last executing test programs: 3.725936278s ago: executing program 4 (id=2532): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000001800)={@local, @random="50a245d5cde0", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x65, 0x0, 0x0, 0x32, 0x0, @empty, @broadcast}, @timestamp_reply={0x11}}}}}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) mkdir(0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/xfrm_stat\x00') lseek(r4, 0x7fffffffffffffff, 0x0) mknodat$loop(r4, &(0x7f0000000040)='./file0\x00', 0x8, 0x1) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000180)={0x1, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeedcafe, 0x3, 0x0, 0x2}}) r5 = socket(0x10, 0x3, 0x0) r6 = openat$dsp(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$SOUND_MIXER_WRITE_RECSRC(r6, 0xc0044dff, &(0x7f00000000c0)=0x33) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, 0x0, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="780100003c000701fcffffff00000003047c000004003680600101805c0110804f0115"], 0x178}, 0x1, 0x0, 0x0, 0x48840}, 0xc000) write(r5, &(0x7f0000000000)="240000001a005f0414f9f407000901000aff8000034000030000000008001d0001000000", 0x24) 3.401962189s ago: executing program 2 (id=2536): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000001000)=@raw={'raw\x00', 0xc01, 0x3, 0x12a0, 0x1100, 0x5002004a, 0x0, 0x1100, 0x0, 0x1208, 0x3c8, 0x3c8, 0x1208, 0x3c8, 0x3, 0x0, {[{{@uncond, 0x60, 0x10a0, 0x1100, 0x0, {0x1000000}, [@common=@unspec=@cgroup1={{0x1030}, {0x1, 0x0, 0x0, 0x0, './cgroup.cpu/syz1\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1, [0x2, 0x1, 0x7], 0x6, 0x2}, {0x2, [0x0, 0x4, 0x4, 0x9, 0x0, 0x89ce99baffcf6900], 0x1, 0x1}}}}, {{@uncond, 0x0, 0xa8, 0x108, 0x0, {}, [@common=@unspec=@owner={{0x38}, {0x0, 0x0, 0x0, 0x0, 0x4, 0x3}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback, [0xffffff00, 0xff000000, 0xff, 0xff0000ff], 0x4e22, 0x4c20, 0x4e24, 0x4e23, 0xc9, 0x0, 0x3b, 0x83, 0x25}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x1300) 3.376782249s ago: executing program 2 (id=2537): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000340)=ANY=[@ANYBLOB="12013f00000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f000905", @ANYRES64], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000200)={0x24, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0022100000000b449bab5957e5130796b6979252d1b4"], 0x0}, 0x0) r1 = syz_open_dev$hiddev(&(0x7f0000000540), 0xfffffffffffffffd, 0x203100) r2 = syz_usb_connect(0x0, 0x24, &(0x7f0000000f40)=ANY=[@ANYBLOB="12010000dc3f6e4013080100083a000000010902120001000000000904"], 0x0) syz_usb_control_io(r2, 0x0, 0x0) syz_usb_control_io$hid(r2, 0x0, &(0x7f0000000500)={0x2c, &(0x7f0000000300)={0x0, 0xa, 0x30, "0297e0a7df815a87fd6f59d369f41dd95bdcb7f8d0c2748652e231c4ef4206281ea67b40b5e1166b79fc7d74c0b3b4e8"}, 0x0, 0x0, 0x0, 0x0}) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) preadv(r1, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000080)=""/26, 0x1a}], 0x2, 0x2, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x3) syz_usb_control_io$cdc_ncm(r2, &(0x7f0000000c40)={0x14, &(0x7f0000000b00)={0x40, 0x4, 0xc3, {0xc3, 0xa, "42b2bd3cb66eda37b90d1f8c365299abf7216049d528ccb3187ecf24e5d4cd3dccb6ecd9a7a8bccef48b3afbb37ccb2674e8671ae279bb744077f8aa9531809144183cf29d9d9b4315f1a2d933ffcb0336fc118dd98132ee18c7873444e38fa1da3e6a7cff3877067cd12b676a1232ab70780bba0804c348d175b9cfa4c9f7f9c5b86229f39a77472a9e493224506cb09f472b0f9ec0434fa5ac1527c79c8c8d203ec0316e0b35643aa4daf07e6a1da28855f464633a273861c0367eed1e4e9828"}}, &(0x7f0000000c00)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000f80)={0x44, &(0x7f0000000c80)={0x20, 0xa, 0x84, "d2da689c66509039250335f12299e35fb1b659e7e80bb67c4cc90b31ae310855c4eee625c3d2034b23c1ce8d360637a8b4d51e9ea43e66d7a0e94b4efe93221a6f7416130fc49b8dbdf74187a73d92d4d3141db5a2e7aad07c60b61c42da9fdf8b18ff62f15bb236b9e9e54b4d52fb5d512e03b61acc525f82cc9cf39cb893bb13b6e283"}, &(0x7f0000000d40)={0x0, 0xa, 0x1, 0x1}, &(0x7f0000000d80)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000dc0)={0x20, 0x80, 0x1c, {0x100, 0x800, 0x1, 0x2, 0x7, 0xa4, 0x9, 0x5, 0x2, 0x7, 0x81, 0x8001}}, &(0x7f0000000e00)={0x20, 0x85, 0x4, 0x10}, &(0x7f0000000e40)={0x20, 0x83, 0x2, 0x1}, &(0x7f0000000e80)={0x20, 0x87, 0x2, 0x5}, &(0x7f0000000ec0)={0x20, 0x89, 0x2, 0x1}}) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) unshare(0x62040600) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x4000) write(0xffffffffffffffff, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x137b, 0x20c32}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x810}, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) syz_usb_control_io(r0, &(0x7f00000004c0)={0x2c, &(0x7f0000000280)={0x20, 0x1, 0x48, {0x48, 0x22, "7ae04822cff67604604a46f3f685e583443daa9acc08f09a6cf9e5b8d2d62fd1a6e9b02dfeeed35e58df162845ba09d091d87f823e48173996c5ff9a07a202951b9f5ce41e44"}}, &(0x7f0000000380)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x41a}}, &(0x7f00000003c0)={0x0, 0xf, 0x49, {0x5, 0xf, 0x49, 0x6, [@ptm_cap={0x3}, @ptm_cap={0x3}, @wireless={0xb, 0x10, 0x1, 0xc, 0x1, 0xc, 0xac, 0x5, 0x41}, @wireless={0xb, 0x10, 0x1, 0x4, 0x84, 0x6, 0x6, 0xa0, 0x3b}, @ssp_cap={0x14, 0x10, 0xa, 0x0, 0x2, 0x2, 0xf, 0xa, [0xc0, 0xff7e17]}, @ssp_cap={0x14, 0x10, 0xa, 0x4, 0x2, 0x1, 0xf, 0x6, [0xf0, 0xff00f0]}]}}, &(0x7f0000000440)={0x20, 0x29, 0xf, {0xf, 0x29, 0xaa, 0x3, 0x5, 0xf0, '1y<7', "cc8fcd46"}}, &(0x7f0000000480)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x3, 0x80, 0x4, 0x4, 0x10, 0x7, 0x8}}}, &(0x7f0000000a40)={0x84, &(0x7f0000000580)={0x40, 0x0, 0xc0, "928dc4d1f8494444218d7aa94e6ed6467c6f3cf7a67daeeb4ffc966484b761ea0ead7d26e5062b9d73109da69bf0d4605287e41fe3bf877a88b15c823a692594419ed5a7b0ac9e9d72b5ba0abedb33ac04810b8efc1af0bf135647e085088fcdb2b26fe5c6575b7ca40efd8993259e6b38c96fb5632a3498297e9cb9ba240002c0f82d193a539457d256e47469afd2897f5d4f2ff4fcd816736090ee1977f9c666a9c65ab15323b3919d04fd2497cd18cd84b4e632ec7f4fb27ddc1b0d582cab"}, &(0x7f0000000680)={0x0, 0xa, 0x1, 0x2}, &(0x7f00000006c0)={0x0, 0x8, 0x1, 0x1}, &(0x7f0000000700)={0x20, 0x0, 0x4, {0x2, 0x1}}, &(0x7f0000000740)={0x20, 0x0, 0x8, {0x1e0, 0x20, [0xf0f]}}, &(0x7f0000000780)={0x40, 0x7, 0x2, 0x6}, &(0x7f00000007c0)={0x40, 0x9, 0x1, 0x5}, &(0x7f0000000800)={0x40, 0xb, 0x2, "da3f"}, &(0x7f0000000840)={0x40, 0xf, 0x2}, &(0x7f0000000880)={0x40, 0x13, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x18}}, &(0x7f00000008c0)={0x40, 0x17, 0x6, @broadcast}, &(0x7f0000000900)={0x40, 0x19, 0x2, "cecf"}, &(0x7f0000000940)={0x40, 0x1a, 0x2, 0x8000}, &(0x7f0000000980)={0x40, 0x1c, 0x1, 0x4b}, &(0x7f00000009c0)={0x40, 0x1e, 0x1, 0x5}, &(0x7f0000000a00)={0x40, 0x21, 0x1, 0x2}}) socket$nl_generic(0x10, 0x3, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@loopback, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000000)=0xe8) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_buf(r7, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000695ffc)=0x24b) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) ioctl$TUNGETIFF(r6, 0x800454d2, &(0x7f0000000000)={'ip6gre0\x00'}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0xc, 0x1, 0x0, 0x75}]}) 3.285899288s ago: executing program 0 (id=2538): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x19, 0x7, &(0x7f0000000540)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) r4 = userfaultfd(0x80001) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000140)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) ioctl$UFFDIO_COPY(r4, 0x8010aa02, &(0x7f0000000040)={&(0x7f000071c000/0x1000)=nil, &(0x7f0000757000/0x1000)=nil, 0x1000}) 3.162280654s ago: executing program 0 (id=2539): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000001800)={@local, @random="50a245d5cde0", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x65, 0x0, 0x0, 0x32, 0x0, @empty, @broadcast}, @timestamp_reply={0x11}}}}}, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mkdir(0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/xfrm_stat\x00') lseek(r4, 0x7fffffffffffffff, 0x0) mknodat$loop(r4, &(0x7f0000000040)='./file0\x00', 0x8, 0x1) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000180)={0x1, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeedcafe, 0x3, 0x0, 0x2}}) r5 = socket(0x10, 0x3, 0x0) r6 = openat$dsp(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$SOUND_MIXER_WRITE_RECSRC(r6, 0xc0044dff, &(0x7f00000000c0)=0x33) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, 0x0, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="780100003c000701fcffffff00000003047c000004003680600101805c0110804f0115"], 0x178}, 0x1, 0x0, 0x0, 0x48840}, 0xc000) write(r5, &(0x7f0000000000)="240000001a005f0414f9f407000901000aff8000034000030000000008001d0001000000", 0x24) 2.859974957s ago: executing program 4 (id=2541): mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt(r0, 0x84, 0x82, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = syz_io_uring_setup(0x110, &(0x7f0000000140)={0x0, 0x5fb5, 0x0, 0x1}, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000300)=0x3) r4 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r4, &(0x7f0000019680)=""/102392, 0x18ff8) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0) setresuid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f000000c1c0)) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x40054) syz_io_uring_submit(r2, r3, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) io_uring_enter(r1, 0x47f6, 0x0, 0x0, 0x0, 0x0) r5 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x0, 0x3, 0x3}, 0x10) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x9, 0x3, [0xfff, 0x1, 0xdef4]}, &(0x7f0000000400)=0xe) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000440)={r6, 0x7}, 0x8) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f00000000c0)={0x43, 0x0, 0x0, 0x3}, 0x10) openat$sysfs(0xffffffffffffff9c, 0x0, 0x149a82, 0x0) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRESHEX=r7, @ANYBLOB, @ANYBLOB=',grou', @ANYRESDEC=0x0]) read$FUSE(r7, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000008400)="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", 0x2000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x90, 0x0, 0x0, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000, 0x5, 0x0, 0x0, 0x800}}}, 0x0, 0x0, 0x0, 0x0}) write$FUSE_INIT(r7, &(0x7f0000000340)={0x50}, 0x50) ioctl$FIBMAP(0xffffffffffffffff, 0x401070ca, 0x0) 2.797396882s ago: executing program 4 (id=2542): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000340)=@newtaction={0x5c, 0x30, 0xffffffffffffffff, 0x0, 0x0, {}, [{0x48, 0x1, [@m_bpf={0x44, 0x1, 0x0, 0x0, {{0x8}, {0x1c, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18, 0x2, {0x1, 0x3f}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x5c}}, 0x0) 2.759509845s ago: executing program 4 (id=2543): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x4010, 0xffffffffffffffff, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000400)='.\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="02000000080000000000000002000000", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0xee00, @ANYBLOB="020000", @ANYRES32=0x0, @ANYBLOB="040000000000800008000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="100000000000000020"], 0x5c, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x19) mlock2(&(0x7f0000018000/0x2000)=nil, 0x2000, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newqdisc={0x2c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_qfg={0x8}]}, 0x2c}}, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000600)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x2}}, 0x0, 0x83c6, 0x2, 0x60, 0xe0, 0x1, 0x5}, 0x9c) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pwritev(r7, &(0x7f00000003c0)=[{&(0x7f0000000640)="97de4c76e9686899bb76d2b62160f77e55ff00a1a90f695d4b3f3fa2ed80b5bd0916681f84d1733413cc45075ad5bfabbf9127bc9a62e098a079dd0c9b81ec7b7d41bee7be0dff61b5168029b70c9ba91fcc2eebe9", 0x55}], 0x1, 0x2, 0x0) r8 = openat(r7, &(0x7f0000000040)='./file0\x00', 0x101800, 0x144) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000012, 0x28011, r7, 0x0) preadv(r7, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffff23}], 0x1, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r9 = socket$netlink(0x10, 0x3, 0xa) r10 = syz_io_uring_setup(0x10e, &(0x7f0000000140)={0x0, 0x99d6, 0x800, 0x1000000, 0x1f5}, &(0x7f0000000000)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r11, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) ioctl$KVM_CAP_X86_APIC_BUS_CYCLES_NS(r8, 0x4068aea3, &(0x7f0000000480)={0xed, 0x0, 0xf64}) syz_io_uring_submit(r11, r12, &(0x7f00000002c0)=@IORING_OP_SEND={0x1a, 0x40, 0x0, r9, 0x0, &(0x7f0000000300)="df2d", 0x2, 0x20000000, 0x1}) io_uring_enter(r10, 0x47f9, 0x0, 0x0, 0x0, 0x0) r13 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x1, 0x0, 0xfffffffffffffdb8) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan0\x00'}) ioctl$KVM_RUN(r13, 0xae80, 0x0) 2.754802439s ago: executing program 4 (id=2544): syz_open_dev$dri(0x0, 0x40000000001, 0x2000) r0 = syz_open_dev$vim2m(&(0x7f0000000140), 0x10001, 0x2) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000240)={0x1, @raw_data="a425e2f1a54d24f15955565860608d70566e425a6c36af37b33fac9d31c8a9c7044410d324b03e044e454d2092a62fea8f13441431ce248bfc73a6726ee61ba491d15d8f392ff66fe0b17f0e11f5d2367d5593205ab1efa97d40619a553e7da2518125b850a186ef691daa55c9e50ffaf6ddc25220ded32aeba4524cec1afbd17abba1d15ea05e97ed3dcad452db6e08a991e2c78b057f55de7fdeba7411ce65700c0a1ad7946ff7c355db87566e3e5abb7a37a06731ed19ddfa970bb58a27fd9fa194c092730319"}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) io_uring_setup(0x6479, &(0x7f0000000340)={0x0, 0x403d, 0x400, 0x0, 0x33d}) io_uring_setup(0x4adf, 0x0) syz_io_uring_setup(0x4b62, 0x0, &(0x7f00000000c0), 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x6) ioctl$F2FS_IOC_GARBAGE_COLLECT(r2, 0x4004f506, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(0x0, 0x400, 0x2635a55d2c98f2e4) truncate(0x0, 0x0) r6 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r6, 0x4018620d, &(0x7f0000000300)) r7 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000580)={0x10, 0x0, &(0x7f0000000700)=[@request_death={0x400c6313, 0x1000000, 0xffffff7f00000000}], 0x2, 0x1000000000000, 0x0}) 2.470052041s ago: executing program 1 (id=2548): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='nv\x00', 0x3) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000400)="89000000120081ae08060cdc03a6000000000002000000006ee2ffca1b1f0000000004c00e72f750375ed08a563319bf9ed720000000d6e747033a0093b837dc6cc01e32efaec8c7a6ec0012100002400d0c0c00bdad446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'lo\x00', 0x0}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) close(r5) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x20001400) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="80fd"], 0x9) r6 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r6}, &(0x7f0000bbdffc)) ioperm(0x7f, 0x5, 0x84) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2c41, 0x0) flock(r7, 0x5) r8 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) flock(r8, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) r10 = dup(r9) sendmsg$nl_xfrm(r10, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB='\x00'/112], 0xb8}}, 0x0) r11 = syz_open_procfs$userns(0x0, 0x0) mount_setattr(0xffffffffffffffff, 0x0, 0x9000, &(0x7f0000000280)={0x87, 0x70, 0x10000, {r11}}, 0x20) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv6_newaddr={0x30, 0x14, 0x20, 0x70bd2d, 0x25dfdbfb, {0xa, 0x18, 0x0, 0xfe, r4}, [@IFA_FLAGS={0x8, 0x8, 0x100}, @IFA_TARGET_NETNSID={0x8, 0xa, 0x1}, @IFA_FLAGS={0x8, 0x8, 0x42}]}, 0x30}}, 0x0) r12 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sysvipc/shm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r12, 0x0) pselect6(0x40, &(0x7f0000000000)={0x49, 0x3, 0xbf7, 0x2, 0x6bde, 0x2, 0xfffffffffffffff8, 0x200}, &(0x7f0000000040)={0xe83, 0x0, 0x8, 0x6, 0x2, 0x8, 0x4}, &(0x7f0000000080)={0x1, 0xa, 0x3, 0x101, 0x26a, 0xe7c, 0x8, 0x2}, &(0x7f00000000c0)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000300)={[0x80000000000006]}, 0x8}) 2.406516392s ago: executing program 2 (id=2549): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a5050000000077d8f3b423cdac8d80000000000000002be16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f7535f7866907dc6751dfb265a0d6453559c3421eed73d56615fe6c54c3b3ffe1b4ce25d7c983c044c03bf3a48dfe47ec9dd6c091c30b93bfae76d9ebacd3ed3e26e7a23129d6606fd28a69989d552af6bda9df2c3af36effff9af2551ce896165127cb3f011a7d06602e2fd52347125907000000000000003ed38ae89d24e1cebfba2f87925bfacba83109751fe6c05405d027edd68149ee99eef6a6992308a4fc0b7c70bc677d6dd4aed4af7500d7900a820b6347184e9a217b5614cd50cbe43a1ed2526814bc0000e9e086ce48e90defb6670c3df262ad0a97aec7291c25447c106a99893e10db21901eb397b2f5fd71d20fa7a050fbbef9e326ea27e513e96068fd1e8a43e89f9c85c822a961546ed5363c17ff1432d08806bc376e3e49ee52b59d13182e1f24ed200ada12f7a1001500a710eb1affb87ba55b2d72078e9f40b4ae7d01000000d11cd22c35d32940000088dde499000000fdffffff000000000000000000000000000000000000000000000c52f4ebd2c893bb97a068bd10734a83584898eccb26f7b789cfc4cd995fa3e11a5c74c85404e2df3ad37b729ac83b0dcb4f48f3c3356b9997fc455a17690b6f7f9ccbe4b1701941b18a904c0e585a66c3b84b138efc20a546d3d5227e23b03f2a834391ad24fe7d9b20cf92cb151763d41f5c76e2ff3e93ee296c4082ee73e7e197253a2b66c353312c9d75711ce1623e9c54bdff59d2a69dcb7d84c235b23a4480c2461b405cfd1a38992f295ad3adc94cd07c850d1ce6d0b2fea02c24e9280333152fb794e4ddea02017a6c139b50101caecaf2abc0842b99a96fc4275ad107274e2934a87a4ddcdb112754ca5bdec0ead14b6c0f19a43a2f04c7f0be31491eb8c9ff68236c8600000000000000000000000066e034c81c3cab4e33fc8dc55ce0ada18dcbf31c6ea1893add3bee3e10fc873d1d922b0877cbcd95b839d3059d5140a1f742f6e75741e39e5cb6a193e06a1043375b0f61b5d4e17c81baa31b924d84f2243471221c15fa12313ffbfa7c2730302b66a99f66705b71e6205e7cbf3643561eabb9a63fcd604d5cc27e1317ad94cf438d71873e540be16b6ca20508011132153c528f7bca92980a3223c5b9cdddedb0a14adddf9a6e70a26b5c0ee0879c349814bee9d96d8bd23db4e801d49201ae84090455682794098afa42b34196b1d849020eeeb1ef48d003d71524683d7cdfa841bca708414fb8ff49742420d1ab7fa678aa4806d5247616e8bc0b02887f8efe9310ccf9bec1c9b7f6671c9d59ac6b09b4436cafdd1887c8e884c930d21ace088ccc99a94d4b33da2fc1b1310bb607a9ad65844655de1ac9fd36d12e07a821fb951368a970c58fb4f3f403fdaf68902874"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x19, 0x7, &(0x7f0000000540)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) r4 = userfaultfd(0x80001) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000140)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) ioctl$UFFDIO_COPY(r4, 0x8010aa02, &(0x7f0000000040)={&(0x7f000071c000/0x1000)=nil, &(0x7f0000757000/0x1000)=nil, 0x1000}) 2.381227838s ago: executing program 2 (id=2550): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) socket$kcm(0x10, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0xf, &(0x7f0000000080)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd, @generic={0x2c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9}, @exit, @tail_call]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0x40345410, &(0x7f0000000000)={{0x3}}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001740)={&(0x7f0000001600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x43000000}, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2, 0x1}]}]}, {0x0, [0x0, 0x2e]}}, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, @void, @value}, 0x28) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r5, 0x80e85411, &(0x7f00000022c0)) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYRES32=r3, @ANYRES16=r0], 0x50}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x8) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="640000000206010800000000000000000000000014000780080012400003000008001140000000000500010006000000050005000200000005000400000000000900020073797a310000000015000300686173683a6970"], 0x64}}, 0x6000000) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6ad2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.299996413s ago: executing program 0 (id=2551): prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x4, 0x0, 0x6, 0x7ffc1ffb}]}) (async) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000140)={0x0, 0x0}) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) (async) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) (async) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) (async) sched_setscheduler(r3, 0x1, &(0x7f0000000200)=0x81) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) (async) socket$rxrpc(0x21, 0x2, 0x2) (async) accept$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000480)=0x1c) (async) getsockopt$sock_buf(r5, 0x1, 0x1f, 0x0, &(0x7f00000004c0)) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async) pwritev(r1, 0x0, 0x0, 0x1, 0x40000) (async) mprotect(&(0x7f00003fd000/0xc00000)=nil, 0xc00000, 0x5) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) (async) socketpair$unix(0x1, 0x2, 0x0, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001040)=ANY=[@ANYBLOB="1c0000001d00010000000000040000000a00100023"], 0x1c}}, 0x48000) (async) connect$unix(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r7, 0xc01064b5, &(0x7f0000000240)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], 0x4}) ioctl$DRM_IOCTL_MODE_ATOMIC(r1, 0xc03864bc, &(0x7f0000000440)={0x200, 0x1, &(0x7f0000000280)=[r8], &(0x7f0000000300)=[0x6, 0x755a, 0x8, 0x101, 0xb, 0x8001], &(0x7f0000000340), &(0x7f0000000400)=[0x10], 0x0, 0x85f}) 2.298926481s ago: executing program 3 (id=2552): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000480)=@filter={'filter\x00', 0xe, 0x4, 0x360, 0xffffffff, 0x0, 0x0, 0x120, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0xd}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@rand_addr=0x64010101, 'vlan0\x00', {0x1d6e}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYRES8=r0], 0x7) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18, 0xfffffffffffffff5, 0x0, {0x9}}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="b0000000000000"], 0xb0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x10) sendmsg$NFT_BATCH(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=ANY=[@ANYBLOB="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"/306, @ANYRES32=r1, @ANYRESOCT], 0xb0}, 0x1, 0x0, 0x0, 0x80}, 0x60000080) rt_sigprocmask(0x0, &(0x7f000078b000)={[0xfffffffffffffffd]}, 0x0, 0x8) syslog(0x2, 0xfffffffffffffffc, 0x1000000) mkdirat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) getrlimit(0x5, &(0x7f0000000980)) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000009c0)='sysfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x3) 2.238460825s ago: executing program 2 (id=2553): mknodat(0xffffffffffffff9c, 0x0, 0x81c0, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x400000bce) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) openat$vcs(0xffffffffffffff9c, 0x0, 0x40000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$inet(r4, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @rand_addr=0x20}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000380)}], 0x1, &(0x7f0000007880)=[@ip_tos_u8={{0x11, 0x34000}}, @ip_pktinfo={{0x1c, 0xfd000f00, 0x8, {0x0, @remote, @multicast1}}}, @ip_pktinfo={{0x1c, 0x28f0700, 0x8, {0x0, @empty=0xa0050000}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp={0x44, 0x8, 0x88, 0x0, 0x0, [0x0]}]}}}], 0x70}, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4003100000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0x2, 0x4e21, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0xa, 0x0, 0x0, @mcast2}}}, 0x48) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r7, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @remote}, r8}}, 0x48) close_range(r6, r6, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[], 0x48) close(r5) 2.207838501s ago: executing program 3 (id=2554): sendmsg$OSF_MSG_REMOVE(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x710}}, 0x4000) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_GET_KEY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x1c, r1, 0x1, 0x70bd25, 0x25dfdbff, {{}, {@val={0x8, 0x3, r2}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x20008800}, 0x40000) openat$incfs(0xffffffffffffffff, &(0x7f0000000040)='.pending_reads\x00', 0x20040, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) readv(r3, &(0x7f0000000640)=[{&(0x7f0000000340)=""/184, 0xb8}, {0x0}], 0x2) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f0000000080)={'ip6_vti0\x00', 0x0, 0x29, 0x6, 0x6, 0x4, 0x0, @local, @local, 0x700, 0x8000, 0xffffffff, 0x10000}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000400)={'ip6tnl0\x00', &(0x7f0000000240)={'syztnl2\x00', 0x0, 0x4, 0x30, 0x4, 0x2, 0x4, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x31}, 0x1, 0x10, 0x5, 0x7fa}}) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x88, 0x8f}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, 0x0, 0x0, 0x0) r7 = socket(0x40000000015, 0x5, 0x0) ioctl$SIOCGETNODEID(r7, 0x89e1, &(0x7f0000000000)={0x3}) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r8 = memfd_create(&(0x7f0000000040)='rootmode', 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x12, r8, 0x0) r9 = userfaultfd(0x1) ioctl$UFFDIO_API(r9, 0xc018aa3f, &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$UFFDIO_REGISTER(r9, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}, 0x1}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0x4, 0x4, 0x22, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 2.201115995s ago: executing program 0 (id=2555): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xd, &(0x7f0000000700)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x61}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 2.151948743s ago: executing program 2 (id=2556): socket$netlink(0x10, 0x3, 0x0) timer_create(0xfffffffffffffffc, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, r0, 0xaba5c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x0, 0x80) recvmmsg(r3, &(0x7f0000000400)=[{{&(0x7f0000000180)=@l2tp, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/169, 0xa9}, 0x8}], 0x1, 0x2, 0x0) r5 = timerfd_create(0x0, 0x0) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, 0xffffffffffffffff, &(0x7f0000000200)) timerfd_settime(r5, 0x3, &(0x7f0000000440)={{}, {0x77359400}}, 0x0) clock_adjtime(0x0, &(0x7f0000000480)={0xd54, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x40000000000001, 0xb, 0x8000002, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={0x0, 0xd4}}, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x40800, 0x0) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r9, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000000240)=ANY=[@ANYRES64=r8], 0x268}}, 0x0) write$6lowpan_control(r1, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:11 0', 0x1b) write$6lowpan_control(r1, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:10 2', 0x1b) epoll_create1(0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000580)='wake_reaper\x00', r8, 0x0, 0xffffffffffffffff}, 0x18) 2.1158237s ago: executing program 0 (id=2557): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008a}, 0x0) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(0xffffffffffffffff, 0xc01864b0, &(0x7f0000000080)) sched_setscheduler(0x0, 0x1, &(0x7f0000000300)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) listen(0xffffffffffffffff, 0xda90) r1 = socket(0x2b, 0x5, 0x3) setsockopt$sock_linger(r1, 0x1, 0x3c, 0x0, 0x300) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='contention_end\x00'}, 0x18) migrate_pages(0x0, 0x8000, &(0x7f0000000100)=0x200, &(0x7f0000000180)=0x9) 2.115034518s ago: executing program 0 (id=2558): r0 = socket$inet6_udp(0xa, 0x2, 0x0) syz_open_dev$dri(0x0, 0x1ff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2c040, 0x10c) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000180)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) pipe2(0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff, 0x0, 0x0, 0x100000d873}) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={@map=r1, 0xe, 0x0, 0x78, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000100), &(0x7f00000004c0)}, 0x40) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x70}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r5}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x458, 0x0, 0x2b8, 0xb0000010, 0x2, 0x5c8f0200, 0x388, 0x3a8, 0x3a8, 0x388, 0x3a8, 0x3, 0x0, {[{{@ipv6={@private1, @local, [], [], 'vlan1\x00', 'veth0_to_team\x00'}, 0x0, 0x248, 0x290, 0x700, {}, [@common=@inet=@hashlimit3={{0x158}, {'geneve1\x00', {0xf1, 0x0, 0x33, 0x0, 0x0, 0x1, 0x7fffffff}}}, @common=@unspec=@limit={{0x48}, {0x10000000, 0x3}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x206, 'syz1\x00'}}}, {{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@CONNSECMARK={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4b8) 1.570374499s ago: executing program 1 (id=2559): socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup(r0) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000001afc180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x88, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000040)=0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r5 = syz_open_procfs(r2, &(0x7f0000000540)='net/ip_vs\x00') r6 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x0) mmap(&(0x7f000001a000/0x3000)=nil, 0x3000, 0xf, 0x11012, r6, 0x0) ioctl$IOMMU_IOAS_ALLOC(0xffffffffffffffff, 0x3b81, &(0x7f00000004c0)={0xc}) pread64(r5, &(0x7f000001a240)=""/102400, 0x19000, 0x0) r7 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000280)={'syzkaller1\x00', @link_local}) openat$rfkill(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x481, 0x0) ioctl$KVM_CAP_ARM_INJECT_SERROR_ESR(r8, 0x3309, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000340)={'syztnl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x10, 0x5, 0x7eed, {{0x16, 0x4, 0x0, 0x4, 0x58, 0x65, 0x0, 0x1, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010100, {[@ra={0x94, 0x4}, @rr={0x7, 0xf, 0xb8, [@empty, @empty, @private=0xa010101]}, @rr={0x7, 0x1f, 0x4a, [@empty, @loopback, @multicast2, @broadcast, @loopback, @dev={0xac, 0x14, 0x14, 0x3e}, @multicast1]}, @timestamp_prespec={0x44, 0x4, 0xc8, 0x3, 0x4}, @timestamp_prespec={0x44, 0xc, 0x65, 0x3, 0xa, [{@rand_addr=0x64010102, 0xc}]}]}}}}}) 1.569762264s ago: executing program 4 (id=2560): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x19, 0x7, &(0x7f0000000540)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) r4 = userfaultfd(0x80001) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000140)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) ioctl$UFFDIO_COPY(r4, 0x8010aa02, &(0x7f0000000040)={&(0x7f000071c000/0x1000)=nil, &(0x7f0000757000/0x1000)=nil, 0x1000}) 1.402110498s ago: executing program 1 (id=2561): socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup(r0) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000001afc180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x88, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000040)=0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r5 = syz_open_procfs(r2, &(0x7f0000000540)='net/ip_vs\x00') r6 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x0) mmap(&(0x7f000001a000/0x3000)=nil, 0x3000, 0xf, 0x11012, r6, 0x0) ioctl$IOMMU_IOAS_ALLOC(0xffffffffffffffff, 0x3b81, &(0x7f00000004c0)={0xc}) pread64(r5, &(0x7f000001a240)=""/102400, 0x19000, 0x0) r7 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000280)={'syzkaller1\x00', @link_local}) openat$rfkill(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x481, 0x0) ioctl$KVM_CAP_ARM_INJECT_SERROR_ESR(r8, 0x3309, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000340)={'syztnl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x10, 0x5, 0x7eed, {{0x16, 0x4, 0x0, 0x4, 0x58, 0x65, 0x0, 0x1, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010100, {[@ra={0x94, 0x4}, @rr={0x7, 0xf, 0xb8, [@empty, @empty, @private=0xa010101]}, @rr={0x7, 0x1f, 0x4a, [@empty, @loopback, @multicast2, @broadcast, @loopback, @dev={0xac, 0x14, 0x14, 0x3e}, @multicast1]}, @timestamp_prespec={0x44, 0x4, 0xc8, 0x3, 0x4}, @timestamp_prespec={0x44, 0xc, 0x65, 0x3, 0xa, [{@rand_addr=0x64010102, 0xc}]}]}}}}}) 1.343408914s ago: executing program 1 (id=2562): openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x21, 0x2, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_open_procfs(0x0, &(0x7f0000000480)='attr/prev\x00') r3 = syz_open_dev$dri(0x0, 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r3, 0x4010640d, &(0x7f0000000000)={0x3, 0x2}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r3, 0xc01064b5, &(0x7f0000000140)={&(0x7f0000000100)=[0x0], 0x1}) ioctl$DRM_IOCTL_MODE_ATOMIC(0xffffffffffffffff, 0xc03864bc, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000200)=[0x0], 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_ATOMIC(r3, 0xc03864bc, &(0x7f0000000180)={0x1, 0x1, &(0x7f00000000c0)=[r4], &(0x7f0000000180), &(0x7f0000000200), &(0x7f0000000040)}) r5 = syz_open_procfs(r0, &(0x7f00000000c0)='net/protocols\x00') sendmsg$key(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f0000000040), 0x3, 0x2000) lseek(r5, 0x200000002, 0x0) sendmsg$inet(r1, 0x0, 0x0) syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000df2bfd404b0c0001cad7010203010902240001000000000904450002c9"], 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[], 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000081) 1.25468123s ago: executing program 3 (id=2563): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000838500000071000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)={0x2c, 0x0, 0xb, 0x801, 0x0, 0x0, {0x7}, [@NFTA_COMPAT_REV={0x8}, @NFTA_COMPAT_NAME={0x8, 0x1, 'bpf\x00'}, @NFTA_COMPAT_TYPE={0x8}]}, 0x2c}, 0x1, 0xfff5}, 0x0) 1.194366708s ago: executing program 3 (id=2564): socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="a0000000210001000000000000000000fc0100000000000a00000000000000007f00000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000005000110000000000000000000000000000000000fe8000000000000000000000000000bbfe8800000000000000000000000000010000000006000000000000000000000000000000000000000a"], 0xa0}}, 0x0) 1.00014391s ago: executing program 3 (id=2565): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$inet6(0xa, 0x802, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002940)=[{{0x0, 0x57, 0x0}}], 0x62, 0xf5) (fail_nth: 12) bind$can_j1939(0xffffffffffffffff, &(0x7f00000001c0)={0x1d, 0x0, 0x3, {0x0, 0x1, 0x3}}, 0x18) 486.573229ms ago: executing program 3 (id=2566): socket$packet(0x11, 0x3, 0x300) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() kcmp(0x0, 0x0, 0x300, 0xffffffffffffffff, 0xffffffffffffffff) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000007f80)=[{{&(0x7f0000000380)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000600)=""/131, 0x83}, {&(0x7f00000006c0)=""/195, 0xc3}, {&(0x7f0000000840)=""/216, 0xd8}, {&(0x7f0000000940)=""/154, 0x9a}, {&(0x7f0000000a00)=""/227, 0xe3}, {&(0x7f0000000b00)=""/4096, 0x1000}, {&(0x7f0000001b00)=""/4096, 0x1000}, {&(0x7f0000002b00)=""/4096, 0x1000}], 0x8}, 0x81}, {{0x0, 0x0, &(0x7f0000004d40)=[{&(0x7f0000003b00)=""/4096, 0x1000}, {&(0x7f0000007f40)=""/23, 0x17}, {&(0x7f0000004b00)=""/134, 0x86}, {&(0x7f0000004bc0)=""/73, 0x49}, {&(0x7f0000004c40)=""/112, 0x70}, {&(0x7f0000004cc0)=""/83, 0x53}], 0x6, &(0x7f0000004dc0)=""/103, 0x67}, 0x1}, {{&(0x7f0000004e40)=@l2={0x1f, 0x0, @none}, 0x80, &(0x7f0000000280)=[{&(0x7f0000004ec0)=""/198, 0xc6}], 0x1, &(0x7f0000004fc0)=""/163, 0xa3}, 0xc}, {{&(0x7f0000005080)=@qipcrtr, 0x80, &(0x7f0000005340)=[{&(0x7f00000007c0)=""/8, 0x8}, {&(0x7f0000005100)=""/93, 0x5d}, {&(0x7f0000005180)=""/229, 0xe5}, {&(0x7f0000005280)=""/70, 0x46}, {&(0x7f0000005300)=""/54, 0x36}], 0x5, &(0x7f00000053c0)=""/197, 0xc5}, 0x2}, {{0x0, 0x0, &(0x7f0000005700)=[{&(0x7f00000054c0)=""/240, 0xf0}, {&(0x7f00000055c0)=""/231, 0xe7}, {&(0x7f00000056c0)}], 0x3, &(0x7f0000005740)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000006740)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000007880)=[{&(0x7f00000067c0)=""/4096, 0x1000}, {&(0x7f00000077c0)=""/35, 0x23}, {&(0x7f0000007800)=""/107, 0x6b}], 0x3, &(0x7f00000078c0)}, 0x8}], 0x6, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = semget$private(0x0, 0x4000000009, 0x0) semop(r2, &(0x7f0000000900)=[{0x0, 0xfffb}, {0x2, 0x7f, 0x1800}], 0x2) semop(r2, &(0x7f0000001400)=[{0x0, 0x200}], 0x1) 50.620715ms ago: executing program 1 (id=2567): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x503, 0xffe4, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x44402}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x10, 0x2, 0x0, 0x1, [@IFLA_MACSEC_SCI={0xc, 0x1, 0x10000}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x48}}, 0x0) 0s ago: executing program 1 (id=2568): r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000000)={'broute\x00'}, &(0x7f0000000080)=0x20000078) gettid() openat$binfmt(0xffffffffffffff9c, 0x0, 0x41, 0x1ff) timer_create(0x0, 0x0, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r2, 0x29, 0x1a, &(0x7f0000000100)=0x401, 0x4) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x3f, 0x28, 0x0, 0x0, 0x4, 0x6, 0x0, @remote={0xac, 0x3}, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x82}}}}}}, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x10) r3 = socket$kcm(0x10, 0x2, 0x0) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000040)={0x20, 0x1405, 0x1, 0x70bd2d, 0x25dfdbfc, "", [{{0x4}, {0x8, 0x3, 