last executing test programs: 36m20.250780694s ago: executing program 4 (id=786): socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0xb49, 0x9, 0x8, 0x0, 0x3}, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0x7c81, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280), 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYRESDEC=r2, @ANYBLOB, @ANYRESDEC=0x0, @ANYRESDEC=0x0]) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r3 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000002c0)="ae", 0x1, 0xfffffffffffffffd) keyctl$read(0xb, r3, &(0x7f0000000240)=""/112, 0x349b7f55) r4 = socket$nl_generic(0x10, 0x3, 0x10) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000280)=""/254) sendmsg$nl_generic(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)={0x18, 0x2d, 0x9, 0x70bd27, 0x0, {0x4}, [@typed={0x4, 0x18, 0x0, 0x0, @binary}]}, 0x18}}, 0x84) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x0, 0x0}) io_setup(0x9, &(0x7f0000000100)) 36m17.985572641s ago: executing program 4 (id=791): r0 = syz_open_procfs(0x0, 0x0) munmap(&(0x7f0000901000/0x3000)=nil, 0x3000) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r1 = gettid() sched_setscheduler(r1, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000000000000000000000000000000020000", @ANYRES32=0x0, @ANYBLOB="010064060a000200aaaaaaaaaa0c0000"], 0x28}, 0x1, 0x0, 0x0, 0x20040051}, 0x4048080) openat$cgroup_ro(r0, &(0x7f0000000340)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000040)=0x7fff) r6 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000300)={'virt_wifi0\x00', 0x0}) setsockopt$inet6_mreq(r6, 0x29, 0x1b, &(0x7f0000000000)={@remote, r7}, 0x14) setsockopt$inet6_mreq(r6, 0x29, 0x1c, &(0x7f0000000480)={@remote, r7}, 0x14) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0xc0a85320, &(0x7f0000001400)={{0x80}, 'port1\x00', 0xe3, 0x1b1c07}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000000)={0x80, 0x9, 0x2, 0xe05, 0x20000, 0x28e7}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140), 0x8417f, 0x0) 36m16.88706391s ago: executing program 4 (id=795): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x88) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB], &(0x7f0000000140)='GPL\x00'}, 0x94) r1 = socket$kcm(0x2, 0x1, 0x0) sendmsg$inet(r1, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x7) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000200)=0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tracefs\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xc4062, &(0x7f0000000300)={[{}]}) bpf$MAP_CREATE(0x0, 0x0, 0x48) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040ed7e54e20"], 0x7) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000002080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000880)="1a", 0x100000}], 0x1}, 0x0) syz_emit_ethernet(0x86, &(0x7f00000010c0)={@broadcast, @multicast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010102, @local}, @redirect={0x3, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x2a}, {0x17, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, @private, @empty, {[@timestamp_addr={0x44, 0xc, 0x0, 0x1, 0x0, [{@remote, 0x4e210000}]}, @timestamp_addr={0x44, 0x3c, 0x0, 0x1, 0x0, [{@multicast1}, {}, {@dev}, {@private}, {@empty}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@dev}]}]}}}}}}}, 0x0) mknodat$loop(0xffffffffffffffff, &(0x7f0000001600)='./file1\x00', 0x200, 0x0) 36m15.034403281s ago: executing program 4 (id=799): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1a"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='kfree\x00', r1}, 0x10) mkdir(0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000200000000000000000000060400000000000000000000010500000008000000000000000000000300000000020000000200000004000000000000000000000b03"], 0x0, 0x5a}, 0x28) syz_open_dev$usbfs(&(0x7f0000000080), 0x70, 0x101301) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffe00}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffe}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x4, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) pipe2$9p(&(0x7f0000000100), 0x80000) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x1, 0x803, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r9}]}, 0x44}}, 0x0) 36m13.968867236s ago: executing program 4 (id=802): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) r1 = add_key$keyring(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) add_key(0x0, &(0x7f0000000300)={'syz', 0x1}, &(0x7f00000003c0), 0x0, r1) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0x2b38094, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=0x0]) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000040)='autofs\x00', 0x0, &(0x7f0000000400)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) accept$inet(r3, &(0x7f0000000100)={0x2, 0x0, @private}, &(0x7f0000000200)=0x10) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x2003, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4, 0x13, r2, 0x59967000) chdir(&(0x7f0000000080)='./file1\x00') r5 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r5, 0x40049366, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') ioctl$TCXONC(r0, 0x540a, 0x1) 36m12.091867754s ago: executing program 4 (id=804): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xeffffe0000000001, 0xfa11, 0xffffffff}, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x50, 0x0, &(0x7f0000000040)=0x54) socket$l2tp6(0xa, 0x2, 0x73) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000100)={0x362, 0x6a, 0x55cd, 0x8000000000000001, 0x48c, 0x5, 0xd, 0x424, 0x2, 0xffffffffffffffff, 0xf423f, 0xfffffffffffffff9, 0x4, 0x2, 0x1000000081, 0x5, 0xfffffffffffffffe, 0x5, 0x8, 0x9220000000000000, 0x3, 0x0, 0x80000001, 0x0, 0x5, 0x7}) syz_open_dev$sndmidi(0x0, 0x2, 0x141101) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000000)={0x15, 0x110, 0xfa08, {0xffffffffffffffff, 0x0, 0x10, 0x10, 0x0, @in={0x2, 0x4e20, @empty}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1c}}}}, 0x118) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) munlockall() r2 = syz_open_dev$sndmidi(&(0x7f00000002c0), 0x2, 0x141101) r3 = dup(r2) write$6lowpan_enable(r3, &(0x7f0000000000)='0', 0xfffffd2c) r4 = userfaultfd(0x80001) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000140)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x19) socket$xdp(0x2c, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x94) clock_adjtime(0xffffffd3, &(0x7f0000000000)={0x7fffffff, 0xfffffffffffffffe, 0xff, 0x4000000, 0x0, 0x0, 0x651, 0xfffffffffffffff8, 0x8, 0x0, 0x9, 0x0, 0x1000000000000008, 0xb, 0x0, 0xcc6, 0xfffffffffffff7fc, 0x1, 0x80008, 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x3}) 35m56.647661645s ago: executing program 32 (id=804): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xeffffe0000000001, 0xfa11, 0xffffffff}, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x50, 0x0, &(0x7f0000000040)=0x54) socket$l2tp6(0xa, 0x2, 0x73) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000100)={0x362, 0x6a, 0x55cd, 0x8000000000000001, 0x48c, 0x5, 0xd, 0x424, 0x2, 0xffffffffffffffff, 0xf423f, 0xfffffffffffffff9, 0x4, 0x2, 0x1000000081, 0x5, 0xfffffffffffffffe, 0x5, 0x8, 0x9220000000000000, 0x3, 0x0, 0x80000001, 0x0, 0x5, 0x7}) syz_open_dev$sndmidi(0x0, 0x2, 0x141101) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000000)={0x15, 0x110, 0xfa08, {0xffffffffffffffff, 0x0, 0x10, 0x10, 0x0, @in={0x2, 0x4e20, @empty}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1c}}}}, 0x118) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) munlockall() r2 = syz_open_dev$sndmidi(&(0x7f00000002c0), 0x2, 0x141101) r3 = dup(r2) write$6lowpan_enable(r3, &(0x7f0000000000)='0', 0xfffffd2c) r4 = userfaultfd(0x80001) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000140)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x19) socket$xdp(0x2c, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x94) clock_adjtime(0xffffffd3, &(0x7f0000000000)={0x7fffffff, 0xfffffffffffffffe, 0xff, 0x4000000, 0x0, 0x0, 0x651, 0xfffffffffffffff8, 0x8, 0x0, 0x9, 0x0, 0x1000000000000008, 0xb, 0x0, 0xcc6, 0xfffffffffffff7fc, 0x1, 0x80008, 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x3}) 13.514643452s ago: executing program 3 (id=5831): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x7ff}, 