last executing test programs: 8m13.247009657s ago: executing program 3 (id=77): r0 = syz_open_dev$vim2m(&(0x7f00000000c0), 0x3, 0x2) ioprio_set$pid(0x1, 0x0, 0x0) creat(0x0, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000b00)={'bond0\x00', &(0x7f0000000a40)=@ethtool_pauseparam={0x13, 0x0, 0x36, 0x101}}) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) sendto$packet(r3, &(0x7f00000002c0)="12030500d3fc120000004788fcd609102c28", 0xfce0, 0x4, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) ioctl$IOMMU_IOAS_ALLOC(0xffffffffffffffff, 0x3b81, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)="711f2abf2d0c383d5264df6f5d89", 0xe}}, 0x0) close(r0) 8m13.014932552s ago: executing program 3 (id=78): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0xfffffffffffffffd) r1 = socket(0x10, 0x80002, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="1800000072000132895343000000000007"], 0x18}, 0x1, 0x0, 0x0, 0x4a002}, 0x0) (fail_nth: 6) setsockopt(0xffffffffffffffff, 0xff, 0x0, 0x0, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000080)=0x4) 8m12.682721828s ago: executing program 3 (id=79): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) (async) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000440)={0x28, 0x0, 0xffffffff}, 0x10) (async, rerun: 64) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip6_flowlabel\x00') (async, rerun: 64) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000280)={@mcast2, 0x800, 0x0, 0x103, 0x1}, 0x20) read$FUSE(r1, &(0x7f00000016c0)={0x2020}, 0x2020) (async, rerun: 64) listen(r0, 0x0) (async, rerun: 64) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) (async) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)={0x24, r6, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0xb}]}, 0x24}, 0x1, 0x0, 0x0, 0x400c000}, 0x0) (async, rerun: 32) sendmsg$NL80211_CMD_JOIN_OCB(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="010028bd7000ffdbdf256c00000008000300", @ANYRES32=r4, @ANYBLOB="08002600710900000800270003000000fce52763339a2994012cc4563bd20ba3c63ef2800b6ef546d00243cf132ef39f068b0fbcb54a74c12e6a6279e8f93d9b3de4800e040b6dea205d394646cde96127bda1d8cb19c352a64353ae9f1e63e6ce7f5defd0744716d260bea7cd152c3579a51f73fa71f64cd920df8617fe2cbdb84d43f3cb8b89f8b6"], 0x2c}, 0x1, 0x0, 0x0, 0x24004015}, 0x448d0) (async, rerun: 32) r8 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r8, &(0x7f0000000100)={0x28, 0x0, 0x0, @local}, 0x10) (async) r9 = accept4$unix(r0, 0x0, 0x0, 0x0) recvmsg(r9, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x32101) (async, rerun: 64) r10 = getpid() (rerun: 64) sched_setscheduler(r10, 0x2, &(0x7f0000000040)=0x7) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r11, &(0x7f0000000180)=@abs, 0x6e) (async, rerun: 32) sendmmsg$unix(r12, &(0x7f00000bd000), 0x318, 0x0) (rerun: 32) recvmmsg(r11, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) syz_io_uring_setup(0x10d, &(0x7f0000000140), &(0x7f0000000340), &(0x7f0000000280)) (async, rerun: 64) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 64) 8m9.794155735s ago: executing program 3 (id=86): mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000004580)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14103e, 0x10) r1 = open(&(0x7f0000000080)='./bus\x00', 0x143042, 0x83) ftruncate(r1, 0x2008002) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x1425}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000380)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x200) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(r5, 0x4004ae8b, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r4, 0x8208ae63, &(0x7f0000000140)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xeffffdff, 0x0, [{0x0, 0x0, 0x0, '\x00', 0x8}, {0x39, 0x5, 0x9}, {}, {0x0, 0x0, 0x7f}, {}, {0x0, 0x0, 0x4}, {0x0, 0x80}, {}, {}, {}, {}, {0x0, 0x4c}, {}, {0x0, 0xf}, {0x0, 0x2}, {}, {0x0, 0x0, 0x0, '\x00', 0x8}, {}, {0x0, 0x0, 0x8}, {}, {0x2}, {}, {0x0, 0x2}, {0x0, 0x0, 0x0, '\x00', 0xfd}]}}) syz_open_dev$tty1(0xc, 0x4, 0x1) connect$qrtr(r0, &(0x7f0000000180)={0x2a, 0x2, 0x3ffe}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r6, &(0x7f0000001b80)=[{{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f00000003c0)=""/222, 0xde}, {&(0x7f00000004c0)=""/186, 0xba}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/158, 0x9e}, {&(0x7f0000001640)=""/76, 0x4c}, {&(0x7f00000016c0)=""/153, 0x99}], 0x6, &(0x7f0000001800)=""/162, 0xa2}, 0x80000000}, {{&(0x7f00000018c0)=@caif=@rfm, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000001940)=""/223, 0xdf}, {&(0x7f0000001a40)=""/112, 0x70}], 0x2, &(0x7f0000001b00)=""/99, 0x63}, 0x6}], 0x2, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r8 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r8) ptrace$pokeuser(0x6, r8, 0x358, 0xfffffffffffffffe) 8m8.50991911s ago: executing program 3 (id=90): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000040)=0x7) mmap(&(0x7f0000a1e000/0x1000)=nil, 0x1000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, &(0x7f0000000480)=@file={0x1, './file0\x00'}, 0x6e) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000080)='.\x00', 0xfe) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000080)='.\x00', 0x80) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) r5 = dup3(r3, r2, 0x0) write$binfmt_script(r4, &(0x7f0000000100), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r6, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r8 = syz_open_dev$dri(&(0x7f0000000080), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r4, 0x4010640d, &(0x7f0000000000)={0x3, 0x2}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r5, 0xc01064b5, &(0x7f0000000140)={&(0x7f00000006c0)=[0x0], 0x1}) ioctl$DRM_IOCTL_MODE_GETPLANE(r8, 0xc02064b6, &(0x7f00000003c0)={r9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_SETCRTC(r8, 0xc06864a2, &(0x7f0000000400)={0x0, 0x0, r10, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "b4bc323ef77d1f000071849800000000deff00000000e6ffffff00"}}) ioctl$DRM_IOCTL_MODE_GETCRTC(r8, 0xc06864a1, &(0x7f0000000340)={0x0, 0x0, r10}) 8m7.48690075s ago: executing program 3 (id=93): r0 = syz_usb_connect(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="11010000733336088dee1adb23610000000109022d0001100000000904000003fe03010009cd8d1f000200000009050502000000001009058b1e20"], 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000300)={0x84, &(0x7f0000001a80)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="6c00000002060104db406e3e0004000200000000100003006269746d61703a706f72740005000400000000000900020073797a32000000000500050000006c000500010006000000240007"], 0x6c}}, 0x0) ioctl$FS_IOC_GETVERSION(r1, 0x80015b11, &(0x7f0000000040)) 8m7.161488468s ago: executing program 32 (id=93): r0 = syz_usb_connect(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="11010000733336088dee1adb23610000000109022d0001100000000904000003fe03010009cd8d1f000200000009050502000000001009058b1e20"], 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000300)={0x84, &(0x7f0000001a80)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="6c00000002060104db406e3e0004000200000000100003006269746d61703a706f72740005000400000000000900020073797a32000000000500050000006c000500010006000000240007"], 0x6c}}, 0x0) ioctl$FS_IOC_GETVERSION(r1, 0x80015b11, &(0x7f0000000040)) 4.498694727s ago: executing program 0 (id=2194): setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/63, 0x3f, 0x40004040, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) r5 = dup(r4) write$UHID_INPUT(r5, &(0x7f00000029c0)={0xc, {"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", 0x1000}}, 0xf13) 3.418860956s ago: executing program 0 (id=2217): userfaultfd(0x1) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80284504, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x8) socket$nl_generic(0x10, 0x3, 0x10) getpgid(0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x100008b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x400000bce) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x1) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) setsockopt(0xffffffffffffffff, 0x84, 0x81, &(0x7f00000002c0), 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$rose(0xffffffffffffffff, 0x104, 0x7, &(0x7f0000000540), 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vxcan1\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000000)={0x1d, r2}, 0x18) sendmsg$can_j1939(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x1d, 0x0, 0x0, {0x0, 0x1ee, 0x2}}, 0x18, &(0x7f00000004c0)={&(0x7f0000000140)='\x00', 0x1}}, 0x0) 3.372014406s ago: executing program 2 (id=2219): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=@newsa={0xf8, 0x10, 0x1, 0x0, 0x0, {{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in=@dev, 0x0, 0x3c}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@tfcpad={0x8}]}, 0xf8}}, 0x0) connect$inet6(r3, 0x0, 0x0) recvmmsg(r3, &(0x7f0000003540)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000580)=""/185, 0xb9}], 0x1}, 0x7}], 0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000440)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_POWER_SAVE(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f0000001080)={0x24, r1, 0x1, 0x70bd2d, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0xc040}, 0x80) 3.352313489s ago: executing program 0 (id=2220): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x88, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x3ffffffffffffda, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000022008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r4, 0x40045532, &(0x7f0000000040)) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x40000000040201, 0x0) r6 = syz_open_dev$sndpcmp(&(0x7f00000001c0), 0x0, 0xa2c65) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0xa}}, 0x20) ioctl$SNDRV_PCM_IOCTL_REWIND(r6, 0x40084146, &(0x7f00000003c0)=0x8) 3.210986916s ago: executing program 2 (id=2222): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a58000000090a010400000000000000000000000008000a40000000000900010073797a4d000000000900020073797a3200000000080005400000001f080003400000001408000c40100000000c000b4000"], 0x80}}, 0x0) 3.135203758s ago: executing program 2 (id=2223): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCPKT(r3, 0x5420, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000300)={0x0, 0xfffffffd, 0x0, 0x0, 0x0, "000600"}) r4 = syz_open_pts(r3, 0x0) ioctl$TCSETSW(r3, 0x5403, &(0x7f00000000c0)={0x81, 0xd, 0x2c2f, 0x7f, 0x1, "1381146fee396d8d24902b030211e952c832fe"}) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000018c0)=0x13) 2.718924952s ago: executing program 4 (id=2228): r0 = syz_open_dev$cec(&(0x7f0000000000), 0xffffffffffffffff, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) ioctl$CEC_DQEVENT(r0, 0xc0506107, 0x0) ioctl$CEC_DQEVENT(r0, 0xc0506107, &(0x7f0000000100)={0x0, 0x0, 0x0, @lost_msgs}) 2.642309846s ago: executing program 4 (id=2229): r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@bridge_setlink={0x24, 0x13, 0x0, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x4}]}, 0x24}}, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f00000000c0)=0x1bc6, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 1.911957177s ago: executing program 0 (id=2236): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x38, 0x16, 0xa, 0x401, 0xb00, 0x0, {0x1}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8, 0x1, 0x1, 0x0, 0x2}]}]}], {0x14, 0x10}}, 0xa0}}, 0x0) 1.899163024s ago: executing program 2 (id=2237): fsopen(&(0x7f00000002c0)='rpc_pipefs\x00', 0x0) getpid() r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000240), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x50}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000300)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) 1.750877622s ago: executing program 0 (id=2238): fsopen(&(0x7f00000002c0)='rpc_pipefs\x00', 0x0) r0 = getpid() r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000240), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x50}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000300)=0x7) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r4 = socket$phonet_pipe(0x23, 0x5, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000000ad0000009500000000000000b55909295a0e122264cbdcb8225a1bfd516affb630817964"], &(0x7f0000000180)='GPL\x00', 0x2, 0xe9, &(0x7f0000000240)=""/233, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) setsockopt$PNPIPE_ENCAP(r4, 0x113, 0x1, &(0x7f0000000140)=0x1, 0x4) 1.717854386s ago: executing program 4 (id=2239): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)={0x28, 0x0, 0x8, 0x801, 0x0, 0x0, {0x0, 0x0, 0x1}, [@CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x28}}, 0x40) 1.54973769s ago: executing program 5 (id=2240): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_emit_ethernet(0x4e, &(0x7f0000000880)={@link_local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "010448", 0x18, 0x3a, 0x1, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, '\x00', @remote}}}}}}, 0x0) recvmsg(r0, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) 1.490875851s ago: executing program 4 (id=2241): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, 0x0, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000600), 0x0, &(0x7f0000000680)={0x7ff}, 0x0, 0x0) 1.382112032s ago: executing program 5 (id=2242): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000014007910480000000000790020000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x21) 1.378538477s ago: executing program 1 (id=2243): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000001a00010000000000000000000a000000", @ANYRES32=0x0, @ANYBLOB="00000000140003000700000000000000000000000000000014000100ff01"], 0x44}}, 0x0) 1.238709085s ago: executing program 1 (id=2244): socket$unix(0x1, 0x1, 0x0) r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) r1 = dup(r0) socket$nl_generic(0x10, 0x3, 0x10) write$cgroup_pid(r1, &(0x7f0000000040)=0xffffffffffffffff, 0x12) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r2, &(0x7f0000847fff)='X', 0xfee4, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0xe, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}}}, &(0x7f0000000000)=0x100) 1.134904166s ago: executing program 5 (id=2245): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f000000b500), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f000000d040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2c, r1, 0x8de13c6b70ae92c3, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xd8}]}]}]}, 0x2c}}, 0x0) 1.122636984s ago: executing program 1 (id=2246): madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) mremap(&(0x7f0000dde000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000bb3000/0x1000)=nil) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) prlimit64(0x0, 0x3, 0x0, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r4, 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000040), 0x0, 0x2) r5 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r2, 0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x3000, 0x2}, [@IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_SPOOFCHK={0xc, 0x4, {0x9, 0xb}}]}]}]}, 0x34}}, 0x4004814) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000040)={0x11, @loopback, 0x0, 0x0, 'ovf\x00', 0x1d}, 0x2c) socket$inet6(0xa, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x34, 0x0, 0x0) 573.145013ms ago: executing program 5 (id=2247): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r0, 0x0) mq_open(0x0, 0x800, 0x25, &(0x7f0000000400)={0x2, 0xfffffffffffffffd, 0x63, 0x9}) 571.66761ms ago: executing program 1 (id=2248): bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, &(0x7f0000000400)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x18539000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = syz_open_procfs(0x0, &(0x7f0000000480)='net/icmp6\x00') preadv(r3, &(0x7f0000000e00)=[{&(0x7f0000000340)=""/165, 0xa5}], 0x1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 498.910016ms ago: executing program 4 (id=2249): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/fscaps', 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) flistxattr(r1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_cred(r2, 0x1, 0x46, &(0x7f0000000080), 0xc) r3 = openat$mice(0xffffff9c, &(0x7f0000000540), 0x20400) openat(r0, &(0x7f0000000040)='./file0\x00', 0x101000, 0x0) syz_clone3(&(0x7f0000000580)={0x200024000, 0x0, 0x0, 0x0, {0x26}, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0x0], 0x1, {r3}}, 0x58) mknodat$null(r0, &(0x7f0000000180)='./file0\x00', 0x2, 0x103) 498.452777ms ago: executing program 4 (id=2250): r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000004c0)='ns/uts\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r0, 0x4008941a, &(0x7f0000000040)=0x2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000100)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101301) ioctl$USBDEVFS_CLEAR_HALT(r5, 0xc0185502, &(0x7f0000000340)={0x1, 0x1}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x1d, 0x0, 0x0) lseek(0xffffffffffffffff, 