0x4}}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x94) sendmsg$inet(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000000)="5c00000015006b05c84e21000ab16d6e230675f802000000440002005817d30461bc24eeb556a705251e6182149a36c23d3b48dfd8cdbf9367b098fa51f60a64c9f408000000e786a6d0bdd70000b6c0504bb9189d9193e9bd1c1b78", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) kernel console output (not intermixed with test programs): m_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 551.467034][ T9] usb 5-1: new high-speed USB device number 54 using dummy_hcd [ 551.484198][T13223] mac80211_hwsim hwsim10 syzkaller0: entered allmulticast mode [ 551.510109][ T5881] usb 2-1: USB disconnect, device number 63 [ 551.703055][ T9] usb 5-1: Using ep0 maxpacket: 32 [ 551.709726][ T9] usb 5-1: config 160 has an invalid interface number: 26 but max is 0 [ 551.718363][ T9] usb 5-1: config 160 has no interface number 0 [ 551.725212][ T9] usb 5-1: config 160 interface 26 has no altsetting 0 [ 551.810707][T13269] netlink: 256 bytes leftover after parsing attributes in process `syz.0.1684'. [ 552.288936][ T9] usb 5-1: New USB device found, idVendor=0a12, idProduct=5d10, bcdDevice=86.b4 [ 552.299274][ T9] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 552.307792][ T9] usb 5-1: Product: syz [ 552.312071][ T9] usb 5-1: Manufacturer: syz [ 552.316855][ T9] usb 5-1: SerialNumber: syz [ 554.010327][ T9] ushc 5-1:160.26: probe with driver ushc failed with error -71 [ 554.081401][ T9] usb 5-1: USB disconnect, device number 54 [ 554.264763][T13310] mac80211_hwsim hwsim10 : renamed from wlan1 (while UP) [ 554.946379][T13315] bridge1: entered allmulticast mode [ 556.163082][T13336] workqueue: Failed to create a rescuer kthread for wq "ceph-watch-notify": -EINTR [ 557.135346][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 557.135363][ T29] audit: type=1400 audit(1732467581.155:2149): avc: denied { sys_chroot } for pid=13365 comm="dhcpcd" capability=18 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 557.230649][T13373] netlink: 'syz.2.1699': attribute type 9 has an invalid length. [ 557.244506][ T29] audit: type=1400 audit(1732467581.155:2150): avc: denied { setgid } for pid=13365 comm="dhcpcd" capability=6 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 557.271369][ T29] audit: type=1400 audit(1732467581.165:2151): avc: denied { setrlimit } for pid=13365 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=process permissive=1 [ 557.362706][T13377] netlink: 16 bytes leftover after parsing attributes in process `syz.1.1704'. [ 557.397131][T13377] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1704'. [ 557.455274][T13377] IPv6: sit1: Disabled Multicast RS [ 557.477514][T13377] sit1: entered allmulticast mode [ 557.865452][ T29] audit: type=1404 audit(1732467581.905:2152): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 557.890455][ T29] audit: type=1400 audit(1732467581.905:2153): avc: denied { search } for pid=13398 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 557.912418][ T29] audit: type=1400 audit(1732467581.935:2154): avc: denied { read } for pid=13397 comm="syz.4.1707" dev="nsfs" ino=4026532806 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 557.938671][ T29] audit: type=1400 audit(1732467581.935:2155): avc: denied { create } for pid=13397 comm="syz.4.1707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 557.959030][ T29] audit: type=1400 audit(1732467581.985:2156): avc: denied { search } for pid=13405 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 557.981625][ T29] audit: type=1400 audit(1732467582.015:2157): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 558.003982][ T29] audit: type=1400 audit(1732467582.015:2158): avc: denied { search } for pid=13406 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 Nov 24 16:59:42 syzkaller kern.notice kernel: [ 557.938671][ T29] audit: type=1400 audit(1732467581.935:2155): avc: denied { create } for pid=13397 comm="syz.4.1707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive= Nov 24 16:59:42 syzkaller kern.notice kernel: [ 557.959030][ T29] audit: type=1400 audit(1732467581.985:2156): avc: denied { search } for pid=13405 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t Nov 24 16:59:42 syzkaller kern.notice kernel: [ 557.981625][ T29] audit: type=1400 audit(1732467582.015:2157): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 16:59:42 syzkaller kern.notice kernel: [ 558.003982][ T29] audit: type=1400 audit(1732467582.015:2158): avc: denied { search } for pid=13406 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t Nov 24 16:59:42 syzkaller daemon.info dhcpcd[5501]: lapb14: carrier acquired Nov 24 16:59:42 syzkaller daemon.info dhcpcd[5501]: lapb14: IAID 00:00:00:88 Nov 24 16:59:42 syzkaller daemon.info dhcpcd[5501]: lapb14: adding address fe80::f1ae:3e42:ec4e:cf61 Nov 24 16:59:42 syzkaller daemon.err dhcpcd[5501]: ipv6_addaddr1: Invalid argument Nov 24 16:59:42 syzkaller daemon.info dhcpcd[5501]: lapb14: soliciting a DHCP lease Nov 24 16:59:42 syzkaller daemon.err dhcpcd[13422]: ps_bpf_start_bpf: bpf_open: Invalid argument Nov 24 16:59:42 syzkaller daemon.err dhcpcd[13422]: ps_root_recvmsg: Invalid argument [ 558.838217][T13433] xt_cgroup: invalid path, errno=-2 Nov 24 16:59:42 syzkaller kern.info kernel: [ 558.838217][T13433] xt_cgroup: invalid path, errno=-2 Nov 24 16:59:43 syzkaller daemon.info dhcpcd[5501]: lapb14: soliciting an IPv6 router [ 559.717325][T13458] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13458 comm=syz.3.1727 Nov 24 16:59:43 syzkaller kern.w[ 559.735713][T13458] kernel profiling enabled (shift: 17) arn kernel: [ 559.717325][T13458] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13458 comm=syz.3.1727 Nov 24 16:59:43 syzkaller kern.info kernel: [ 559.735713][T13458] kernel profiling enabled (shift: 17) Nov 24 16:59:43 syzkaller daemon.err dhcpcd[5501]: ps_sendpsmmsg: Connection refused Nov 24 16:59:43 syzkaller daemon.err dhcpcd[5501]: ps_root_recvmsgcb: failed to send message to pid 12438: Connection refused [ 560.047712][ T5878] libceph: connect (1)[c::]:6789 error -101 [ 560.063124][ T5878] libceph: mon0 (1)[c::]:6789 connect error Nov 24 16:59:44 syzkaller kern.err kernel: [ 560.047712][ T5878] libceph: connect (1)[c::]:6789 error -101 Nov 24 16:59:44 syzkaller kern.warn kernel: [ 560.063124][ T5878] libceph: mon0 (1)[c::]:6789 connect error [ 560.335763][ T5881] libceph: connect (1)[c::]:6789 error -101 [ 560.342052][ T5881] libceph: mon0 (1)[c::]:6789 connect error Nov 24 16:59:44 syzkaller kern.err kernel: [ 560.335763][ T5881] libceph: connect (1)[c::]:6789 error -101 Nov 24 16:59:44 syzkaller kern.warn kernel: [ 560.342052][ T5881] libceph: mon0 (1)[c::]:6789 connect error [ 560.800280][T13461] ceph: No mds server is up or the cluster is laggy Nov 24 16:59:44 syzkaller kern.info kernel: [ 560.800280][T13461] ceph: No mds server is up or the cluster is laggy [ 561.107932][T13491] Cannot find del_set index 2 as target Nov 24 16:59:45 syzkaller kern.info kernel: [ 561.107932][T13491] Cannot find del_set index 2 as target Nov 24 16:59:46 syzkaller daemon.err dhcpcd[5501]: ps_sendpsmmsg: Connection refused Nov 24 16:59:46 syzkaller daemon.err dhcpcd[5501]: ps_root_recvmsgcb: failed to send message to pid 13422: Connection refused [ 562.143755][ T29] kauditd_printk_skb: 355 callbacks suppressed [ 562.143771][ T29] audit: type=1400 audit(1732467586.195:2514): avc: denied { map_create } for pid=13544 comm="syz.3.1760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 562.145147][T13547] FAULT_INJECTION: forcing a failure. [ 562.145147][T13547] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 562.153599][ T29] audit: type=1400 audit(1732467586.195:2515): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 5[ 562.209201][T13547] CPU: 0 UID: 0 PID: 13547 Comm: syz.4.1761 Not tainted 6.12.0-syzkaller-09073-g9f16d5e6f220 #0 62.143755][ T2[ 562.220361][T13547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 9] kauditd_print[ 562.226279][ T29] audit: type=1400 audit(1732467586.255:2516): avc: denied { execmem } for pid=13544 comm="syz.3.1760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 562.231761][T13547] Call Trace: [ 562.231770][T13547] k_skb: 355 callb[ 562.231777][T13547] dump_stack_lvl+0x16c/0x1f0 acks suppressed[ 562.231805][T13547] should_fail_ex+0x497/0x5b0 [ 562.231832][T13547] _copy_from_user+0x2e/0xd0 Nov 24 16:59:46[ 562.231852][T13547] copy_msghdr_from_user+0x99/0x160 [ 562.231871][T13547] ? __pfx_copy_msghdr_from_user+0x10/0x10 syzkaller kern.[ 562.287550][T13547] ? __lock_acquire+0xcc5/0x3c40 notice kernel: [[ 562.293820][T13547] ? hlock_class+0x4e/0x130 562.143771][ [ 562.299673][T13547] ? __lock_acquire+0x15a9/0x3c40 T29] audit: typ[ 562.306074][T13547] ___sys_sendmsg+0xff/0x1e0 e=1400 audit(173[ 562.312031][T13547] ? __pfx____sys_sendmsg+0x10/0x10 2467586.195:2514[ 562.318583][T13547] ? __pfx___lock_acquire+0x10/0x10 ): avc: denied [ 562.325154][T13547] ? __pfx___might_resched+0x10/0x10 { map_create } [ 562.331780][T13547] ? __might_fault+0xe3/0x190 for pid=13544 c[ 562.337816][T13547] __sys_sendmmsg+0x201/0x420 omm="syz.3.1760"[ 562.343866][T13547] ? __pfx___sys_sendmmsg+0x10/0x10 scontext=root:s[ 562.350422][T13547] ? __pfx___mutex_unlock_slowpath+0x10/0x10 ysadm_r:sysadm_t[ 562.357756][T13547] ? fput+0x67/0x440 tcontext=root:s[ 562.363005][T13547] ? ksys_write+0x1ba/0x250 ysadm_r:sysadm_t[ 562.368866][T13547] ? __pfx_ksys_write+0x10/0x10 tclass=bpf perm[ 562.375079][T13547] __x64_sys_sendmmsg+0x9c/0x100 issive=0 Nov 24[ 562.381372][T13547] ? lockdep_hardirqs_on+0x7c/0x110 16:59:46 syzkal[ 562.387935][T13547] do_syscall_64+0xcd/0x250 ler kern.notice [ 562.393814][T13547] entry_SYSCALL_64_after_hwframe+0x77/0x7f kernel: [ 562.1[ 562.401059][T13547] RIP: 0033:0x7fa9f397e819 45147][T13547] F[ 562.406850][T13547] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 AULT_INJECTION: [ 562.427909][T13547] RSP: 002b:00007fa9f471f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 forcing a failur[ 562.437678][T13547] RAX: ffffffffffffffda RBX: 00007fa9f3b35fa0 RCX: 00007fa9f397e819 e. Nov 24 16:59[ 562.447011][T13547] RDX: 0000000000000062 RSI: 0000000020002940 RDI: 0000000000000003 :46 syzkaller ke[ 562.456348][T13547] RBP: 00007fa9f471f090 R08: 0000000000000000 R09: 0000000000000000 rn.notice kernel[ 562.465769][T13547] R10: 00000000000000f5 R11: 0000000000000246 R12: 0000000000000001 : [ 562.145147][ 562.475104][T13547] R13: 0000000000000000 R14: 00007fa9f3b35fa0 R15: 00007ffdf5bd31c8 [T13547] name fa[ 562.484448][T13547] il_usercopy, interval 1, probabi[ 562.491439][T13549] CIFS: Unable to determine destination address lity 0, space 0, times 0 Nov 24 16:59:46 syzkaller kern.notice kernel: [ 562.153599][ T29] audit: type=1400 audit(1732467586.195:2515): avc:[ 562.510089][ T29] audit: type=1400 audit(1732467586.255:2517): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 562.532398][ T29] audit: type=1400 audit(1732467586.255:2518): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 562.532434][ T29] audit: type=1400 audit(1732467586.255:2519): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 562.532464][ T29] audit: type=1400 audit(1732467586.255:2520): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 562.532496][ T29] audit: type=1400 audit(1732467586.555:2521): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 562.532527][ T29] audit: type=1400 audit(1732467586.555:2522): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 562.532555][ T29] audit: type=1400 audit(1732467586.555:2523): avc: denied { read } for pid=13544 comm="syz.3.1760" dev="nsfs" ino=4026533362 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 562.638973][ T1289] ieee802154 phy0 wpan0: encryption failed: -22 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.209201][T13547] CPU: 0 UID: 0 PID: 13547 Comm: syz.4.1761 Not tainted 6.12.0-syzkaller-09073-g9f16d5e6f220 #0 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.220361][T13547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Nov 24 16:59:46 syzkaller kern.notice kernel: [ 562.226279][ T29] audit: type=1400 audit(1732467586.255:2516): avc: denied { execmem } for pid=13544 comm="syz.3.1760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.231761][T13547] Call Trace: Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.231770][T13547] Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.231777][T13547] dump_stack_lvl+0x16c/0x1f0 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.231805][T13547] should_fail_ex+0x497/0x5b0 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.231832][T13547] _copy_from_user+0x2e/0xd0 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.231852][T13547] copy_msghdr_from_user+0x99/0x160 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.231871][T13547] ? __pfx_copy_msghdr_from_user+0x10/0x10 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.287550][T13547] ? __lock_acquire+0xcc5/0x3c40 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.293820][T13547] ? hlock_class+0x4e/0x130 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.299673][T13547] ? __lock_acquire+0x15a9/0x3c40 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.306074][T13547] ___sys_sendmsg+0xff/0x1e0 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.312031][T13547] ? __pfx____sys_sendmsg+0x10/0x10 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.318583][T13547] ? __pfx___lock_acquire+0x10/0x10 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.325154][T13547] ? __pfx___might_resched+0x10/0x10 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.331780][T13547] ? __might_fault+0xe3/0x190 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.337816][T13547] __sys_sendmmsg+0x201/0x420 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.343866][T13547] ? __pfx___sys_sendmmsg+0x10/0x10 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.350422][T13547] ? __pfx___mutex_unlock_slowpath+0x10/0x10 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.357756][T13547] ? fput+0x67/0x440 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.363005][T13547] ? ksys_write+0x1ba/0x250 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.368866][T13547] ? __pfx_ksys_write+0x10/0x10 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.375079][T13547] __x64_sys_sendmmsg+0x9c/0x100 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.381372][T13547] ? lockdep_hardirqs_on+0x7c/0x110 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.387935][T13547] do_syscall_64+0xcd/0x250 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.393814][T13547] entry_SYSCALL_64_after_hwframe+0x77/0x7f Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.401059][T13547] RIP: 0033:0x7fa9f397e819 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.406850][T13547] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.427909][T13547] RSP: 002b:00007fa9f471f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.437678][T13547] RAX: ffffffffffffffda RBX: 00007fa9f3b35fa0 RCX: 00007fa9f397e819 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.447011][T13547] RDX: 0000000000000062 RSI: 0000000020002940 RDI: 0000000000000003 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.456348][T13547] RBP: 00007fa9f471f090 R08: 0000000000000000 R09: 0000000000000000 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.465769][T13547] R10: 00000000000000f5 R11: 0000000000000246 R12: 0000000000000001 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.475104][T13547] R13: 0000000000000000 R14: 00007fa9f3b35fa0 R15: 00007ffdf5bd31c8 Nov 24 16:59:46 syzkaller kern.warn kernel: [ 562.484448][T13547] Nov 24 16:59:46 syzkaller kern.erNov 24 16:59:46 Nov 24 16:59:47 syzkaller daemon.info dhcpcd[5501]: lapb14: probing for an IPv4LL address Nov 24 16:59:47 syzkaller daemon.err dhcpcd[13570]: ps_bpf_start_bpf: bpf_open: Invalid argument Nov 24 16:59:47 syzkaller daemon.err dhcpcd[13570]: ps_root_recvmsg: Invalid argument [ 563.583205][ T53] Bluetooth: hci4: command 0x0405 tx timeout Nov 24 16:59:47 syzkaller kern.err kernel: [ 563.583205][ T53] Bluetooth: hci4: command 0x0405 tx timeout Nov 24 16:59:48 syzkaller daemon.err dhcpcd[5501]: ps_sendpsmmsg: Connection refused Nov 24 16:59:48 syzkaller daemon.err dhcpcd[5501]: ps_root_recvmsgcb: failed to send message to pid 13570: Connection refused [ 566.024234][T13636] pim6reg1: entered allmulticast mode Nov 24 16:59:50 syzkaller kern.info kernel: [ 566.024234][T13636] pim6reg1: entered allmulticast mode Nov 24 16:59:50 syzkaller daemon.err dhcpcd[5501]: ps_root_recvmsg: Invalid argument Nov 24 16:59:51 syzkaller daemon.err dhcpcd[5501]: ps_sendpsmmsg: Connection refused Nov 24 16:59:51 syzkaller daemon.err dhcpcd[5501]: ps_root_recvmsgcb: failed to send message to pid 13252: Connection refused [ 567.168002][ T29] kauditd_printk_skb: 275 callbacks suppressed [ 567.168017][ T29] audit: type=1400 audit(1732467591.215:2799): avc: denied { create } for pid=13655 comm="syz.3.1799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 Nov 24 16:59:51 syzkaller kern.warn kernel: [ 567.168002][ T29] kauditd_printk_skb: 275 callbacks suppressed Nov 24 16:59:51 syzkaller kern.notice kernel: [ 567.168017][ [ 567.216841][T13657] netlink: 'syz.4.1798': attribute type 29 has an invalid length. T29] audit: typ[ 567.225745][ T29] audit: type=1400 audit(1732467591.255:2800): avc: denied { execmem } for pid=13655 comm="syz.3.1799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 e=1400 audit(1732467591.215:2799): avc: denied { create } for pid=13655 comm="syz.3.1799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis Nov 24 16:5[ 567.263659][ T29] audit: type=1400 audit(1732467591.255:2801): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 567.285505][T13658] netlink: 'syz.3.1799': attribute type 29 has an invalid length. 9:51 syzkaller kern.warn kernel: [ 567.216841][T13657] netlink: 'syz.4.1798': attribute type 29 has an invalid [ 567.303605][ T29] audit: type=1400 audit(1732467591.255:2802): avc: denied { write } for pid=13655 comm="syz.3.1799" name="xfrm_stat" dev="proc" ino=4026533381 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 length. Nov 24 16:59:51 syzkaller kern.notice kernel: [ 567.225745][ T29] audit: type=1400 audit(1732467591.255:2800): avc: denied { execmem } for pid=13655 comm="syz.3.1799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Nov 24 16:59:51 syzkaller ker[ 567.353058][ T29] audit: type=1400 audit(1732467591.255:2803): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 n.notice kernel: [ 567.263659][ T29] audit: type=1400 audit(1732467591.255:2801): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 16[ 567.397379][ T29] audit: type=1400 audit(1732467591.265:2804): avc: denied { create } for pid=13653 comm="syz.4.1798" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 :59:51 syzkaller kern.warn kernel: [ 567.285505][T13658] netlink: 'syz.3.1799':[ 567.423821][ T29] audit: type=1400 audit(1732467591.295:2805): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 attribute type 29 has an invalid length. Nov 24 16:59:51 syzkaller kern.notice[ 567.453804][ T29] audit: type=1400 audit(1732467591.295:2806): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 kernel: [ 567.