0xe) syz_init_net_socket$bt_hidp(0x1f, 0x3, 0x6) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') syz_io_uring_setup(0x4a3d, &(0x7f00000000c0)={0x0, 0x79af, 0x3180, 0x8000, 0x40024e}, &(0x7f0000000340)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r5, r6, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x801, 0x0, 0x0, {0x0, 0x0, 0x8000}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x101}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x4004}, 0xd4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x18) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x4000, 0x0, 0x0) r9 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={0x54, 0x12, 0x1, 0x8, 0x0, {0xa, 0x0, 0x0, 0x0, {0x0, 0x4e22, [0xfffffffc, 0x0, 0xcd7e], [], 0x0, [0x1]}, 0x0, 0x2000}, [@INET_DIAG_REQ_BYTECODE={0x8, 0x3, "06010000"}]}, 0x54}}, 0x20000080) r10 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x2, 0x8) setsockopt$IPT_SO_SET_REPLACE(r10, 0x4000000000000, 0x40, &(0x7f0000000400)=@raw={'raw\x00', 0x41, 0x3, 0x380, 0x0, 0x19, 0x0, 0x0, 0x0, 0x2e8, 0x1f0, 0x1f0, 0x2e8, 0x1f0, 0x3, 0x0, {[{{@ip={@private, @dev, 0x0, 0x0, 'wlan1\x00', 'wg1\x00'}, 0x0, 0x1f8, 0x218, 0x0, {0x0, 0xffffffffa0028000}, [@common=@unspec=@quota={{0x38}}, @common=@inet=@hashlimit2={{0x150}, {'veth1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x687c, 0x1}}}]}, @unspec=@TRACE={0x20}}, {{@ip={@empty, @empty, 0x0, 0x0, 'veth0_vlan\x00', 'netpci0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x3e0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) io_uring_enter(0xffffffffffffffff, 0x0, 0xcb, 0xf, &(0x7f0000000000), 0x18) 12.428306344s ago: executing program 2 (id=5836): modify_ldt$write(0x1, &(0x7f0000000240)={0xd6, 0x1000, 0x1000, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1}, 0x10) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x800) r0 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x20000000002, &(0x7f0000000700)="f387f3d0d636834c015f24e62c2e7c82d107a6808737c85e69706da9c8440000009c0ebf8e3f0a7efe0ed91d923af04bf049364e1b69237c6258215d8f1e91bd3bd03e7f3876d52ef012264768d6b703075024a5164aebe8ba1203b8512b2258bb6dfa2f55f496386fd12d29590c6eee14a6c7bc9d4c9c26915315ab4f01f3b278e7a837b409f9a8d7") ptrace$cont(0x21, r0, 0x80000001, 0x4) 12.400414696s ago: executing program 3 (id=5837): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000001c0)="d80000001e0081054e81f782060000000000000006007c095dd2466506000e800a00142603600e1208000f0000000406a80016c0080009400400027c035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791433a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad909d5e1cace81ed0bffece0b42a9eca0200e6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) socket$pppoe(0x18, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_open_dev$MSR(&(0x7f0000000040), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) ioperm(0x7, 0x81, 0x2) mremap(&(0x7f0000041000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f00004c3000/0x2000)=nil) r2 = socket$kcm(0x29, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000080)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000380)=0x18) write$cgroup_pressure(r2, &(0x7f0000000140)={'full'}, 0xfffffdef) ioctl$int_in(r2, 0x5452, &(0x7f0000000240)=0x3) sendmsg$kcm(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x20000818) setsockopt$sock_attach_bpf(r2, 0x1, 0x7, &(0x7f0000000340), 0x4) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x1d2) fcntl$setlease(r4, 0x400, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x1000000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x3a, 0x1, 0x0, 0x0) 11.398375266s ago: executing program 2 (id=5840): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0xa4, 0x30, 0x1, 0x0, 0x25dfdbfb, {}, [{0x90, 0x1, [@m_ct={0x44, 0xe, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x9d, 0x11e41e7a, 0x8, 0x0, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x1}}}}, @m_ife={0x48, 0x3, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x804}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = gettid() timer_create(0x7, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3f0, 0x0, 0x940c, 0x3002, 0x0, 0x2c0, 0x404, 0x3d8, 0x3d8, 0x404, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x1a0, 0x1e8, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private0, [0x0, 0x0, 0xff000000, 0xff], [0xffffff00, 0xffffff00, 0xff000000, 0xffffffff], 'team_slave_1\x00', 'veth1_virt_wifi\x00', {0xff}, {}, 0x886215f4d37bb4bb, 0x90, 0x1, 0x69}, 0x0, 0xd0, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x450) pipe2(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX=r5, @ANYBLOB=',wfdno=', @ANYRESHEX=r6, @ANYBLOB=',cache=fscach']) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000300)={0x0, 0x1, 0x6, @local}, 0x10) r7 = socket$nl_route(0x10, 0x3, 0x0) syz_clone(0x10020000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000000500)="d1bc900d8a00c336af2a52816b757b56260c0944c4f341e9c85c040cff9c5cb201188344ec2fc3fffae0c36426d9228eba2b3c8b42a11f14833b25ea6bd3247a6b565adec5c3a506f5018d06d35efdbb76355936726d1060e638d7e8038ab2e6a23d5c4e1d00d5e8e0b94a252398a320916396ce6999aa2c04557443ff35fd4f7b6a2a2c4717dd2840936d0c43556b3e98f3cb949293cae52be2488aad3b51be28d5751ffa75c3e2fd85e7044b798fe8cb4c4d14f11f4465acc5507d1e3176218958d23fff776ff00f0afb37cd50d13dbf57db8b0d743b59779a6f8008c1e0d354d666417953545575356d5618b956117d1314e5") recvmmsg(r7, &(0x7f0000004e00)=[{{&(0x7f0000000440)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000f00)=""/242, 0xf2}, 0x23b}, {{&(0x7f0000001000)=@sco={0x1f, @none}, 0x80, &(0x7f0000002380)=[{&(0x7f0000001080)=""/13, 0xd}, {&(0x7f00000010c0)=""/119, 0x77}, {0x0}, {&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/84, 0x54}], 0x6, &(0x7f00000023c0)=""/74, 0x4a}, 0x5}, {{&(0x7f0000002440)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000024c0)=""/79, 0x4f}, {&(0x7f0000002540)=""/40, 0x28}, {&(0x7f0000003580)=""/88, 0x58}, {&(0x7f0000003600)=""/160, 0xa0}], 0x4}, 0x5}, {{&(0x7f0000003700)=@qipcrtr, 0x80, &(0x7f0000004bc0)=[{&(0x7f0000003880)=""/219, 0xdb}, {0x0}, {&(0x7f0000004900)=""/242, 0xf2}, {&(0x7f0000003780)=""/235, 0xeb}, {&(0x7f0000004b00)=""/149, 0x95}], 0x5, &(0x7f0000004c00)=""/65, 0x41}, 0xfffffff7}, {{&(0x7f0000004c80)=@qipcrtr, 0x80, &(0x7f0000004d80)=[{&(0x7f0000004d00)=""/29, 0x1d}, {&(0x7f0000004d40)=""/26, 0x1a}], 0x2, &(0x7f0000004dc0)}, 0x5}], 0x5, 0x1, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r8 = shmget$private(0x0, 0x13000, 0x1, &(0x7f0000feb000/0x13000)=nil) r9 = shmat(r8, &(0x7f0000fff000/0x1000)=nil, 0x400c) shmdt(r9) shmdt(r9) syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) 11.153233041s ago: executing program 3 (id=5844): socket$rxrpc(0x21, 0x2, 0xa) r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f00000001c0)=0x1e00) r5 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r5, 0x3b81, &(0x7f00000002c0)={0xc, 0x0, 0x0}) ioctl$IOMMU_IOAS_MAP$PAGES(r5, 0x3b85, &(0x7f0000000100)={0x28, 0x7, r6, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3000}) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000140)='mmap_lock_acquire_returned\x00', r7}, 0x73) ioctl$IOMMU_TEST_OP_CREATE_ACCESS(r5, 0x3ba0, &(0x7f00000001c0)={0x48, 0x5, r6, 0x0, 0xffffffffffffffff}) ioctl$IOMMU_TEST_OP_ACCESS_RW(r5, 0x3ba0, &(0x7f0000000540)={0x48, 0x8, r8, 0x0, 0x2fff, 0x1, &(0x7f00000000c0)='r', 0x4}) r9 = creat(&(0x7f0000000040)='./file0\x00', 0x4b) close(r9) r10 = syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r10, 0xc04064a0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_GETCRTC(r9, 0xc06864a1, 0x0) ioctl$DRM_IOCTL_MODE_GETFB2(r9, 0xc06864ce, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x3, [0x0, 0x0, 0x0, 0x0], [0x800000], [0x0, 0x1001000], [0x0, 0x0, 0xe8a6]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r9, 0xc06864b8, &(0x7f00000001c0)={0x0, 0x80, 0x3ff, 0x34325241, 0x0, [r11, 0x0, 0x0, r12], [0x2ba], [], [0x400000000000000, 0x0, 0xc]}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r10, 0xc04064a0, &(0x7f0000000280)={&(0x7f00000000c0)=[0x0], 0x0, 0x0, 0x0, 0x1}) 9.429572934s ago: executing program 3 (id=5847): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x7ff}, 0xe) syz_init_net_socket$bt_hidp(0x1f, 0x3, 0x6) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') syz_io_uring_setup(0x4a3d, &(0x7f00000000c0)={0x0, 