutex){+.+.}-{4:4}, at: sync_bdevs+0xfd/0x360 [ 352.953094][ T30] 1 lock held by syz.4.780/8297: [ 352.953104][ T30] #0: ffff88802645a4c8 (&disk->open_mutex){+.+.}-{4:4}, at: sync_bdevs+0xfd/0x360 [ 352.953150][ T30] 1 lock held by syz.4.780/8298: [ 352.953160][ T30] #0: ffff88802645a4c8 (&disk->open_mutex){+.+.}-{4:4}, at: sync_bdevs+0xfd/0x360 [ 352.953208][ T30] 1 lock held by syz.5.1661/10901: [ 352.953218][ T30] #0: ffff88802645a4c8 (&disk->open_mutex){+.+.}-{4:4}, at: sync_bdevs+0xfd/0x360 [ 352.953270][ T30] 1 lock held by syz.5.1661/10903: [ 352.953280][ T30] #0: ffff88802645a4c8 (&disk->open_mutex){+.+.}-{4:4}, at: sync_bdevs+0xfd/0x360 [ 352.953326][ T30] 1 lock held by syz.5.1661/10910: [ 352.953336][ T30] #0: ffff88802645a4c8 (&disk->open_mutex){+.+.}-{4:4}, at: sync_bdevs+0xfd/0x360 [ 352.953381][ T30] 1 lock held by syz.5.1661/10911: [ 352.953391][ T30] #0: ffff88802645a4c8 (&disk->open_mutex){+.+.}-{4:4}, at: sync_bdevs+0xfd/0x360 [ 352.953436][ T30] 1 lock held by syz.5.1661/10915: [ 352.953446][ T30] #0: ffff88802645a4c8 (&disk->open_mutex){+.+.}-{4:4}, at: sync_bdevs+0xfd/0x360 [ 352.953491][ T30] 1 lock held by syz.5.1661/10916: [ 352.953501][ T30] #0: ffff88802645a4c8 (&disk->open_mutex){+.+.}-{4:4}, at: sync_bdevs+0xfd/0x360 [ 352.953545][ T30] 1 lock held by syz.5.1661/10917: [ 352.953556][ T30] #0: ffff88802645a4c8 (&disk->open_mutex){+.+.}-{4:4}, at: sync_bdevs+0xfd/0x360 [ 352.953603][ T30] [ 352.953609][ T30] ============================================= [ 352.953609][ T30] [ 352.953617][ T30] NMI backtrace for cpu 1 [ 352.953626][ T30] CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Not tainted 6.13.0-syzkaller-08265-g9c5968db9e62 #0 [ 352.953644][ T30] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 352.953653][ T30] Call Trace: [ 352.953658][ T30] [ 352.953665][ T30] dump_stack_lvl+0x116/0x1f0 [ 352.953692][ T30] nmi_cpu_backtrace+0x27b/0x390 [ 352.953714][ T30] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 352.953737][ T30] nmi_trigger_cpumask_backtrace+0x29c/0x300 [ 352.953760][ T30] watchdog+0xf62/0x12b0 [ 352.953789][ T30] ? __pfx_watchdog+0x10/0x10 [ 352.953811][ T30] ? lockdep_hardirqs_on+0x7c/0x110 [ 352.953837][ T30] ? __kthread_parkme+0x148/0x220 [ 352.953855][ T30] ? __pfx_watchdog+0x10/0x10 [ 352.953879][ T30] kthread+0x3af/0x750 [ 352.953899][ T30] ? __pfx_kthread+0x10/0x10 [ 352.953922][ T30] ? __pfx_kthread+0x10/0x10 [ 352.953942][ T30] ret_from_fork+0x45/0x80 [ 352.953963][ T30] ? __pfx_kthread+0x10/0x10 [ 352.953981][ T30] ret_from_fork_asm+0x1a/0x30 [ 352.954011][ T30] [ 352.954016][ T30] Sending NMI from CPU 1 to CPUs 0: [ 352.954036][ C0] NMI backtrace for cpu 0 [ 352.954043][ C0] CPU: 0 UID: 0 PID: 6028 Comm: kworker/u8:10 Not tainted 6.13.0-syzkaller-08265-g9c5968db9e62 #0 [ 352.954062][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 352.954070][ C0] Workqueue: bat_events batadv_nc_worker [ 352.954085][ C0] RIP: 0010:lock_acquire.part.0+0x30/0x380 [ 352.954103][ C0] Code: 56 41 89 f6 41 55 49 89 fd 41 54 41 89 d4 48 ba 00 00 00 00 00 fc ff df 55 53 48 81 ec a8 00 00 00 48 c7 44 24 08 b3 8a b5 41 <48> 8d 5c 24 08 48 c7 44 24 10 97 f6 97 8d 48 c1 eb 03 48 c7 44 24 [ 352.954115][ C0] RSP: 0018:ffffc90004a7f9b8 EFLAGS: 00000296 [ 352.954125][ C0] RAX: 0000000000000001 RBX: ffff888032c60080 RCX: 0000000000000000 [ 352.954133][ C0] RDX: dffffc0000000000 RSI: 0000000000000000 RDI: ffff888032c60098 [ 352.954141][ C0] RBP: dffffc0000000000 R08: 0000000000000001 R09: 0000000000000000 [ 352.954149][ C0] R10: ffffffff90624917 R11: 0000000000000002 R12: 0000000000000000 [ 352.954157][ C0] R13: ffff888032c60098 R14: 0000000000000000 R15: 0000000000000000 [ 352.954165][ C0] FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 [ 352.954178][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 352.954187][ C0] CR2: 00007f1e96979178 CR3: 00000000298f0000 CR4: 00000000003526f0 [ 352.954195][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 352.954203][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 352.954211][ C0] Call Trace: [ 352.954216][ C0] [ 352.954220][ C0] ? nmi_cpu_backtrace+0x1d8/0x390 [ 352.954238][ C0] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 352.954254][ C0] ? nmi_handle+0x1ac/0x5d0 [ 352.954272][ C0] ? lock_acquire.part.0+0x30/0x380 [ 352.954290][ C0] ? default_do_nmi+0x6a/0x160 [ 352.954305][ C0] ? exc_nmi+0x170/0x1e0 [ 352.954319][ C0] ? end_repeat_nmi+0xf/0x53 [ 352.954340][ C0] ? lock_acquire.part.0+0x30/0x380 [ 352.954357][ C0] ? lock_acquire.part.0+0x30/0x380 [ 352.954373][ C0] ? lock_acquire.part.0+0x30/0x380 [ 352.954390][ C0] [ 352.954394][ C0] [ 352.954399][ C0] ? rcu_is_watching+0x12/0xc0 [ 352.954413][ C0] ? trace_lock_acquire+0x14e/0x1f0 [ 352.954427][ C0] ? batadv_nc_purge_paths+0xca/0x390 [ 352.954439][ C0] ? lock_acquire+0x2f/0xb0 [ 352.954454][ C0] ? batadv_nc_purge_paths+0xca/0x390 [ 352.954466][ C0] ? __pfx_batadv_nc_to_purge_nc_path_coding+0x10/0x10 [ 352.954481][ C0] _raw_spin_lock_bh+0x33/0x40 [ 352.954496][ C0] ? batadv_nc_purge_paths+0xca/0x390 [ 352.954508][ C0] batadv_nc_purge_paths+0xca/0x390 [ 352.954523][ C0] batadv_nc_worker+0x913/0x1060 [ 352.954538][ C0] ? __pfx_batadv_nc_worker+0x10/0x10 [ 352.954551][ C0] ? rcu_is_watching+0x12/0xc0 [ 352.954563][ C0] ? trace_lock_acquire+0x14e/0x1f0 [ 352.954577][ C0] ? process_one_work+0x921/0x1ba0 [ 352.954593][ C0] ? lock_acquire+0x2f/0xb0 [ 352.954608][ C0] ? process_one_work+0x921/0x1ba0 [ 352.954624][ C0] process_one_work+0x9c5/0x1ba0 [ 352.954642][ C0] ? __pfx_batadv_nc_worker+0x10/0x10 [ 352.954655][ C0] ? __pfx_process_one_work+0x10/0x10 [ 352.954673][ C0] ? assign_work+0x1a0/0x250 [ 352.954688][ C0] worker_thread+0x6c8/0xf00 [ 352.954707][ C0] ? __pfx_worker_thread+0x10/0x10 [ 352.954723][ C0] kthread+0x3af/0x750 [ 352.954737][ C0] ? __pfx_kthread+0x10/0x10 [ 352.954750][ C0] ? lock_acquire+0x2f/0xb0 [ 352.954766][ C0] ? __pfx_kthread+0x10/0x10 [ 352.954780][ C0] ret_from_fork+0x45/0x80 [ 352.954795][ C0] ? __pfx_kthread+0x10/0x10 [ 352.954809][ C0] ret_from_fork_asm+0x1a/0x30 [ 352.954826][ C0] [ 352.955033][ T30] Kernel panic - not syncing: hung_task: blocked tasks [ 352.955043][ T30] CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Not tainted 6.13.0-syzkaller-08265-g9c5968db9e62 #0 [ 352.955061][ T30] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 352.955071][ T30] Call Trace: [ 352.955076][ T30] [ 352.955083][ T30] dump_stack_lvl+0x3d/0x1f0 [ 352.955109][ T30] panic+0x71d/0x800 [ 352.955129][ T30] ? __pfx_panic+0x10/0x10 [ 352.955150][ T30] ? irq_work_claim+0x76/0xa0 [ 352.955176][ T30] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 352.955196][ T30] ? irq_work_queue+0x2a/0x80 [ 352.955220][ T30] ? watchdog+0xdcc/0x12b0 [ 352.955244][ T30] ? watchdog+0xdbf/0x12b0 [ 352.955277][ T30] watchdog+0xddd/0x12b0 [ 352.955306][ T30] ? __pfx_watchdog+0x10/0x10 [ 352.955329][ T30] ? lockdep_hardirqs_on+0x7c/0x110 [ 352.955355][ T30] ? __kthread_parkme+0x148/0x220 [ 352.955372][ T30] ? __pfx_watchdog+0x10/0x10 [ 352.955397][ T30] kthread+0x3af/0x750 [ 352.955418][ T30] ? __pfx_kthread+0x10/0x10 [ 352.955441][ T30] ? __pfx_kthread+0x10/0x10 [ 352.955462][ T30] ret_from_fork+0x45/0x80 [ 352.955483][ T30] ? __pfx_kthread+0x10/0x10 [ 352.955503][ T30] ret_from_fork_asm+0x1a/0x30 [ 352.955532][ T30] [ 352.955729][ T30] Kernel Offset: disabled