[ 567.476807][ T29] audit: type=1400 audit(1732467591.335:2807): avc: denied { create } for pid=13655 comm="syz.3.1799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 303605][ T29] audit: type=1400 audit(1732467591.255:2802): avc: denied { write } for pid=13655 comm="syz.3.1799" name="xfrm_stat" dev="proc[ 567.509516][ T29] audit: type=1400 audit(1732467591.335:2808): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 " ino=4026533381 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:p Nov 24 16:59:51 syzkaller kern.notice kernel: [ 567.353058][ T29] audit: type=1400 audit(1732467591.255:2803): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 16:59:51 syzkaller kern.notice kernel: [ 567.397379][ T29] audit: type=1400 audit(1732467591.265:2804): avc: denied { create } for pid=13653 comm="syz.4.1798" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissi Nov 24 16:59:51 syzkaller kern.notice kernel: [ 567.423821][ T29] audit: type=1400 audit(1732467591.295:2805): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 16:59:51 syzkaller kern.notice kernel: [ 567.453804][ T29] audit: type=1400 audit(1732467591.295:2806): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 16:59:51 syzkaller kern.notice kernel: [ 567.476807][ T29] audit: type=1400 audit(1732467591.335:2807): avc: denied { create } for pid=13655 comm="syz.3.1799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissi Nov 24 16:59:51 syzkaller kern.notice kernel: [ 567.509516][ T29] audit: type=1400 audit(1732467591.335:2808): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 16:59:52 syzkaller daemon.info dhcpcd[5501]: lapb14: using IPv4LL address 169.254.214.236 Nov 24 16:59:52 syzkaller daemon.info dhcpcd[5501]: lapb14: adding route to 169.254.0.0/16 Nov 24 16:59:52 syzkaller daemon.err dhcpcd[5501]: ps_root_recvmsg: Invalid argument [ 568.246728][T13680] trusted_key: encrypted_key: insufficient parameters specified Nov 24 16:59:52 syzkaller kern.err kernel: [ 568.246728][T13680] trusted_key: encrypted_key: insufficient parameters specified [ 568.896952][T13706] netlink: 'syz.1.1815': attribute type 29 has an invalid length. Nov 24 16:59:52 syzkaller kern.warn kernel: [ 568.896952][T13706] netlink: 'syz.1.1815': attribute type 29 has an invalid length. [ 569.973805][T13744] xt_NFQUEUE: number of total queues is 0 Nov 24 16:59:54 syzkaller kern.info kernel: [ 569.973805][T13744] xt_NFQUEUE: number of total queues is 0 Nov 24 16:59:54 syzkaller daemon.err dhcpcd[13750]: ps_bpf_start_bpf: bpf_open: Invalid argument Nov 24 16:59:54 syzkaller daemon.err dhcpcd[13750]: ps_root_recvmsg: Invalid argument [ 570.087154][T13751] netlink: 'syz.3.1833': attribute type 29 has an invalid length. Nov 24 16:59:54 syzkaller kern.warn kernel: [ 570.087154][T13751] netlink: 'syz.3.1833': attribute type 29 has an invalid length. Nov 24 16:59:54 syzkaller daemon.err dhcpcd[5501]: ps_root_recvmsg: Invalid argument [ 571.834713][T13803] netlink: 'syz.0.1852': attribute type 29 has an invalid length. Nov 24 16:59:55 syzkaller kern.warn kernel: [ 571.834713][T13803] netlink: 'syz.0.1852': attribute type 29 has an invalid length. [ 571.893477][ T53] Bluetooth: hci4: command 0x0405 tx timeout Nov 24 16:59:55 syzkaller kern.err kernel: [ 571.893477][ T53] Bluetooth: hci4: command 0x0405 tx timeout [ 572.189791][ T29] kauditd_printk_skb: 458 callbacks suppressed [ 572.189807][ T29] audit: type=1400 audit(1732467596.235:3267): avc: denied { create } for pid=13815 comm="syz.1.1856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 572.221161][ T29] audit: type=1400 audit(1732467596.275:3268): avc: denied { create } for pid=13815 comm="syz.1.1856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=0 [ 572.243451][ T29] audit: type=1400 audit(1732467596.295:3269): avc: denied { read } for pid=13811 comm="syz.4.1854" name="iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 572.266676][ T29] audit: type=1400 audit(1732467596.325:3270): avc: denied { read } for pid=13811 comm="syz.4.1854" name="iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 Nov 24 16:59:56 syzkaller kern.warn kernel: [ 572.189791][ T29] kauditd_printk_skb: 458 callbacks suppressed Nov 24 16:59:56 syzkaller kern.notice kernel: [ 572.189807][ T29] audit: type=1400 audit(1732467596.235:3267): avc: denied { create } for [ 572.325505][ T29] audit: type=1400 audit(1732467596.325:3271): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 pid=13815 comm="syz.1.1856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 Nov 24 16:59:56 syzkaller kern.notice kernel: [ 572.221161][ T29] audit: type=1400 audit(1732467596.275:3268): avc: denied { create } for pid=13815 comm="syz.1.1856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass[ 572.379008][ T29] audit: type=1400 audit(1732467596.355:3272): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 =netlink_tcpdiag_socket permissi Nov 24 16:59:56 syzkaller kern.notice kernel: [ 572.243451][ T29] audit: type=1400 audit(1732467596.295:3269): avc: denied { read } for pid=13811 comm="syz.4.1854" name="iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t Nov 24 16:59:56 syzkaller kern.notice kernel: [ 572.266676][ T29] audit: type=1400 audit(1732467596.325:3270): avc: denied { read } for pid=13811 comm="syz.4.1854" name="iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t Nov 24 16:59:56 syzkaller kern.notice kernel: [ 572.325505][ T29] a[ 572.457784][ T29] audit: type=1400 audit(1732467596.355:3273): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 udit: type=1400 audit(1732467596.325:3271): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 16:59:56 syzkaller kern.notice kernel: [ 572.379008][ T29] audit: type=1400 audit(1732467596.355:3272): avc: denied { [ 572.509504][ T29] audit: type=1400 audit(1732467596.355:3274): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 16:59:56 syzkaller kern.notice kernel: [ 572.457784][ T29] audit: type=1400 audit(1732467596.355:3273): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tcl[ 572.567599][ T29] audit: type=1400 audit(1732467596.355:3275): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ass= Nov 24 16:59:56 syzkaller kern.notice kernel: [ 572.509504][ T29] audit: type=1400 audit(1732467596.355:3274): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 16:59:56 syzkaller kern.notice kernel: [ 572.567599][ T29] audit: type=1400 audit(1732467596.355:3275): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 572.650548][ T29] audit: type=1400 audit(1732467596.405:3276): avc: denied { prog_load } for pid=13815 comm="syz.1.1856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Nov 24 16:59:56 syzkaller kern.notice kernel: [ 572.650548][ T29] audit: type=1400 audit(1732467596.405:3276): avc: denied { prog_load } for pid=13815 comm="syz.1.1856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 573.518492][T13825] ceph: No mds server is up or the cluster is laggy Nov 24 16:59:57 syzkaller kern.info kernel: [ 573.518492][T13825] ceph: No mds server is up or the cluster is laggy [ 575.543961][T13898] ceph: No mds server is up or the cluster is laggy Nov 24 16:59:59 syzkaller kern.info kernel: [ 575.543961][T13898] ceph: No mds server is up or the cluster is laggy [ 577.221807][ T29] kauditd_printk_skb: 253 callbacks suppressed [ 577.221824][ T29] audit: type=1400 audit(1732467601.265:3530): avc: denied { create } for pid=13955 comm="syz.3.1907" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 Nov 24 17:00:01 syzkaller kern.warn kernel: [ 577.221807][ T29] kauditd_printk_skb: 253 callbacks suppressed Nov 24 17:00:01[ 577.259585][ T29] audit: type=1400 audit(1732467601.305:3531): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.[ 577.281878][ T29] audit: type=1400 audit(1732467601.305:3532): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 notice kernel: [[ 577.305209][ T29] audit: type=1400 audit(1732467601.325:3533): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 577.221824][ T29] audit: type=1400 audit(1732467601.265:3530[ 577.332748][ T29] audit: type=1400 audit(1732467601.355:3534): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ): avc: denied { create } for pid=13955 comm=[ 577.358474][ T29] audit: type=1400 audit(1732467601.375:3535): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 "syz.3.1907" scontext=root:sysad[ 577.383544][ T29] audit: type=1400 audit(1732467601.405:3536): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 m_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tcl[ 577.410436][ T29] audit: type=1400 audit(1732467601.405:3537): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 ass=key_socket permissive=0 Nov 24 17:00:01 syzkaller kern.noti[ 577.439372][ T29] audit: type=1400 audit(1732467601.405:3538): avc: denied { create } for pid=13958 comm="syz.0.1908" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 ce kernel: [ 57[ 577.462543][ T29] audit: type=1400 audit(1732467601.425:3539): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 7.259585][ T29] audit: type=1400 audit(1732467601.305:3531): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 17:00:01 syzkaller kern.notice kernel: [ 577.281878][ T29] audit: type=1400 audit(1732467601.305:3532): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 17:00:01 syzkaller kern.notice kernel: [ 577.305209][ T29] audit: type=1400 audit(1732467601.325:3533): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 17:00:01 syzkaller kern.notice kernel: [ 577.332748][ T29] audit: type=1400 audit(1732467601.355:3534): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 17:00:01 syzkaller kern.notice kernel: [ 577.358474][ T29] audit: type=1400 audit(1732467601.375:3535): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 17:00:01 syzkaller kern.notice kernel: [ 577.383544][ T29] audit: type=1400 audit(1732467601.405:3536): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 17:00:01 syzkaller kern.notice kernel: [ 577.410436][ T29] audit: type=1400 audit(1732467601.405:3537): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 24 17:00:01 syzkaller kern.notice kernel: [ 577.439372][ T29] audit: type=1400 audit(1732467601.405:3538): avc: denied { create } for pid=13958 comm="syz.0.1908" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode Nov 24 17:00:01 syzkaller kern.notice kernel: [ 577.462543][ T29] audit: type=1400 audit(1732467601.425:3539): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 578.784119][T13997] netlink: 'syz.3.1922': attribute type 16 has an invalid length. [ 578.831482][T13998] netlink: 'syz.3.1922': attribute type 16 has an invalid length. [ 578.882896][T13997] netlink: 'syz.3.1922': attribute type 3 has an invalid length. Nov 24 18:08:17 syzkaller kern.warn kernel: [ 578.784119][T13997] netlink: 'syz.3.1922': attribute type 16 has an invalid lengt[ 578.902318][T13998] netlink: 'syz.3.1922': attribute type 3 has an invalid length. h. Nov 24 18:08:17 syzkaller kern.warn kernel: [ 578.831482][T13998] netlink: 'syz.3.1922': attribute type 16 has an invalid length. Nov 24 1[ 578.923092][T13997] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1922'. [ 578.928475][T13998] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1922'. 8:08:17 syzkaller kern.warn kernel: [ 578.882896][T13997] netlink: 'syz.3.1922': attribute type 3 has an invalid length. Nov 24 18:08:17 syzkaller kern.warn kernel: [ 578.902318][T13998] netlink: 'syz.3.1922': attribute type 3 has an invalid length. Nov 24 18:08:18 syzkaller kern.warn kernel: [ 578.923092][T13997] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1922'. Nov 24 18:08:18 syzkaller kern.warn kernel: [ 578.928475][T13998] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1922'. [ 579.048746][T14011] libceph: resolve ' [ 579.048746][T14011] -&fYǝa2i [ 579.048746][T14011] .?&*&' (ret=-3): failed Nov 24 18:08:18 syzkaller kern.info kernel: [ 579.048746][T14011] libceph: resolve ' Nov 24 18:08:18 syzkaller kern.info kernel: [ 579.048746][T14011] -&^FfYǝa^M^Q2i Nov 24 18:08:18 syzkaller kern.info kernel: [ 579.048746][T14011] ^S.?&*&' (ret=-3): failed [ 582.245988][ T29] kauditd_printk_skb: 265 callbacks suppressed [ 582.245998][ T29] audit: type=1400 audit(1732471701.297:3805): avc: denied { create } for pid=14090 comm="syz.2.1957" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=0 Nov 24 18:08:21 syzkaller kern.warn kernel: [ 582.245988][ T29] kauditd_printk_skb: 265 callbacks suppressed Nov 24 18:08:21 syzkaller kern.notice kernel: [ 582.245998][ T29] audit: type=1400 audit(1732471701.297:3805): avc: denied { create } for pid=14090 comm="syz.2.1957" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissi [ 582.368715][ T29] audit: type=1400 audit(1732471701.347:3806): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 24 18:08:21 syzkaller kern.notice kernel: [ 582.368715][ T29] audit: type=1400 audit(1732471701.347:3806): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 582.496835][ T29] audit: type=1400 audit(1732471701.347:3807): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 24 18:08:21 syzkaller kern.notice kernel: [ 582.496835][ [ 582.524701][T14096] netlink: 'syz.1.1959': attribute type 29 has an invalid length. T29] audit: type=1400 audit(1732471701.347:3807): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 582.557096][ T29] audit: type=1400 audit(1732471701.367:3808): avc: denied { read write } for pid=5843 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Nov 24 18:08:21 [ 582.586366][ T29] audit: type=1400 audit(1732471701.407:3809): avc: denied { read write } for pid=5838 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 syzkaller kern.warn kernel: [ 5[ 582.614215][ T29] audit: type=1400 audit(1732471701.447:3810): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 82.524701][T14096] netlink: 'syz.1.1959': attribute type 29 has [ 582.640848][T14101] netlink: 'syz.2.1961': attribute type 29 has an invalid length. an invalid length. Nov 24 18:08[ 582.652015][ T29] audit: type=1400 audit(1732471701.457:3812): avc: denied { prog_load } for pid=14094 comm="syz.1.1959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 :21 syzkaller kern.notice kernel: [ 582.557096][ 582.675168][ T29] audit: type=1400 audit(1732471701.447:3811): avc: denied { execmem } for pid=14092 comm="syz.2.1958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ T29] audit: type=1400 audit(1732471701.367:3[ 582.698573][ T29] audit: type=1400 audit(1732471701.457:3813): avc: denied { create } for pid=14092 comm="syz.2.1958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 808): avc: denied { read write } for pid=5843[ 582.721693][ T29] audit: type=1400 audit(1732471701.467:3814): avc: denied { create } for pid=14094 comm="syz.1.1959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 24 18:08:21 syzkaller kern.notice kernel: [ 582.586366][ T29] audit: type=1400 audit(1732471701.407:3809): avc: denied { read write } for pid=5838 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 24 18:08:21 syzkaller kern.notice kernel: [ 582.614215][ T29] audit: type=1400 audit(1732471701.447:3810): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 18:08:21 syzkaller kern.warn kernel: [ 582.640848][T14101] netlink: 'syz.2.1961': attribute type 29 has an invalid length. Nov 24 18:08:21 syzkaller kern.notice kernel: [ 582.652015][ T29] audit: type=1400 audit(1732471701.457:3812): avc: denied { prog_load } for pid=14094 comm="syz.1.1959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Nov 24 18:08:21 syzkaller kern.notice kernel: [ 582.675168][ T29] audit: type=1400 audit(1732471701.447:3811): avc: denied { execmem } for pid=14092 comm="syz.2.1958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Nov 24 18:08:21 syzkaller kern.notice kernel: [ 582.698573][ T29] audit: type=1400 audit(1732471701.457:3813): avc: denied { create } for pid=14092 comm="syz.2.1958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 Nov 24 18:08:21 syzkaller kern.notice kernel: [ 582.721693][ T29] audit: type=1400 audit(1732471701.467:3814): avc: denied { create } for pid=14094 comm="syz.1.1959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis [ 583.417735][T14112] CIFS: Unable to determine destination address Nov 24 18:08:22 syzkaller kern.err kernel: [ 583.417735][T14112] CIFS: Unable to determine destination address [ 584.588446][T14149] mac80211_hwsim hwsim4 : renamed from wlan1 (while UP) Nov 24 18:08:23 syzkaller kern.info kernel: [ 584.588446][T14149] mac80211_hwsim hwsim4 : renamed from wlan1 (while UP) [ 585.035420][T14171] FAULT_INJECTION: forcing a failure. [ 585.035420][T14171] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 585.050716][T14171] CPU: 0 UID: 0 PID: 14171 Comm: syz.2.1985 Not tainted 6.12.0-syzkaller-09073-g9f16d5e6f220 #0 [ 585.061149][T14171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 585.071187][T14171] Call Trace: [ 585.074448][T14171] [ 585.077365][T14171] dump_stack_lvl+0x16c/0x1f0 [ 585.082038][T14171] should_fail_ex+0x497/0x5b0 [ 585.086702][T14171] _copy_from_user+0x2e/0xd0 [ 585.091277][T14171] kstrtouint_from_user+0xd7/0x1c0 [ 585.096410][T14171] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 585.102124][T14171] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 585.107748][T14171] proc_fail_nth_write+0x84/0x250 [ 585.112764][T14171] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 585.118386][T14171] ? ksys_write+0x12b/0x250 [ 585.122882][T14171] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 585.128519][T14171] vfs_write+0x24c/0x1150 [ 585.132836][T14171] ? __fget_files+0x1fc/0x3a0 [ 585.137500][T14171] ? __pfx___mutex_lock+0x10/0x10 [ 585.142528][T14171] ? __pfx_vfs_write+0x10/0x10 [ 585.147294][T14171] ? __fget_files+0x206/0x3a0 [ 585.151966][T14171] ksys_write+0x12b/0x250 [ 585.156280][T14171] ? __pfx_ksys_write+0x10/0x10 [ 585.161120][T14171] do_syscall_64+0xcd/0x250 [ 585.165623][T14171] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 585.171509][T14171] RIP: 0033:0x7f9bbdd7d2ff [ 585.175920][T14171] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48 [ 585.195515][T14171] RSP: 002b:00007f9bbeb9f030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 585.203926][T14171] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9bbdd7d2ff [ 585.211880][T14171] RDX: 0000000000000001 RSI: 00007f9bbeb9f0a0 RDI: 0000000000000004 [ 585.219834][T14171] RBP: 