0x79af, 0x3180, 0x8000, 0x40024e}, &(0x7f0000000340)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r5, r6, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x801, 0x0, 0x0, {0x0, 0x0, 0x8000}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x101}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x4004}, 0xd4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x18) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x4000, 0x0, 0x0) r9 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={0x54, 0x12, 0x1, 0x8, 0x0, {0xa, 0x0, 0x0, 0x0, {0x0, 0x4e22, [0xfffffffc, 0x0, 0xcd7e], [], 0x0, [0x1]}, 0x0, 0x2000}, [@INET_DIAG_REQ_BYTECODE={0x8, 0x3, "06010000"}]}, 0x54}}, 0x20000080) r10 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x2, 0x8) setsockopt$IPT_SO_SET_REPLACE(r10, 0x4000000000000, 0x40, &(0x7f0000000400)=@raw={'raw\x00', 0x41, 0x3, 0x380, 0x0, 0x19, 0x0, 0x0, 0x0, 0x2e8, 0x1f0, 0x1f0, 0x2e8, 0x1f0, 0x3, 0x0, {[{{@ip={@private, @dev, 0x0, 0x0, 'wlan1\x00', 'wg1\x00'}, 0x0, 0x1f8, 0x218, 0x0, {0x0, 0xffffffffa0028000}, [@common=@unspec=@quota={{0x38}}, @common=@inet=@hashlimit2={{0x150}, {'veth1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x687c, 0x1}}}]}, @unspec=@TRACE={0x20}}, {{@ip={@empty, @empty, 0x0, 0x0, 'veth0_vlan\x00', 'netpci0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x3e0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) io_uring_enter(0xffffffffffffffff, 0x0, 0xcb, 0xf, &(0x7f0000000000), 0x18) 8.134068202s ago: executing program 1 (id=5849): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x2, 0x2}}, 0x20) r1 = syz_io_uring_setup(0x120a, &(0x7f0000000140)={0x0, 0x1e91, 0x2, 0x3, 0x127}, &(0x7f00000001c0), &(0x7f0000000200)) io_uring_register$IORING_UNREGISTER_PERSONALITY(r1, 0xa, 0x2000000, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000300)={{0x6, @null}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @bcast, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast]}, 0x48) socket$kcm(0x10, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0xd, 0x0, 0x0, 0x0}, 0x94) request_key(&(0x7f0000001000)='dns_resolver\x00', &(0x7f0000001040)={'syz', 0x2}, &(0x7f00000003c0)='\x00', 0x0) request_key(&(0x7f00000010c0)='dns_resolver\x00', &(0x7f0000001100)={'syz', 0x2}, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$x25(0x9, 0x5, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000300)={{0x6, @rose}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) r6 = io_uring_setup(0xfc6, &(0x7f0000000180)) r7 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r7, 0x6, 0x21, &(0x7f0000000b00)="86cf8445f4ba1d9f20174688f169e58c", 0x10) listen(r7, 0x0) close_range(r6, 0xffffffffffffffff, 0x0) 6.815362273s ago: executing program 5 (id=5852): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000001c0)="d80000001e0081054e81f782060000000000000006007c095dd2466506000e800a00142603600e1208000f0000000406a80016c0080009400400027c035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791433a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad909d5e1cace81ed0bffece0b42a9eca0200e6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) socket$pppoe(0x18, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_open_dev$MSR(&(0x7f0000000040), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) ioperm(0x7, 0x81, 0x2) mremap(&(0x7f0000041000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f00004c3000/0x2000)=nil) r2 = socket$kcm(0x29, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000080)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000380)=0x18) write$cgroup_pressure(r2, &(0x7f0000000140)={'full'}, 0xfffffdef) ioctl$int_in(r2, 0x5452, &(0x7f0000000240)=0x3) sendmsg$kcm(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x20000818) setsockopt$sock_attach_bpf(r2, 0x1, 0x7, &(0x7f0000000340), 0x4) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x1d2) fcntl$setlease(r4, 0x400, 0x0) truncate(0x0, 0x1000000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x3a, 0x1, 0x0, 0x0) 6.774780049s ago: executing program 1 (id=5853): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x4, &(0x7f00000002c0)=@raw=[@map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x2}], &(0x7f0000000300)='syzkaller\x00', 0x4, 0xb9, &(0x7f0000000440)=""/185, 0x41000, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000540)={0x0, 0x1, 0x5, 0x7}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000600)='f2fs_filemap_fault\x00', r0, 0x0, 0x3e3f}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r4, 0x29, 0x6, &(0x7f0000000180)="1000000000000000010000000c000000", 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kfree\x00'}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000900)={&(0x7f0000000800)=ANY=[@ANYBLOB="9feb010018000000000000000200000002"], 0x0, 0x1a, 0x0, 0x6, 0x5}, 0x28) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='map_files\x00') getdents(r5, &(0x7f0000000000)=""/42, 0x2a) getdents64(r5, &(0x7f0000000080)=""/147, 0x93) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = syz_open_procfs(0x0, &(0x7f0000000580)='smaps_rollup\x00') renameat2(r7, &(0x7f0000000d00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r7, &(0x7f0000000040)='./file1\x00', 0x5) lseek(r7, 0x2004, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000050000000900010073797a300000000064000000030a01030000000000000000050000000900010073797a30000000000900030073797a300000000008000a40000000032800048008000240000000120800014000000000140003006e657464657673696d30000000000000080000000000000014000000110001"], 0xac}}, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000100000a24000000020a01080000000000000000050000060800024000000003080002400000000014000000110001"], 0x4c}}, 0xc050) ioctl$IOMMU_IOAS_ALLOC(r7, 0x3b81, &(0x7f00000001c0)={0xc, 0x0, 0x0}) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN(r7, 0x3ba0, &(0x7f0000000240)={0x48, 0x2, r8}) 6.419008493s ago: executing program 5 (id=5854): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000001c0)="d80000001e0081054e81f782060000000000000006007c095dd2466506000e800a00142603600e1208000f0000000406a80016c0080009400400027c035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791433a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad909d5e1cace81ed0bffece0b42a9eca0200e6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) socket$pppoe(0x18, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_open_dev$MSR(&(0x7f0000000040), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) ioperm(0x7, 0x81, 0x2) mremap(&(0x7f0000041000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f00004c3000/0x2000)=nil) r2 = socket$kcm(0x29, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000080)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000380)=0x18) write$cgroup_pressure(r2, &(0x7f0000000140)={'full'}, 0xfffffdef) ioctl$int_in(r2, 0x5452, &(0x7f0000000240)=0x3) sendmsg$kcm(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x20000818) setsockopt$sock_attach_bpf(r2, 0x1, 0x7, &(0x7f0000000340), 0x4) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x1d2) fcntl$setlease(r4, 0x400, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x1000000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x3a, 0x1, 0x0, 0x0) 5.748349885s ago: executing program 0 (id=5855): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x74, &(0x7f0000000100)=[{&(0x7f00000001c0)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af36504001a0038001d001931a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d4938037e70e4509c5bb", 0x33fe0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000000240)=""/212, 0xd4}], 0x1}, 0x0) ioctl$SNDCTL_DSP_SETFMT(0xffffffffffffffff, 0xc0045005, &(0x7f0000000300)=0x10) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4c03000017"], 0x34c}}, 0x44) 5.745197922s ago: executing program 1 (id=5856): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x1fd, 0x1, 0x0, 0x2000, &(0x7f0000bd3000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x34, 0x0, 0x1}]}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4048aecb, &(0x7f0000000000)) 5.556088001s ago: executing program 2 (id=5857): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x2, 0x2}}, 0x20) r1 = syz_io_uring_setup(0x120a, &(0x7f0000000140)={0x0, 0x1e91, 0x2, 0x3, 