0x7fffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r6 = add_key$keyring(&(0x7f0000000080), &(0x7f0000001100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, &(0x7f0000000580)="303e3080020000000900f190c937dc6b14243b0402e8886ff204d830fa5b3ba026b4fb643891162fb3fbf36e7118a3d45a46b678a2e5b247a74fb2c38c802a2a8c", 0x41, r6) add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc1}, &(0x7f0000000240)={0x0, "83bc62ecb891d5e89c4fff510296a9e7a06d0a943c270f2726c07582a48b5288aa73339bfba20f597dcdf5ae37b00f498de2c929c1c2fdf8eb7412b369a54352", 0x29}, 0x48, r6) getpid() 443.34594ms ago: executing program 5 (id=2251): syz_open_procfs$userns(0xffffffffffffffff, 0x0) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x200400c0) getpid() close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f00000000c0)=0xa0000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f0000000040)={@hyper}) ioctl$IOCTL_VMCI_DATAGRAM_SEND(r0, 0x7ab, &(0x7f0000000540)={&(0x7f0000000a00)={{@host}, {@hyper, 0xffffffff}, 0x400, "d751b6c3ff77ccd39e2f481cc72144c85ae9fc5c2d5d1c0ecb93dc3797d9db646c1a9a6d7c48a2b73e72e56b7209dabaa882b24ad1ac5d69cba93397ca5533d75e4861b6b1ce9c03d79584c12010a3de87d6b63f52e49bc7275092114b4a5a2f2072f44cce8b1c3c77448d3f3e5a5645068105cfea97ba3b1fe65fa2f714e345cc420adce55b522f7c6d53fd855c86bef80dc806fd0eac6fe517c5eff3d4b9885410e38bf0c18e3b504e64541117ed3f5f73f277dfb29d20f64c79cae24939c1b2c0da483df3171222a1d84b2655ca2e6ec73a7b7ace45a8a8eb15f383464f420865ecd8807ed891c3a5772e29371e5b7ac197f71e582556719284f5bac770d579512743626c864e72140d4bf4622f6693dcfebc356789bf2408eed7220cb7333f6a7c88fcdc2b77b5add1eb759ed337c76d113c42d86a42af43d2d5022217f5846060999712f775d877745ff9f5366fdaf01e2772d5a0fde1190b9159f660c63ca5a7fa3dfd346a9e76522936d5d82691e9c653b3feee987d82ea786056f3f8d81c36f1333deb26a3d4b752eec3bd43ab50035e7addea884e524e5fc416ffe6bb20558c70746aa7bb63f6b68c5135afc10164b8766278863e26660d18f48bb9b43005c399d0c3d652afe7955f162c3ef3fa937769a692e0c58039311550fcc8edf213ab411bf62d0789520d478bee64ea6b6071960950ea365e642ab713df32b2c704a60056a467286d84ce82f8859a2ad0a9a8497943be7803fdde7d43af25d0df74a99dae3d2afbf72576d53b97fb05deaee0265e0370942519eabec11db70219d86651f9ef5ba247b3aec9af50c17bbd6bf41169caca3b8f9bebc692270ec191b41e9f3ea83e2c2935d2b29ebebbb03902d5575a0b00fe7aadea02113945402c57429b55b52d0b63ee5c823b119b7a8a67089d90a7b6d0d66c82a8219a1c8b0d06b52c17e1c11dd3146e6f68f487bd725fa7700c3b92f74e754101e6805622b64d3344929eefcacb66a4686f39913ab900f05a540be2bdb151dfaa425bf881fed679d2bcd50e4d197dbf8e9c0ff5d6b6f811b9ed8bdc45cc7945e100134275cef651332544a1389bb37642a4533ea6a53ee3599d769ab3a2386617bbba385b0518e69b618b6660514f243347721eed0b5bee77e357e61511eba8bd257e9f61f1b62f5efeefc6160c534222dc1c97799911f6bf765060ed263c6e763985ca13a200cd6097b83dde48db8f4ef5f9bbeabf4dea8628fdcd461b0158df69d1fe262cc1ffb183d1c1adcf652388d54901b25268991b06986470dd39f07f993096fcda24fe1a95057f2d44366677de90750caa35788acd14c2db28646d65d02e312c656c9da5a577da084a77ab17da0d123fe90a0132322b1c72b444c7fb5b6712ae70aa332e467aafb675043fa268860749845c5157bc4423609b7942d58e83ca"}, 0x418}) syz_emit_vhci(0x0, 0x8) syz_emit_vhci(0x0, 0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) 428.692073ms ago: executing program 1 (id=2252): r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000180)={0x42}, 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000000)={0x40000042}, 0x10) r2 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f00000001c0)={0x8000042}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 318.874806ms ago: executing program 5 (id=2253): r0 = socket$alg(0x26, 0x5, 0x0) accept4$alg(r0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') chmod(&(0x7f00000000c0)='./bus\x00', 0x21e) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) prlimit64(0x0, 0xe, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, &(0x7f00000002c0)=""/163, 0xa3) syz_usb_connect$hid(0x0, 0x36, 0x0, 0x0) r5 = shmget(0x1, 0x4000, 0x200, &(0x7f0000ffb000/0x4000)=nil) shmat(r5, &(0x7f0000ff9000/0x1000)=nil, 0x4000) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x9) shmctl$IPC_RMID(0x0, 0x0) r6 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r6, &(0x7f0000003a80)={&(0x7f00000004c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000003a00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0xd}, @multicast1}}}], 0x20}, 0x4008804) sendmsg$inet(r6, &(0x7f0000000c00)={&(0x7f0000000540)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000400)}, 0x0) 318.572185ms ago: executing program 1 (id=2254): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) epoll_create1(0x80000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x0, 0x200}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r1, 0x1, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)=ANY=[], 0x20) sendmsg$nl_xfrm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYRES32=0x0], 0xc0}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x7fffffffffffffff, 0x3) setresuid(0x0, 0x0, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x7}, 0x0) 107.17537ms ago: executing program 2 (id=2255): mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) dup(0xffffffffffffffff) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) setxattr$trusted_overlay_redirect(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) 316.168µs ago: executing program 0 (id=2256): clock_adjtime(0x0, &(0x7f0000000480)={0xd54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}) 0s ago: executing program 2 (id=2257): socket$can_j1939(0x1d, 0x2, 0x7) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) socket$tipc(0x1e, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r4 = syz_open_dev$sndpcmc(&(0x7f0000004240), 0x18, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS64(r4, 0xc0844123, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) r5 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_elf64(r5, &(0x7f0000000600)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x8, 0xb, 0x0, 0xffffffff00000001, 0x3, 0x3, 0x1, 0x138, 0x40, 0x344, 0x0, 0x741, 0x38, 0x1, 0x2e9d, 0x200}, [{0x70000000, 0x4, 0x401, 0xb0b, 0x4, 0x5, 0x0, 0x7}]}, 0x78) kernel console output (not intermixed with test programs): pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ead } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:57:50 syzkaller kern.notice kernel: [ 500.766439][ T29] audit: type=1400 audit(1730509069.996:1382): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:57:50 syzkaller kern.notice kernel: [ 500.792287][ T29] audit: type=1400 audit(1730509070.046:1383): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 sconte[ 500.997717][ T29] audit: type=1400 audit(1730509070.076:1386): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 xt=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 2 00:57:50 syzkaller kern.notice kernel: [ 500.817950][ T29] audit: type=1400 audit(1730509070.046:1384): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:57:50 syzkaller kern.notice kernel: [ 500.919841][ T29[ 501.055066][ T29] audit: type=1400 audit(1730509070.116:1387): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ] audit: type=1400 audit(1730509070.046:1385): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:57:50 syzkaller kern.notice kernel: [ 500.997717][ T29] audit: type=1400 audit(1730509070.076:1386): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:57:50 syzkaller kern.notice kernel: [ 501.055066][ T29] audit: type=1400 audit(1730509070.116:1387): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 501.363563][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 Nov 2 00:57:50 syzkaller kern.warn kernel: [ 501.363563][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 [ 503.063593][T12042] snd_dummy snd_dummy.0: control -16777217:0:0:syz0:0 is already present Nov 2 00:57:52 syzkaller kern.err kernel: [ 503.063593][T12042] snd_dummy snd_dummy.0: control -16777217:0:0:syz0:0 is already present [ 504.397219][T12064] FAULT_INJECTION: forcing a failure. [ 504.397219][T12064] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 504.464420][T12064] CPU: 0 UID: 0 PID: 12064 Comm: syz.5.1467 Not tainted 6.12.0-rc5-syzkaller-00181-g6c52d4da1c74 #0 [ 504.475216][T12064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 504.485281][T12064] Call Trace: [ 504.488561][T12064] [ 504.491496][T12064] dump_stack_lvl+0x16c/0x1f0 [ 504.496193][T12064] should_fail_ex+0x497/0x5b0 [ 504.500893][T12064] _copy_to_user+0x32/0xd0 [ 504.505324][T12064] simple_read_from_buffer+0xd0/0x160 [ 504.510721][T12064] proc_fail_nth_read+0x198/0x270 [ 504.515758][T12064] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 504.521314][T12064] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 504.526865][T12064] vfs_read+0x1df/0xbe0 [ 504.531020][T12064] ? __fget_files+0x23a/0x3f0 [ 504.535692][T12064] ? fdget_pos+0x24c/0x360 [ 504.540127][T12064] ? __pfx_lock_release+0x10/0x10 [ 504.545141][T12064] ? trace_lock_acquire+0x14a/0x1d0 [ 504.550335][T12064] ? __pfx_vfs_read+0x10/0x10 [ 504.555010][T12064] ? __pfx___mutex_lock+0x10/0x10 [ 504.560042][T12064] ? __fget_files+0x244/0x3f0 [ 504.564720][T12064] ksys_read+0x12f/0x260 [ 504.568958][T12064] ? __pfx_ksys_read+0x10/0x10 [ 504.573729][T12064] do_syscall_64+0xcd/0x250 [ 504.578232][T12064] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 504.584124][T12064] RIP: 0033:0x7f4cf3d7d15c [ 504.588528][T12064] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 504.608128][T12064] RSP: 002b:00007f4cf4b37030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 504.616536][T12064] RAX: ffffffffffffffda RBX: 00007f4cf3f36130 RCX: 00007f4cf3d7d15c [ 504.624496][T12064] RDX: 000000000000000f RSI: 00007f4cf4b370a0 RDI: 000000000000000a [ 504.632456][T12064] RBP: 00007f4cf4b37090 R08: 0000000000000000 R09: 0000000000000000 [ 504.640415][T12064] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 504.648379][T12064] R13: 0000000000000000 R14: 00007f4cf3f36130 R15: 00007ffe4bc31998 [ 504.656353][T12064] Nov 2 00:57:53 syzkaller kern.notice kernel: [ 504.397219][T12064] FAULT_INJECTION: forcing a failure. Nov 2 00:57:53 syzkaller kern.notice kernel: [ 504.397219][T12064] name fail_usercopy, interval 1, probability 0, space 0, times 0 Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.464420][T12064] CPU: 0 UID: 0 PID: 12064 Comm: syz.5.1467 Not tainted 6.12.0-rc5-syzkaller-00181-g6c52d4da1c74 #0 Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.475216][T12064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.485281][T12064] Call Trace: Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.488561][T12064] Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.491496][T12064] dump_stack_lvl+0x16c/0x1f0 Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.496193][T12064] should_fail_ex+0x497/0x5b0 Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.500893][T12064] _copy_to_user+0x32/0xd0 Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.505324][T12064] simple_read_from_buffer+0xd0/0x160 Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.510721][T12064] proc_fail_nth_read+0x198/0x270 Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.515758][T12064] ? __pfx_proc_fail_nth_read+0x10/0x10 Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.521314][T12064] ? __pfx_proc_fail_nth_read+0x10/0x10 Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.526865][T12064] vfs_read+0x1df/0xbe0 Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.531020][T12064] ? __fget_files+0x23a/0x3f0 Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.535692][T12064] ? fdget_pos+0x24c/0x360 Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.540127][T12064] ? __pfx_lock_release+0x10/0x10 Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.545141][T12064] ? trace_lock_acquire+0x14a/0x1d0 Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.550335][T12064] ? __pfx_vfs_read+0x10/0x10 Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.555010][T12064] ? __pfx___mutex_lock+0x10/0x10 Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.560042][T12064] ? __fget_files+0x244/0x3f0 Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.564720][T12064] ksys_read+0x12f/0x260 Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.568958][T12064] ? __pfx_ksys_read+0x10/0x10 Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.573729][T12064] do_syscall_64+0xcd/0x250 Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.578232][T12064] entry_SYSCALL_64_after_hwframe+0x77/0x7f Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.584124][T12064] RIP: 0033:0x7f4cf3d7d15c Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.588528][T12064] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.608128][T12064] RSP: 002b:00007f4cf4b37030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.616536][T12064] RAX: ffffffffffffffda RBX: 00007f4cf3f36130 RCX: 00007f4cf3d7d15c Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.624496][T12064] RDX: 000000000000000f RSI: 00007f4cf4b370a0 RDI: 000000000000000a Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.632456][T12064] RBP: 00007f4cf4b37090 R08: 0000000000000000 R09: 0000000000000000 Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.640415][T12064] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.648379][T12064] R13: 0000000000000000 R14: 00007f4cf3f36130 R15: 00007ffe4bc31998 Nov 2 00:57:53 syzkaller kern.warn kernel: [ 504.656353][T12064] [ 505.185934][T12071] ceph: No mds server is up or the cluster is laggy Nov 2 00:57:54 syzkaller kern.info kernel: [ 505.185934][T12071] ceph: No mds server is up or the cluster is laggy [ 505.793566][ T29] kauditd_printk_skb: 220 callbacks suppressed [ 505.793585][ T29] audit: type=1400 audit(1730509075.046:1608): avc: denied { read write } for pid=6206 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Nov 2 00:57:55 [ 505.879784][ T29] audit: type=1400 audit(1730509075.136:1609): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 505.902866][ T29] audit: type=1400 audit(1730509075.136:1610): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 5[ 505.926430][ T29] audit: type=1400 audit(1730509075.166:1611): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 05.793566][ T2[ 505.951626][ T29] audit: type=1400 audit(1730509075.186:1612): avc: denied { read write } for pid=12077 comm="syz.5.1470" name="vmci" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 9] kauditd_print[ 505.976039][ T29] audit: type=1400 audit(1730509075.186:1613): avc: denied { read write } for pid=12077 comm="syz.5.1470" name="vmci" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 k_skb: 220 callbacks suppressed Nov 2 00:57:55[ 506.004195][ T29] audit: type=1400 audit(1730509075.266:1614): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.