00007f9bbeb9f090 R08: 0000000000000000 R09: 0000000000000000 [ 585.227793][T14171] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 585.235769][T14171] R13: 0000000000000000 R14: 00007f9bbdf35fa0 R15: 00007ffe948441b8 [ 585.243732][T14171] Nov 24 18:08:24 syzkaller kern.notice kernel: [ 585.035420][T14171] FAULT_INJECTION: forcing a failure. Nov 24 18:08:24 syzkaller kern.notice kernel: [ 585.035420][T14171] name fail_usercopy, interval 1, probability 0, space 0, times 0 Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.050716][T14171] CPU: 0 UID: 0 PID: 14171 Comm: syz.2.1985 Not tainted 6.12.0-syzkaller-09073-g9f16d5e6f220 #0 Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.061149][T14171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.071187][T14171] Call Trace: Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.074448][T14171] Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.077365][T14171] dump_stack_lvl+0x16c/0x1f0 Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.082038][T14171] should_fail_ex+0x497/0x5b0 Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.086702][T14171] _copy_from_user+0x2e/0xd0 Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.091277][T14171] kstrtouint_from_user+0xd7/0x1c0 Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.096410][T14171] ? __pfx_kstrtouint_from_user+0x10/0x10 Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.102124][T14171] ? __pfx_lock_acquire.part.0+0x10/0x10 Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.107748][T14171] proc_fail_nth_write+0x84/0x250 Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.112764][T14171] ? __pfx_proc_fail_nth_write+0x10/0x10 Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.118386][T14171] ? ksys_write+0x12b/0x250 Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.122882][T14171] ? __pfx_proc_fail_nth_write+0x10/0x10 Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.128519][T14171] vfs_write+0x24c/0x1150 Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.132836][T14171] ? __fget_files+0x1fc/0x3a0 Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.137500][T14171] ? __pfx___mutex_lock+0x10/0x10 Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.142528][T14171] ? __pfx_vfs_write+0x10/0x10 Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.147294][T14171] ? __fget_files+0x206/0x3a0 Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.151966][T14171] ksys_write+0x12b/0x250 Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.156280][T14171] ? __pfx_ksys_write+0x10/0x10 Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.161120][T14171] do_syscall_64+0xcd/0x250 Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.165623][T14171] entry_SYSCALL_64_after_hwframe+0x77/0x7f Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.171509][T14171] RIP: 0033:0x7f9bbdd7d2ff Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.175920][T14171] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48 Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.195515][T14171] RSP: 002b:00007f9bbeb9f030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.203926][T14171] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9bbdd7d2ff Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.211880][T14171] RDX: 0000000000000001 RSI: 00007f9bbeb9f0a0 RDI: 0000000000000004 Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.219834][T14171] RBP: 00007f9bbeb9f090 R08: 0000000000000000 R09: 0000000000000000 Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.227793][T14171] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.235769][T14171] R13: 0000000000000000 R14: 00007f9bbdf35fa0 R15: 00007ffe948441b8 Nov 24 18:08:24 syzkaller kern.warn kernel: [ 585.243732][T14171] Nov 24 18:08:25 syzkaller daemon.err dhcpcd[5501]: ps_sendpsmmsg: Connection refused Nov 24 18:08:25 syzkaller daemon.err dhcpcd[5501]: ps_root_recvmsgcb: failed to send message to pid 13750: Connection refused [ 587.319413][ T29] kauditd_printk_skb: 282 callbacks suppressed [ 587.319433][ T29] audit: type=1400 audit(1732471706.367:4097): avc: denied { read write } for pid=5838 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.319413][ T29] kauditd_printk_skb: 282 callbacks suppressed Nov 24 18:08:26 syzkaller kern.notice kernel: [ 587.319433][ T29] audit: type=1400 audit(1732471706.367:4097): avc: denied { read write } for pid=5838 comm="syz-executor[ 587.379066][ T29] audit: type=1400 audit(1732471706.407:4098): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 " name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 24 18:08:26 syzkaller kern.notice kernel: [ 587.379066][ T29] audit: type[ 587.417862][ T29] audit: type=1400 audit(1732471706.407:4099): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 =1400 audit(1732471706.407:4098): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 18:08:26 syzkaller kern.notice kernel: [ 587.417862][ T29] audit: type=1400 audit(1732471706.407:4099): avc: denied { read } for pid=5189 comm=[ 587.471189][ T29] audit: type=1400 audit(1732471706.427:4100): avc: denied { prog_load } for pid=14244 comm="syz.1.2011" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 "syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 18:08:26 syzkaller kern.notice kernel: [ 587.471189][ T29] audit: type=1400 audit(1732471706.4[ 587.510115][ T29] audit: type=1400 audit(1732471706.457:4101): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 27:4100): avc: [ 587.533551][ T29] audit: type=1400 audit(1732471706.467:4102): avc: denied { read write } for pid=5839 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 denied { prog_load } for pid=14244 comm="syz.1.2011" scontext=root:sysadm_r:sy[ 587.564531][T14254] FAULT_INJECTION: forcing a failure. [ 587.564531][T14254] name fail_usercopy, interval 1, probability 0, space 0, times 0 sadm_t tcontext=[ 587.578629][ T29] audit: type=1400 audit(1732471706.467:4103): avc: denied { create } for pid=14247 comm="syz.3.2012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 root:sysadm_r:sysadm_t tclass=bp[ 587.601169][T14254] CPU: 1 UID: 0 PID: 14254 Comm: syz.3.2012 Not tainted 6.12.0-syzkaller-09073-g9f16d5e6f220 #0 [ 587.612472][T14254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 587.622511][T14254] Call Trace: [ 587.625770][T14254] [ 587.628680][T14254] dump_stack_lvl+0x16c/0x1f0 [ 587.633341][T14254] should_fail_ex+0x497/0x5b0 [ 587.638009][T14254] _copy_from_user+0x2e/0xd0 [ 587.642586][T14254] kstrtouint_from_user+0xd7/0x1c0 [ 587.647682][T14254] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 587.653319][ T29] audit: type=1400 audit(1732471706.467:4104): avc: denied { read } for pid=14247 comm="syz.3.2012" dev="nsfs" ino=4026533362 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 587.653479][T14254] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 587.680270][T14254] proc_fail_nth_write+0x84/0x250 [ 587.685303][T14254] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 587.690916][T14254] ? ksys_write+0x12b/0x250 [ 587.695397][T14254] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 587.701006][T14254] vfs_write+0x24c/0x1150 [ 587.705310][T14254] ? __fget_files+0x1fc/0x3a0 [ 587.709963][T14254] ? __pfx___mutex_lock+0x10/0x10 [ 587.714972][T14254] ? __pfx_vfs_write+0x10/0x10 [ 587.719727][T14254] ? __fget_files+0x206/0x3a0 [ 587.724396][T14254] ksys_write+0x12b/0x250 [ 587.728710][T14254] ? __pfx_ksys_write+0x10/0x10 [ 587.733551][T14254] do_syscall_64+0xcd/0x250 [ 587.738046][T14254] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 587.743946][T14254] RIP: 0033:0x7f3f3f37d2ff [ 587.748370][T14254] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48 [ 587.767977][T14254] RSP: 002b:00007f3f401fe030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 587.776380][T14254] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3f3f37d2ff [ 587.784335][T14254] RDX: 0000000000000001 RSI: 00007f3f401fe0a0 RDI: 0000000000000007 [ 587.792287][T14254] RBP: 00007f3f401fe090 R08: 0000000000000000 R09: 0000000000000000 [ 587.800239][T14254] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 587.808195][T14254] R13: 0000000000000000 R14: 00007f3f3f536160 R15: 00007ffcfdea48c8 [ 587.816159][T14254] f permissive=0 Nov 24 18:08:26 [ 587.821427][ T29] audit: type=1400 audit(1732471706.497:4105): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.notice kernel: [ 587.510115][ T29] audit: type=1400 audit(1732471706.457:4101): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 18:08:26 syzkaller kern.notice kernel[ 587.870560][ T29] audit: type=1400 audit(1732471706.507:4106): avc: denied { read write } for pid=5838 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 : [ 587.533551][ T29] audit: type=1400 audit(1732471706.467:4102): avc: denied { read write } for pid=5839 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 24 18:08:26 syzkaller kern.notice kernel: [ 587.564531][T14254] FAULT_INJECTION: forcing a failure. Nov 24 18:08:26 syzkaller kern.notice kernel: [ 587.564531][T14254] name fail_usercopy, interval 1, probability 0, space 0, times 0 Nov 24 18:08:26 syzkaller kern.notice kernel: [ 587.578629][ T29] audit: type=1400 audit(1732471706.467:4103): avc: denied { create } for pid=14247 comm="syz.3.2012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.601169][T14254] CPU: 1 UID: 0 PID: 14254 Comm: syz.3.2012 Not tainted 6.12.0-syzkaller-09073-g9f16d5e6f220 #0 Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.612472][T14254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.622511][T14254] Call Trace: Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.625770][T14254] Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.628680][T14254] dump_stack_lvl+0x16c/0x1f0 Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.633341][T14254] should_fail_ex+0x497/0x5b0 Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.638009][T14254] _copy_from_user+0x2e/0xd0 Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.642586][T14254] kstrtouint_from_user+0xd7/0x1c0 Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.647682][T14254] ? __pfx_kstrtouint_from_user+0x10/0x10 Nov 24 18:08:26 syzkaller kern.notice kernel: [ 587.653319][ T29] audit: type=1400 audit(1732471706.467:4104): avc: denied { read } for pid=14247 comm="syz.3.2012" dev="nsfs" ino=4026533362 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.653479][T14254] ? __pfx_lock_acquire.part.0+0x10/0x10 Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.680270][T14254] proc_fail_nth_write+0x84/0x250 Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.685303][T14254] ? __pfx_proc_fail_nth_write+0x10/0x10 Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.690916][T14254] ? ksys_write+0x12b/0x250 Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.695397][T14254] ? __pfx_proc_f[ 588.109967][T14268] netlink: 'syz.2.2020': attribute type 29 has an invalid length. ail_nth_write+0x10/0x10 Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.701006][T14254] vfs_write+0x24c/0x1150 Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.705310][T14254] ? __fget_files+0x1fc/0x3a0 Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.709963][T14254] ? __pfx___mutex_lock+0x10/0x10 Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.714972][T14254] ? __pfx_vfs_write+0x10/0x10 Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.719727][T14254] ? __fget_files+0x206/0x3a0 Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.724396][T14254] ksys_write+0x12b/0x250 Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.728710][T14254] ? __pfx_ksys_write+0x10/0x10 Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.733551][T14254] do_syscall_64+0xcd/0x250 Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.738046][T14254] entry_SYSCALL_64_after_hwframe+0x77/0x7f Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.743946][T14254] RIP: 0033:0x7f3f3f37d2ff Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.748370][T14254] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48 Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.767977][T14254] RSP: 002b:00007f3f401fe030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.776380][T14254] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3f3f37d2ff Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.784335][T14254] RDX: 0000000000000001 RSI: 00007f3f401fe0a0 RDI: 0000000000000007 Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.792287][T14254] RBP: 00007f3f401fe090 R08: 0000000000000000 R09: 0000000000000000 Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.800239][T14254] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 Nov 24 18:08:26 syzkaller kern.warn kernel: [ 587.808195][T14254] R13: 0000000000000000 R14: 00Nov 24 18:08:26 Nov 24 18:08:26 Nov 24 18:08:26 syzkaller kern.nNov 24 18:08:27 syzkaller kern.warn kernel: [ 588.109967][T14268] netlink: 'syz.2.2020': attribute type 29 has an invalid length. [ 590.069415][T14317] bridge0: port 3(erspan0) entered blocking state [ 590.188896][T14317] bridge0: port 3(erspan0) entered disabled state [ 590.196658][T14317] erspan0: entered allmulticast mode [ 590.202914][T14317] erspan0: entered promiscuous mode [ 590.208934][T14317] bridge0: port 3(erspan0) entered blocking state [ 590.215433][T14317] bridge0: port 3(erspan0) entered forwarding state Nov 24 18:08:29 syzkaller kern.info kernel: [ 590.069415][T14317] bridge0: port 3(erspan0) entered blocking state Nov 24 18:08:29 syzkaller kern.info kernel: [ 590.188896][T14317] bridge0: port 3(erspan0) entered disabled state Nov 24 18:08:29 syzkaller kern.info kernel: [ 590.196658][T14317] erspan0: entered allmulticast mode Nov 24 18:08:29 syzkaller kern.info kernel: [ 590.202914][T14317] erspan0: entered promiscuous mode Nov 24 18:08:29 syzkaller kern.info kernel: [ 590.208934][T14317] bridge0: port 3(erspan0) entered blocking state Nov 24 18:08:29 syzkaller kern.info kernel: [ 590.215433][T14317] bridge0: port 3(erspan0) entered forwarding state [ 591.392009][T14337] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=14337 comm=syz.3.2045 [ 591.441458][T14337] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14337 comm=syz.3.2045 Nov 24 19:16:45 syzkaller kern.warn kernel: [ 591.392009][T14337] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=14337 comm=syz.3.2045 Nov 24 19:16:45 syzkaller kern.warn kernel: [ 591.441458][T14337] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14337 comm=syz.3.2045 [ 592.346119][ T29] kauditd_printk_skb: 270 callbacks suppressed [ 592.346331][ T29] audit: type=1400 audit(1732475806.400:4377): avc: denied { create } for pid=14378 comm="syz.1.2061" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 Nov 24 19:16:46 syzkaller kern.w[ 592.376006][T14377] netlink: 'syz.2.2060': attribute type 9 has an invalid length. arn kernel: [ 592.346119][ T29] kauditd_printk_skb: 270 callb[ 592.389445][ T29] audit: type=1400 audit(1732475806.400:4378): avc: denied { read } for pid=14376 comm="syz.2.2060" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 acks suppressed Nov 24 19:16:46 syzkaller kern.notice kernel: [[ 592.417962][ T29] audit: type=1400 audit(1732475806.410:4379): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 592.346331][ T29] audit: typ[ 592.443106][ T29] audit: type=1400 audit(1732475806.430:4380): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 e=1400 audit(1732475806.400:4377): avc: denied [ 592.468634][ T29] audit: type=1400 audit(1732475806.430:4381): avc: denied { create } for pid=14376 comm="syz.2.2060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 { create } for pid=14378 comm="syz.1.2061" sco[ 592.492585][ T29] audit: type=1400 audit(1732475806.450:4382): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ntext=root:sysadm_r:sysadm_t tcontext=root:sysad[ 592.518763][ T29] audit: type=1400 audit(1732475806.460:4383): avc: denied { read write } for pid=5838 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 m_r:sysadm_t tclass=netlink_netfilter_socket permis Nov 24 19:16:46 syzkaller kern.warn kernel: [ 592.376006][T14377] netlink: 'syz.2.2060': attribute type 9 has an invalid length. Nov 24 19:16:46 syzkaller kern.notice kernel: [ 592.389445][ T29] audit: type=1400 audit(1732475806.400:4378): avc: denied { read } for pid=14376 comm="syz.2.2060" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t Nov 24 19:16:46 syzkaller kern.notice kernel: [ 592[ 592.588333][ T29] audit: type=1400 audit(1732475806.470:4384): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 .417962][ T29][ 592.610544][ T29] audit: type=1400 audit(1732475806.480:4385): avc: denied { create } for pid=14380 comm="syz.1.2062" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 audit: type=1400 audit(1732475806.410:4379): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev[ 592.639485][ T29] audit: type=1400 audit(1732475806.480:4386): avc: denied { execmem } for pid=14380 comm="syz.1.2062" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 ="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 19:16:46 syzkaller kern.notice kernel: [ 592.443106][ T29] audit: type=1400 audit(1732475806.430:4380): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 19:16:46 syzkaller kern.notice kernel: [ 592.468634][ T29] audit: type=1400 audit(1732475806.430:4381): avc: denied { create } for pid=14376 comm="syz.2.2060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive= Nov 24 19:16:46 syzkaller kern.notice kernel: [ 592.492585][ T29] audit: type=1400 audit(1732475806.450:4382): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 19:16:46 syzkaller kern.notice kernel: [ 592.518763][ T29] audit: type=1400 audit(1732475806.460:4383): avc: denied { read write } for pid=5838 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 24 19:16:46 syzkaller kern.notice kernel: [ 592.588333][ T29] audit: type=1400 audit(1732475806.470:4384): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 19:16:46 syzkaller kern.notice kernel: [ 592.610544][ T29] audit: type=1400 audit(1732475806.480:4385): avc: denied { create } for pid=14380 comm="syz.1.2062" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 Nov 24 19:16:46 syzkaller kern.notice kernel: [ 592.639485][ T29] audit: type=1400 audit(1732475806.480:4386): avc: denied { execmem } for pid=14380 comm="syz.1.2062" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 593.018314][T14414] netlink: 'syz.3.2073': attribute type 9 has an invalid length. Nov 24 19:16:47 syzkaller kern.warn kernel: [ 593.018314][T14414] netlink: 'syz.3.2073': attribute type 9 has an invalid length. [ 593.582520][T14436] netlink: 'syz.1.2081': attribute type 29 has an invalid length. Nov 24 19:16:47 syzkaller kern.warn kernel: [ 593.582520][T14436] netlink: 'syz.1.2081': attribute type 