0x127}, &(0x7f00000001c0), &(0x7f0000000200)) io_uring_register$IORING_UNREGISTER_PERSONALITY(r1, 0xa, 0x2000000, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000300)={{0x6, @null}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @bcast, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast]}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0xd, 0x0, 0x0, 0x0}, 0x94) request_key(&(0x7f0000001000)='dns_resolver\x00', &(0x7f0000001040)={'syz', 0x2}, &(0x7f00000003c0)='\x00', 0x0) request_key(&(0x7f00000010c0)='dns_resolver\x00', &(0x7f0000001100)={'syz', 0x2}, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$x25(0x9, 0x5, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000300)={{0x6, @rose}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) r6 = io_uring_setup(0xfc6, &(0x7f0000000180)) r7 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r7, 0x6, 0x21, &(0x7f0000000b00)="86cf8445f4ba1d9f20174688f169e58c", 0x10) listen(r7, 0x0) close_range(r6, 0xffffffffffffffff, 0x0) 5.486207465s ago: executing program 0 (id=5858): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x7ff}, 0xe) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') syz_io_uring_setup(0x4a3d, &(0x7f00000000c0)={0x0, 0x79af, 0x3180, 0x8000, 0x40024e}, &(0x7f0000000340)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r6, r7, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x52, 0x4007, @fd=r5, 0x6, 0x0, 0x0, 0x2, 0x1}) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x801, 0x0, 0x0, {0x0, 0x0, 0x8000}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x101}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x4004}, 0xd4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x18) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x4000, 0x0, 0x0) r10 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r10, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={0x54, 0x12, 0x1, 0x8, 0x0, {0xa, 0x0, 0x0, 0x0, {0x0, 0x4e22, [0xfffffffc, 0x0, 0xcd7e], [], 0x0, [0x1]}, 0x0, 0x2000}, [@INET_DIAG_REQ_BYTECODE={0x8, 0x3, "06010000"}]}, 0x54}}, 0x20000080) r11 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x2, 0x8) setsockopt$IPT_SO_SET_REPLACE(r11, 0x4000000000000, 0x40, &(0x7f0000000400)=@raw={'raw\x00', 0x41, 0x3, 0x380, 0x0, 0x19, 0x0, 0x0, 0x0, 0x2e8, 0x1f0, 0x1f0, 0x2e8, 0x1f0, 0x3, 0x0, {[{{@ip={@private, @dev, 0x0, 0x0, 'wlan1\x00', 'wg1\x00'}, 0x0, 0x1f8, 0x218, 0x0, {0x0, 0xffffffffa0028000}, [@common=@unspec=@quota={{0x38}}, @common=@inet=@hashlimit2={{0x150}, {'veth1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x687c, 0x1}}}]}, @unspec=@TRACE={0x20}}, {{@ip={@empty, @empty, 0x0, 0x0, 'veth0_vlan\x00', 'netpci0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x3e0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) io_uring_enter(0xffffffffffffffff, 0x0, 0xcb, 0xf, &(0x7f0000000000), 0x18) 5.363829987s ago: executing program 1 (id=5859): syz_usb_connect(0x0, 0x24, &(0x7f0000000300)=ANY=[@ANYBLOB="12010000e6222f40e90f01dbd5f7010203010902120001000000000904c7000079ac2000d3c317666eae05e03aebf7ee9424d18f3512755ed345a1670cb8509fbd12b49bcb35e4bcddffbfaadacc7129caa9fdbd49991651a363507c9dd54e903fb685879b926de81f9d2cc734dfcb976626c3f43a04f00dc3c60bc3"], 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x80383, 0x0) syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000540)=ANY=[], 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x800, 0x0) 4.502650721s ago: executing program 5 (id=5860): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x2, 0x200, @loopback, 0x7}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000240)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000280)='2x', 0x2, 0x20000045, &(0x7f00000001c0)={0xa, 0x2, 0xffff, @loopback, 0x3}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='illinois\x00', 0x9) shutdown(r0, 0x1) 4.383474268s ago: executing program 5 (id=5861): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x4, &(0x7f00000002c0)=@raw=[@map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x2}], &(0x7f0000000300)='syzkaller\x00', 0x4, 0xb9, &(0x7f0000000440)=""/185, 0x41000, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000540)={0x0, 0x1, 0x5, 0x7}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000600)='f2fs_filemap_fault\x00', r0, 0x0, 0x3e3f}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r4, 0x29, 0x6, &(0x7f0000000180)="1000000000000000010000000c000000", 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kfree\x00'}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000900)={&(0x7f0000000800)=ANY=[@ANYBLOB="9feb010018000000000000000200000002"], 0x0, 0x1a, 0x0, 0x6, 0x5}, 0x28) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='map_files\x00') getdents(r5, &(0x7f0000000000)=""/42, 0x2a) getdents64(r5, &(0x7f0000000080)=""/147, 0x93) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = syz_open_procfs(0x0, &(0x7f0000000580)='smaps_rollup\x00') renameat2(r7, &(0x7f0000000d00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r7, &(0x7f0000000040)='./file1\x00', 0x5) lseek(r7, 0x2004, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000050000000900010073797a300000000064000000030a01030000000000000000050000000900010073797a30000000000900030073797a300000000008000a40000000032800048008000240000000120800014000000000140003006e657464657673696d30000000000000080000000000000014000000110001"], 0xac}}, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000100000a24000000020a01080000000000000000050000060800024000000003080002400000000014000000110001"], 0x4c}}, 0xc050) ioctl$IOMMU_IOAS_ALLOC(r7, 0x3b81, &(0x7f00000001c0)={0xc, 0x0, 0x0}) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN(r7, 0x3ba0, &(0x7f0000000240)={0x48, 0x2, r8}) 4.286147013s ago: executing program 2 (id=5862): syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x200, 0xa, 0x86, 0xf3, 0x40, 0x1110, 0x9024, 0xdb24, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0xe9, 0x50, 0x9, [{{0x9, 0x4, 0x62, 0x4, 0x0, 0x6f, 0x6f, 0x49, 0x5}}]}}]}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.idle_time\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000140097f87059ae08060c040002ff0f0200000000000001870182fa73a69d35a2cca84708f7abca1b4e7d06a6bd7c493872f750375ed08a560400000003c48f93b82a03000000461e", 0x4c}], 0x1}, 0x0) 4.149042769s ago: executing program 0 (id=5863): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000002c0)='contention_begin\x00', r0, 0x0, 0xd}, 0x18) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) pipe2$watch_queue(0x0, 0x80) read$msr(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x14) 4.051620713s ago: executing program 3 (id=5864): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000001c0)="d80000001e0081054e81f782060000000000000006007c095dd2466506000e800a00142603600e1208000f0000000406a80016c0080009400400027c035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791433a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad909d5e1cace81ed0bffece0b42a9eca0200e6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) socket$pppoe(0x18, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_open_dev$MSR(&(0x7f0000000040), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) ioperm(0x7, 0x81, 0x2) mremap(&(0x7f0000041000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f00004c3000/0x2000)=nil) r2 = socket$kcm(0x29, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000080)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000380)=0x18) write$cgroup_pressure(r2, &(0x7f0000000140)={'full'}, 0xfffffdef) ioctl$int_in(r2, 0x5452, &(0x7f0000000240)=0x3) sendmsg$kcm(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x20000818) setsockopt$sock_attach_bpf(r2, 0x1, 0x7, &(0x7f0000000340), 0x4) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x1d2) fcntl$setlease(r4, 0x400, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x1000000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x3a, 0x1, 0x0, 0x0) 3.302909949s ago: executing program 5 (id=5865): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = gettid() timer_create(0x7, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe2(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000300)={0x0, 0x1, 0x6, @local}, 0x10) syz_clone(0x10020000, 