[ 506.027060][ T29] audit: type=1400 audit(1730509075.266:1615): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 notice kernel: [ 505.793585][ T29] audit: type=1400 audit(1730509075.046:1608): avc: denied { read write } for pid=6206 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 2 00:57:55 syzkaller kern.notice kernel: [ 505.879784][ T29] audit: type=1400 audit(1730509075.136:1609): avc: den[ 506.081528][ T29] audit: type=1400 audit(1730509075.266:1616): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:57:55 syzkaller kern.notice kernel: [ 505.902866][ T29] audit: type=1400 audit(1730509075.136:1610): avc: denied { read } for pid=5183 comm="syslogd" n[ 506.132505][ T29] audit: type=1400 audit(1730509075.266:1617): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ame="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:57:55 syzkaller kern.notice kernel: [ 505.926430][ T29] audit: type=1400 audit(1730509075.166:1611): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 2 00:57:55 syzkaller kern.notice kernel: [ 505.951626][ T29] audit: type=1400 audit(1730509075.186:1612): avc: denied { read write } for pid=12077 comm="syz.5.1470" name="vmci" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devi Nov 2 00:57:55 syzkaller kern.notice kernel: [ 505.976039][ T29] audit: type=1400 audit(1730509075.186:1613): avc: denied { read write } for pid=12077 comm="syz.5.1470" name="vmci" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devi Nov 2 00:57:55 syzkaller kern.notice kernel: [ 506.004195][ T29] audit: type=1400 audit(1730509075.266:1614): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:57:55 syzkaller kern.notice kernel: [ 506.027060][ T29] audit: type=1400 audit(1730509075.266:1615): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:57:55 syzkaller kern.notice kernel: [ 506.081528][ T29] audit: type=1400 audit(1730509075.266:1616): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:57:55 syzkaller kern.notice kernel: [ 506.132505][ T29] audit: type=1400 audit(1730509075.266:1617): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 507.481743][T12110] xt_TPROXY: Can be used only with -p tcp or -p udp Nov 2 00:57:56 syzkaller kern.info kernel: [ 507.481743][T12110] xt_TPROXY: Can be used only with -p tcp or -p udp [ 508.101896][T12141] FAULT_INJECTION: forcing a failure. [ 508.101896][T12141] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 508.123576][T12141] CPU: 1 UID: 0 PID: 12141 Comm: syz.1.1493 Not tainted 6.12.0-rc5-syzkaller-00181-g6c52d4da1c74 #0 [ 508.134342][T12141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 508.144386][T12141] Call Trace: [ 508.147650][T12141] [ 508.150582][T12141] dump_stack_lvl+0x16c/0x1f0 [ 508.155258][T12141] should_fail_ex+0x497/0x5b0 [ 508.159948][T12141] ? fs_reclaim_acquire+0xae/0x150 [ 508.165040][T12141] should_fail_alloc_page+0xe7/0x130 [ 508.170313][T12141] prepare_alloc_pages.constprop.0+0x16f/0x560 [ 508.176462][T12141] ? __pfx_mark_lock+0x10/0x10 [ 508.181232][T12141] __alloc_pages_noprof+0x190/0x25a0 [ 508.186516][T12141] ? hlock_class+0x4e/0x130 [ 508.191005][T12141] ? mark_lock+0xb5/0xc60 [ 508.195316][T12141] ? __pfx___lock_acquire+0x10/0x10 [ 508.200504][T12141] ? __pfx___alloc_pages_noprof+0x10/0x10 [ 508.206211][T12141] ? __pfx_lock_release+0x10/0x10 [ 508.211214][T12141] ? __pfx___lock_acquire+0x10/0x10 [ 508.216398][T12141] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 508.222279][T12141] ? policy_nodemask+0xea/0x4e0 [ 508.227124][T12141] alloc_pages_mpol_noprof+0x2c9/0x610 [ 508.232569][T12141] ? __pfx_alloc_pages_mpol_noprof+0x10/0x10 [ 508.238619][T12141] ? __pfx_lock_release+0x10/0x10 [ 508.243625][T12141] ? xas_load+0x49/0x5b0 [ 508.247844][T12141] ? filemap_get_entry+0xd0/0x3c0 [ 508.252853][T12141] folio_alloc_noprof+0x1e/0xc0 [ 508.257686][T12141] filemap_alloc_folio_noprof+0x3b4/0x480 [ 508.263397][T12141] ? __pfx_filemap_get_entry+0x10/0x10 [ 508.268837][T12141] ? __pfx_filemap_alloc_folio_noprof+0x10/0x10 [ 508.275067][T12141] __filemap_get_folio+0x539/0xaf0 [ 508.280163][T12141] ioctx_alloc+0x757/0x1fc0 [ 508.284653][T12141] ? __might_fault+0x13b/0x190 [ 508.289404][T12141] ? __pfx_ioctx_alloc+0x10/0x10 [ 508.294319][T12141] ? lock_acquire+0x2f/0xb0 [ 508.298822][T12141] ? __might_fault+0xe3/0x190 [ 508.303481][T12141] __x64_sys_io_setup+0xc9/0x210 [ 508.308404][T12141] do_syscall_64+0xcd/0x250 [ 508.312893][T12141] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 508.318767][T12141] RIP: 0033:0x7f7c8057e719 [ 508.323175][T12141] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 508.342765][T12141] RSP: 002b:00007f7c812e5038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ce [ 508.351178][T12141] RAX: ffffffffffffffda RBX: 00007f7c80736058 RCX: 00007f7c8057e719 [ 508.359127][T12141] RDX: 0000000000000000 RSI: 0000000020000680 RDI: 0000000000002004 [ 508.367073][T12141] RBP: 00007f7c812e5090 R08: 0000000000000000 R09: 0000000000000000 [ 508.375022][T12141] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 508.382967][T12141] R13: 0000000000000000 R14: 00007f7c80736058 R15: 00007ffee67da848 [ 508.390924][T12141] Nov 2 00:57:57 syzkaller kern.notice kernel: [ 508.101896][T12141] FAULT_INJECTION: forcing a failure. Nov 2 00:57:57 syzkaller kern.notice kernel: [ 508.101896][T12141] name fail_page_alloc, interval 1, probability 0, space 0, times 0 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.123576][T12141] CPU: 1 UID: 0 PID: 12141 Comm: syz.1.1493 Not tainted 6.12.0-rc5-syzkaller-00181-g6c52d4da1c74 #0 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.134342][T12141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.144386][T12141] Call Trace: Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.147650][T12141] Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.150582][T12141] dump_stack_lvl+0x16c/0x1f0 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.155258][T12141] should_fail_ex+0x497/0x5b0 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.159948][T12141] ? fs_reclaim_acquire+0xae/0x150 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.165040][T12141] should_fail_alloc_page+0xe7/0x130 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.170313][T12141] prepare_alloc_pages.constprop.0+0x16f/0x560 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.176462][T12141] ? __pfx_mark_lock+0x10/0x10 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.181232][T12141] __alloc_pages_noprof+0x190/0x25a0 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.186516][T12141] ? hlock_class+0x4e/0x130 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.191005][T12141] ? mark_lock+0xb5/0xc60 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.195316][T12141] ? __pfx___lock_acquire+0x10/0x10 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.200504][T12141] ? __pfx___alloc_pages_noprof+0x10/0x10 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.206211][T12141] ? __pfx_lock_release+0x10/0x10 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.211214][T12141] ? __pfx___lock_acquire+0x10/0x10 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.216398][T12141] ? __sanitizer_cov_trace_switch+0x54/0x90 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.222279][T12141] ? policy_nodemask+0xea/0x4e0 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.227124][T12141] alloc_pages_mpol_noprof+0x2c9/0x610 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.232569][T12141] ? __pfx_alloc_pages_mpol_noprof+0x10/0x10 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.238619][T12141] ? __pfx_lock_release+0x10/0x10 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.243625][T12141] ? xas_load+0x49/0x5b0 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.247844][T12141] ? filemap_get_entry+0xd0/0x3c0 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.252853][T12141] folio_alloc_noprof+0x1e/0xc0 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.257686][T12141] filemap_alloc_folio_noprof+0x3b4/0x480 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.263397][T12141] ? __pfx_filemap_get_entry+0x10/0x10 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.268837][T12141] ? __pfx_filemap_alloc_folio_noprof+0x10/0x10 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.275067][T12141] __filemap_get_folio+0x539/0xaf0 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.280163][T12141] ioctx_alloc+0x757/0x1fc0 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.284653][T12141] ? __might_fault+0x13b/0x190 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.289404][T12141] ? __pfx_ioctx_alloc+0x10/0x10 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.294319][T12141] ? lock_acquire+0x2f/0xb0 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.298822][T12141] ? __might_fault+0xe3/0x190 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.303481][T12141] __x64_sys_io_setup+0xc9/0x210 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.308404][T12141] do_syscall_64+0xcd/0x250 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.312893][T12141] entry_SYSCALL_64_after_hwframe+0x77/0x7f Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.318767][T12141] RIP: 0033:0x7f7c8057e719 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.323175][T12141] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.342765][T12141] RSP: 002b:00007f7c812e5038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ce Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.351178][T12141] RAX: ffffffffffffffda RBX: 00007f7c80736058 RCX: 00007f7c8057e719 Nov 2 00:57:57 syzkaller kern.warn kernel: [ 508.359127][T12141Nov 2 00:57:57 Nov 2 00:57:58 syzkaller daemon.err dhcpcd[5495]: ps_sendpsmmsg: Connection refused Nov 2 00:57:58 syzkaller daemon.err dhcpcd[5495]: ps_root_recvmsgcb: failed to send message to pid 11073: Connection refused [ 510.816298][ T29] kauditd_printk_skb: 379 callbacks suppressed [ 510.816316][ T29] audit: type=1400 audit(1730509080.076:1997): avc: denied { execute } for pid=12216 comm="syz.4.1524" path="/325/cpu.stat" dev="tmpfs" ino=1773 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 Nov 2 00:58:00 syzkaller kern.warn kernel: [ 510.816298][ T29] kauditd_printk_skb: 379 callbacks suppressed Nov 2 00:58:00 syzkaller kern.notice kernel: [ 510.816316][ T29] audit: type=1400 audit(1730509080.076:1997[ 510.871124][ T29] audit: type=1400 audit(1730509080.076:1998): avc: denied { create } for pid=12216 comm="syz.4.1524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 ): avc: denied [ 510.891443][ T29] audit: type=1400 audit(1730509080.076:1999): avc: denied { create } for pid=12216 comm="syz.4.1524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 { execute } for[ 510.913188][ T29] audit: type=1400 audit(1730509080.076:2000): avc: denied { create } for pid=12216 comm="syz.4.1524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 pid=12216 comm[ 510.935015][ T29] audit: type=1400 audit(1730509080.076:2001): avc: denied { execmem } for pid=12216 comm="syz.4.1524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 ="syz.4.1524" pa[ 510.955546][ T29] audit: type=1400 audit(1730509080.076:2002): avc: denied { create } for pid=12216 comm="syz.4.1524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 th="/325/cpu.sta[ 510.977175][ T29] audit: type=1400 audit(1730509080.076:2003): avc: denied { create } for pid=12216 comm="syz.4.1524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 t" dev="tmpfs" i[ 510.999313][ T29] audit: type=1400 audit(1730509080.076:2004): avc: denied { read write } for pid=12216 comm="syz.4.1524" name="video36" dev="devtmpfs" ino=1044 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 no=1773 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user [ 510.999353][ T29] audit: type=1400 audit(1730509080.076:2005): avc: denied { create } for pid=12216 comm="syz.4.1524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 510.999386][ T29] audit: type=1400 audit(1730509080.096:2006): avc: denied { read write } for pid=6206 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Nov 2 00:58:00 syzkaller kern.notice kernel: [ 510.871124][ T29] audit: type=1400 audit(1730509080.076:1998): avc: denied { create } for pid=12216 comm="syz.4.1524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 Nov 2 00:58:00 syzkaller kern.notice kernel: [ 510.891443][ T29] audit: type=1400 audit(1730509080.076:1999): avc: denied { create } for pid=12216 comm="syz.4.1524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis Nov 2 00:58:00 syzkaller kern.notice kernel: [ 510.913188][ T29] audit: type=1400 audit(1730509080.076:2000): avc: denied { create } for pid=12216 comm="syz.4.1524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissi Nov 2 00:58:00 syzkaller kern.notice kernel: [ 510.935015][ T29] audit: type=1400 audit(1730509080.076:2001): avc: denied { execmem } for pid=12216 comm="syz.4.1524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Nov 2 00:58:00 syzkaller kern.notice kernel: [ 510.955546][ T29] audit: type=1400 audit(1730509080.076:2002): avc: denied { create } for pid=12216 comm="syz.4.1524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissi Nov 2 00:58:00 syzkaller kern.notice kernel: [ 510.977175][ T29] audit: type=1400 audit(1730509080.076:2003): avc: denied { create } for pid=12216 comm="syz.4.1524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissi Nov 2 00:58:00 syzkaller kern.notice kernel: [ 510.999313][ T29] audit: type=1400 audit(1730509080.076:2004): avc: denied { read write } for pid=12216 comm="syz.4.1524" name="video36" dev="devtmpfs" ino=1044 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r: Nov 2 00:58:00 syzkaller kern.notice kernel: [ 510.999353][ T29] audit: type=1400 audit(1730509080.076:2005): avc: denied { create } for pid=12216 comm="syz.4.1524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissi Nov 2 00:58:00 syzkaller kern.notice kernel: [ 510.999386][ T29] audit: type=1400 audit(173050[ 511.384781][T12237] FAULT_INJECTION: forcing a failure. [ 511.384781][T12237] name fail_usercopy, interval 1, probability 0, space 0, times 0 9080.096:2006): avc: denied { read write } for[ 511.401626][T12237] CPU: 0 UID: 0 PID: 12237 Comm: syz.2.1531 Not tainted 6.12.0-rc5-syzkaller-00181-g6c52d4da1c74 #0 pid=6206 comm=[ 511.413779][T12237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 "syz-executor" n[ 511.425201][T12237] Call Trace: ame="loop1" dev=[ 511.429839][T12237] "devtmpfs" ino=6[ 511.434130][T12237] dump_stack_lvl+0x16c/0x1f0 48 scontext=root[ 511.440162][T12237] should_fail_ex+0x497/0x5b0 :sysadm_r:sysadm[ 511.446200][T12237] _copy_from_user+0x2e/0xd0 _t tcontext=syst[ 511.452140][T12237] kstrtouint_from_user+0xd7/0x1c0 em_u:object_r:fi[ 511.458604][T12237] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 511.465688][T12237] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 511.471458][T12237] proc_fail_nth_write+0x84/0x250 [ 511.476488][T12237] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 511.482119][T12237] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 511.487743][T12237] vfs_write+0x24c/0x1150 [ 511.492075][T12237] ? __fget_files+0x23a/0x3f0 [ 511.496756][T12237] ? fdget_pos+0x24c/0x360 [ 511.501168][T12237] ? __pfx_lock_release+0x10/0x10 [ 511.506194][T12237] ? trace_lock_acquire+0x14a/0x1d0 [ 511.511391][T12237] ? __pfx_vfs_write+0x10/0x10 [ 511.516186][T12237] ? __pfx___mutex_lock+0x10/0x10 [ 511.521222][T12237] ? __fget_files+0x244/0x3f0 [ 511.525906][T12237] ksys_write+0x12f/0x260 [ 511.530234][T12237] ? __pfx_ksys_write+0x10/0x10 [ 511.535090][T12237] do_syscall_64+0xcd/0x250 [ 511.539594][T12237] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 511.545486][T12237] RIP: 0033:0x7f744d97d1ff [ 511.549893][T12237] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48 [ 511.569507][T12237] RSP: 002b:00007f744e69d030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 511.577912][T12237] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f744d97d1ff [ 511.585873][T12237] RDX: 0000000000000001 RSI: 00007f744e69d0a0 RDI: 0000000000000003 [ 511.593831][T12237] RBP: 00007f744e69d090 R08: 0000000000000000 R09: 0000000000000000 [ 511.601790][T12237] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 511.609748][T12237] R13: 0000000000000000 R14: 00007f744db35f80 R15: 00007ffe20f60038 [ 511.617726][T12237] Nov 2 00:58:00 syzkaller kern.notice kernel: [ 511.384781][T12237] FAULT_INJECTION: forcing a failure. Nov 2 00:58:00 syzkaller kern.notice kernel: [ 511.384781][T12237] name fail_usercopy, interval 1, probability 0, space 0, times 0 Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.401626][T12237] CPU: 0 UID: 0 PID: 12237 Comm: syz.2.1531 Not tainted 6.12.0-rc5-syzkaller-00181-g6c52d4da1c74 #0 Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.413779][T12237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.425201][T12237] Call Trace: Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.429839][T12237] Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.434130][T12237] dump_stack_lvl+0x16c/0x1f0 Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.440162][T12237] should_fail_ex+0x497/0x5b0 Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.446200][T12237] _copy_from_user+0x2e/0xd0 Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.452140][T12237] kstrtouint_from_user+0xd7/0x1c0 Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.458604][T12237] ? __pfx_kstrtouint_from_user+0x10/0x10 Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.465688][T12237] ? __pfx_lock_acquire.part.0+0x10/0x10 Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.471458][T12237] proc_fail_nth_write+0x84/0x250 Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.476488][T12237] ? __pfx_proc_fail_nth_write+0x10/0x10 Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.482119][T12237] ? __pfx_proc_fail_nth_write+0x10/0x10 Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.487743][T12237] vfs_write+0x24c/0x1150 Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.492075][T12237] ? __fget_files+0x23a/0x3f0 Nov 2 00:58:00 syzkaller kern.warn kernel: [ [ 511.793468][T12241] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12241 comm=syz.4.1533 511.496756][T12237] ? fdget_pos+0x24c/0x360 Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.501168][T12237] ? __pfx_lock_release+0x10/0x10 Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.506194][T12237] ? trace_lock_acquire+0x14a/0x1d0 Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.511391][T12237] ? __pfx_vfs_write+0x10/0x10 Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.516186][T12237] ? __pfx___mutex_lock+0x10/0x10 Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.521222][T12237] ? __fget_files+0x244/0x3f0 Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.525906][T12237] ksys_write+0x12f/0x260 Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.530234][T12237] ? __pfx_ksys_write+0x10/0x10 Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.535090][T12237] do_syscall_64+0xcd/0x250 Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.539594][T12237] entry_SYSCALL_64_after_hwframe+0x77/0x7f Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.545486][T12237] RIP: 0033:0x7f744d97d1ff Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.549893][T12237] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48 Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.569507][T12237] RSP: 002b:00007f744e69d030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.577912][T12237] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f744d97d1ff Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.585873][T12237] RDX: 0000000000000001 RSI: 00007f744e69d0a0 RDI: 0000000000000003 Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.593831][T12237] RBP: 00007f744e69d090 R08: 0000000000000000 R09: 0000000000000000 Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.601790][T12237] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 Nov 2 00:58:00 syzkaller kern.warn kernel: [ 511.609748][T12237] R13: 0000000000000000 R14: 00007f744db35f80 R15: 00007ffe20f60038 Nov 2 00:58:01 syzkaller kern.warn kernel: [ 511.617726][T12237] Nov 2 00:58:01 syzkaller kern.warn kernel: [ 511.793468][T12241] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12241 comm=syz.4.1533 [ 513.507346][T12311] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=12311 comm=syz.1.1563 Nov 2 00:58:02 syzkaller kern.warn kernel: [ 513.507346][T12311] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=12311 comm=syz.1.1563 [ 515.825076][ T29] kauditd_printk_skb: 416 callbacks suppressed [ 515.825100][ T29] audit: type=1400 audit(1730509085.086:2423): avc: denied { create } for pid=12392 comm="syz.4.1597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 Nov 2 00:58:05 [ 515.860569][ T29] audit: type=1400 audit(1730509085.116:2424): avc: denied { create } for pid=12392 comm="syz.4.1597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 syzkaller kern.warn kernel: [ 515.825076][ T29] kauditd_printk_skb: 416 callbacks suppressed Nov 2 00:58:05 syzkaller kern.notice kernel: [[ 515.893406][ T29] audit: type=1400 audit(1730509085.116:2425): avc: denied { read write } for pid=6206 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 515.825100][ T29] audit: typ[ 515.920380][ T29] audit: type=1400 audit(1730509085.116:2426): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 e=1400 audit(1730509085.086:2423): avc: denied { create } for pid=12392 comm="syz.4.1597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissi Nov 2 00:5[ 515.960073][ T29] audit: type=1400 audit(1730509085.116:2427): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 8:05 syzkaller kern.notice kernel: [ 515.860569][ T29] audit: type=1400 audit(1730509085.116:2424): avc: denied { create } for pid=12392 comm="syz.4.1597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissi Nov 2 00:58:05 syzkaller kern.notice k[ 516.008488][ T29] audit: type=1400 audit(1730509085.146:2428): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ernel: [ 515.893406][ T29] audit: type=1400 a[ 516.035209][ T29] audit: type=1400 audit(1730509085.156:2429): avc: denied { read write } for pid=6206 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 udit(1730509085.116:2425): avc: denied { read write } for pid=6206 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 2 00:58:05 syzkaller kern.notice kernel: [ 515.920380][ T29] audit: type=1400 audit(1730509085.116:2426): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:58:05 syzkaller kern.notice kernel: [ 515.960073][ T29] audit: type=1400 audit(1730509085.116:2427): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:58:05 syzkaller kern.notice kernel: [ 516.008488][ T29] audit: type=1400 audit(1730509085.146:2428): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1"[ 516.140421][ T29] audit: type=1400 audit(1730509085.186:2430): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:58:05 syzkaller kern.notice kernel: [ 516.035209][ T29] audit: type=1400 audit(1730509085.156:2429): avc: denied { read write } for pid=6206 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 2 00:58:05 syzkaller kern.notice kernel: [ 516.140421][ T29] audit: type=1400 audit(1730509085.186:2430): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 516.219940][ T29] audit: type=1400 audit(1730509085.186:2431): avc: denied { prog_load } for pid=12397 comm="syz.1.1599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Nov 2 00:58:05 syzkaller kern.notice kernel: [ 516.219940][ T29] audit: type=1400 audit(1730509085.186:2431): avc: denied { prog_load } for pid=12397 comm="syz.1.1599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 516.289654][ T29] audit: type=1400 audit(1730509085.186:2432): avc: denied { create } for pid=12397 comm="syz.1.1599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 Nov 2 00:58:05 syzkaller kern.notice kernel: [ 516.289654][ T29] audit: type=1400 audit(1730509085.186:2432): avc: denied { create } for pid=12397 comm="syz.1.1599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissi [ 517.236452][T12437] FAULT_INJECTION: forcing a failure. [ 517.236452][T12437] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 517.249992][T12437] CPU: 0 UID: 0 PID: 12437 Comm: syz.1.1607 Not tainted 6.12.0-rc5-syzkaller-00181-g6c52d4da1c74 #0 [ 517.260779][T12437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 517.271009][T12437] Call Trace: [ 517.274278][T12437] [ 517.277200][T12437] dump_stack_lvl+0x16c/0x1f0 [ 517.281888][T12437] should_fail_ex+0x497/0x5b0 [ 517.286573][T12437] _copy_to_user+0x32/0xd0 [ 517.290986][T12437] simple_read_from_buffer+0xd0/0x160 [ 517.296355][T12437] proc_fail_nth_read+0x198/0x270 [ 517.301368][T12437] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 517.306900][T12437] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 517.312431][T12437] vfs_read+0x1df/0xbe0 [ 517.316583][T12437] ? __fget_files+0x23a/0x3f0 [ 517.321250][T12437] ? fdget_pos+0x24c/0x360 [ 517.325673][T12437] ? __pfx_lock_release+0x10/0x10 [ 517.330684][T12437] ? trace_lock_acquire+0x14a/0x1d0 [ 517.335901][T12437] ? __pfx_vfs_read+0x10/0x10 [ 517.340570][T12437] ? __pfx___mutex_lock+0x10/0x10 [ 517.345592][T12437] ? __fget_files+0x244/0x3f0 [ 517.350264][T12437] ksys_read+0x12f/0x260 [ 517.354496][T12437] ? __pfx_ksys_read+0x10/0x10 [ 517.359275][T12437] do_syscall_64+0xcd/0x250 [ 517.363779][T12437] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 517.369667][T12437] RIP: 0033:0x7f7c8057d15c [ 517.374077][T12437] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 517.393670][T12437] RSP: 002b:00007f7c812e5030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 517.402066][T12437] RAX: ffffffffffffffda RBX: 00007f7c80736058 RCX: 00007f7c8057d15c [ 517.410017][T12437] RDX: 000000000000000f RSI: 00007f7c812e50a0 RDI: 0000000000000009 [ 517.417971][T12437] RBP: 00007f7c812e5090 R08: 0000000000000000 R09: 0000000000000000 [ 517.425925][T12437] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 517.433877][T12437] R13: 0000000000000001 R14: 00007f7c80736058 R15: 00007ffee67da848 [ 517.441839][T12437] Nov 2 00:58:06 syzkaller kern.notice kernel: [ 517.236452][T12437] FAULT_INJECTION: forcing a failure. Nov 2 00:58:06 syzkaller kern.notice kernel: [ 517.236452][T12437] name fail_usercopy, interval 1, probability 0, space 0, times 0 Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.249992][T12437] CPU: 0 UID: 0 PID: 12437 Comm: syz.1.1607 Not tainted 6.12.0-rc5-syzkaller-00181-g6c52d4da1c74 #0 Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.260779][T12437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.271009][T12437] Call Trace: Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.274278][T12437] Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.277200][T12437] dump_stack_lvl+0x16c/0x1f0 Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.281888][T12437] should_fail_ex+0x497/0x5b0 Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.286573][T12437] _copy_to_user+0x32/0xd0 Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.290986][T12437] simple_read_from_buffer+0xd0/0x160 Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.296355][T12437] proc_fail_nth_read+0x198/0x270 Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.301368][T12437] ? __pfx_proc_fail_nth_read+0x10/0x10 Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.306900][T12437] ? __pfx_proc_fail_nth_read+0x10/0x10 Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.312431][T12437] vfs_read+0x1df/0xbe0 Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.316583][T12437] ? __fget_files+0x23a/0x3f0 Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.321250][T12437] ? fdget_pos+0x24c/0x360 Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.325673][T12437] ? __pfx_lock_release+0x10/0x10 Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.330684][T12437] ? trace_lock_acquire+0x14a/0x1d0 Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.335901][T12437] ? __pfx_vfs_read+0x10/0x10 Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.340570][T12437] ? __pfx___mutex_lock+0x10/0x10 Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.345592][T12437] ? __fget_files+0x244/0x3f0 Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.350264][T12437] ksys_read+0x12f/0x260 Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.354496][T12437] ? __pfx_ksys_read+0x10/0x10 Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.359275][T12437] do_syscall_64+0xcd/0x250 Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.363779][T12437] entry_SYSCALL_64_after_hwframe+0x77/0x7f Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.369667][T12437] RIP: 0033:0x7f7c8057d15c Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.374077][T12437] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.393670][T12437] RSP: 002b:00007f7c812e5030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.402066][T12437] RAX: ffffffffffffffda RBX: 00007f7c80736058 RCX: 00007f7c8057d15c Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.410017][T12437] RDX: 000000000000000f RSI: 00007f7c812e50a0 RDI: 0000000000000009 Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.417971][T12437] RBP: 00007f7c812e5090 R08: 0000000000000000 R09: 0000000000000000 Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.425925][T12437] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.433877][T12437] R13: 0000000000000001 R14: 00007f7c80736058 R15: 00007ffee67da848 Nov 2 00:58:06 syzkaller kern.warn kernel: [ 517.441839][T12437] [ 520.719280][T12492] xt_hashlimit: Unknown mode mask 2000, kernel too old? Nov 2 00:58:10 syzkaller kern.info kernel: [ 520.719280][T12492] xt_hashlimit: Unknown mode mask 2000, kernel too old? [ 520.847938][ T29] kauditd_printk_skb: 274 callbacks suppressed [ 520.847950][ T29] audit: type=1400 audit(1730509090.106:2707): avc: denied { read write } for pid=5824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Nov 2 00:58:10 syzkaller kern.warn kernel: [ 520.847938][ T29] kauditd_printk_skb: 274 callbacks suppressed Nov 2 00:58:10 syzkaller kern.notice kernel: [ 520.847950][ T29] audit: type=1400 audit(1730509090.106:2707): avc: denied { read write } for pid=5824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 521.011544][ T29] audit: type=1400 audit(1730509090.146:2708): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 2 00:58:10 syzkaller kern.notice kernel: [ 521.011544][ T29] audit: type=1400 audit(1730509090.146:2708): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=sy[ 521.051829][ T29] audit: type=1400 audit(1730509090.146:2709): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 stem_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:58:10 syzkaller kern.notice kernel: [ 521.051829][ T29] audit: type=1400 audit(1730509090.146:2709): avc: denied { read } for pid=5183 comm="syslogd" name="log"[ 521.116673][ T29] audit: type=1400 audit(1730509090.226:2710): avc: denied { create } for pid=12495 comm="syz.2.1636" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:58:10 syzkaller kern.notice kernel: [ [ 521.150628][ T29] audit: type=1400 audit(1730509090.226:2711): avc: denied { map_create } for pid=12495 comm="syz.2.1636" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 521.116673][ T29] audit: type=1400 audit(1730[ 521.174234][ T29] audit: type=1400 audit(1730509090.226:2712): avc: denied { prog_load } for pid=12495 comm="syz.2.1636" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 509090.226:2710): avc: denied { create } for pid=12495 comm="syz.2.1636" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissi Nov 2 00:58:10 syzkaller kern.notice kernel: [ 521.150628][ T29] audit: type=1400 audit(1730509090.226:2711): avc: denied { map_create } for pid=12495 comm="syz.2.1636" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Nov 2 00:58:10 syzkaller kern.n[ 521.236469][ T29] audit: type=1400 audit(1730509090.226:2713): avc: denied { execmem } for pid=12495 comm="syz.2.1636" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 otice kernel: [ [ 521.257758][ T29] audit: type=1400 audit(1730509090.226:2714): avc: denied { read } for pid=12495 comm="syz.2.1636" dev="nsfs" ino=4026533280 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 521.174234][ T29] audit: type=1400 audit(1730509090.226:2712)[ 521.284184][ T29] audit: type=1400 audit(1730509090.226:2715): avc: denied { prog_load } for pid=12495 comm="syz.2.1636" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 : avc: denied { prog_load } for pid=12495 comm="syz.2.1636" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Nov 2 00:58:10 syzkaller kern.notice kernel: [ 521.236469][ T29] audit: type=1400 audit(1730509090.226:2713): avc: denied { execmem } for pid=12495 comm="syz.2.1636" scontext=root:sysadm_r:sysadm_t tcontext=ro[ 521.335500][ T29] audit: type=1400 audit(1730509090.226:2716): avc: denied { create } for pid=12495 comm="syz.2.1636" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 ot:sysadm_r:sysadm_t tclass=process permissive=0 Nov 2 00:58:10 syzkaller kern.notice kernel: [ 521.257758][ T29] audit: type=1400 audit(1730509090.226:2714): avc: denied { read } for pid=12495 comm="syz.2.1636" dev="nsfs" ino=4026533280 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file Nov 2 00:58:10 syzkaller kern.notice kernel: [ 521.284184][ T29] audit: type=1400 audit(1730509090.226:2715): avc: denied { prog_load } for pid=12495 comm="syz.2.1636" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Nov 2 00:58:10 syzkaller kern.notice kernel: [ 521.335500][ T29] audit: type=1400 audit(1730509090.226:2716): avc: denied { create } for pid=12495 comm="syz.2.1636" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 Nov 2 00:58:12 syzkaller daemon.err dhcpcd[5495]: ps_sendpsmmsg: Connection refused Nov 2 00:58:12 syzkaller daemon.err dhcpcd[5495]: ps_root_recvmsgcb: failed to send message to pid 11336: Connection refused Nov 2 00:58:12 syzkaller daemon.err dhcpcd[5495]: ps_sendpsmmsg: Connection refused Nov 2 00:58:12 syzkaller daemon.err dhcpcd[5495]: ps_root_recvmsgcb: failed to send message to pid 11337: Connection refused Nov 2 00:58:13 syzkaller daemon.err dhcpcd[5495]: ps_sendpsmmsg: Connection refused Nov 2 00:58:13 syzkaller daemon.err dhcpcd[5495]: ps_root_recvmsgcb: failed to send message to pid 11338: Connection refused [ 525.894494][ T29] kauditd_printk_skb: 261 callbacks suppressed [ 525.894512][ T29] audit: type=1400 audit(1730509095.156:2978): avc: denied { create } for pid=12602 comm="syz.4.1673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 Nov 2 00:58:15 syzkaller kern.warn kernel: [ 525.894494][ T29] kauditd_printk_skb: 261 callbacks suppressed Nov 2 00:58:15 syzkaller kern.notice kernel: [ 525.894512][ T29] audit: type=1400 audit(1730509095.156:2978): avc: denied { create } for pid=12602 comm="syz.4.1673" scontext=root:sysadm_r:sysadm_t tco[ 525.951456][ T29] audit: type=1400 audit(1730509095.186:2979): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ntext=root:sysadm_r:sysadm_t tclass=packet_socke[ 525.977238][ T29] audit: type=1400 audit(1730509095.186:2980): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 t permissive=0 Nov 2 00:58:15 syzkaller kern.notice kernel: [ 525.951456][ T29] audit: type=1400 audit(1730509095.186:2979): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:58:15 syzkaller kern.notice kernel: [ 525.977238][ T29] audit: type=1400 audit(1730509095.186:2980): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tc[ 526.046182][ T29] audit: type=1400 audit(1730509095.186:2981): avc: denied { create } for pid=12602 comm="syz.4.1673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 ontext=system_u:object_r:var_t tclass= Nov 2 00:58:15 syzkaller kern.notice kernel: [ 526.046182][ T29] audit: type=1400 audit(1730509095.186:2981): avc: denied { create[ 526.080131][ T29] audit: type=1400 audit(1730509095.206:2982): avc: denied { read } for pid=12602 comm="syz.4.1673" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 } for pid=12602 comm="syz.4.16[ 526.105357][ T29] audit: type=1400 audit(1730509095.206:2983): avc: denied { create } for pid=12602 comm="syz.4.1673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 73" scontext=roo[ 526.127524][ T29] audit: type=1400 audit(1730509095.206:2984): avc: denied { create } for pid=12602 