29 has an invalid length. [ 593.625260][T14438] netlink: 'syz.2.2082': attribute type 29 has an invalid length. Nov 24 19:16:47 syzkaller kern.warn kernel: [ 593.625260][T14438] netlink: 'syz.2.2082': attribute type 29 has an invalid length. [ 593.677909][T14442] netlink: 'syz.2.2084': attribute type 9 has an invalid length. Nov 24 19:16:47 syzkaller kern.warn kernel: [ 593.677909][T14442] netlink: 'syz.2.2084': attribute type 9 has an invalid length. [ 594.046801][T14420] ceph: No mds server is up or the cluster is laggy Nov 24 19:16:48 syzkaller kern.info kernel: [ 594.046801][T14420] ceph: No mds server is up or the cluster is laggy [ 594.549299][T14464] netlink: 'syz.1.2093': attribute type 29 has an invalid length. Nov 24 19:16:48 syzkaller kern.warn kernel: [ 594.549299][T14464] netlink: 'syz.1.2093': attribute type 29 has an invalid length. [ 597.647322][ T29] kauditd_printk_skb: 296 callbacks suppressed [ 597.647337][ T29] audit: type=1400 audit(1732475811.700:4683): avc: denied { read write } for pid=5843 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Nov 24 19:16:51 [ 597.679300][ T29] audit: type=1400 audit(1732475811.730:4684): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 597.702368][ T29] audit: type=1400 audit(1732475811.730:4685): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 597.647322][ T29] kauditd_print[ 597.727604][ T29] audit: type=1400 audit(1732475811.750:4686): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 296 callbacks suppressed Nov 24 19:16:51 syzkaller kern.notice kernel: [ 597.647337][ T29] audit: type=1400 audit(1732475811.700:4683): avc: denied { read write } for pid=5843 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 24 19:16:51 syzkaller k[ 597.779648][ T29] audit: type=1400 audit(1732475811.780:4687): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ern.notice kernel: [ 597.679300][ T29] audit: type=1400 audit(1732475811.730:4684): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 19:16:51 syzkaller kern.notice kernel: [ 597.702368][ T29] audit: type=1400 audit(1732475811.730:4685): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 19:16:51 syzkaller kern.notice kernel: [ 597.727604][ T29] audit: type=1400 audit(1732475811.750:4686): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=[ 597.868641][ T29] audit: type=1400 audit(1732475811.810:4688): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 system_u:object_r:var_t tclass= Nov 24 19:16:51 syzkaller kern.notice kernel: [ 597.779648][ T29] audit: type=1400 audit(1732475811.780:4687): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 19:16:51 syzkaller kern.notice kernel: [ 597.868641][ T29] audit: type=1400 audit(1732475811.810:4688): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u[ 597.938237][ T29] audit: type=1400 audit(1732475811.830:4689): avc: denied { map_create } for pid=14538 comm="syz.2.2120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 :object_r:var_t tclass= Nov 24 19:16:52 syzkaller kern.notice kernel: [ 597.938237][ T29] audit: type=1400 audit(1732475811.830:4689): avc: denied { map_create } for pid=14538 comm="syz.2.2120" [ 597.977557][ T29] audit: type=1400 audit(1732475811.870:4690): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Nov 24 19:16:52 syzkaller kern.notice kernel: [ 597.977557][ T29] audit: type=1400 audit(1732475811.870:4690): avc: denied { read } for pid=5189 comm="syslogd" n[ 598.020886][ T29] audit: type=1400 audit(1732475811.880:4691): avc: denied { read write } for pid=5839 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 ame="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 19:16:52 syzkaller kern.notice kernel: [ 598.020886][ T29] audit: type=1400 audit(1732475811.880:4691): avc: denied { read write } for pid=5839 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=syste[ 598.077627][ T29] audit: type=1400 audit(1732475811.880:4692): avc: denied { prog_load } for pid=14538 comm="syz.2.2120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 m_u:object_r:fi Nov 24 19:16:52 syzkaller kern.notice kernel: [ 598.077627][ T29] audit: type=1400 audit(1732475811.880:4692): avc: denied { prog_load } for pid=14538 comm="syz.2.2120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Nov 24 19:16:53 syzkaller daemon.err dhcpcd[14574]: ps_bpf_start_bpf: bpf_open: Invalid argument Nov 24 19:16:53 syzkaller daemon.err dhcpcd[14574]: ps_root_recvmsg: Invalid argument [ 600.880663][T14645] syz.1.2164 (14645): drop_caches: 2 [ 600.886821][T14645] syz.1.2164 (14645): drop_caches: 2 Nov 24 19:16:54 syzkaller kern.info kernel: [ 600.880663][T14645] syz.1.2164 (14645): drop_caches: 2 Nov 24 19:16:54 syzkaller kern.info kernel: [ 600.886821][T14645] syz.1.2164 (14645): drop_caches: 2 Nov 24 19:16:55 syzkaller daemon.err dhcpcd[14650]: ps_bpf_start_bpf: bpf_open: Invalid argument Nov 24 19:16:55 syzkaller daemon.err dhcpcd[14650]: ps_root_recvmsg: Invalid argument Nov 24 19:16:55 syzkaller daemon.err dhcpcd[14649]: ps_bpf_start_bpf: bpf_open: Invalid argument Nov 24 19:16:55 syzkaller daemon.err dhcpcd[14649]: ps_root_recvmsg: Invalid argument [ 602.679263][ T29] kauditd_printk_skb: 339 callbacks suppressed [ 602.679334][ T29] audit: type=1400 audit(1732475816.730:5032): avc: denied { execmem } for pid=14700 comm="syz.3.2185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Nov 24 19:16:56 syzkaller kern.warn kernel: [ 602.679263][ T2[ 602.710740][ T29] audit: type=1400 audit(1732475816.760:5033): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_printk_skb: 339 callbacks suppressed Nov 24 19:16:56[ 602.739610][ T29] audit: type=1400 audit(1732475816.760:5034): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.notice kernel: [ 602.679334][ T29] audit: typ[ 602.766845][ T29] audit: type=1400 audit(1732475816.760:5035): avc: denied { create } for pid=14700 comm="syz.3.2185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 e=1400 audit(1732475816.730:5032): avc: denied { execmem } for[ 602.792371][ T29] audit: type=1400 audit(1732475816.790:5036): avc: denied { read } for pid=14700 comm="syz.3.2185" name="btrfs-control" dev="devtmpfs" ino=1309 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:lvm_control_t tclass=chr_file permissive=0 pid=14700 comm="syz.3.2185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Nov 24 19:16:56 syzkaller kern.notice kernel: [ 602.[ 602.833080][ T29] audit: type=1400 audit(1732475816.790:5037): avc: denied { create } for pid=14700 comm="syz.3.2185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 710740][ T29] audit: type=1400 audit(1732475816.760:5033): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_[ 602.867073][ T29] audit: type=1400 audit(1732475816.790:5038): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 19:16:56 syzkaller kern.notice kernel: [ 602.739610][ T29] audit: type=1400 audit(1732475816.760:5034): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass[ 602.918379][ T29] audit: type=1400 audit(1732475816.820:5039): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 = Nov 24 19:16:[ 602.941726][ T29] audit: type=1400 audit(1732475816.840:5040): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 56 syzkaller kern.notice kernel: [ 602.766845][ T29] audit: type=1400 audit(1732475816.760:5035): avc: denied { create } for pid=14700 comm="syz.3.2185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis Nov 24 19:16:56 syzkaller kern.notice kernel: [ 602.792371][ T29] audit: type=1400 audit(1732475816.790:5036): avc: denied { read } for pid=14700 comm="syz.3.2185" name="btrfs-con[ 603.003213][ T29] audit: type=1400 audit(1732475816.850:5041): avc: denied { read write } for pid=5839 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 trol" dev="devtmpfs" ino=1309 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r: Nov 24 19:16:56 syzkaller kern.notice kernel: [ 602.833080][ T29] audit: type=1400 audit(1732475816.790:5037): avc: denied { create } for pid=14700 comm="syz.3.2185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis Nov 24 19:16:56 syzkaller kern.notice kernel: [ 602.867073][ T29] audit: type=1400 audit(1732475816.790:5038): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 19:16:57 syzkaller kern.notice kernel: [ 602.918379][ T29] audit: type=1400 audit(1732475816.820:5039): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 19:16:57 syzkaller kern.notice kernel: [ 602.941726][ T29] audit: type=1400 audit(1732475816.840:5040): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 19:16:57 syzkaller kern.notice kernel: [ 603.003213][ T29] audit: type=1400 audit(1732475816.850:5041): avc: denied { read write } for pid=5839 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 24 19:16:57 syzkaller daemon.err dhcpcd[14714]: ps_bpf_start_bpf: bpf_open: Invalid argument Nov 24 19:16:57 syzkaller daemon.err dhcpcd[14714]: ps_root_recvmsg: Invalid argument [ 603.449420][T14723] netlink: 'syz.3.2193': attribute type 29 has an invalid length. Nov 24 19:16:57 syzkaller kern.warn kernel: [ 603.449420][T14723] netlink: 'syz.3.2193': attribute type 29 has an invalid length. Nov 24 19:16:57 syzkaller daemon.err dhcpcd[5501]: ps_sendpsmmsg: Connection refused Nov 24 19:16:57 syzkaller daemon.err dhcpcd[5501]: ps_root_recvmsgcb: failed to send message to pid 13080: Connection refused Nov 24 19:16:59 syzkaller daemon.err dhcpcd[14766]: ps_bpf_start_bpf: bpf_open: Invalid argument Nov 24 19:16:59 syzkaller daemon.err dhcpcd[14766]: ps_root_recvmsg: Invalid argument Nov 24 19:17:00 syzkaller daemon.err dhcpcd[14781]: ps_bpf_start_bpf: bpf_open: Invalid argument Nov 24 19:17:00 syzkaller daemon.err dhcpcd[14781]: ps_root_recvmsg: Invalid argument Nov 24 19:17:01 syzkaller daemon.err dhcpcd[14831]: ps_bpf_start_bpf: bpf_open: Invalid argument Nov 24 19:17:01 syzkaller daemon.err dhcpcd[14831]: ps_root_recvmsg: Invalid argument [ 607.687015][ T29] kauditd_printk_skb: 288 callbacks suppressed [ 607.687030][ T29] audit: type=1400 audit(1732475821.740:5330): avc: denied { create } for pid=14832 comm="syz.4.2230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 Nov 24 19:17:01 syzkaller kern.warn kernel: [ 607.687015][ T29] kauditd_printk_skb: 288 callbacks suppressed Nov 24 19:17:01 syzkaller kern.notice kernel: [ 607.687030][ T29] audit: type=1400 audit(1732475821.740:5330): avc: denied { create } for pid=14832 comm="syz.4.2230" sco[ 607.743203][ T29] audit: type=1400 audit(1732475821.770:5331): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ntext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 Nov 24 19:17:01 syzkaller kern.notice kernel: [ 607.743203][ T29] audit: type=1400 audit(1732475821.770:5331): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=sys[ 607.791938][ T29] audit: type=1400 audit(1732475821.770:5332): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 tem_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 19:17:01 syzkaller kern.notice kernel: [ 607.791938][ T29] audit: type=1400 audit(1732475821.770:5332): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 607.850632][ T29] audit: type=1400 audit(1732475821.790:5333): avc: denied { read } for pid=14834 comm="syz.2.2231" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 Nov 24 19:17:01 syzkaller kern.notice kernel: [ 607.850632][ T29] audit: type=1400 audit(1732475821.790:5333): avc: denied { read } for pid=14834 comm="syz.2.2231" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t [ 607.911695][ T29] audit: type=1400 audit(1732475821.820:5334): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 24 19:17:01 syzkaller kern.notice kernel: [ 607.911695][ [ 607.939810][ T29] audit: type=1400 audit(1732475821.870:5335): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 T29] audit: type=1400 audit(1732475821.820:5334): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 19:17:02 syzkaller kern.notice kernel: [ 607.939810][ T29] audit: type=1400 audit(1732475821.870:5335): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 608.003900][ T29] audit: type=1400 audit(1732475821.900:5336): avc: denied { create } for pid=14834 comm="syz.2.2231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 Nov 24 19:17:02 syzkaller daemon.err dhcpcd[5501[ 608.033511][ T29] audit: type=1400 audit(1732475821.930:5337): avc: denied { read write } for pid=5839 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 ]: ps_sendpsmmsg: Connection refused Nov 24 19:17:02 syzkaller daemon.err dhcpcd[5501]: ps_root_recvmsgcb: failed to send message to pid 13136: Connection refused Nov 24 19:17:02 syzkaller kern.notice kernel: [ 608.003900][ T29] audit: type=1400 audit(1732475821.900:[ 608.081797][ T29] audit: type=1400 audit(1732475821.930:5338): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 5336): avc: den[ 608.104798][ T29] audit: type=1400 audit(1732475821.930:5339): avc: denied { create } for pid=14834 comm="syz.2.2231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 ied { create } for pid=14834 comm="syz.2.2231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissi Nov 24 19:17:02 syzkaller kern.notice kernel: [ 608.033511][ T29] audit: type=1400 audit(1732475821.930:5337): avc: denied { read write } for pid=5839 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 24 19:17:02 syzkaller kern.notice kernel: [ 608.081797][ T29] audit: type=1400 audit(1732475821.930:5338): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 19:17:02 syzkaller kern.notice kernel: [ 608.104798][ T29] audit: type=1400 audit(1732475821.930:5339): avc: denied { create } for pid=14834 comm="syz.2.2231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissi Nov 24 19:17:02 syzkaller daemon.err dhcpcd[14843]: ps_bpf_start_bpf: bpf_open: Invalid argument Nov 24 19:17:02 syzkaller daemon.err dhcpcd[14843]: ps_root_recvmsg: Invalid argument Nov 24 19:17:03 syzkaller daemon.err dhcpcd[14879]: ps_bpf_start_bpf: bpf_open: Invalid argument Nov 24 19:17:03 syzkaller daemon.err dhcpcd[14879]: ps_root_recvmsg: Invalid argument Nov 24 19:17:03 syzkaller daemon.err dhcpcd[14894]: ps_bpf_start_bpf: bpf_open: Invalid argument Nov 24 19:17:03 syzkaller daemon.err dhcpcd[14894]: ps_root_recvmsg: Invalid argument [ 609.825166][T14880] ceph: No mds server is up or the cluster is laggy Nov 24 19:17:03 syzkaller kern.info kernel: [ 609.825166][T14880] ceph: No mds server is up or the cluster is laggy Nov 24 19:17:05 syzkaller daemon.err dhcpcd[5501]: ps_sendpsmmsg: Connection refused Nov 24 19:17:05 syzkaller daemon.err dhcpcd[5501]: ps_root_recvmsgcb: failed to send message to pid 13155: Connection refused [ 612.697178][ T29] kauditd_printk_skb: 378 callbacks suppressed [ 612.697194][ T29] audit: type=1400 audit(1732475826.750:5718): avc: denied { read write } for pid=15014 comm="syz.1.2298" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 Nov 24 19:17:06 syzkaller kern.warn kernel: [ 612.697178][ T29] kauditd_printk_skb: 378 callbacks suppressed Nov 24 19:17:06 syzkaller kern.notice kernel: [ 612.697194][ T29] audit: type=1400 audit(1732475826.750:5718): avc: denied { read write } for pid=15014 comm="syz.1.2298" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_ [ 612.761360][ T29] audit: type=1400 audit(1732475826.760:5719): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 24 19:17:06 syzkaller kern.notice kernel: [ [ 612.793064][ T29] audit: type=1400 audit(1732475826.780:5720): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 612.761360][ T29] audit: type[ 612.817528][ T29] audit: type=1400 audit(1732475826.800:5721): avc: denied { read write } for pid=5839 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 =1400 audit(1732[ 612.843504][ T29] audit: type=1400 audit(1732475826.810:5722): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 475826.760:5719): avc: denied { read } for pid=5189 comm="sys[ 612.872706][ T29] audit: type=1400 audit(1732475826.840:5723): avc: denied { create } for pid=15016 comm="syz.3.2299" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 logd" name="log" dev="sda1" ino=[ 612.896597][ T29] audit: type=1400 audit(1732475826.840:5724): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 1915 scontext=system_u:system_r:syslogd_t tconte[ 612.923694][ T29] audit: type=1400 audit(1732475826.840:5725): avc: denied { read write } for pid=15016 comm="syz.3.2299" name="vbi4" dev="devtmpfs" ino=978 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 xt=system_u:object_r:var_t tclass= Nov 24 19:17:06 syzkaller kern.notice kernel: [ 612.793064][ T29] audit: type=1400 audit(1732475826.780:5720): avc: denied { read } for[ 612.961423][ T29] audit: type=1400 audit(1732475826.850:5726): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 pid=5189 comm="syslogd" name="log" dev="sda1" [ 612.990447][ T29] audit: type=1400 audit(1732475826.870:5727): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 19:17:06 syzkaller kern.notice kernel: [ 612.817528][ T29] audit: type=1400 audit(1732475826.800:5721): avc: denied { read write } for pid=5839 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 24 19:17:06 syzkaller kern.notice kernel: [ 612.843504][ T29] audit: type=1400 audit(1732475826.810:5722): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 24 19:17:06 syzkaller kern.notice kernel: [ 612.872706][ T29] audit: type=1400 audit(1732475826.840:5723): avc: denied { create } for pid=15016 comm="syz.3.2299" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode Nov 24 19:17:06 syzkaller kern.notice kernel: [ 612.896597][ T29] audit: type=1400 audit(1732475826.840:5724): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 19:17:07 syzkaller kern.notice kernel: [ 612.923694][ T29] audit: type=1400 audit(1732475826.840:5725): avc: denied { read write } for pid=15016 comm="syz.3.2299" name="vbi4" dev="devtmpfs" ino=978 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_ Nov 24 19:17:07 syzkaller kern.notice kernel: [ 612.961423][ T29] audit: type=1400 audit(1732475826.850:5726): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 24 19:17:07 syzkaller kern.notice kernel: [ 612.990447][ T29] audit: type=1400 audit(1732475826.870:5727): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 615.730825][T15151] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(4) [ 615.737397][T15151] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) Nov 24 19:17:09 syzkaller kern.i[ 615.751549][T15151] vhci_hcd vhci_hcd.0: Device attached nfo kernel: [ 615.730825][T15151] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(4) Nov 24 19:17:09 syzkaller kern.info kernel: [ 615.737397][T15151] vhci_hcd[ 615.768329][T15152] vhci_hcd: connection closed vhci_hcd.0: dev[ 615.772800][ T12] vhci_hcd: stop threads id(0) speed(4) speed_str(wireless) Nov 24 19:17:09 syzkaller kern.info kernel: [ 615.789241][ T12] vhci_hcd: release socket [ 615.751549][T[ 