0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000500)="d1bc900d8a00c336af2a52816b757b56260c0944c4f341e9c85c040cff9c5cb201188344ec2fc3fffae0c36426d9228eba2b3c8b42a11f14833b25ea6bd3247a6b565adec5c3a506f5018d06d35efdbb76355936726d1060e638d7e8038ab2e6a23d5c4e1d00d5e8e0b94a252398a320916396ce6999aa2c04557443ff35fd4f7b6a2a2c4717dd2840936d0c43556b3e98f3cb949293cae52be2488aad3b51be28d5751ffa75c3e2fd85e7044b798fe8cb4c4d14f11f4465acc5507d1e3176218958d23fff776ff00f0afb37cd50d13dbf57db8b0d743b59779a6f8008c1e0d354d666417953545575356d5618b956117d1314e5") recvmmsg(0xffffffffffffffff, &(0x7f0000004e00)=[{{&(0x7f0000000440)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000f00)=""/242, 0xf2}, 0x23b}, {{&(0x7f0000001000)=@sco={0x1f, @none}, 0x80, &(0x7f0000002380)=[{&(0x7f0000001080)=""/13, 0xd}, {&(0x7f00000010c0)=""/119, 0x77}, {0x0}, {&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/84, 0x54}], 0x6, &(0x7f00000023c0)=""/74, 0x4a}, 0x5}, {{&(0x7f0000002440)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000024c0)=""/79, 0x4f}, {&(0x7f0000002540)=""/40, 0x28}, {&(0x7f0000003580)=""/88, 0x58}, {&(0x7f0000003600)=""/160, 0xa0}], 0x4}, 0x5}, {{&(0x7f0000003700)=@qipcrtr, 0x80, &(0x7f0000004bc0)=[{&(0x7f0000003880)=""/219, 0xdb}, {0x0}, {&(0x7f0000004900)=""/242, 0xf2}, {&(0x7f0000003780)=""/235, 0xeb}, {&(0x7f0000004b00)=""/149, 0x95}], 0x5, &(0x7f0000004c00)=""/65, 0x41}, 0xfffffff7}, {{&(0x7f0000004c80)=@qipcrtr, 0x80, &(0x7f0000004d80)=[{&(0x7f0000004d00)=""/29, 0x1d}, {&(0x7f0000004d40)=""/26, 0x1a}], 0x2, &(0x7f0000004dc0)}, 0x5}], 0x5, 0x1, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r5 = shmget$private(0x0, 0x13000, 0x1, &(0x7f0000feb000/0x13000)=nil) r6 = shmat(r5, &(0x7f0000fff000/0x1000)=nil, 0x400c) shmdt(r6) shmdt(r6) 2.970721709s ago: executing program 0 (id=5866): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x4, &(0x7f00000002c0)=@raw=[@map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x2}], &(0x7f0000000300)='syzkaller\x00', 0x4, 0xb9, &(0x7f0000000440)=""/185, 0x41000, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000540)={0x0, 0x1, 0x5, 0x7}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={0x0, r0, 0x0, 0x3e3f}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r4, 0x29, 0x6, &(0x7f0000000180)="1000000000000000010000000c000000", 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kfree\x00'}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000900)={&(0x7f0000000800)=ANY=[@ANYBLOB="9feb010018000000000000000200000002"], 0x0, 0x1a, 0x0, 0x6, 0x5}, 0x28) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='map_files\x00') getdents(r5, &(0x7f0000000000)=""/42, 0x2a) getdents64(r5, &(0x7f0000000080)=""/147, 0x93) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = syz_open_procfs(0x0, &(0x7f0000000580)='smaps_rollup\x00') renameat2(r7, &(0x7f0000000d00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r7, &(0x7f0000000040)='./file1\x00', 0x5) lseek(r7, 0x2004, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000050000000900010073797a300000000064000000030a01030000000000000000050000000900010073797a30000000000900030073797a300000000008000a40000000032800048008000240000000120800014000000000140003006e657464657673696d30000000000000080000000000000014000000110001"], 0xac}}, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000100000a24000000020a01080000000000000000050000060800024000000003080002400000000014000000110001"], 0x4c}}, 0xc050) ioctl$IOMMU_IOAS_ALLOC(r7, 0x3b81, &(0x7f00000001c0)={0xc, 0x0, 0x0}) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN(r7, 0x3ba0, &(0x7f0000000240)={0x48, 0x2, r8}) 2.642041034s ago: executing program 3 (id=5867): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0xa4, 0x30, 0x1, 0x0, 0x25dfdbfb, {}, [{0x90, 0x1, [@m_ct={0x44, 0xe, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x9d, 0x11e41e7a, 0x8, 0x0, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x1}}}}, @m_ife={0x48, 0x3, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x804}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = gettid() timer_create(0x7, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3f0, 0x0, 0x940c, 0x3002, 0x0, 0x2c0, 0x404, 0x3d8, 0x3d8, 0x404, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x1a0, 0x1e8, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private0, [0x0, 0x0, 0xff000000, 0xff], [0xffffff00, 0xffffff00, 0xff000000, 0xffffffff], 'team_slave_1\x00', 'veth1_virt_wifi\x00', {0xff}, {}, 0x886215f4d37bb4bb, 0x90, 0x1, 0x69}, 0x0, 0xd0, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x450) pipe2(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX=r5, @ANYBLOB=',wfdno=', @ANYRESHEX=r6, @ANYBLOB=',cache=fscach']) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000300)={0x0, 0x1, 0x6, @local}, 0x10) r7 = socket$nl_route(0x10, 0x3, 0x0) syz_clone(0x10020000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000000500)="d1bc900d8a00c336af2a52816b757b56260c0944c4f341e9c85c040cff9c5cb201188344ec2fc3fffae0c36426d9228eba2b3c8b42a11f14833b25ea6bd3247a6b565adec5c3a506f5018d06d35efdbb76355936726d1060e638d7e8038ab2e6a23d5c4e1d00d5e8e0b94a252398a320916396ce6999aa2c04557443ff35fd4f7b6a2a2c4717dd2840936d0c43556b3e98f3cb949293cae52be2488aad3b51be28d5751ffa75c3e2fd85e7044b798fe8cb4c4d14f11f4465acc5507d1e3176218958d23fff776ff00f0afb37cd50d13dbf57db8b0d743b59779a6f8008c1e0d354d666417953545575356d5618b956117d1314e5") recvmmsg(r7, &(0x7f0000004e00)=[{{&(0x7f0000000440)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000f00)=""/242, 0xf2}, 0x23b}, {{&(0x7f0000001000)=@sco={0x1f, @none}, 0x80, &(0x7f0000002380)=[{&(0x7f0000001080)=""/13, 0xd}, {&(0x7f00000010c0)=""/119, 0x77}, {0x0}, {&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/84, 0x54}], 0x6, &(0x7f00000023c0)=""/74, 0x4a}, 0x5}, {{&(0x7f0000002440)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000024c0)=""/79, 0x4f}, {&(0x7f0000002540)=""/40, 0x28}, {&(0x7f0000003580)=""/88, 0x58}, {&(0x7f0000003600)=""/160, 0xa0}], 0x4}, 0x5}, {{&(0x7f0000003700)=@qipcrtr, 0x80, &(0x7f0000004bc0)=[{&(0x7f0000003880)=""/219, 0xdb}, {0x0}, {&(0x7f0000004900)=""/242, 0xf2}, {&(0x7f0000003780)=""/235, 0xeb}, {&(0x7f0000004b00)=""/149, 0x95}], 0x5, &(0x7f0000004c00)=""/65, 0x41}, 0xfffffff7}, {{&(0x7f0000004c80)=@qipcrtr, 0x80, &(0x7f0000004d80)=[{&(0x7f0000004d00)=""/29, 0x1d}, {&(0x7f0000004d40)=""/26, 0x1a}], 0x2, &(0x7f0000004dc0)}, 0x5}], 0x5, 0x1, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r8 = shmget$private(0x0, 0x13000, 0x1, &(0x7f0000feb000/0x13000)=nil) r9 = shmat(r8, &(0x7f0000fff000/0x1000)=nil, 0x400c) shmdt(r9) shmdt(r9) syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) 1.891278159s ago: executing program 0 (id=5868): socket$rxrpc(0x21, 0x2, 0xa) r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f00000001c0)=0x1e00) r4 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r4, 0x3b81, &(0x7f00000002c0)={0xc, 0x0, 0x0}) ioctl$IOMMU_IOAS_MAP$PAGES(r4, 0x3b85, &(0x7f0000000100)={0x28, 0x7, r5, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3000}) ioctl$IOMMU_TEST_OP_CREATE_ACCESS(r4, 0x3ba0, &(0x7f00000001c0)={0x48, 0x5, r5, 0x0, 0xffffffffffffffff}) ioctl$IOMMU_TEST_OP_ACCESS_RW(r4, 0x3ba0, &(0x7f0000000540)={0x48, 0x8, r6, 0x0, 0x2fff, 0x1, &(0x7f00000000c0)='r', 0x4}) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x4b) close(r7) r8 = syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r8, 0xc04064a0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_GETFB2(r7, 0xc06864ce, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x3, [0x0, 0x0, 0x0, 0x0], [0x800000], [0x0, 0x1001000], [0x0, 0x0, 0xe8a6]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r7, 0xc06864b8, &(0x7f00000001c0)={0x0, 0x80, 0x3ff, 0x34325241, 0x0, [r9, 0x0, 0x0, r10], [0x2ba], [], [0x400000000000000, 0x0, 0xc]}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r8, 0xc04064a0, &(0x7f0000000280)={&(0x7f00000000c0)=[0x0], 0x0, 0x0, 0x0, 0x1}) 1.732936667s ago: executing program 1 (id=5869): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a80)={0x11, 0x3, &(0x7f0000000200)=@framed, &(0x7f00000018c0)='GPL\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000140)='contention_end\x00', r0}, 0x10) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000240)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f0000000100)={0x73622a85, 0x0, 