comm="syz.4.1673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 t:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 Nov 2 00:58:15 syzkaller kern.notice kernel: [ 526.080131][ T29] audit: type=1400 audit(1730509095.206:2982): avc: denied { read } for pid=12602 comm="syz.4.1673" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t Nov 2 00:58:15 syzkaller kern.notice kernel: [ 526.105357][ T29] audit: type=1400 audit(1730509095.206:2983): avc: denied { create } for pid=1260[ 526.191876][ T29] audit: type=1400 audit(1730509095.206:2985): avc: denied { create } for pid=12602 comm="syz.4.1673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 2 comm="syz.4.1673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive= Nov 2 00:58:15 syzkaller kern.notice kernel: [ 526.127524][ T29] audit: type=1400 audit(1730509095.206:2984): avc: denied { create } for pid=12602 comm="syz.4.1673" scontext=root:sysadm_r:sysadm_t tcontext[ 526.241680][ T29] audit: type=1400 audit(1730509095.236:2986): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 =root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissi [ 526.269492][ T29] audit: type=1400 audit(1730509095.276:2987): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 2 00:58:15 syzkaller kern.notice kernel: [ 526.191876][ T29] audit: type=1400 audit(1730509095.206:2985): avc: denied { create } for pid=12602 comm="syz.4.1673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissi Nov 2 00:58:15 syzkaller kern.notice kernel: [ 526.241680][ T29] audit: type=1400 audit(1730509095.236:2986): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:58:15 syzkaller kern.notice kernel: [ 526.269492][ T29] audit: type=1400 audit(1730509095.276:2987): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 530.949812][ T29] kauditd_printk_skb: 275 callbacks suppressed [ 530.949830][ T29] audit: type=1400 audit(1730509100.206:3261): avc: denied { create } for pid=12730 comm="syz.1.1721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 Nov 2 00:58:20 syzkaller kern.warn kernel: [ 530.949812][ T29] kauditd_printk_skb: 275 callbacks suppressed Nov 2 00:58:20 syzkaller kern.notice kernel: [ 530.949830][ T29] audit: type=1400 audit(1730509100.206:3261): avc: denied { create } for pid=12730 comm="syz.1.1721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 531.048400][ T29] audit: type=1400 audit(1730509100.216:3262): avc: denied { prog_load } for pid=12730 comm="syz.1.1721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Nov 2 00:58:20 syzkaller kern.notice kernel: [ 531.048400][ T29] audit: type=1400 audit(1730509100.216:3262): avc: denied { prog_load } for pid=12730 comm="syz.1.1721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 531.154709][ T29] audit: type=1400 audit(1730509100.216:3263): avc: denied { execmem } for pid=12730 comm="syz.1.1721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Nov 2 00:58:20 syzkaller kern.notice kernel: [ 531.154709][ T29] audit: type=1400 audit(1730509100.216:3263): avc: denied { execmem } for pid=12730 comm="syz.1.1721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tcl[ 531.195781][ T29] audit: type=1400 audit(1730509100.216:3264): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ass=process permissive=0 Nov 2 00:58:20 syzkaller kern.notice kernel: [ 531.195781][ T29] audit: type=1400 audit(1730509100.216:3264): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 531.255815][ T29] audit: type=1400 audit(1730509100.216:3265): avc: denied { create } for pid=12730 comm="syz.1.1721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 531.266775][T12736] xt_bpf: check failed: parse error Nov 2 00:58:20 syzkaller kern.notice kernel: [ 531.255815][ T29] audit: type=1400 audit(1730509100.216:3265): avc: denied { create } for pid=12730 comm="syz.1.1721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis Nov 2 00:58:20 syzkaller kern.info kernel: [ 531.266775][T12736] xt_bpf: check failed: parse error [ 531.350905][ T29] audit: type=1400 audit(1730509100.216:3266): avc: denied { prog_load } for pid=12730 comm="syz.1.1721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Nov 2 00:58:20 syzkaller kern.notice kernel: [ 531.350905][ T29] audit: type=1400 audit(1730509100.216:3266): avc: denied { prog_load } for pid=12730 comm="syz.1.1721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 531.406877][ T29] audit: type=1400 audit(1730509100.216:3267): avc: denied { map_create } for pid=12730 comm="syz.1.1721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Nov 2 00:58:20 syzkaller kern.notice kernel: [ 531.406877][ T29] audit: type=1400 audit(1730509100.216:3267): avc: denied { map_create } for pid=12730 comm="syz.1.1721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 531.464020][ T29] audit: type=1400 audit(1730509100.236:3268): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 2 00:58:20 syzkaller kern.notice kernel: [ 531.464020][ T29] audit: type=1400 audit(1730509100.236:3268): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 531.529608][ T29] audit: type=1400 audit(1730509100.336:3269): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 2 00:58:20 syzkaller kern.notice kernel: [ 531.529608][ T29] audit: type=1400 audit(1730509100.336:3269): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 531.597781][ T29] audit: type=1400 audit(1730509100.336:3270): avc: denied { read write } for pid=6206 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Nov 2 00:58:20 syzkaller kern.notice kernel: [ 531.597781][ T29] audit: type=1400 audit(1730509100.336:3270): avc: denied { read write } for pid=6206 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 536.092146][ T29] kauditd_printk_skb: 229 callbacks suppressed [ 536.092168][ T29] audit: type=1400 audit(1730509105.346:3500): avc: denied { read write } for pid=6206 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Nov 2 00:58:25 syzkaller kern.warn kernel: [ 536.092146][ T29] kauditd_printk_skb: 229 callbacks suppressed Nov 2 00:58:25 syzkaller kern.notice kernel: [ 536.092168][ T29] audit: type=1400 audit(1730509105.346:3500): avc: denied { read write } for pid=6206 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 536.191439][ T29] audit: type=1400 audit(1730509105.386:3501): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 2 00:58:25 syzkaller kern.notice kernel: [ 536.191439][ T29] audit: type=1400 audit(1730509105.386:3501): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 536.271944][ T29] audit: type=1400 audit(1730509105.386:3502): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 2 00:58:25 syzkaller kern.notice kernel: [ 536.271944][ T29] audit: type=1400 audit(1730509105.386:3502): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 536.342267][ T29] audit: type=1400 audit(1730509105.436:3503): avc: denied { read } for pid=12833 comm="syz.1.1756" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 Nov 2 00:58:25 syzkaller kern.notice kernel: [ 536.342267][ T29] audit: type=1400 audit(1730509105.436:3503): avc: denied { read } for pid=12833 comm="syz.1.1756" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t [ 536.404219][ T29] audit: type=1400 audit(1730509105.436:3504): avc: denied { map_create } for pid=12833 comm="syz.1.1756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Nov 2 00:58:25 syzkaller kern.notice kernel: [ 536.404219][ T29] audit: type=1400 audit(1730509105.436:3504): avc: denied { map_create } for pid=12833 comm="syz.1.1756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 536.454221][ T29] audit: type=1400 audit(1730509105.436:3505): avc: denied { map_create } for pid=12833 comm="syz.1.1756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Nov 2 00:58:25 syzkaller kern.notice kernel: [ 536.454221][ T29] audit: type=1400 audit(1730[ 536.480981][ T29] audit: type=1400 audit(1730509105.436:3506): avc: denied { prog_load } for pid=12833 comm="syz.1.1756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 509105.436:3505): avc: denied { map_create } for pid=12833 comm="syz.1.1756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Nov 2 00:58:25 syzkaller kern.notice kernel: [ 536.480981][ T29] audit: type=1400 audit(1730509105.436:3506): avc: denied { prog_load } for pid=12833 comm="syz.1.1756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0[ 536.537976][ T29] audit: type=1400 audit(1730509105.486:3507): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 2 00:58:25 syzkaller kern.notice kernel: [ 536.537976][ T29] audit: type=1400 audit(1730509105.486:3507): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 536.586986][ T29] audit: type=1400 audit(1730509105.506:3508): avc: denied { read write } for pid=6206 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Nov 2 00:58:25 syzkaller kern.notice kernel: [ 536.586986][ T29] audit: type=1400 audit(1730509105.506:3508): avc: denied { read write } for pid=6206 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 536.652235][T12841] x_tables: ip6_tables: rpfilter match: used from hooks INPUT, but only valid from PREROUTING [ 536.659761][ T29] audit: type=1400 audit(1730509105.566:3509): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 2 00:58:25 syzkaller kern.info kernel: [ 536.652235][T12841] x_tables: ip6_tables: rpfilter match: used from hooks INPUT, but only valid from PREROUTING Nov 2 00:58:25 syzkaller kern.notice kernel: [ 536.659761][ T29] audit: type=1400 audit(1730509105.566:3509): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 541.176054][ T29] kauditd_printk_skb: 294 callbacks suppressed [ 541.176069][ T29] audit: type=1400 audit(1730509110.436:3804): avc: denied { read write } for pid=6451 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Nov 2 00:58:30 syzkaller kern.warn kernel: [ 541.176054][ T29] kauditd_printk_skb: 294 callbacks suppressed Nov 2 00:58:30 syzkaller kern.notice kernel: [ 541.176069][ T29] audit: type=1400 audit(1730509110.436:3804): avc: denied { read write } for pid=6451 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 541.267097][ T29] audit: type=1400 audit(1730509110.486:3805): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 2 00:58:30 syzkaller kern.notice kernel: [ 541.267097][ T29] audit: type=1400 audit(1730509110.486:3805): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 541.333546][ T29] audit: type=1400 audit(1730509110.486:3806): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 2 00:58:30 syzkaller kern.notice kernel: [ 541.333546][ T29] audit: type=1400 audit(1730509110.486:3806): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 541.401308][ T29] audit: type=1400 audit(1730509110.516:3807): avc: denied { create } for pid=12966 comm="syz.1.1807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 Nov 2 00:58:30 syzkaller kern.notice kernel: [ 541.401308][ T29] audit: type=1400 audit(1730509110.516:3807): avc: denied { create } for pid=12966 comm="syz.1.1807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 541.479417][ T29] audit: type=1400 audit(1730509110.516:3808): avc: denied { create } for pid=12966 comm="syz.1.1807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 Nov 2 00:58:30 syzkaller kern.notice kernel: [ 541.479417][ T29] audit: type=1400 audit(1730509110.516:3808): avc: denied { create } for pid=12966 comm="syz.1.1807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 541.540825][ T29] audit: type=1400 audit(1730509110.516:3809): avc: denied { create } for pid=12966 comm="syz.1.1807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 Nov 2 00:58:30 syzkaller kern.notice kernel: [ 541.540825][ T29] audit: type=1400 audit(1730509110.516:3809): avc: denied { create } for pid=12966 comm="syz.1.1807" scontext=root:sysadm_r:sysadm_t tcon[ 541.583828][T12973] bridge0: port 3(hsr_slave_1) entered blocking state text=root:sysadm[ 541.591314][ T29] audit: type=1400 audit(1730509110.516:3810): avc: denied { create } for pid=12966 comm="syz.1.1807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 541.611555][T12973] bridge0: port 3(hsr_slave_1) entered disabled state _r:sysadm_t tclass=rawip_socket permissive=0 Nov 2 00:58:30 syzkaller kern.info kernel: [ 541.583828][T12973] bridge0: port 3(hsr_slave_1) entered blocking state Nov 2 00:58:30 syzkaller kern.notice kernel: [ 541.591314][ T29] audit: type=1400 au[ 541.641570][T12973] hsr_slave_1: entered allmulticast mode dit(1730509110.516:3810): avc: denied { create[ 541.650563][ T29] audit: type=1400 audit(1730509110.516:3811): avc: denied { create } for pid=12966 comm="syz.1.1807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 } for pid=1296[ 541.660421][T12973] hsr_slave_1: left allmulticast mode 6 comm="syz.1.1807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 Nov 2 00:58:30 syzkaller kern.info kernel: [ 541.611555][T12973] bridge0: port 3(hsr_slave_1) entered disabled state Nov 2 00:58:30 syzkaller kern.info kernel: [ 541.641570][T12973] hsr_slave_1: entered allmulticast mode Nov 2 00:58:30 syzkaller kern.notice kernel: [ 541.65[ 541.711308][ T29] audit: type=1400 audit(1730509110.516:3812): avc: denied { read write } for pid=12966 comm="syz.1.1807" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 0563][ T29] audit: type=1400 audit(1730509110.516:3811): avc: denied { create } for pid=12966 comm="syz.1.1807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 Nov 2 00:58:30 syzkaller kern.info kernel: [ 541.660421][T12973] hsr_slave_1: left allmulticast mode Nov 2 00:58:30 syzkaller kern.notice kernel: [ 541.711308][ T29] audit: type=1400 audit(1730509110.516:3812): avc: denied { read write } for pid=12966 comm="syz.1.1807" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_ [ 541.794131][ T29] audit: type=1400 audit(1730509110.546:3813): avc: denied { prog_load } for pid=12968 comm="syz.5.1808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Nov 2 00:58:31 syzkaller kern.notice kernel: [ 541.794131][ T29] audit: type=1400 audit(1730509110.546:3813): avc: denied { prog_load } for pid=12968 comm="syz.5.1808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Nov 2 00:58:32 syzkaller daemon.err dhcpcd[5495]: ps_sendpsmmsg: Connection refused Nov 2 00:58:32 syzkaller daemon.err dhcpcd[5495]: ps_root_recvmsgcb: failed to send message to pid 11588: Connection refused [ 543.869664][T13016] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65298 sclass=netlink_route_socket pid=13016 comm=syz.1.1826 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 543.869664][T13016] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65298 sclass=netlink_route_socket pid=13016 comm=syz.1.1826 [ 544.030779][T13021] FAULT_INJECTION: forcing a failure. [ 544.030779][T13021] name failslab, interval 1, probability 0, space 0, times 0 [ 544.053033][T13021] CPU: 0 UID: 0 PID: 13021 Comm: syz.4.1828 Not tainted 6.12.0-rc5-syzkaller-00181-g6c52d4da1c74 #0 [ 544.063830][T13021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 544.073885][T13021] Call Trace: [ 544.077141][T13021] [ 544.080052][T13021] dump_stack_lvl+0x16c/0x1f0 [ 544.084720][T13021] should_fail_ex+0x497/0x5b0 [ 544.089392][T13021] ? fs_reclaim_acquire+0xae/0x150 [ 544.094481][T13021] should_failslab+0xc2/0x120 [ 544.099141][T13021] kmem_cache_alloc_noprof+0x6e/0x2f0 [ 544.104498][T13021] ? mas_alloc_nodes+0x176/0x860 [ 544.109430][T13021] mas_alloc_nodes+0x176/0x860 [ 544.114177][T13021] mas_node_count_gfp+0x105/0x130 [ 544.119185][T13021] mas_preallocate+0x53b/0xcd0 [ 544.123930][T13021] ? __pfx_mas_preallocate+0x10/0x10 [ 544.129199][T13021] ? anon_vma_name+0x75/0x100 [ 544.133858][T13021] __split_vma+0x474/0x1160 [ 544.138343][T13021] ? __pfx___split_vma+0x10/0x10 [ 544.143266][T13021] vms_gather_munmap_vmas+0x38f/0x1750 [ 544.148718][T13021] ? __pfx_vms_gather_munmap_vmas+0x10/0x10 [ 544.154599][T13021] ? __pfx___lock_acquire+0x10/0x10 [ 544.159780][T13021] ? vma_iter_store+0x9bf/0xe30 [ 544.164641][T13021] ? find_held_lock+0x2d/0x110 [ 544.169397][T13021] do_vmi_align_munmap+0x281/0x890 [ 544.174523][T13021] ? __pfx_do_vmi_align_munmap+0x10/0x10 [ 544.180164][T13021] do_vmi_munmap+0x20b/0x3e0 [ 544.184740][T13021] move_vma+0x8ff/0x1c60 [ 544.188972][T13021] ? __pfx_move_vma+0x10/0x10 [ 544.193635][T13021] ? mm_get_unmapped_area_vmflags+0x97/0xe0 [ 544.199517][T13021] ? selinux_mmap_addr+0x2b/0x110 [ 544.204547][T13021] ? bpf_lsm_mmap_addr+0x9/0x10 [ 544.209379][T13021] ? security_mmap_addr+0x6c/0x1e0 [ 544.214481][T13021] __do_sys_mremap+0xf8e/0x1590 [ 544.219345][T13021] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 544.225319][T13021] ? __pfx___do_sys_mremap+0x10/0x10 [ 544.230595][T13021] ? __fget_files+0x244/0x3f0 [ 544.235272][T13021] ? fput+0x30/0x390 [ 544.239146][T13021] ? ksys_write+0x1ad/0x260 [ 544.243640][T13021] ? __pfx_ksys_write+0x10/0x10 [ 544.248483][T13021] do_syscall_64+0xcd/0x250 [ 544.252979][T13021] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 544.258860][T13021] RIP: 0033:0x7f054af7e719 [ 544.263256][T13021] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 544.282860][T13021] RSP: 002b:00007f054be3d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000019 [ 544.291250][T13021] RAX: ffffffffffffffda RBX: 00007f054b135f80 RCX: 00007f054af7e719 [ 544.299221][T13021] RDX: 0000000000001000 RSI: 0000000000001000 RDI: 0000000020dde000 [ 544.307173][T13021] RBP: 00007f054be3d090 R08: 0000000020bb3000 R09: 0000000000000000 [ 544.315134][T13021] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 544.323084][T13021] R13: 0000000000000000 R14: 00007f054b135f80 R15: 00007ffe8aeb5f08 [ 544.331040][T13021] Nov 2 00:58:33 syzkaller kern.notice kernel: [ 544.030779][T13021] FAULT_INJECTION: forcing a failure. Nov 2 00:58:33 syzkaller kern.notice kernel: [ 544.030779][T13021] name failslab, interval 1, probability 0, space 0, times 0 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.053033][T13021] CPU: 0 UID: 0 PID: 13021 Comm: syz.4.1828 Not tainted 6.12.0-rc5-syzkaller-00181-g6c52d4da1c74 #0 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.063830][T13021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.073885][T13021] Call Trace: Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.077141][T13021] Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.080052][T13021] dump_stack_lvl+0x16c/0x1f0 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.084720][T13021] should_fail_ex+0x497/0x5b0 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.089392][T13021] ? fs_reclaim_acquire+0xae/0x150 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.094481][T13021] should_failslab+0xc2/0x120 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.099141][T13021] kmem_cache_alloc_noprof+0x6e/0x2f0 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.104498][T13021] ? mas_alloc_nodes+0x176/0x860 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.109430][T13021] mas_alloc_nodes+0x176/0x860 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.114177][T13021] mas_node_count_gfp+0x105/0x130 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.119185][T13021] mas_preallocate+0x53b/0xcd0 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.123930][T13021] ? __pfx_mas_preallocate+0x10/0x10 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.129199][T13021] ? anon_vma_name+0x75/0x100 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.133858][T13021] __split_vma+0x474/0x1160 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.138343][T13021] ? __pfx___split_vma+0x10/0x10 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.143266][T13021] vms_gather_munmap_vmas+0x38f/0x1750 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.148718][T13021] ? __pfx_vms_gather_munmap_vmas+0x10/0x10 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.154599][T13021] ? __pfx___lock_acquire+0x10/0x10 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.159780][T13021] ? vma_iter_store+0x9bf/0xe30 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.164641][T13021] ? find_held_lock+0x2d/0x110 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.169397][T13021] do_vmi_align_munmap+0x281/0x890 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.174523][T13021] ? __pfx_do_vmi_align_munmap+0x10/0x10 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.180164][T13021] do_vmi_munmap+0x20b/0x3e0 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.184740][T13021] move_vma+0x8ff/0x1c60 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.188972][T13021] ? __pfx_move_vma+0x10/0x10 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.193635][T13021] ? mm_get_unmapped_area_vmflags+0x97/0xe0 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.199517][T13021] ? selinux_mmap_addr+0x2b/0x110 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.204547][T13021] ? bpf_lsm_mmap_addr+0x9/0x10 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.209379][T13021] ? security_mmap_addr+0x6c/0x1e0 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.214481][T13021] __do_sys_mremap+0xf8e/0x1590 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.219345][T13021] ? __pfx___mutex_unlock_slowpath+0x10/0x10 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.225319][T13021] ? __pfx___do_sys_mremap+0x10/0x10 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.230595][T13021] ? __fget_files+0x244/0x3f0 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.235272][T13021] ? fput+0x30/0x390 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.239146][T13021] ? ksys_write+0x1ad/0x260 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.243640][T13021] ? __pfx_ksys_write+0x10/0x10 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.248483][T13021] do_syscall_64+0xcd/0x250 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.252979][T13021] entry_SYSCALL_64_after_hwframe+0x77/0x7f Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.258860][T13021] RIP: 0033:0x7f054af7e719 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.263256][T13021] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.282860][T13021] RSP: 002b:00007f054be3d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000019 Nov 2 00:58:33 syzkaNov 2 00:58:33 syzkaller kern.warn kernel: [ 544.299221][T13021] RDX: 0000000000001000 RSI: 0000000000001000 RDI: 0000000020dde000 Nov 2 00:58:33 syzkaller kern.warn kernel: [ 544.307173][T13021] RBP: 00007f054be3d090 R08: 0000000020bb3000 R09: 000000Nov 2 00:58:33 [ 546.192317][ T29] kauditd_printk_skb: 281 callbacks suppressed [ 546.192332][ T29] audit: type=1400 audit(1730509115.456:4095): avc: denied { read write } for pid=6451 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Nov 2 00:58:35 syzkaller kern.warn kernel: [ 546.192317][ T29] kauditd_printk_skb: 281 callbacks suppressed Nov 2 00:58:35 syzkaller kern.notice kernel: [ 546.192332][ T29] audit: type=1400 audit(1730509115.456:4095): avc: denied { read write } for pid=6451 co[ 546.249560][ T29] audit: type=1400 audit(1730509115.486:4096): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 mm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sys[ 546.278405][ T29] audit: type=1400 audit(1730509115.486:4097): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 adm_t tcontext=system_u:object_r:fi Nov 2 00:58:35 syzkaller kern.notice kernel: [ 546.249560][ T29] audit: type=1400 audit[ 546.311078][ T29] audit: type=1400 audit(1730509115.496:4098): avc: denied { create } for pid=13068 comm="syz.4.1847" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 (1730509115.486:4096): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u[ 546.345971][ T29] audit: type=1400 audit(1730509115.496:4099): avc: denied { write } for pid=13071 comm="syz.2.1848" path="/dev/vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=0 :object_r:var_t tclass= Nov 2 00:58:35 syzkaller kern.notice kernel: [ 546.278405][ T29] audit: type=1400 audit(1730509115.486:4097): avc: denied { read } for pid=5183 [ 546.385396][ T29] audit: type=1400 audit(1730509115.506:4100): avc: denied { create } for pid=13074 comm="syz.5.1849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:va[ 546.414384][ T29] audit: type=1400 audit(1730509115.536:4101): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 r_t tclass= Nov 2 00:58:35 syzkaller kern.notice kernel: [ 546.311078][ T29] audit: type=1400 audit(1730509115.496:4098): a[ 546.446641][ T29] audit: type=1400 audit(1730509115.566:4102): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 vc: denied { create } for pid=13068 comm="syz.4.1847" scontext=root:sysadm_r:sysadm_t tcontex[ 546.476725][ T29] audit: type=1400 audit(1730509115.566:4103): avc: denied { create } for pid=13071 comm="syz.2.1848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 t=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 Nov 2 00:58:35 syzkaller kern.notice kernel: [ 546.3[ 546.506731][ T29] audit: type=1400 audit(1730509115.566:4104): avc: denied { create } for pid=13071 comm="syz.2.1848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 45971][ T29] audit: type=1400 audit(1730509115.496:4099): avc: denied { write } for pid=13071 comm="syz.2.1848" path="/dev/vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vho Nov 2 00:58:35 syzkaller kern.notice kernel: [ 546.385396][ T29] audit: type=1400 audit(1730509115.506:4100): avc: denied { create } for pid=13074 comm="syz.5.1849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 Nov 2 00:58:35 syzkaller kern.notice kernel: [ 546.414384][ T29] audit: type=1400 audit(1730509115.536:4101): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:58:35 syzkaller kern.notice kernel: [ 546.446641][ T29] audit: type=1400 audit(1730509115.566:4102): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:58:35 syzkaller kern.notice kernel: [ 546.476725][ T29] audit: type=1400 audit(1730509115.566:4103): avc: denied { create } for pid=13071 comm="syz.2.1848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 Nov 2 00:58:35 syzkaller kern.notice kernel: [ 546.506731][ T29] audit: type=1400 audit(1730509115.566:4104): avc: denied { create } for pid=13071 comm="syz.2.1848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 Nov 2 00:58:36 syzkaller daemon.err dhcpcd[5495]: ps_sendpsmmsg: Connection refused Nov 2 00:58:36 syzkaller daemon.err dhcpcd[5495]: ps_root_recvmsgcb: failed to send message to pid 11661: Connection refused Nov 2 00:58:36 syzkaller daemon.err dhcpcd[5495]: ps_sendpsmmsg: Connection refused Nov 2 00:58:36 syzkaller daemon.err dhcpcd[5495]: ps_root_recvmsgcb: failed to send message to pid 11660: Connection refused Nov 2 00:58:36 syzkaller daemon.err dhcpcd[5495]: ps_sendpsmmsg: Connection refused Nov 2 00:58:36 syzkaller daemon.err dhcpcd[5495]: ps_root_recvmsgcb: failed to send message to pid 11649: Connection refused [ 551.296493][ T29] kauditd_printk_skb: 260 callbacks suppressed [ 551.296510][ T29] audit: type=1400 audit(1730509120.556:4365): avc: denied { read write } for pid=6206 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Nov 2 00:58:40 syzkaller kern.warn kernel: [ 551.296493][ T29] kauditd_printk_skb: 260 callbacks suppressed Nov 2 00:58:40 syzkaller kern.notice kernel: [ 551.296510][ T29] audit: type=1400 audit(1730509120.556:4365): avc: denied { read write } for pid=6206 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 551.405227][ T29] audit: type=1400 audit(1730509120.586:4366): avc: denied { read write } for pid=5824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Nov 2 00:58:40 syzkaller kern.notice kernel: [ 551.405227][ T29] audit: type=1400 audit(1730509120.586:4366): avc: denied { read write } for pid=5824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 551.481477][ T29] audit: type=1400 audit(1730509120.596:4367): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 2 00:58:40 syzkaller kern.notice kernel: [ 551.481477][ T29] audit: type=1400 audit(1730509120.596:4367): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 551.551361][ T29] audit: type=1400 audit(1730509120.596:4368): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 551.573813][ T29] audit: type=1400 audit(1730509120.626:4369): avc: denied { map_create } for pid=13178 comm="syz.5.1886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 551.593255][ T29] audit: type=1400 audit(1730509120.626:4370): avc: denied { read write } for pid=13178 comm="syz.5.1886" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 551.593293][ T29] audit: type=1400 audit(1730509120.626:4371): avc: denied { read } for pid=13178 comm="syz.5.1886" name="usbmon0" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=0 [ 551.593325][ T29] audit: type=1400 audit(1730509120.626:4372): avc: denied { create } for pid=13178 comm="syz.5.1886" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 551.593356][ T29] audit: type=1400 audit(1730509120.626:4373): avc: denied { create } for pid=13178 comm="syz.5.1886" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 551.593387][ T29] audit: type=1400 audit(1730509120.626:4374): avc: denied { create } for pid=13178 comm="syz.5.1886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 Nov 2 00:58:40 syzkaller kern.notice kernel: [ 551.551361][ T29] audit: type=1400 audit(1730509120.596:4368): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:58:40 syzkaller kern.notice kernel: [ 551.573813][ T29] audit: type=1400 audit(1730509120.626:4369): avc: denied { map_create } for pid=13178 comm="syz.5.1886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Nov 2 00:58:40 syzkaller kern.notice kernel: [ 551.593255][ T29] audit: type=1400 audit(1730509120.626:4370): avc: denied { read write } for pid=13178 comm="syz.5.1886" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_ Nov 2 00:58:40 syzkaller kern.notice kernel: [ 551.593293][ T29] audit: type=1400 audit(1730509120.626:4371): avc: denied { read } for pid=13178 comm="syz.5.1886" name="usbmon0" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_ Nov 2 00:58:40 syzkaller kern.notice kernel: [ 551.593325][ T29] audit: type=1400 audit(1730509120.626:4372): avc: denied { create } for pid=13178 comm="syz.5.1886" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode Nov 2 00:58:40 syzkaller kern.notice kernel: [ 551.593356][ T29] audit: type=1400 audit(1730509120.626:4373): avc: denied { create } for pid=13178 comm="syz.5.1886" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode Nov 2 00:58:40 syzkaller kern.notice kernel: [ 551.593387][ T29] audit: type=1400 audit(1730509120.626:4374): avc: denied { create } for pid=13178 comm="syz.5.1886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 554.218616][T13265] xt_hashlimit: max too large, truncated to 1048576 Nov 2 00:58:43 syzkaller kern.i[ 554.239747][T13265] x_tables: ip6_tables: TCPMSS target: only valid for protocol 6 nfo kernel: [ 554.218616][T13265] xt_hashlimit: max too large, truncated to 1048576 [ 554.545241][T13273] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1564 sclass=netlink_route_socket pid=13273 comm=syz.2.1920 Nov 2 00:58:43 syzkaller kern.info kernel: [ 554.239747][T13265] x_tables: ip6_tables: TCPMSS target: only valid for protocol 6 Nov 2 00:58:44 syzkaller kern.warn kernel: [ 554.545241][T13273] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1564 sclass=netlink_route_socket pid=13273 comm=syz.2.1920 [ 556.308883][ T29] kauditd_printk_skb: 257 callbacks suppressed [ 556.308895][ T29] audit: type=1400 audit(1730509125.566:4632): avc: denied { read write } for pid=5830 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Nov 2 00:58:45 syzkaller kern.warn kernel: [ 556.308883][ T29] kauditd_printk_skb: 257 callbacks suppressed Nov 2 00:58:45 syzkaller kern.notice kernel: [ 556.308895][ T29] audit: typ[ 556.355524][ T29] audit: type=1400 audit(1730509125.606:4633): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 e=1400 audit(1730509125.566:4632): avc: denied { read write } for pid=5830 comm="syz-executor[ 556.385815][ T29] audit: type=1400 audit(1730509125.606:4634): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 " name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=s[ 556.414672][ T29] audit: type=1400 audit(1730509125.646:4635): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ystem_u:object_r:fi Nov 2 00:58:45 syzkaller kern.notice kernel: [ 556.355524][ T29] audit: type=1400 audit(1730509125.606:4633): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t [ 556.462726][ T29] audit: type=1400 audit(1730509125.676:4636): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 tclass= Nov 2 00:58:45 syzkaller kern.notice k[ 556.488938][ T29] audit: type=1400 audit(1730509125.726:4637): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ernel: [ 556.38[ 556.511404][ T29] audit: type=1400 audit(1730509125.736:4638): avc: denied { read write } for pid=13289 comm="syz.2.1928" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 5815][ T29] au[ 556.536399][ T29] audit: type=1400 audit(1730509125.736:4639): avc: denied { create } for pid=13289 comm="syz.2.1928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 dit: type=1400 a[ 556.558149][ T29] audit: type=1400 audit(1730509125.736:4640): avc: denied { create } for pid=13289 comm="syz.2.1928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 udit(1730509125.