615.794518][ T12] vhci_hcd: disconnect device 15151] vhci_hcd vhci_hcd.0: Device attached Nov 24 19:17:09 syzkaller kern.info kernel: [ 615.768329][T15152] vhci_hcd: connection closed Nov 24 19:17:09 syzkaller kern.info kernel: [ 615.772800][ T12] vhci_hcd: stop threads Nov 24 19:17:09 syzkaller kern.info kernel: [ 615.789241][ T12] vhci_hcd: release socket Nov 24 19:17:09 syzkaller kern.info kernel: [ 615.794518][ T12] vhci_hcd: disconnect device [ 615.924370][T15162] netlink: 'syz.0.2360': attribute type 9 has an invalid length. Nov 24 19:17:10 syzkaller kern.warn kernel: [ 615.924370][T15162] netlink: 'syz.0.2360': attribute type 9 has an invalid length. [ 616.422815][T15192] CIFS: Unable to determine destination address Nov 24 19:17:10 syzkaller kern.err kernel: [ 616.422815][T15192] CIFS: Unable to determine destination address Nov 24 19:17:11 [ 617.787543][ T29] kauditd_printk_skb: 419 callbacks suppressed syzkaller daemon[ 617.787557][ T29] audit: type=1400 audit(1732475831.840:6147): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 .err dhcpcd[15218]: ps_bpf_start_bpf: bpf_open: Invalid argument Nov 24 19:17:11 syzkaller daemon.err dhcpcd[15218]: ps_root_recvmsg: Invalid argument Nov 24 19:17:11 syzkaller kern.warn kernel: [ 617.787543][ T29] kauditd_printk_skb: 419 callbacks suppressed Nov 24 19:17:11 syzkalle[ 617.847534][ T29] audit: type=1400 audit(1732475831.850:6148): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 r kern.notice kernel: [ 617.787557][ T29] audit: type=1400 audit(1732475831.840:6147): avc: denied { read }[ 617.878925][T15220] audit: audit_backlog=65 > audit_backlog_limit=64 for pid=5189 c[ 617.886505][ T5189] audit: audit_backlog=65 > audit_backlog_limit=64 [ 617.893835][T15220] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 omm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov [ 617.911547][ T5189] audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 [ 617.913723][T15220] audit: backlog limit exceeded 24 19:17:11 syzkaller kern.notice kernel: [ 617.847534][ T29] audit: type=1400 audit(1732475831.850:6148): avc: denied { read } for pid=51[ 617.937161][ T29] audit: type=1400 audit(1732475831.880:6149): avc: denied { read write } for pid=5838 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 89 comm="syslogd[ 617.943010][ T5189] audit: backlog limit exceeded " name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 19:17:11 [ 617.984993][ T5189] audit: audit_backlog=65 > audit_backlog_limit=64 syzkaller kern.warn kernel: [ 617.878925][T15220] audit: audit_backlog=65 > audit_backlog_limit=64 Nov 24 19:17:11 syzkaller kern.warn kernel: [ 617.886505][ T5189] audit: audit_backlog=65 > audit_backlog_limit=64 Nov 24 19:17:11 syzkaller kern.warn kernel: [ 617.893835][T15220] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Nov 24 19:17:11 syzkaller kern.warn kernel: [ 617.911547][ T5189] audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 Nov 24 19:17:11 syzkaller kern.err kernel: [ 617.913723][T15220] audit: backlog limit exceeded Nov 24 19:17:12 syzkaller kern.notice kernel: [ 617.937161][ T29] audit: type=1400 audit(1732475831.880:6149): avc: denied { read write } for pid=5838 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 24 19:17:12 syzkaller kern.err kernel: [ 617.943010][ T5189] audit: backlog limit exceeded Nov 24 19:17:12 syzkaller kern.warn kernel: [ 617.984993][ T5189] audit: audit_backlog=65 > audit_backlog_limit=64 [ 618.231143][T15242] ptm ptm0: ldisc open failed (-12), clearing slot 0 Nov 24 19:17:12 syzkaller kern.info kernel: [ 618.231143][T15242] ptm ptm0: ldisc open failed (-12), clearing slot 0 [ 619.222499][T15278] FAULT_INJECTION: forcing a failure. [ 619.222499][T15278] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 619.236551][T15278] CPU: 0 UID: 0 PID: 15278 Comm: syz.0.2402 Not tainted 6.12.0-syzkaller-09073-g9f16d5e6f220 #0 [ 619.246956][T15278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 619.257017][T15278] Call Trace: [ 619.260302][T15278] [ 619.263222][T15278] dump_stack_lvl+0x16c/0x1f0 [ 619.267892][T15278] should_fail_ex+0x497/0x5b0 [ 619.272566][T15278] _copy_from_user+0x2e/0xd0 [ 619.277159][T15278] kstrtouint_from_user+0xd7/0x1c0 [ 619.282256][T15278] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 619.287966][T15278] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 619.293604][T15278] proc_fail_nth_write+0x84/0x250 [ 619.298629][T15278] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 619.304266][T15278] ? ksys_write+0x12b/0x250 [ 619.308755][T15278] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 619.314388][T15278] vfs_write+0x24c/0x1150 [ 619.318713][T15278] ? __fget_files+0x1fc/0x3a0 [ 619.323388][T15278] ? __pfx___mutex_lock+0x10/0x10 [ 619.328427][T15278] ? __pfx_vfs_write+0x10/0x10 [ 619.333211][T15278] ? __fget_files+0x206/0x3a0 [ 619.337903][T15278] ksys_write+0x12b/0x250 [ 619.342240][T15278] ? __pfx_ksys_write+0x10/0x10 [ 619.347091][T15278] do_syscall_64+0xcd/0x250 [ 619.351578][T15278] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 619.357459][T15278] RIP: 0033:0x7f4654d7d2ff [ 619.361874][T15278] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48 [ 619.381476][T15278] RSP: 002b:00007f4655a97030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 619.389866][T15278] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4654d7d2ff [ 619.397832][T15278] RDX: 0000000000000001 RSI: 00007f4655a970a0 RDI: 0000000000000003 [ 619.405793][T15278] RBP: 00007f4655a97090 R08: 0000000000000000 R09: 0000000000000000 [ 619.413757][T15278] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 619.421722][T15278] R13: 0000000000000000 R14: 00007f4654f35fa0 R15: 00007ffd8ea3aa78 [ 619.429706][T15278] Nov 24 19:17:13 syzkaller kern.notice kernel: [ 619.222499][T15278] FAULT_INJECTION: forcing a failure. Nov 24 19:17:13 syzkaller kern.notice kernel: [ 619.222499][T15278] name fail_usercopy, interval 1, probability 0, space 0, times 0 Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.236551][T15278] CPU: 0 UID: 0 PID: 15278 Comm: syz.0.2402 Not tainted 6.12.0-syzkaller-09073-g9f16d5e6f220 #0 Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.246956][T15278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.257017][T15278] Call Trace: Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.260302][T15278] Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.263222][T15278] dump_stack_lvl+0x16c/0x1f0 Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.267892][T15278] should_fail_ex+0x497/0x5b0 Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.272566][T15278] _copy_from_user+0x2e/0xd0 Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.277159][T15278] kstrtouint_from_user+0xd7/0x1c0 Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.282256][T15278] ? __pfx_kstrtouint_from_user+0x10/0x10 Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.287966][T15278] ? __pfx_lock_acquire.part.0+0x10/0x10 Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.293604][T15278] proc_fail_nth_write+0x84/0x250 Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.298629][T15278] ? __pfx_proc_fail_nth_write+0x10/0x10 Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.304266][T15278] ? ksys_write+0x12b/0x250 Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.308755][T15278] ? __pfx_proc_fail_nth_write+0x10/0x10 Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.314388][T15278] vfs_write+0x24c/0x1150 Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.318713][T15278] ? __fget_files+0x1fc/0x3a0 Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.323388][T15278] ? __pfx___mutex_lock+0x10/0x10 Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.328427][T15278] ? __pfx_vfs_write+0x10/0x10 Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.333211][T15278] ? __fget_files+0x206/0x3a0 Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.337903][T15278] ksys_write+0x12b/0x250 Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.342240][T15278] ? __pfx_ksys_write+0x10/0x10 Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.347091][T15278] do_syscall_64+0xcd/0x250 Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.351578][T15278] entry_SYSCALL_64_after_hwframe+0x77/0x7f Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.357459][T15278] RIP: 0033:0x7f4654d7d2ff Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.361874][T15278] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48 Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.381476][T15278] RSP: 002b:00007f4655a97030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.389866][T15278] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4654d7d2ff Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.397832][T15278] RDX: 0000000000000001 RSI: 00007f4655a970a0 RDI: 0000000000000003 Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.405793][T15278] RBP: 00007f4655a97090 R08: 0000000000000000 R09: 0000000000000000 Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.413757][T15278] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.421722][T15278] R13: 0000000000000000 R14: 00007f4654f35fa0 R15: 00007ffd8ea3aa78 Nov 24 19:17:13 syzkaller kern.warn kernel: [ 619.429706][T15278] [ 621.579852][T15365] libceph: resolve ' [ 621.579852][T15365] -&fYǝa2i [ 621.579852][T15365] .?&*&' (ret=-3): failed Nov 24 20:25:30 syzkaller kern.info kernel: [ 621.579852][T15365] libceph: resolve ' Nov 24 20:25:30 syzkaller kern.info kernel: [ 621.579852][T15365] -&^FfYǝa^M^Q2i Nov 24 20:25:30 syzkaller kern.info kernel: [ 621.579852][T15365] ^S.?&*&' (ret=-3): failed [ 622.115922][T15396] netlink: 'syz.4.2447': attribute type 29 has an invalid length. Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.115922][T15396] netlink: 'syz.4.2447': attribute type 29 has an invalid length. [ 622.209099][T15400] FAULT_INJECTION: forcing a failure. [ 622.209099][T15400] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 622.222840][T15400] CPU: 0 UID: 0 PID: 15400 Comm: syz.1.2451 Not tainted 6.12.0-syzkaller-09073-g9f16d5e6f220 #0 [ 622.233274][T15400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 622.243352][T15400] Call Trace: [ 622.246629][T15400] [ 622.249560][T15400] dump_stack_lvl+0x16c/0x1f0 [ 622.254253][T15400] should_fail_ex+0x497/0x5b0 [ 622.258939][T15400] _copy_from_user+0x2e/0xd0 [ 622.263537][T15400] do_ipt_set_ctl+0x8f2/0xc30 [ 622.268218][T15400] ? __mutex_lock+0x1cc/0xa60 [ 622.272909][T15400] ? __pfx_do_ipt_set_ctl+0x10/0x10 [ 622.273484][T15402] syz.3.2452 (15402): drop_caches: 2 [ 622.278090][T15400] ? __mutex_unlock_slowpath+0x164/0x690 [ 622.278119][T15400] ? sockopt_release_sock+0x52/0x60 [ 622.278142][T15400] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 622.278175][T15400] ? nf_sockopt_find.constprop.0+0x221/0x290 [ 622.278205][T15400] nf_setsockopt+0x8a/0xf0 [ 622.310597][T15400] ip_setsockopt+0xcb/0xf0 [ 622.314993][T15400] tcp_setsockopt+0xa4/0x100 [ 622.319558][T15400] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 622.325429][T15400] do_sock_setsockopt+0x222/0x480 [ 622.330429][T15400] ? __pfx_do_sock_setsockopt+0x10/0x10 [ 622.335949][T15400] ? lock_acquire+0x2f/0xb0 [ 622.340429][T15400] __sys_setsockopt+0x1a0/0x230 [ 622.345253][T15400] __x64_sys_setsockopt+0xbd/0x160 [ 622.350337][T15400] ? do_syscall_64+0x91/0x250 [ 622.354990][T15400] ? lockdep_hardirqs_on+0x7c/0x110 [ 622.360165][T15400] do_syscall_64+0xcd/0x250 [ 622.364640][T15400] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 622.370510][T15400] RIP: 0033:0x7f7eec37e819 [ 622.374907][T15400] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 622.394497][T15400] RSP: 002b:00007f7eed0cf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 622.402881][T15400] RAX: ffffffffffffffda RBX: 00007f7eec535fa0 RCX: 00007f7eec37e819 [ 622.410824][T15400] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000004 [ 622.418782][T15400] RBP: 00007f7eed0cf090 R08: 0000000000000320 R09: 0000000000000000 [ 622.426725][T15400] R10: 0000000020000a80 R11: 0000000000000246 R12: 0000000000000001 [ 622.434669][T15400] R13: 0000000000000000 R14: 00007f7eec535fa0 R15: 00007ffce76878a8 [ 622.442624][T15400] [ 622.448972][T15402] syz.3.2452 (15402): drop_caches: 2 Nov 24 20:25:31 syzkaller kern.notice kernel: [ 622.209099][T15400] FAULT_INJECTION: forcing a failure. Nov 24 20:25:31 syzkaller kern.notice kernel: [ 622.209099][T15400] name fail_usercopy, interval 1, probability 0, space 0, times 0 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.222840][T15400] CPU: 0 UID: 0 PID: 15400 Comm: syz.1.2451 Not tainted 6.12.0-syzkaller-09073-g9f16d5e6f220 #0 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.233274][T15400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.243352][T15400] Call Trace: Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.246629][T15400] Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.249560][T15400] dump_stack_lvl+0x16c/0x1f0 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.254253][T15400] should_fail_ex+0x497/0x5b0 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.258939][T15400] _copy_from_user+0x2e/0xd0 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.263537][T15400] do_ipt_set_ctl+0x8f2/0xc30 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.268218][T15400] ? __mutex_lock+0x1cc/0xa60 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.272909][T15400] ? __pfx_do_ipt_set_ctl+0x10/0x10 Nov 24 20:25:31 syzkaller kern.info kernel: [ 622.273484][T15402] syz.3.2452 (15402): drop_caches: 2 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.278090][T15400] ? __mutex_unlock_slowpath+0x164/0x690 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.278119][T15400] ? sockopt_release_sock+0x52/0x60 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.278142][T15400] ? __pfx___mutex_unlock_slowpath+0x10/0x10 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.278175][T15400] ? nf_sockopt_find.constprop.0+0x221/0x290 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.278205][T15400] nf_setsockopt+0x8a/0xf0 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.310597][T15400] ip_setsockopt+0xcb/0xf0 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.314993][T15400] tcp_setsockopt+0xa4/0x100 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.319558][T15400] ? __pfx_sock_common_setsockopt+0x10/0x10 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.325429][T15400] do_sock_setsockopt+0x222/0x480 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.330429][T15400] ? __pfx_do_sock_setsockopt+0x10/0x10 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.335949][T15400] ? lock_acquire+0x2f/0xb0 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.340429][T15400] __sys_setsockopt+0x1a0/0x230 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.345253][T15400] __x64_sys_setsockopt+0xbd/0x160 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.350337][T15400] ? do_syscall_64+0x91/0x250 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.354990][T15400] ? lockdep_hardirqs_on+0x7c/0x110 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.360165][T15400] do_syscall_64+0xcd/0x250 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.364640][T15400] entry_SYSCALL_64_after_hwframe+0x77/0x7f Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.370510][T15400] RIP: 0033:0x7f7eec37e819 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.374907][T15400] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.394497][T15400] RSP: 002b:00007f7eed0cf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.402881][T15400] RAX: ffffffffffffffda RBX: 00007f7eec535fa0 RCX: 00007f7eec37e819 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.410824][T15400] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000004 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.418782][T15400] RBP: 00007f7eed0cf090 R08: 0000000000000320 R09: 0000000000000000 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.426725][T15400] R10: 0000000020000a80 R11: 0000000000000246 R12: 0000000000000001 Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.434669][T15400] R13: 000000000[ 622.829522][ T29] kauditd_printk_skb: 555 callbacks suppressed 0000000 R14: 000[ 622.829537][ T29] audit: type=1400 audit(1732479931.877:6682): avc: denied { create } for pid=15411 comm="syz.0.2456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 07f7eec535fa0 R1[ 622.858876][ T29] audit: type=1400 audit(1732479931.887:6683): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 5: 00007ffce76878a8 Nov 24 20:2Nov 24 20:25:31 syzkaller kern.warn kernel: [ 622.829522][ T29] kauditd_printk_skb: 555 callb[ 622.891951][ T29] audit: type=1400 audit(1732479931.917:6684): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 acks suppressed[ 622.915562][ T29] audit: type=1400 audit(1732479931.937:6685): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 24 20:25:31[ 622.938956][ T29] audit: type=1400 audit(1732479931.937:6686): avc: denied { read write } for pid=5843 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 syzkaller kern.notice kernel: [ 622.829537][ T29] audit: type=1400 audit(1732479931.877:6682): avc: denied { create } for pid=15411 comm="syz.0.2456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket per[ 622.985819][ T29] audit: type=1400 audit(1732479931.937:6687): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 mis Nov 24 20:25:31 syzkaller kern.notice kernel: [ 622.858876][ T29] audit: type=1400 audit(1732479931.887:6683): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u[ 623.032332][ T29] audit: type=1400 audit(1732479931.967:6688): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 :object_r:var_t tclass= Nov 24 20:25:31 syzkaller kern.notice kernel: [ 622.891951][ T29] audit: type=1400 audit(1732479931.917:6684): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov[ 623.080748][ T29] audit: type=1400 audit(1732479931.997:6689): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 24 20:25:31 syzkaller kern.noti[ 623.104686][ T29] audit: type=1400 audit(1732479932.017:6690): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ce kernel: [ 622.915562][ T29] audit: type=1400 audit(1732479931.937:6685): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 20:25:31 syzkaller kern.notice kernel: [ 622.938956][ T29] audit: type=1400 audit(1732479931.937:6686): avc: denied { read write } for pid=5843 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 24 20:25:32 syzkaller kern.notice kernel: [ 622.985819][ T29] audit: type=1400 audit(1732479931.937:6687): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 24 20:25:32 syzkaller kern.notice kernel: [ 623.032332][ T29] audit: type=1400 audit(1732479931.967:6688): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 