0x2}) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000200)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000080)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 1.465823542s ago: executing program 1 (id=5870): socket$netlink(0x10, 0x3, 0xc) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000730000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000680)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='contention_begin\x00', r0}, 0x18) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a58000000060a010400000000000000000a0000010900010073797a31000000002c0004802800018007000100637400001c0002800500030001000000080002400000001108000440000000120900020073797a3200"], 0x80}, 0x1, 0x0, 0x0, 0x8891}, 0x24000000) 1.443961821s ago: executing program 2 (id=5871): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x8e000, &(0x7f00000000c0)={0xa, 0x4e22, 0x5f, @local, 0x5}, 0x1c) r1 = dup2(r0, r0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) dup2(r1, r2) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f00000013c0), 0x4) 1.204480714s ago: executing program 2 (id=5872): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x2, 0x2}}, 0x20) r1 = syz_io_uring_setup(0x120a, &(0x7f0000000140)={0x0, 0x1e91, 0x2, 0x3, 0x127}, &(0x7f00000001c0), &(0x7f0000000200)) io_uring_register$IORING_UNREGISTER_PERSONALITY(r1, 0xa, 0x2000000, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000300)={{0x6, @null}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @bcast, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast]}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0xd, 0x0, 0x0, 0x0}, 0x94) request_key(&(0x7f0000001000)='dns_resolver\x00', &(0x7f0000001040)={'syz', 0x2}, &(0x7f00000003c0)='\x00', 0x0) request_key(&(0x7f00000010c0)='dns_resolver\x00', &(0x7f0000001100)={'syz', 0x2}, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$x25(0x9, 0x5, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000300)={{0x6, @rose}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) r6 = io_uring_setup(0xfc6, &(0x7f0000000180)) r7 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r7, 0x6, 0x21, &(0x7f0000000b00)="86cf8445f4ba1d9f20174688f169e58c", 0x10) listen(r7, 0x0) close_range(r6, 0xffffffffffffffff, 0x0) 93.021281ms ago: executing program 0 (id=5873): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000100)=0x100000001) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x1, 0x4) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e20, @dev}, 0x10) close(r0) 0s ago: executing program 5 (id=5874): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x2, 0x0, 0x7fff0000}]}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r2, 0x4038ae7a, &(0x7f0000000180)={0x1, 0x283, 0x0, &(0x7f0000000340)}) ioctl$KVM_SET_CLOCK(r2, 0x4188aec6, &(0x7f0000000040)={0x1, 0x8, 0x0, 0x20000000000000}) close_range(r0, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): 60.236917][T28891] usb 37-1: enqueue for inactive port 0 [ 2460.443369][T28891] vhci_hcd: vhci_device speed not set [ 2462.209638][T30136] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 2463.369213][ T30] kauditd_printk_skb: 255 callbacks suppressed [ 2463.369250][ T30] audit: type=1400 audit(2000001215.811:38505): avc: denied { create } for pid=30144 comm="syz.0.5077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2463.436212][ T30] audit: type=1400 audit(2000001215.821:38506): avc: denied { prog_load } for pid=30144 comm="syz.0.5077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2463.574954][ T30] audit: type=1400 audit(2000001215.821:38507): avc: denied { bpf } for pid=30144 comm="syz.0.5077" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2463.626988][ T30] audit: type=1400 audit(2000001215.831:38508): avc: denied { create } for pid=30144 comm="syz.0.5077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2463.679595][ T30] audit: type=1400 audit(2000001215.841:38509): avc: denied { write } for pid=30144 comm="syz.0.5077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2463.819182][ T30] audit: type=1400 audit(2000001215.841:38510): avc: denied { read } for pid=30144 comm="syz.0.5077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2463.896727][ T30] audit: type=1400 audit(2000001215.871:38511): avc: denied { firmware_load } for pid=30144 comm="syz.0.5077" path="/lib/firmware/regulatory.db" dev="sda1" ino=448 scontext=system_u:system_r:kernel_t tcontext=system_u:object_r:lib_t tclass=system permissive=1 [ 2463.925189][ T30] audit: type=1400 audit(2000001215.881:38512): avc: denied { firmware_load } for pid=30144 comm="syz.0.5077" path="/lib/firmware/regulatory.db.p7s" dev="sda1" ino=449 scontext=system_u:system_r:kernel_t tcontext=system_u:object_r:lib_t tclass=system permissive=1 [ 2463.958882][ T30] audit: type=1400 audit(2000001216.031:38513): avc: denied { recv } for pid=30144 comm="syz.0.5077" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2464.095598][ T30] audit: type=1400 audit(2000001216.051:38514): avc: denied { read write } for pid=30144 comm="syz.0.5077" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 2465.179213][T30174] netlink: 32 bytes leftover after parsing attributes in process `syz.3.5085'. [ 2465.232305][T30164] netlink: 12 bytes leftover after parsing attributes in process `syz.0.5082'. [ 2465.352021][T30165] platform regulatory.0: loading /lib/firmware/regulatory.db failed with error -12 [ 2465.361867][T30165] platform regulatory.0: Direct firmware load for regulatory.db failed with error -12 [ 2465.383289][T30165] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 2465.716154][T30181] dlm: plock device version mismatch: kernel (1.2.0), user (0.0.0) [ 2467.093663][ T1297] ieee802154 phy0 wpan0: encryption failed: -22 [ 2467.100253][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 [ 2467.436898][T30221] netlink: 32 bytes leftover after parsing attributes in process `syz.3.5099'. [ 2468.386807][ T30] kauditd_printk_skb: 304 callbacks suppressed [ 2468.386823][ T30] audit: type=1400 audit(2000001221.151:38819): avc: denied { create } for pid=30240 comm="syz.2.5107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 2468.912766][ T30] audit: type=1400 audit(2000001221.231:38820): avc: denied { prog_load } for pid=30236 comm="syz.3.5106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2469.094523][ T30] audit: type=1400 audit(2000001221.231:38821): avc: denied { bpf } for pid=30236 comm="syz.3.5106" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2469.115734][ T30] audit: type=1400 audit(2000001221.241:38822): avc: denied { create } for pid=30236 comm="syz.3.5106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2469.265139][ T30] audit: type=1400 audit(2000001221.251:38823): avc: denied { read } for pid=30236 comm="syz.3.5106" dev="nsfs" ino=4026532943 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2469.334547][ T30] audit: type=1400 audit(2000001221.251:38824): avc: denied { read open } for pid=30236 comm="syz.3.5106" path="net:[4026532943]" dev="nsfs" ino=4026532943 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2469.392873][ T30] audit: type=1400 audit(2000001221.251:38825): avc: denied { create } for pid=30236 comm="syz.3.5106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 2469.476424][ T30] audit: type=1400 audit(2000001221.261:38826): avc: denied { create } for pid=30236 comm="syz.3.5106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 2469.499110][ T30] audit: type=1400 audit(2000001221.271:38827): avc: denied { connect } for pid=30236 comm="syz.3.5106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 2469.520400][ T30] audit: type=1400 audit(2000001221.341:38828): avc: denied { allowed } for pid=30236 comm="syz.3.5106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2470.036200][T30261] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 2470.790901][T30270] overlayfs: missing 'lowerdir' [ 2472.396269][T30285] 8021q: VLANs not supported on ipvlan1 [ 2472.614413][T30284] [U]  [ 2472.850950][T30289] netlink: 32 bytes leftover after parsing attributes in process `syz.3.5114'. [ 2473.412278][ T30] kauditd_printk_skb: 162 callbacks suppressed [ 2473.412292][ T30] audit: type=1400 audit(2000001226.181:38991): avc: denied { prog_load } for pid=30292 comm="syz.3.5119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2473.558454][ T30] audit: type=1400 