[ 556.580039][ T29] audit: type=1400 audit(1730509125.736:4641): avc: denied { read } for pid=13289 comm="syz.2.1928" dev="nsfs" ino=4026533280 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 606:4634): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:58:45 syzkaller kern.notice kernel: [ 556.414672][ T29] audit: type=1400 audit(1730509125.646:4635): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:58:45 syzkaller kern.notice kernel: [ 556.462726][ T29] audit: type=1400 audit(1730509125.676:4636): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:58:45 syzkaller kern.notice kernel: [ 556.488938][ T29] audit: type=1400 audit(1730509125.726:4637): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:58:45 syzkaller kern.notice kernel: [ 556.511404][ T29] audit: type=1400 audit(1730509125.736:4638): avc: denied { read write } for pid=13289 comm="syz.2.1928" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_ Nov 2 00:58:45 syzkaller kern.notice kernel: [ 556.536399][ T29] audit: type=1400 audit(1730509125.736:4639): avc: denied { create } for pid=13289 comm="syz.2.1928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissi Nov 2 00:58:45 syzkaller kern.notice kernel: [ 556.558149][ T29] audit: type=1400 audit(1730509125.736:4640): avc: denied { create } for pid=13289 comm="syz.2.1928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissi Nov 2 00:58:45 syzkaller kern.notice kernel: [ 556.580039][ T29] audit: type=1400 audit(1730509125.736:4641): avc: denied { read } for pid=13289 comm="syz.2.1928" dev="nsfs" ino=4026533280 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file [ 561.332381][ T29] kauditd_printk_skb: 191 callbacks suppressed [ 561.332397][ T29] audit: type=1400 audit(1730509130.556:4833): avc: denied { read write } for pid=6206 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 561.363684][ T29] audit: type=1400 audit(1730509130.576:4834): avc: denied { read write } for pid=5824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 561.406754][ T29] audit: type=1400 audit(1730509130.666:4835): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 561.433973][ T29] audit: type=1400 audit(1730509130.696:4836): avc: denied { prog_load } for pid=13444 comm="syz.0.1993" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 561.458883][ T29] audit: type=1400 audit(1730509130.716:4837): avc: denied { create } for pid=13444 comm="syz.0.1993" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 561.462355][ T29] audit: type=1400 audit(1730509130.726:4838): avc: denied { execmem } for pid=13448 comm="syz.2.1995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 561.467856][ T29] audit: type=1400 audit(1730509130.726:4839): avc: denied { read } for pid=13444 comm="syz.0.1993" dev="nsfs" ino=4026532803 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 561.469378][ T29] audit: type=1400 audit(1730509130.726:4840): avc: denied { read } for pid=13444 comm="syz.0.1993" dev="nsfs" ino=4026532803 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 561.470059][ T29] audit: type=1400 audit(1730509130.726:4841): avc: denied { create } for pid=13444 comm="syz.0.1993" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 561.490060][ T29] audit: type=1400 audit(1730509130.746:4842): avc: denied { read write } for pid=6206 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Nov 2 00:58:50 syzkaller kern.warn kernel: [ 561.332381][ T29] kauditd_printk_skb: 191 callbacks suppressed Nov 2 00:58:50 syzkaller kern.notice kernel: [ 561.332397][ T29] audit: type=1400 audit(1730509130.556:4833): avc: denied { read write } for pid=6206 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 2 00:58:50 syzkaller kern.notice kernel: [ 561.363684][ T29] audit: type=1400 audit(1730509130.576:4834): avc: denied { read write } for pid=5824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 2 00:58:50 syzkaller kern.notice kernel: [ 561.406754][ T29] audit: type=1400 audit(1730509130.666:4835): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:58:50 syzkaller kern.notice kernel: [ 561.433973][ T29] audit: type=1400 audit(1730509130.696:4836): avc: denied { prog_load } for pid=13444 comm="syz.0.1993" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Nov 2 00:58:50 syzkaller kern.notice kernel: [ 561.458883][ T29] audit: type=1400 audit(1730509130.716:4837): avc: denied { create } for pid=13444 comm="syz.0.1993" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 Nov 2 00:58:50 syzkaller kern.notice kernel: [ 561.462355][ T29] audit: type=1400 audit(1730509130.726:4838): avc: denied { execmem } for pid=13448 comm="syz.2.1995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Nov 2 00:58:50 syzkaller kern.notice kernel: [ 561.467856][ T29] audit: type=1400 audit(1730509130.726:4839): avc: denied { read } for pid=13444 comm="syz.0.1993" dev="nsfs" ino=4026532803 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file Nov 2 00:58:50 syzkaller kern.notice kernel: [ 561.469378][ T29] audit: type=1400 audit(1730509130.726:4840): avc: denied { read } for pid=13444 comm="syz.0.1993" dev="nsfs" ino=4026532803 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file Nov 2 00:58:50 syzkaller kern.notice kernel: [ 561.470059][ T29] audit: type=1400 audit(1730509130.726:4841): avc: denied { create } for pid=13444 comm="syz.0.1993" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive= Nov 2 00:58:50 syzkaller kern.notice kernel: [ 561.490060][ T29] audit: type=1400 audit(1730509130.746:4842): avc: denied { read write } for pid=6206 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 562.811908][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 Nov 2 00:58:52 syzkaller kern.warn kernel: [ 562.811908][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 [ 566.274458][ T29] kauditd_printk_skb: 185 callbacks suppressed [ 566.274477][ T29] audit: type=1400 audit(1730509135.611:5028): avc: denied { create } for pid=13590 comm="syz.5.2056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=0 Nov 2 00:58:55 syzkaller kern.warn kernel: [ 566.274458][ T29] kauditd_printk_skb: 185 callbacks suppressed Nov 2 00:58:55 syzkaller kern.notice kernel: [[ 566.323797][ T29] audit: type=1400 audit(1730509135.611:5029): avc: denied { prog_load } for pid=13590 comm="syz.5.2056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 566.274477][ T29] audit: type=1400 audit(1730509135.611:5028): avc: denied { create } for pid=13590 comm="syz.5.2056" scontext=root:sysadm_r:sysadm_t tco[ 566.355897][ T29] audit: type=1400 audit(1730509135.611:5030): avc: denied { create } for pid=13590 comm="syz.5.2056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 ntext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=0 Nov 2 00:58:55 syzkaller kern.notice kernel: [ 566.323797][ T29] audit: type=1400 audit(1730509135.611:5029): avc: denied { prog_load } for pid=13590 comm="syz.5.2056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Nov 2 00:58:55 syzkaller kern.notice kernel: [ 566.355897][ T29] au[ 566.411074][ T29] audit: type=1400 audit(1730509135.652:5031): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 dit: type=1400 audit(1730509135.611:5030): avc: denied { create } for pid=13590 comm="syz.5.2056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 Nov 2 00:58:55 syzkaller kern.notice kernel: [ 566.411074][ T29] audit: type=1400 audit(1730509135.652:5031): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 566.476277][ T29] audit: type=1400 audit(1730509135.652:5032): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 566.492122][T13595] syzkaller0: entered promiscuous mode Nov 2 00:58:55 syzkaller kern.notice kernel: [ 566.476277][ T29] audit: type=1400 audit(1730509135.652:5032): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:58:55 syzkaller kern.info kernel: [ 566.492122][T13595] syzkaller[ 566.533553][ T29] audit: type=1400 audit(1730509135.662:5033): avc: denied { read write } for pid=6451 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 0: entered promi[ 566.534336][T13595] syzkaller0: entered allmulticast mode scuous mode Nov 2 00:58:55 syzkaller kern.notice kernel: [ 566.533553][ T29] audit: type=1400 audit(1730509135.662:5033): avc: denied { read write } for pid=6451 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 2 00:58:55 syzkaller kern.info kernel: [ 566.534336][T13595] syzkaller0: entered allmulticast mode [ 566.604607][ T29] audit: type=1400 audit(1730509135.693:5034): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 566.629649][ T5183] audit: audit_backlog=65 > audit_backlog_limit=64 [ 566.639202][ T6206] audit: audit_backlog=65 > audit_backlog_limit=64 [ 566.645755][ T6206] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Nov 2 00:58:55 syzkaller kern.notice kernel: [ 566.604607][ T29] audit: type=1400 audit(1730509135.693:5034): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:58:56 syzkaller kern.warn kernel: [ 566.629649][ T5183] audit: audit_backlog=65 > audit_backlog_limit=64 Nov 2 00:58:56 syzkaller kern.warn kernel: [ 566.639202][ T6206] audit: audit_backlog=65 > audit_backlog_limit=64 Nov 2 00:58:56 syzkaller kern.warn kernel: [ 566.645755][ T6206] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 566.747987][T13600] Cannot find add_set index 0 as target Nov 2 00:58:56 syzkaller kern.info kernel: [ 566.747987][T13600] Cannot find add_set index 0 as target [ 571.054572][T13635] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2075'. Nov 2 00:59:00 syzkaller kern.warn kernel: [ 571.054572][T13635] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2075'. [ 571.172604][ T29] kauditd_printk_skb: 325 callbacks suppressed [ 571.172623][ T29] audit: type=1400 audit(1730509140.615:5348): avc: denied { map_create } for pid=13694 comm="syz.2.2101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Nov 2 00:59:00 syzkaller kern.warn kernel: [ 571.172604][ T29] kauditd_printk_skb: 325 callbacks suppressed[ 571.208075][ T29] audit: type=1400 audit(1730509140.625:5349): avc: denied { bpf } for pid=13698 comm="syz.0.2103" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 Nov 2 00:59:00[ 571.229685][ T29] audit: type=1400 audit(1730509140.655:5350): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.[ 571.253217][ T29] audit: type=1400 audit(1730509140.655:5351): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 notice kernel: [ 571.172623][ [ 571.277233][ T29] audit: type=1400 audit(1730509140.655:5352): avc: denied { read } for pid=13696 comm="syz.5.2102" name="card1" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=0 T29] audit: typ[ 571.302331][ T29] audit: type=1400 audit(1730509140.655:5353): avc: denied { read write } for pid=6206 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 e=1400 audit(173[ 571.327651][ T29] audit: type=1400 audit(1730509140.655:5354): avc: denied { read } for pid=13696 comm="syz.5.2102" name="card1" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=0 0509140.615:5348[ 571.327689][ T29] audit: type=1400 audit(1730509140.655:5355): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 ): avc: denied [ 571.327721][ T29] audit: type=1400 audit(1730509140.686:5356): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 { map_create } [ 571.327753][ T29] audit: type=1400 audit(1730509140.686:5357): avc: denied { prog_load } for pid=13700 comm="syz.0.2104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 for pid=13694 comm="syz.2.2101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Nov 2 00:59:00 syzkaller kern.notice kernel: [ 571.208075][ T29] audit: type=1400 audit(1730509140.625:5349): avc: denied { bpf } for pid=13698 comm="syz.0.2103" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permiss Nov 2 00:59:00 syzkaller kern.notice kernel: [ 571.229685][ T29] audit: type=1400 audit(1730509140.655:5350): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:59:00 syzkaller kern.notice kernel: [ 571.253217][ T29] audit: type=1400 audit(1730509140.655:5351): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:59:00 syzkaller kern.notice kernel: [ 571.277233][ T29] audit: type=1400 audit(1730509140.655:5352): avc: denied { read } for pid=13696 comm="syz.5.2102" name="card1" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_devic Nov 2 00:59:00 syzkaller kern.notice kernel: [ 571.302331][ T29] audit: type=1400 audit(1730509140.655:5353): avc: denied { read write } for pid=6206 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 2 00:59:00 syzkaller kern.notice kernel: [ 571.327651][ T29] audit: type=1400 audit(1730509140.655:5354): avc: denied { read } for pid=13696 comm="syz.5.2102" name="card1" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_devic Nov 2 00:59:00 syzkaller kern.notice kernel: [ 571.327689][ T29] audit: type=1400 audit(1730509140.655:5355): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 2 00:59:00 syzkaller kern.notice kernel: [ 571.327721][ T29] audit: type=1400 audit(1730509140.686:5356): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:59:00 syzkaller kern.notice kernel: [ 571.327753][ T29] audit: type=1400 audit(1730509140.686:5357): avc: denied { prog_load } for pid=13700 comm="syz.0.2104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 572.634023][ T5874] libceph: connect (1)[c::]:6789 error -101 [ 572.642366][ T5874] libceph: mon0 (1)[c::]:6789 connect error Nov 2 00:59:02 syzkaller kern.err kernel: [ 572.634023][ T5874] libceph: connect (1)[c::]:6789 error -101 Nov 2 00:59:02 syzkaller kern.warn kernel: [ 572.642366][ T5874] libceph: mon0 (1)[c::]:6789 connect error [ 572.952407][ T5874] libceph: connect (1)[c::]:6789 error -101 [ 572.968869][ T5874] libceph: mon0 (1)[c::]:6789 connect error Nov 2 00:59:02 syzkaller kern.err kernel: [ 572.952407][ T5874] libceph: connect (1)[c::]:6789 error -101 Nov 2 00:59:02 syzkaller kern.warn kernel: [ 572.968869][ T5874] libceph: mon0 (1)[c::]:6789 connect error Nov 2 00:59:02 syzkaller daemon.err dhcpcd[13752]: ps_bpf_start_bpf: bpf_open: Invalid argument Nov 2 00:59:02 syzkaller daemon.err dhcpcd[13752]: ps_root_recvmsg: Invalid argument [ 573.411855][T13739] ceph: No mds server is up or the cluster is laggy Nov 2 00:59:02 syzkaller kern.info kernel: [ 573.411855][T13739] ceph: No mds server is up or the cluster is laggy [ 576.127002][ T29] kauditd_printk_skb: 228 callbacks suppressed [ 576.127025][ T29] audit: type=1400 audit(1730509145.658:5586): avc: denied { read write } for pid=6206 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Nov 2 00:59:05 syzkaller kern.w[ 576.161114][ T29] audit: type=1400 audit(1730509145.668:5587): avc: denied { create } for pid=13863 comm="syz.1.2172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 arn kernel: [ 576.127002][ T29] kauditd_printk_skb: 228 callbacks suppressed Nov 2 00:59:05 syzkaller kern.notice kernel: [ 576.127025][ T29] audit: type=1400 audit(1730509145.658:5586): avc: denied { read write } for pid=6206 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 2 00:59:05 syzkaller kern.notice kernel: [ 576.161114[ 576.217804][ T29] audit: type=1400 audit(1730509145.668:5588): avc: denied { read } for pid=13863 comm="syz.1.2172" name="ptp0" dev="devtmpfs" ino=1265 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=0 ][ T29] audit: type=1400 audit(1730509145.668:5587): avc: denied { create } for pid=13863 comm="syz.1.2172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissi Nov 2 00:59:05 syzkaller kern.notice kernel: [ 576.217804][ T29] audit: type=1400 audit(1730509145.668:5588): avc: denied { read } for pid=13863 comm="syz.1.2172" name="ptp0" dev="devtmpfs" in[ 576.277203][ T29] audit: type=1400 audit(1730509145.668:5589): avc: denied { execmem } for pid=13863 comm="syz.1.2172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 o=1265 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_dev Nov 2 00:59:05 syzkaller kern.notice kernel: [ 576.277203][ T29] audit: type=1400 audit(1730509145.668:5589): avc: denied { execmem } for pid=13863 comm="syz.1.2172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 576.345924][ T29] audit: type=1400 audit(1730509145.699:5590): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 2 00:59:05 syzkaller kern.notice kernel: [ 576.345924][ T29] audit: type=1400 audit(1730509145.699:5590): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 576.413563][ T29] audit: type=1400 audit(1730509145.699:5591): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 2 00:59:05 syzkaller kern.notice kernel: [ 576.413563][ T29] audit: type=1400 audit(1730509145.699:5591): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=[ 576.454090][ T29] audit: type=1400 audit(1730509145.719:5592): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:59:06 syzkaller kern.notice kernel: [ 576.454090][ T29] audit: type=1400 audit(1730509145.719:5592): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 576.513275][ T29] audit: type=1400 audit(1730509145.760:5593): avc: denied { read write } for pid=6206 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Nov 2 00:59:06 syzkaller kern.notice kernel: [ 576.513275][ T29] audit: type=1400 audit(1730509145.760:5593): avc: denied { read write } for pid=6206 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 576.563023][T13876] xt_socket: unknown flags 0x8 Nov 2 00:59:06 syzkaller kern.info kernel: [ 576.563023][T13876] xt_socket: unknown flags 0x8 [ 576.595539][ T29] audit: type=1400 audit(1730509145.780:5594): avc: denied { read write } for pid=5830 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Nov 2 00:59:06 syzkaller kern.notice kernel: [ 576.595539][ T29] audit: type=1400 audit(1730509145.780:5594): avc: denied { read write } for pid=5830 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 576.656401][ T29] audit: type=1400 audit(1730509145.790:5595): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 2 00:59:06 syzkaller kern.notice kernel: [ 576.656401][ T29] audit: type=1400 audit(1730509145.790:5595): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:59:07 syzkaller kern.debug kernel: [ 577.572896][T13903] PM: Image not found (code -22) [ 579.145887][T13931] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=13931 comm=syz.1.2197 Nov 2 00:59:08 syzkaller kern.warn kernel: [ 579.145887][T13931] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=13931 comm=syz.1.2197 [ 579.557926][T13950] x_tables: ip6_tables: TCPOPTSTRIP target: only valid for protocol 6 Nov 2 00:59:09 syzkaller kern.info kernel: [ 579.557926][T13950] x_tables: ip6_tables: TCPOPTSTRIP target: only valid for protocol 6 [ 580.081678][T13974] x_tables: ip6_tables: TCPOPTSTRIP target: only valid for protocol 6 Nov 2 00:59:09 syzkaller kern.info kernel: [ 580.081678][T13974] x_tables: ip6_tables: TCPOPTSTRIP target: only valid for protocol 6 [ 581.105918][T14007] x_tables: ip6_tables: TCPOPTSTRIP target: only valid for protocol 6 [ 581.129439][ T29] kauditd_printk_skb: 221 callbacks suppressed [ 581.129454][ T29] audit: type=1400 audit(1730509150.729:5817): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 2 00:59:10 syzkaller kern.info kernel: [ 581.105918][T14007] x_tables: ip6_tables: TCPOPTSTRIP target: only valid for protocol 6 Nov 2 00:59:10 syzkaller kern.warn kernel: [ 581.129439][ T29] kaudi[ 581.182102][ T29] audit: type=1400 audit(1730509150.749:5818): avc: denied { read write } for pid=6206 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 td_printk_skb: 221 callbacks suppressed Nov 2 00:59:10 syzkaller kern.notice kernel: [ 581.129454][ T29] audit: type=1400 audit(1730509150.729:5817): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:[ 581.229262][ T29] audit: type=1400 audit(1730509150.759:5819): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 system_r:syslogd[ 581.252354][ T29] audit: type=1400 audit(1730509150.759:5820): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 _t tcontext=syst[ 581.275676][ T29] audit: type=1400 audit(1730509150.810:5821): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 em_u:object_r:var_t tclass= Nov 2 00:59:10 syz[ 581.301745][ T29] audit: type=1400 audit(1730509150.850:5822): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 kaller kern.notice kernel: [ 581.182102][ T29[ 581.327598][ T29] audit: type=1400 audit(1730509150.871:5823): avc: denied { write } for pid=14008 comm="syz.1.2233" name="anycast6" dev="proc" ino=4026534005 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 ] audit: type=14[ 581.352675][ T29] audit: type=1400 audit(1730509150.871:5824): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 00 audit(1730509[ 581.376019][ T29] audit: type=1400 audit(1730509150.901:5825): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 150.749:5818): avc: denied { read write } for pid=6206 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 2 00:59:10 syzkaller kern.notice kernel: [ 581.229262][ T29] audit: type=1400 audit(1730509150.759:5819): avc: denied { read } for pid=5183 comm="syslogd" name="log[ 581.427761][ T29] audit: type=1400 audit(1730509150.931:5826): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 " dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:59:10 syzkaller kern.notice kernel: [ 581.252354][ T29] audit: type=1400 audit(1730509150.759:5820): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:59:10 syzkaller kern.notice kernel: [ 581.275676][ T29] audit: type=1400 audit(1730509150.810:5821): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:59:10 syzkaller kern.notice kernel: [ 581.301745][ T29] audit: type=1400 audit(1730509150.850:5822): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:59:10 syzkaller kern.notice kernel: [ 581.327598][ T29] audit: type=1400 audit(1730509150.871:5823): avc: denied { write } for pid=14008 comm="syz.1.2233" name="anycast6" dev="proc" ino=4026534005 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pr Nov 2 00:59:10 syzkaller kern.notice kernel: [ 581.352675][ T29] audit: type=1400 audit(1730509150.871:5824): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:59:11 syzkaller kern.notice kernel: [ 581.376019][ T29] audit: type=1400 audit(1730509150.901:5825): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 00:59:11 syzkaller kern.notice kernel: [ 581.427761][ T29] audit: type=1400 audit(1730509150.931:5826): avc: denied { read } for pid=5183 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 582.113453][T14032] netlink: 'syz.1.2243': attribute type 3 has an invalid length. Nov 2 00:59:11 syzkaller kern.warn kernel: [ 582.113453][T14032] netlink: 'syz.1.2243': attribute type 3 has an invalid length. [ 688.904727][ C1] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 688.911715][ C1] rcu: 0-...!: (1 GPs behind) idle=68fc/1/0x4000000000000000 softirq=59980/59981 fqs=8 [ 688.922888][ C1] rcu: (detected by 1, t=10505 jiffies, g=55061, q=357 ncpus=2) [ 688.930621][ C1] Sending NMI from CPU 1 to CPUs 0: [ 688.930654][ C0] NMI backtrace for cpu 0 [ 688.930668][ C0] CPU: 0 UID: 0 PID: 14064 Comm: syz.0.2256 Not tainted 6.12.0-rc5-syzkaller-00181-g6c52d4da1c74 #0 [ 688.930691][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 688.930703][ C0] RIP: 0010:kasan_check_range+0x150/0x1a0 [ 688.930738][ C0] Code: c0 01 49 89 d3 48 39 d0 74 11 80 38 00 74 ef 4d 8d 1c 2c 48 85 c0 48 89 c2 75 93 48 89 da 4c 89 d8 4c 29 da e9 2c ff ff ff 5b 01 00 00 00 5d 41 5c c3 cc cc cc cc b8 01 00 00 00 c3 cc cc cc [ 688.930757][ C0] RSP: 0018:ffffc90000007c08 EFLAGS: 00000046 [ 688.930773][ C0] RAX: fffffbfff20bea72 RBX: 1ffff92000000f86 RCX: ffffffff816a9e29 [ 688.930787][ C0] RDX: fffffbfff20bea72 RSI: 0000000000000008 RDI: ffffffff905f5388 [ 688.930800][ C0] RBP: fffffbfff20bea71 R08: 0000000000000000 R09: fffffbfff20bea71 [ 688.930813][ C0] R10: ffffffff905f538f R11: 0000000000000000 R12: ffffffff8ed20280 [ 688.930826][ C0] R13: ffff888030c4d340 R14: 000000000003dbcc R15: ffffffff89321bd0 [ 688.930839][ C0] FS: 00007f3304b236c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 [ 688.930859][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 688.930873][ C0] CR2: 00007f3304b22f98 CR3: 0000000059a78000 CR4: 00000000003526f0 [ 688.930886][ C0] DR0: 0000000100000001 DR1: 0000000000000000 DR2: 0000000000000000 [ 688.930898][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 688.930910][ C0] Call Trace: [ 688.930917][ C0] [ 688.930925][ C0] ? nmi_cpu_backtrace+0x1d8/0x390 [ 688.930954][ C0] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 688.930985][ C0] ? nmi_handle+0x1a9/0x5c0 [ 688.931006][ C0] ? kasan_check_range+0x150/0x1a0 [ 688.931034][ C0] ? default_do_nmi+0x6a/0x160 [ 688.931057][ C0] ? exc_nmi+0x170/0x1e0 [ 688.931079][ C0] ? end_repeat_nmi+0xf/0x53 [ 688.931107][ C0] ? __pfx_advance_sched+0x10/0x10 [ 688.931132][ C0] ? lock_release+0xa9/0x6f0 [ 688.931151][ C0] ? kasan_check_range+0x150/0x1a0 [ 688.931179][ C0] ? kasan_check_range+0x150/0x1a0 [ 688.931208][ C0] ? kasan_check_range+0x150/0x1a0 [ 688.931235][ C0] [ 688.931241][ C0] [ 688.931247][ C0] lock_release+0xa9/0x6f0 [ 688.931264][ C0] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 688.931283][ C0] ? debug_object_activate+0x13e/0x540 [ 688.931310][ C0] ? __pfx_lock_release+0x10/0x10 [ 688.931328][ C0] ? trace_lock_acquire+0x14a/0x1d0 [ 688.931353][ C0] ? debug_object_activate+0x13e/0x540 [ 688.931386][ C0] ? lock_acquire+0x2f/0xb0 [ 688.931403][ C0] ? debug_object_activate+0x13e/0x540 [ 688.931429][ C0] ? debug_object_activate+0x13e/0x540 [ 688.931456][ C0] ? __pfx_advance_sched+0x10/0x10 [ 688.931477][ C0] debug_object_activate+0x160/0x540 [ 688.931503][ C0] ? debug_object_activate+0x13e/0x540 [ 688.931530][ C0] ? __pfx_debug_object_activate+0x10/0x10 [ 688.931559][ C0] ? rcu_is_watching+0x12/0xc0 [ 688.931583][ C0] ? do_raw_spin_lock+0x12d/0x2c0 [ 688.931607][ C0] ? __pfx_advance_sched+0x10/0x10 [ 688.931629][ C0] ? enqueue_hrtimer+0x25/0x3c0 [ 688.931647][ C0] enqueue_hrtimer+0x25/0x3c0 [ 688.931666][ C0] __hrtimer_run_queues+0x903/0xae0 [ 688.931691][ C0] ? __pfx___hrtimer_run_queues+0x10/0x10 [ 688.931713][ C0] ? ktime_get_update_offsets_now+0x201/0x310 [ 688.931745][ C0] hrtimer_interrupt+0x31b/0x800 [ 688.931772][ C0] __sysvec_apic_timer_interrupt+0x10f/0x400 [ 688.931795][ C0] sysvec_apic_timer_interrupt+0x9f/0xc0 [ 688.931824][ C0] [ 688.931829][ C0] [ 688.931836][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 688.931866][ C0] RIP: 0010:_raw_spin_unlock_irqrestore+0x31/0x80 [ 688.931894][ C0] Code: f5 53 48 8b 74 24 10 48 89 fb 48 83 c7 18 e8 46 02 45 f6 48 89 df e8 5e 7f 45 f6 f7 c5 00 02 00 00 75 23 9c 58 f6 c4 02 75 37 01 00 00 00 e8 b5 86 36 f6 65 8b 05 66 40 de 74 85 c0 74 16 5b [ 688.931912][ C0] RSP: 0018:ffffc9000f7e7a58 EFLAGS: 00000246 [ 688.931927][ C0] RAX: 0000000000000006 RBX: ffff8880b862c9c0 RCX: 1ffffffff2dc5c7c [ 688.931940][ C0] RDX: 0000000000000000 RSI: ffffffff8b6cd040 RDI: ffffffff8bd1adc0 [ 688.931953][ C0] RBP: 0000000000000286 R08: 0000000000000001 R09: fffffbfff2dc5b88 [ 688.931966][ C0] R10: ffffffff96e2dc47 R11: 0000000000000000 R12: fe232a37f1df00ff [ 688.931979][ C0] R13: 0000000000000000 R14: 00000087ef7f6ea9 R15: dffffc0000000000 [ 688.932000][ C0] clock_was_set+0x591/0x850 [ 688.932024][ C0] ? __pfx_clock_was_set+0x10/0x10 [ 688.932046][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 688.932075][ C0] timekeeping_inject_offset+0x4d1/0x640 [ 688.932102][ C0] ? __pfx_timekeeping_inject_offset+0x10/0x10 [ 688.932129][ C0] ? bpf_lsm_capable+0x9/0x10 [ 688.932151][ C0] ? security_capable+0x7e/0x260 [ 688.932181][ C0] do_adjtimex+0x37a/0xaa0 [ 688.932211][ C0] ? __pfx_do_adjtimex+0x10/0x10 [ 688.932239][ C0] ? __might_fault+0x13b/0x190 [ 688.932267][ C0] ? trace_lock_acquire+0x14a/0x1d0 [ 688.932296][ C0] ? __might_fault+0xe3/0x190 [ 688.932326][ C0] ? __pfx_posix_clock_realtime_adj+0x10/0x10 [ 688.932355][ C0] __do_sys_clock_adjtime+0x173/0x290 [ 688.932388][ C0] ? __pfx___do_sys_clock_adjtime+0x10/0x10 [ 688.932417][ C0] ? find_held_lock+0x59/0x110 [ 688.932441][ C0] ? find_held_lock+0x2d/0x110 [ 688.932474][ C0] ? do_user_addr_fault+0x83d/0x13f0 [ 688.932509][ C0] do_syscall_64+0xcd/0x250 [ 688.932540][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 688.932568][ C0] RIP: 0033:0x7f3303d7e719 [ 688.932585][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 688.932602][ C0] RSP: 002b:00007f3304b23038 EFLAGS: 00000246 ORIG_RAX: 0000000000000131 [ 688.932620][ C0] RAX: ffffffffffffffda RBX: 00007f3303f35f80 RCX: 00007f3303d7e719 [ 688.932634][ C0] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000000 [ 688.932645][ C0] RBP: 00007f3303df132e R08: 0000000000000000 R09: 0000000000000000 [ 688.932658][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 688.932670][ C0] R13: 0000000000000001 R14: 00007f3303f35f80 R15: 00007ffe1db69528 [ 688.932689][ C0] [ 688.933648][ C1] rcu: rcu_preempt kthread starved for 10465 jiffies! g55061 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 689.544250][ C1] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 689.554223][ C1] rcu: RCU grace-period kthread stack dump: [ 689.560108][ C1] task:rcu_preempt state:R running task stack:28352 pid:17 tgid:17 ppid:2 flags:0x00004000 [ 689.571888][ C1] Call Trace: [ 689.575167][ C1] [ 689.578102][ C1] __schedule+0xe55/0x5730 [ 689.582536][ C1] ? __pfx___lock_acquire+0x10/0x10 [ 689.587750][ C1] ? __pfx___schedule+0x10/0x10 [ 689.592613][ C1] ? schedule+0x298/0x350 [ 689.596955][ C1] ? __pfx_lock_release+0x10/0x10 [ 689.601980][ C1] ? trace_lock_acquire+0x14a/0x1d0 [ 689.607196][ C1] ? lock_acquire+0x2f/0xb0 [ 689.611702][ C1] ? schedule+0x1fd/0x350 [ 689.616051][ C1] schedule+0xe7/0x350 [ 689.620132][ C1] schedule_timeout+0x136/0x2a0 [ 689.624990][ C1] ? __pfx_schedule_timeout+0x10/0x10 [ 689.630378][ C1] ? __pfx_process_timeout+0x10/0x10 [ 689.635678][ C1] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 689.641496][ C1] ? prepare_to_swait_event+0xf3/0x470 [ 689.646979][ C1] rcu_gp_fqs_loop+0x1eb/0xb00 [ 689.651761][ C1] ? __pfx_rcu_gp_fqs_loop+0x10/0x10 [ 689.657058][ C1] ? rcu_gp_init+0xc82/0x1630 [ 689.661749][ C1] ? _raw_spin_unlock_irq+0x2e/0x50 [ 689.666970][ C1] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 689.672797][ C1] rcu_gp_kthread+0x271/0x380 [ 689.677484][ C1] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 689.682690][ C1] ? lockdep_hardirqs_on+0x7c/0x110 [ 689.687907][ C1] ? __kthread_parkme+0x148/0x220 [ 689.692947][ C1] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 689.698150][ C1] kthread+0x2c1/0x3a0 [ 689.702228][ C1] ? _raw_spin_unlock_irq+0x23/0x50 [ 689.707525][ C1] ? __pfx_kthread+0x10/0x10 [ 689.712128][ C1] ret_from_fork+0x45/0x80 [ 689.716546][ C1] ? __pfx_kthread+0x10/0x10 [ 689.721150][ C1] ret_from_fork_asm+0x1a/0x30 [ 689.725943][ C1] [ 689.728961][ C1] rcu: Stack dump where RCU GP kthread last ran: [ 689.735279][ C1] CPU: 1 UID: 0 PID: 14075 Comm: syz.4.2260 Not tainted 6.12.0-rc5-syzkaller-00181-g6c52d4da1c74 #0 [ 689.746046][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 689.756101][ C1] RIP: 0010:smp_call_function_many_cond+0x45d/0x1300 [ 689.762785][ C1] Code: 4d 48 b8 00 00 00 00 00 fc ff df 4d 89 f4 4c 89 f5 49 c1 ec 03 83 e5 07 49 01 c4 83 c5 03 e8 8a 1b 0c 00 f3 90 41 0f b6 04 24 <40> 38 c5 7c 08 84 c0 0f 85 a4 0c 00 00 8b 43 08 31 ff 83 e0 01 41 [ 689.782395][ C1] RSP: 0018:ffffc9000b54fb30 EFLAGS: 00000246 [ 689.788469][ C1] RAX: 0000000000000000 RBX: ffff8880b8646b80 RCX: ffffc9000c392000 [ 689.796444][ C1] RDX: 0000000000040000 RSI: ffffffff818160f6 RDI: 0000000000000005 [ 689.804414][ C1] RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000 [ 689.812386][ C1] R10: 0000000000000001 R11: 0000000000000000 R12: ffffed10170c8d71 [ 689.820356][ C1] R13: 0000000000000001 R14: ffff8880b8646b88 R15: ffff8880b8740100 [ 689.828334][ C1] FS: 00007f054be3d6c0(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 [ 689.837267][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 689.843855][ C1] CR2: 0000000000000000 CR3: 000000007e1f0000 CR4: 00000000003526f0 [ 689.851836][ C1] Call Trace: [ 689.855115][ C1] [ 689.857958][ C1] ? rcu_check_gp_kthread_starvation+0x31b/0x450 [ 689.864298][ C1] ? do_raw_spin_unlock+0x172/0x230 [ 689.869516][ C1] ? rcu_sched_clock_irq+0x23d7/0x32a0 [ 689.874993][ C1] ? __pfx_rcu_sched_clock_irq+0x10/0x10 [ 689.880631][ C1] ? __asan_memcpy+0x3c/0x60 [ 689.885224][ C1] ? __asan_memcpy+0x3c/0x60 [ 689.889817][ C1] ? cgroup_rstat_updated+0x2a/0xb20 [ 689.895122][ C1] ? update_process_times+0x178/0x220 [ 689.900512][ C1] ? __pfx_update_process_times+0x10/0x10 [ 689.906247][ C1] ? update_wall_time+0x1c/0x40 [ 689.911109][ C1] ? tick_nohz_handler+0x376/0x530 [ 689.916230][ C1] ? __pfx_tick_nohz_handler+0x10/0x10 [ 689.921695][ C1] ? __hrtimer_run_queues+0x5fb/0xae0 [ 689.927078][ C1] ? __pfx___hrtimer_run_queues+0x10/0x10 [ 689.932802][ C1] ? ktime_get_update_offsets_now+0x201/0x310 [ 689.938884][ C1] ? hrtimer_interrupt+0x31b/0x800 [ 689.944014][ C1] ? __sysvec_apic_timer_interrupt+0x10f/0x400 [ 689.950176][ C1] ? sysvec_apic_timer_interrupt+0x9f/0xc0 [ 689.955993][ C1] [ 689.958922][ C1] [ 689.961851][ C1] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 689.968025][ C1] ? smp_call_function_many_cond+0x456/0x1300 [ 689.974097][ C1] ? smp_call_function_many_cond+0x45d/0x1300 [ 689.980172][ C1] ? __pfx_do_sync_core+0x10/0x10 [ 689.985211][ C1] ? __pfx_do_sync_core+0x10/0x10 [ 689.990243][ C1] on_each_cpu_cond_mask+0x40/0x90 [ 689.995360][ C1] text_poke_bp_batch+0x22b/0x760 [ 690.000396][ C1] ? arch_jump_label_transform_apply+0x17/0x30 [ 690.006566][ C1] ? __pfx_text_poke_bp_batch+0x10/0x10 [ 690.012120][ C1] ? __jump_label_patch+0x1db/0x400 [ 690.017327][ C1] ? text_poke_queue+0xef/0x180 [ 690.022188][ C1] ? arch_jump_label_transform_queue+0xc0/0x120 [ 690.028447][ C1] text_poke_finish+0x30/0x40 [ 690.033134][ C1] arch_jump_label_transform_apply+0x1c/0x30 [ 690.039123][ C1] jump_label_update+0x1d7/0x400 [ 690.044066][ C1] static_key_enable_cpuslocked+0x1b7/0x270 [ 690.049963][ C1] static_key_enable+0x1a/0x20 [ 690.054730][ C1] sched_core_get+0x8a/0xa0 [ 690.059233][ C1] sched_core_share_pid+0x41f/0xa00 [ 690.064443][ C1] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 690.070355][ C1] ? __pfx_sched_core_share_pid+0x10/0x10 [ 690.076087][ C1] ? static_key_count+0x5a/0x70 [ 690.080942][ C1] ? security_task_prctl+0x11c/0x160 [ 690.086240][ C1] __do_sys_prctl+0xeee/0x1eb0 [ 690.091007][ C1] ? __pfx___do_sys_prctl+0x10/0x10 [ 690.096216][ C1] do_syscall_64+0xcd/0x250 [ 690.100748][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 690.106651][ C1] RIP: 0033:0x7f054af7e719 [ 690.111068][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 690.130691][ C1] RSP: 002b:00007f054be3d038 EFLAGS: 00000246 ORIG_RAX: 000000000000009d [ 690.139119][ C1] RAX: ffffffffffffffda RBX: 00007f054b135f80 RCX: 00007f054af7e719 [ 690.147095][ C1] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000003e [ 690.155071][ C1] RBP: 00007f054aff132e R08: 0000000000000000 R09: 0000000000000000 [ 690.163046][ C1] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 [ 690.171022][ C1] R13: 0000000000000000 R14: 00007f054b135f80 R15: 00007ffe8aeb5f08 [ 690.179019][ C1]