20:25:32 syzkaller kern.notice kernel: [ 623.080748][ T29] audit: type=1400 audit(1732479931.997:6689): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 20:25:32 syzkaller kern.notice kernel: [ 623.104686][ T29] audit: type=1400 audit(173[ 623.252156][ T29] audit: type=1400 audit(1732479932.017:6691): avc: denied { node_bind } for pid=15414 comm="syz.2.2458" saddr=fe80:: scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=0 2479932.017:6690): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 20:25:32 syzkaller kern.notice kernel: [ 623.252156][ T29] audit: type=1400 audit(1732479932.017:6691): avc: denied { node_bind } for pid=15414 comm="syz.2.2458" saddr=fe80:: scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket pe Nov 24 20:25:32 syzkaller daemon.err dhcpcd[15433]: ps_bpf_start_bpf: bpf_open: Invalid argument Nov 24 20:25:32 syzkaller daemon.err dhcpcd[15433]: ps_root_recvmsg: Invalid argument [ 624.057681][ T1289] ieee802154 phy0 wpan0: encryption failed: -22 Nov 24 20:25:33 syzkaller kern.warn kernel: [ 624.057681][ T1289] ieee802154 phy0 wpan0: encryption failed: -22 [ 624.154410][T15439] ceph: No mds server is up or the cluster is laggy Nov 24 20:25:33 syzkaller kern.info kernel: [ 624.154410][T15439] ceph: No mds server is up or the cluster is laggy [ 627.092188][T15559] Cannot find del_set index 2 as target Nov 24 20:25:36 syzkaller kern.info kernel: [ 627.092188][T15559] Cannot find del_set index 2 as target [ 627.867802][ T29] kauditd_printk_skb: 306 callbacks suppressed [ 627.867813][ T29] audit: type=1400 audit(1732479936.917:6998): avc: denied { create } for pid=15589 comm="syz.3.2525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 Nov 24 20:25:36 syzkaller kern.warn kernel: [ 627.867802][ T29] kauditd_printk_skb: 306 callbacks suppressed Nov 24 20:25:36 syzkaller kern.notice kernel: [[ 627.910411][ T29] audit: type=1400 audit(1732479936.947:6999): avc: denied { create } for pid=15589 comm="syz.3.2525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 627.867813][ T29] audit: type=1400 audit(1732479936.917:6998): avc: denied { create } for pid=15589 comm="syz.3.2525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 Nov 24 20:25:36 syzkaller kern.notice kernel: [ 627.910411][ T29] audit: type=1400 audit(1732[ 627.958012][ T29] audit: type=1400 audit(1732479936.947:7000): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 479936.947:6999): avc: denied { create } for pid=15589 comm="syz.3.2525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_gener[ 627.994639][ T29] audit: type=1400 audit(1732479936.947:7001): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ic_socket permissi Nov 24 20:25[ 628.019247][ T29] audit: type=1400 audit(1732479936.987:7002): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 :37 syzkaller kern.notice kernel: [ 627.958012][ T29] audit: type=1400 audit(1732479936.947:7000): avc: deni[ 628.050990][ T29] audit: type=1400 audit(1732479937.007:7003): avc: denied { read write } for pid=5839 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 ed { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontex[ 628.080878][ T29] audit: type=1400 audit(1732479937.037:7004): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 t=system_u:system_r:syslogd_t tcontext=system_u:[ 628.106902][ T29] audit: type=1400 audit(1732479937.067:7005): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 object_r:var_t tclass= Nov 24 20:25:37 syzkaller kern.notice ke[ 628.134395][ T29] audit: type=1400 audit(1732479937.087:7006): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 rnel: [ 627.994639][ T29] aud[ 628.159714][ T29] audit: type=1400 audit(1732479937.097:7007): avc: denied { create } for pid=15592 comm="syz.3.2526" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 it: type=1400 audit(1732479936.947:7001): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 20:25:37 syzkaller kern.notice kernel: [ 628.019247][ T29] audit: type=1400 audit(1732479936.987:7002): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 20:25:37 syzkaller kern.notice kernel: [ 628.050990][ T29] audit: type=1400 audit(1732479937.007:7003): avc: denied { read write } for pid=5839 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 24 20:25:37 syzkaller kern.notice kernel: [ 628.080878][ T29] audit: type=1400 audit(1732479937.037:7004): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 20:25:37 syzkaller kern.notice kernel: [ 628.106902][ T29] audit: type=1400 audit(1732479937.067:7005): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 20:25:37 syzkaller kern.notice kernel: [ 628.134395][ T29] audit: type=1400 audit(1732479937.087:7006): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 24 20:25:37 syzkaller kern.notice kernel: [ 628.159714][ T29] audit: type=1400 audit(1732479937.097:7007): avc: denied { create } for pid=15592 comm="syz.3.2526" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode [ 629.028048][T15610] netlink: 'syz.4.2532': attribute type 29 has an invalid length. Nov 24 20:25:38 syzkaller kern.warn kernel: [ 629.028048][T15610] netlink: 'syz.4.2532': attribute type 29 has an invalid length. [ 629.269411][T15619] xt_cgroup: invalid path, errno=-2 Nov 24 20:25:38 syzkaller kern.info kernel: [ 629.269411][T15619] xt_cgroup: invalid path, errno=-2 [ 629.320636][T15622] xt_nat: multiple ranges no longer supported Nov 24 20:25:38 syzkaller kern.info kernel: [ 629.320636][T15622] xt_nat: multiple ranges no longer supported [ 629.556895][T15631] netlink: 'syz.0.2539': attribute type 29 has an invalid length. Nov 24 20:25:38 syzkaller kern.warn kernel: [ 629.556895][T15631] netlink: 'syz.0.2539': attribute type 29 has an invalid length. [ 631.734794][T15693] FAULT_INJECTION: forcing a failure. [ 631.734794][T15693] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 631.762829][T15693] CPU: 0 UID: 0 PID: 15693 Comm: syz.3.2565 Not tainted 6.12.0-syzkaller-09073-g9f16d5e6f220 #0 [ 631.773268][T15693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 631.783341][T15693] Call Trace: [ 631.786624][T15693] [ 631.789551][T15693] dump_stack_lvl+0x16c/0x1f0 [ 631.794245][T15693] should_fail_ex+0x497/0x5b0 [ 631.798933][T15693] _copy_from_user+0x2e/0xd0 [ 631.803524][T15693] copy_msghdr_from_user+0x99/0x160 [ 631.808724][T15693] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 631.814528][T15693] ? __lock_acquire+0xcc5/0x3c40 [ 631.819464][T15693] ? hlock_class+0x4e/0x130 [ 631.823969][T15693] ? __lock_acquire+0x15a9/0x3c40 [ 631.828995][T15693] ___sys_sendmsg+0xff/0x1e0 [ 631.833594][T15693] ? __pfx____sys_sendmsg+0x10/0x10 [ 631.838792][T15693] ? __pfx___lock_acquire+0x10/0x10 [ 631.844010][T15693] ? __pfx___might_resched+0x10/0x10 [ 631.849299][T15693] ? __might_fault+0xe3/0x190 [ 631.853989][T15693] __sys_sendmmsg+0x201/0x420 [ 631.858670][T15693] ? __pfx___sys_sendmmsg+0x10/0x10 [ 631.863904][T15693] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 631.869900][T15693] ? fput+0x67/0x440 [ 631.873795][T15693] ? ksys_write+0x1ba/0x250 [ 631.878294][T15693] ? __pfx_ksys_write+0x10/0x10 [ 631.883156][T15693] __x64_sys_sendmmsg+0x9c/0x100 [ 631.888099][T15693] ? lockdep_hardirqs_on+0x7c/0x110 [ 631.893302][T15693] do_syscall_64+0xcd/0x250 [ 631.897810][T15693] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 631.903719][T15693] RIP: 0033:0x7f3f3f37e819 [ 631.908128][T15693] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 631.927818][T15693] RSP: 002b:00007f3f40240038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 631.936244][T15693] RAX: ffffffffffffffda RBX: 00007f3f3f535fa0 RCX: 00007f3f3f37e819 [ 631.944209][T15693] RDX: 0000000000000062 RSI: 0000000020002940 RDI: 0000000000000003 [ 631.952174][T15693] RBP: 00007f3f40240090 R08: 0000000000000000 R09: 0000000000000000 [ 631.960139][T15693] R10: 00000000000000f5 R11: 0000000000000246 R12: 0000000000000002 [ 631.968137][T15693] R13: 0000000000000000 R14: 00007f3f3f535fa0 R15: 00007ffcfdea48c8 [ 631.976131][T15693] [ 663.944447][ T29] kauditd_printk_skb: 236 callbacks suppressed [ 663.944462][ T29] audit: type=1400 audit(1866697703.996:7244): avc: denied { read } for pid=5189 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 735.602905][ C0] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 735.609876][ C0] rcu: 1-...!: (1 GPs behind) idle=ba44/1/0x4000000000000000 softirq=55400/55402 fqs=662 [ 735.620965][ C0] rcu: (detected by 0, t=10503 jiffies, g=49453, q=934 ncpus=2) [ 735.628691][ C0] Sending NMI from CPU 0 to CPUs 1: [ 735.628716][ C1] NMI backtrace for cpu 1 [ 735.628726][ C1] CPU: 1 UID: 0 PID: 15676 Comm: syz.2.2556 Not tainted 6.12.0-syzkaller-09073-g9f16d5e6f220 #0 [ 735.628742][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 735.628749][ C1] RIP: 0010:rcu_is_watching+0x60/0xc0 [ 735.628772][ C1] Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 75 5c 48 03 1c ed a0 bb a6 8d 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 c1 ea 03 0f b6 14 02 <48> 89 d8 83 e0 07 83 c0 03 38 d0 7c 04 84 d2 75 24 8b 03 c1 e8 02 [ 735.628784][ C1] RSP: 0018:ffffc90000a18d68 EFLAGS: 00000806 [ 735.628797][ C1] RAX: dffffc0000000000 RBX: ffff8880b8737f68 RCX: ffffffff8931bfaf [ 735.628810][ C1] RDX: 0000000000000000 RSI: ffffffff8bd0e900 RDI: ffffffff8da6bba8 [ 735.628819][ C1] RBP: 0000000000000001 R08: 0000000000000005 R09: 0000000000000000 [ 735.628827][ C1] R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000002 [ 735.628835][ C1] R13: ffff8880217fb400 R14: ffff88807ba5c340 R15: ffff8880217fb800 [ 735.628845][ C1] FS: 00007f9bbeb7e6c0(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 [ 735.628860][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 735.628870][ C1] CR2: 000000110c262493 CR3: 000000007adb6000 CR4: 00000000003526f0 [ 735.628879][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 735.628886][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 735.628895][ C1] Call Trace: [ 735.628901][ C1] [ 735.628907][ C1] ? nmi_cpu_backtrace+0x1d8/0x390 [ 735.628924][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 735.628938][ C1] ? nmi_handle+0x1a7/0x5c0 [ 735.628952][ C1] ? rcu_is_watching+0x60/0xc0 [ 735.628968][ C1] ? default_do_nmi+0x6a/0x160 [ 735.628983][ C1] ? exc_nmi+0x170/0x1e0 [ 735.628997][ C1] ? end_repeat_nmi+0xf/0x53 [ 735.629011][ C1] ? advance_sched+0x68f/0xc60 [ 735.629027][ C1] ? rcu_is_watching+0x60/0xc0 [ 735.629044][ C1] ? rcu_is_watching+0x60/0xc0 [ 735.629060][ C1] ? rcu_is_watching+0x60/0xc0 [ 735.629076][ C1] [ 735.629081][ C1] [ 735.629085][ C1] advance_sched+0x919/0xc60 [ 735.629104][ C1] ? __pfx_advance_sched+0x10/0x10 [ 735.629119][ C1] __hrtimer_run_queues+0x20a/0xae0 [ 735.629137][ C1] ? __pfx___hrtimer_run_queues+0x10/0x10 [ 735.629153][ C1] ? read_tsc+0x9/0x20 [ 735.629172][ C1] hrtimer_interrupt+0x392/0x8e0 [ 735.629192][ C1] __sysvec_apic_timer_interrupt+0x10f/0x400 [ 735.629208][ C1] sysvec_apic_timer_interrupt+0x9f/0xc0 [ 735.629225][ C1] [ 735.629229][ C1] [ 735.629233][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 735.629246][ C1] RIP: 0010:finish_task_switch.isra.0+0x220/0xcc0 [ 735.629262][ C1] Code: a9 0a 00 00 44 8b 0d c3 09 02 0f 45 85 c9 0f 85 c0 01 00 00 48 89 df e8 ae f8 ff ff e8 99 e4 38 00 fb 65 48 8b 1d 70 53 a6 7e <48> 8d bb f8 15 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 [ 735.629273][ C1] RSP: 0018:ffffc900043d7920 EFLAGS: 00000202 [ 735.629283][ C1] RAX: 00000000000000b9 RBX: ffff88802844c880 RCX: 1ffffffff20be339 [ 735.629292][ C1] RDX: 0000000000000000 RSI: ffffffff8b6cdee0 RDI: ffffffff8bd0e980 [ 735.629300][ C1] RBP: ffffc900043d7968 R08: 0000000000000001 R09: 0000000000000001 [ 735.629308][ C1] R10: ffffffff905f5c17 R11: 0000000000000000 R12: ffff8880b873f9e0 [ 735.629316][ C1] R13: ffff888028854880 R14: 0000000000000000 R15: ffff8880b863ebc0 [ 735.629329][ C1] ? __switch_to+0x749/0x1190 [ 735.629346][ C1] __schedule+0xe60/0x5ad0 [ 735.629367][ C1] ? __pfx___schedule+0x10/0x10 [ 735.629384][ C1] ? find_held_lock+0x2d/0x110 [ 735.629402][ C1] ? try_to_wake_up+0x949/0x1490 [ 735.629416][ C1] ? preempt_schedule_thunk+0x1a/0x30 [ 735.629429][ C1] preempt_schedule_common+0x44/0xc0 [ 735.629446][ C1] preempt_schedule_thunk+0x1a/0x30 [ 735.629460][ C1] try_to_wake_up+0x953/0x1490 [ 735.629475][ C1] ? __pfx_try_to_wake_up+0x10/0x10 [ 735.629487][ C1] ? __pfx_lock_release+0x10/0x10 [ 735.629501][ C1] ? plist_check_head+0xa3/0x150 [ 735.629516][ C1] wake_up_q+0x91/0x140 [ 735.629529][ C1] ? do_raw_spin_unlock+0x172/0x230 [ 735.629545][ C1] futex_wake+0x43e/0x4e0 [ 735.629561][ C1] ? __pfx_futex_wake+0x10/0x10 [ 735.629576][ C1] ? __pfx_posix_clock_realtime_adj+0x10/0x10 [ 735.629592][ C1] do_futex+0x1e5/0x350 [ 735.629604][ C1] ? __pfx_do_futex+0x10/0x10 [ 735.629618][ C1] __x64_sys_futex+0x1e1/0x4c0 [ 735.629631][ C1] ? __pfx___x64_sys_futex+0x10/0x10 [ 735.629644][ C1] ? rcu_is_watching+0x12/0xc0 [ 735.629662][ C1] do_syscall_64+0xcd/0x250 [ 735.629674][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 735.629693][ C1] RIP: 0033:0x7f9bbdd7e819 [ 735.629703][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 735.629714][ C1] RSP: 002b:00007f9bbeb7e0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 735.629725][ C1] RAX: ffffffffffffffda RBX: 00007f9bbdf36088 RCX: 00007f9bbdd7e819 [ 735.629733][ C1] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f9bbdf3608c [ 735.629741][ C1] RBP: 00007f9bbdf36080 R08: 00007f9bbeba0000 R09: 0000000000000000 [ 735.629749][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9bbdf3608c [ 735.629757][ C1] R13: 0000000000000000 R14: 00007ffe948440d0 R15: 00007ffe948441b8 [ 735.629769][ C1] [ 735.630711][ C0] rcu: rcu_preempt kthread starved for 7166 jiffies! g49453 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 [ 736.163306][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 736.173268][ C0] rcu: RCU grace-period kthread stack dump: [ 736.179145][ C0] task:rcu_preempt state:R running task stack:28424 pid:17 tgid:17 ppid:2 flags:0x00004000 [ 736.190900][ C0] Call Trace: [ 736.194174][ C0] [ 736.197101][ C0] __schedule+0xe58/0x5ad0 [ 736.201524][ C0] ? __pfx___lock_acquire+0x10/0x10 [ 736.206734][ C0] ? __pfx___schedule+0x10/0x10 [ 736.211586][ C0] ? schedule+0x298/0x350 [ 736.215916][ C0] ? __pfx_lock_release+0x10/0x10 [ 736.220940][ C0] ? lock_acquire+0x2f/0xb0 [ 736.225438][ C0] ? schedule+0x1fd/0x350 [ 736.229775][ C0] schedule+0xe7/0x350 [ 736.233845][ C0] schedule_timeout+0x124/0x280 [ 736.238712][ C0] ? __pfx_schedule_timeout+0x10/0x10 [ 736.244088][ C0] ? __pfx_process_timeout+0x10/0x10 [ 736.249379][ C0] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 736.255185][ C0] ? prepare_to_swait_event+0xf3/0x470 [ 736.260642][ C0] rcu_gp_fqs_loop+0x1eb/0xb00 [ 736.265406][ C0] ? __pfx_rcu_gp_fqs_loop+0x10/0x10 [ 736.270689][ C0] ? rcu_gp_init+0xc82/0x1630 [ 736.275365][ C0] ? _raw_spin_unlock_irq+0x2e/0x50 [ 736.280571][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 736.286381][ C0] rcu_gp_kthread+0x271/0x380 [ 736.291058][ C0] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 736.296260][ C0] ? lockdep_hardirqs_on+0x7c/0x110 [ 736.301462][ C0] ? __kthread_parkme+0x148/0x220 [ 736.306492][ C0] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 736.311689][ C0] kthread+0x2c1/0x3a0 [ 736.315758][ C0] ? _raw_spin_unlock_irq+0x23/0x50 [ 736.320958][ C0] ? __pfx_kthread+0x10/0x10 [ 736.325550][ C0] ret_from_fork+0x45/0x80 [ 736.329965][ C0] ? __pfx_kthread+0x10/0x10 [ 736.334558][ C0] ret_from_fork_asm+0x1a/0x30 [ 736.339335][ C0] [ 736.342347][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 736.348661][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.12.0-syzkaller-09073-g9f16d5e6f220 #0 [ 736.358632][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 736.368679][ C0] RIP: 0010:acpi_safe_halt+0x1a/0x20 [ 736.373961][ C0] Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 65 48 8b 05 98 cd de 74 48 8b 00 a8 08 75 0c 66 90 0f 00 2d 88 6e b7 00 fb f4 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 [ 736.393563][ C0] RSP: 0018:ffffffff8de07d70 EFLAGS: 00000246 [ 736.399627][ C0] RAX: 0000000000004000 RBX: 0000000000000001 RCX: ffffffff8b24ee99 [ 736.407592][ C0] RDX: 0000000000000001 RSI: ffff888143aa3800 RDI: ffff888143aa3864 [ 736.415556][ C0] RBP: ffff888143aa3864 R08: 0000000000000001 R09: ffffed10170c6fed [ 736.423520][ C0] R10: ffff8880b8637f6b R11: 0000000000000000 R12: ffff88801ff6b800 [ 736.431483][ C0] R13: ffffffff8ee01820 R14: 0000000000000000 R15: 0000000000000000 [ 736.439448][ C0] FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 [ 736.448377][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 736.454958][ C0] CR2: 0000556c05d66ac0 CR3: 0000000078638000 CR4: 00000000003526f0 [ 736.462927][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 736.470942][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 736.478907][ C0] Call Trace: [ 736.482179][ C0] [ 736.485017][ C0] ? rcu_check_gp_kthread_starvation+0x31b/0x450 [ 736.491350][ C0] ? do_raw_spin_unlock+0x172/0x230 [ 736.496550][ C0] ? rcu_sched_clock_irq+0x247a/0x3310 [ 736.502022][ C0] ? timekeeping_advance+0x70a/0xa60 [ 736.507305][ C0] ? __pfx_rcu_sched_clock_irq+0x10/0x10 [ 736.512946][ C0] ? __asan_memcpy+0x3c/0x60 [ 736.517541][ C0] ? rcu_is_watching+0x12/0xc0 [ 736.522312][ C0] ? update_process_times+0x178/0x2d0 [ 736.527684][ C0] ? __pfx_update_process_times+0x10/0x10 [ 736.533494][ C0] ? update_wall_time+0x1c/0x40 [ 736.538355][ C0] ? tick_nohz_handler+0x376/0x530 [ 736.543470][ C0] ? __pfx_tick_nohz_handler+0x10/0x10 [ 736.548931][ C0] ? __hrtimer_run_queues+0x5fb/0xae0 [ 736.554310][ C0] ? __pfx___hrtimer_run_queues+0x10/0x10 [ 736.560027][ C0] ? read_tsc+0x9/0x20 [ 736.564107][ C0] ? hrtimer_interrupt+0x392/0x8e0 [ 736.569231][ C0] ? __sysvec_apic_timer_interrupt+0x10f/0x400 [ 736.575383][ C0] ? sysvec_apic_timer_interrupt+0x9f/0xc0 [ 736.581188][ C0] [ 736.584127][ C0] [ 736.587058][ C0] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 736.593216][ C0] ? ct_kernel_exit+0x139/0x190 [ 736.598074][ C0] ? acpi_safe_halt+0x1a/0x20 [ 736.602751][ C0] acpi_idle_enter+0xc5/0x160 [ 736.607441][ C0] cpuidle_enter_state+0xaa/0x4f0 [ 736.612470][ C0] ? __pfx_tsc_verify_tsc_adjust+0x10/0x10 [ 736.618290][ C0] cpuidle_enter+0x4e/0xa0 [ 736.622721][ C0] do_idle+0x310/0x3f0 [ 736.626788][ C0] ? __pfx_do_idle+0x10/0x10 [ 736.631388][ C0] ? do_idle+0x8/0x3f0 [ 736.635463][ C0] cpu_startup_entry+0x4f/0x60 [ 736.640315][ C0] rest_init+0x16b/0x2b0 [ 736.644561][ C0] ? acpi_subsystem_init+0x133/0x180 [ 736.649854][ C0] ? __pfx_x86_late_time_init+0x10/0x10 [ 736.655411][ C0] start_kernel+0x3e4/0x4d0 [ 736.659923][ C0] x86_64_start_reservations+0x18/0x30 [ 736.665390][ C0] x86_64_start_kernel+0xb2/0xc0 [ 736.670333][ C0] common_startup_64+0x13e/0x148 [ 736.675283][ C0]