audit(2000001226.181:38992): avc: denied { bpf } for pid=30292 comm="syz.3.5119" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2473.629223][ T30] audit: type=1400 audit(2000001226.181:38993): avc: denied { perfmon } for pid=30292 comm="syz.3.5119" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2474.201017][ T30] audit: type=1400 audit(2000001226.181:38994): avc: denied { perfmon } for pid=30292 comm="syz.3.5119" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2474.314150][ T30] audit: type=1400 audit(2000001226.181:38995): avc: denied { bpf } for pid=30292 comm="syz.3.5119" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2474.531826][ T30] audit: type=1400 audit(2000001226.201:38996): avc: denied { execmem } for pid=30292 comm="syz.3.5119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2474.675764][ T30] audit: type=1400 audit(2000001226.321:38997): avc: denied { recv } for pid=30259 comm="syz.2.5110" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2474.816266][ T5828] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2474.825918][ T5828] audit: audit_lost=195 audit_rate_limit=0 audit_backlog_limit=64 [ 2474.836739][ T5828] audit: backlog limit exceeded [ 2478.436306][ T30] kauditd_printk_skb: 232 callbacks suppressed [ 2478.436322][ T30] audit: type=1400 audit(2000001231.201:39140): avc: denied { ioctl } for pid=30343 comm="syz.3.5142" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2478.524613][ T30] audit: type=1400 audit(2000001231.221:39141): avc: denied { read write } for pid=5837 comm="syz-executor" name="loop0" dev="devtmpfs" ino=3445 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2478.808539][T28891] usb 4-1: new full-speed USB device number 91 using dummy_hcd [ 2479.072376][ T30] audit: type=1400 audit(2000001231.221:39142): avc: denied { open } for pid=5837 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=3445 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2479.153693][T28891] usb 4-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 2479.238498][T28891] usb 4-1: config 1 interface 0 has no altsetting 0 [ 2479.247442][T30358] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(10) [ 2479.254046][T30358] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 2479.293774][ T30] audit: type=1400 audit(2000001231.221:39143): avc: denied { ioctl } for pid=5837 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=3445 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2479.319717][ T30] audit: type=1400 audit(2000001231.241:39144): avc: denied { recv } for pid=30306 comm="udevd" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2479.400022][T30358] vhci_hcd vhci_hcd.0: Device attached [ 2479.408982][T30360] vhci_hcd: connection closed [ 2479.412988][T28891] usb 4-1: New USB device found, idVendor=1781, idProduct=0898, bcdDevice= 0.40 [ 2479.428502][T29151] vhci_hcd: stop threads [ 2479.429462][ T30] audit: type=1400 audit(2000001231.271:39145): avc: denied { read } for pid=30348 comm="syz.1.5134" name="card1" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 2479.433037][T29151] vhci_hcd: release socket [ 2479.916069][ T30] audit: type=1400 audit(2000001231.271:39146): avc: denied { read open } for pid=30348 comm="syz.1.5134" path="/dev/dri/card1" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 2479.942469][T28891] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2479.959976][ T30] audit: type=1400 audit(2000001231.291:39147): avc: denied { ioctl } for pid=30343 comm="syz.3.5142" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2480.038569][T29492] usb 35-1: new high-speed USB device number 22 using vhci_hcd [ 2480.087966][ T30] audit: type=1400 audit(2000001231.381:39148): avc: denied { create } for pid=30347 comm="syz.2.5133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2480.138460][T28891] usb 4-1: Product: syz [ 2480.147176][T28891] usb 4-1: Manufacturer: syz [ 2480.154143][T29151] vhci_hcd: disconnect device [ 2480.169235][T28891] usb 4-1: SerialNumber: syz [ 2480.218462][ T30] audit: type=1400 audit(2000001231.491:39149): avc: denied { ioctl } for pid=30343 comm="syz.3.5142" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2480.466493][T28891] pxrc 4-1:1.0: Could not find endpoint [ 2480.522223][T28891] usb 4-1: USB disconnect, device number 91 [ 2481.780129][T30403] ksmbd: Unknown IPC event: 3, ignore. [ 2481.797223][T30403] usb usb8: usbfs: process 30403 (syz.1.5139) did not claim interface 0 before use [ 2482.512602][T30409] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(10) [ 2482.519217][T30409] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 2482.527119][T30409] vhci_hcd vhci_hcd.0: Device attached [ 2482.542178][T30415] vhci_hcd: connection closed [ 2482.542477][ T6104] vhci_hcd: stop threads [ 2482.560178][T28891] usb 3-1: new high-speed USB device number 106 using dummy_hcd [ 2482.601487][ T6104] vhci_hcd: release socket [ 2482.616878][ T6104] vhci_hcd: disconnect device [ 2482.772802][T28891] usb 3-1: Using ep0 maxpacket: 16 [ 2482.781783][T28891] usb 3-1: config 0 has an invalid interface number: 58 but max is 0 [ 2482.830626][T28891] usb 3-1: config 0 has no interface number 0 [ 2482.895848][T30423] netlink: 32 bytes leftover after parsing attributes in process `syz.5.5151'. [ 2483.326975][T28891] usb 3-1: config 0 interface 58 altsetting 2 bulk endpoint 0x4 has invalid maxpacket 16 [ 2483.350645][T28891] usb 3-1: config 0 interface 58 altsetting 2 bulk endpoint 0x82 has invalid maxpacket 64 [ 2483.374746][T28891] usb 3-1: config 0 interface 58 has no altsetting 0 [ 2483.393623][T28891] usb 3-1: New USB device found, idVendor=054c, idProduct=002b, bcdDevice= 1.03 [ 2483.412056][T28891] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2483.430659][T28891] usb 3-1: Product: syz [ 2483.441608][T28891] usb 3-1: Manufacturer: syz [ 2483.457619][T28891] usb 3-1: SerialNumber: syz [ 2483.482721][T28891] usb 3-1: config 0 descriptor?? [ 2483.499757][ T30] kauditd_printk_skb: 230 callbacks suppressed [ 2483.499770][ T30] audit: type=1400 audit(2000001236.271:39380): avc: denied { ioctl } for pid=30410 comm="syz.2.5149" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x550a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2483.530999][ C0] vkms_vblank_simulate: vblank timer overrun [ 2483.619873][T30412] raw-gadget.0 gadget.2: fail, usb_ep_enable returned -22 [ 2483.650870][T30412] raw-gadget.0 gadget.2: fail, usb_ep_enable returned -22 [ 2483.689836][ T30] audit: type=1400 audit(2000001236.361:39381): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2483.714977][ C0] vkms_vblank_simulate: vblank timer overrun [ 2483.787055][T28891] ums-isd200 3-1:0.58: USB Mass Storage device detected [ 2484.056351][ T30] audit: type=1400 audit(2000001236.361:39382): avc: denied { recv } for pid=9930 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2484.256451][ T30] audit: type=1400 audit(2000001236.381:39383): avc: denied { ioctl } for pid=30410 comm="syz.2.5149" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5509 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2484.281505][ C0] vkms_vblank_simulate: vblank timer overrun [ 2484.307607][ T30] audit: type=1400 audit(2000001236.391:39384): avc: denied { ioctl } for pid=30410 comm="syz.2.5149" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5505 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2484.332682][ C0] vkms_vblank_simulate: vblank timer overrun [ 2484.340177][ T30] audit: type=1400 audit(2000001236.421:39385): avc: denied { ioctl } for pid=30410 comm="syz.2.5149" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5505 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2484.365187][ C0] vkms_vblank_simulate: vblank timer overrun [ 2484.544984][T28891] scsi host1: usb-storage 3-1:0.58 [ 2484.594608][ T30] audit: type=1400 audit(2000001236.421:39386): avc: denied { allowed } for pid=30424 comm="syz.5.5152" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2484.647183][T28891] usb 3-1: USB disconnect, device number 106 [ 2484.686902][T30438] /dev/nullb0: Can't open blockdev [ 2484.760672][ T30] audit: type=1400 audit(2000001236.431:39387): avc: denied { sqpoll } for pid=30424 comm="syz.5.5152" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2484.836201][ T30] audit: type=1400 audit(2000001236.431:39388): avc: denied { create } for pid=30424 comm="syz.5.5152" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2484.960735][ T30] audit: type=1400 audit(2000001236.431:39389): avc: denied { map } for pid=30424 comm="syz.5.5152" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=93509 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2485.202978][T29492] vhci_hcd: vhci_device speed not set [ 2485.615583][T30459] netlink: 32 bytes leftover after parsing attributes in process `syz.5.5162'. [ 2488.106196][T30492] overlayfs: missing 'lowerdir' [ 2488.522535][ T30] kauditd_printk_skb: 215 callbacks suppressed [ 2488.522551][ T30] audit: type=1400 audit(2000001241.291:39605): avc: denied { recv } for pid=30485 comm="syz.2.5167" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2488.711974][T30504] ksmbd: Unknown IPC event: 3, ignore. [ 2488.763030][T30504] usb usb8: usbfs: process 30504 (syz.0.5169) did not claim interface 0 before use [ 2488.816090][ T30] audit: type=1400 audit(2000001241.331:39606): avc: denied { recv } for pid=29492 comm="kworker/0:2" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2489.068559][ T30] audit: type=1400 audit(2000001241.331:39607): avc: denied { recv } for pid=29492 comm="kworker/0:2" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2489.293815][T30516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2489.300458][T30516] audit: audit_lost=226 audit_rate_limit=0 audit_backlog_limit=64 [ 2489.308105][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2489.308515][T30516] audit: backlog limit exceeded [ 2489.314793][ C0] audit: audit_lost=227 audit_rate_limit=0 audit_backlog_limit=64 [ 2489.323888][T30516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2489.327386][ C0] audit: backlog limit exceeded [ 2489.337215][T30516] netlink: 32 bytes leftover after parsing attributes in process `syz.3.5175'. [ 2489.753083][T30514] 9pnet_fd: Insufficient options for proto=fd [ 2490.348722][T30521] netlink: 32 bytes leftover after parsing attributes in process `syz.3.5179'. [ 2490.679392][T30530] 9pnet_fd: Insufficient options for proto=fd [ 2491.925275][T30546] netlink: 'syz.1.5187': attribute type 1 has an invalid length. [ 2491.972644][T30546] netlink: 'syz.1.5187': attribute type 2 has an invalid length. [ 2492.961444][T30561] 9pnet_fd: Insufficient options for proto=fd [ 2493.081132][T30567] netlink: 36 bytes leftover after parsing attributes in process `syz.1.5193'. [ 2493.752268][ T30] kauditd_printk_skb: 276 callbacks suppressed [ 2493.752285][ T30] audit: type=1400 audit(2000001246.071:39867): avc: denied { create } for pid=30564 comm="syz.3.5192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2493.998448][ T30] audit: type=1400 audit(2000001246.081:39868): avc: denied { prog_load } for pid=30564 comm="syz.3.5192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2494.078343][ T30] audit: type=1400 audit(2000001246.081:39869): avc: denied { recv } for pid=30564 comm="syz.3.5192" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2494.247371][ T30] audit: type=1400 audit(2000001246.081:39870): avc: denied { bpf } for pid=30564 comm="syz.3.5192" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2494.424141][T30587] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2494.430797][T30587] audit: audit_lost=234 audit_rate_limit=0 audit_backlog_limit=64 [ 2494.438698][T30587] audit: backlog limit exceeded [ 2494.448443][T30587] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2494.454978][T30587] audit: audit_lost=235 audit_rate_limit=0 audit_backlog_limit=64 [ 2494.464804][T30587] audit: backlog limit exceeded [ 2495.371416][T30603] netlink: 32 bytes leftover after parsing attributes in process `syz.3.5205'. [ 2496.109281][T30615] program syz.3.5207 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 2498.317942][T30647] netlink: 12 bytes leftover after parsing attributes in process `syz.2.5215'. [ 2498.330280][T30649] platform regulatory.0: loading /lib/firmware/regulatory.db failed with error -12 [ 2498.339645][T30649] platform regulatory.0: Direct firmware load for regulatory.db failed with error -12 [ 2498.354764][T30649] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 2498.758868][ T30] kauditd_printk_skb: 387 callbacks suppressed [ 2498.758885][ T30] audit: type=1400 audit(2000001251.531:40258): avc: denied { read write } for pid=5828 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2499.013448][ T30] audit: type=1400 audit(2000001251.531:40259): avc: denied { read write } for pid=5834 comm="syz-executor" name="loop1" dev="devtmpfs" ino=3453 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2499.039434][ T30] audit: type=1400 audit(2000001251.531:40260): avc: denied { open } for pid=5834 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=3453 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2499.064103][ T30] audit: type=1400 audit(2000001251.531:40261): avc: denied { ioctl } for pid=5834 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=3453 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2499.090614][ T30] audit: type=1400 audit(2000001251.561:40262): avc: denied { recv } for pid=15 comm="ksoftirqd/0" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2499.149967][ T30] audit: type=1400 audit(2000001251.561:40263): avc: denied { recv } for pid=30668 comm="syz.3.5228" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2499.188495][ T30] audit: type=1400 audit(2000001251.561:40264): avc: denied { read write open } for pid=5828 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2499.217194][ T30] audit: type=1400 audit(2000001251.571:40265): avc: denied { ioctl } for pid=5828 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=649 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2499.245456][ T30] audit: type=1400 audit(2000001251.581:40266): avc: denied { read write } for pid=30668 comm="syz.3.5228" name="vmci" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2499.270669][ T30] audit: type=1400 audit(2000001251.581:40267): avc: denied { read write open } for pid=30668 comm="syz.3.5228" path="/dev/vmci" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2500.205937][T30703] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(10) [ 2500.212540][T30703] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 2500.220231][T30703] vhci_hcd vhci_hcd.0: Device attached [ 2500.230555][T30705] vhci_hcd: connection closed [ 2500.230723][ T12] vhci_hcd: stop threads [ 2500.240184][ T12] vhci_hcd: release socket [ 2500.244629][ T12] vhci_hcd: disconnect device [ 2501.012919][T30722] netlink: 8 bytes leftover after parsing attributes in process `syz.3.5244'. [ 2503.062002][T30765] netlink: 84 bytes leftover after parsing attributes in process `syz.5.5259'. [ 2503.063006][T30763] 9pnet_fd: Insufficient options for proto=fd [ 2503.616635][T30784] netlink: 'syz.0.5265': attribute type 1 has an invalid length. [ 2503.625488][T30784] netlink: 'syz.0.5265': attribute type 1 has an invalid length. [ 2503.789148][ T30] kauditd_printk_skb: 394 callbacks suppressed [ 2503.789164][ T30] audit: type=1400 audit(2000001256.561:40659): avc: denied { recv } for pid=5837 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2503.820903][ C1] vkms_vblank_simulate: vblank timer overrun [ 2505.053297][ T30] audit: type=1400 audit(2000001256.651:40660): avc: denied { getopt } for pid=30785 comm="syz.5.5267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 2505.075843][ T30] audit: type=1400 audit(2000001256.661:40661): avc: denied { prog_load } for pid=30785 comm="syz.5.5267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2505.095198][ T30] audit: type=1400 audit(2000001256.661:40662): avc: denied { bpf } for pid=30785 comm="syz.5.5267" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2505.115841][ C1] vkms_vblank_simulate: vblank timer overrun [ 2505.234234][ T30] audit: type=1400 audit(2000001257.101:40663): avc: denied { recv } for pid=30785 comm="syz.5.5267" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2505.265516][ T30] audit: type=1400 audit(2000001257.141:40664): avc: denied { read write } for pid=5834 comm="syz-executor" name="loop1" dev="devtmpfs" ino=3453 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2505.790543][ T30] audit: type=1400 audit(2000001257.141:40665): avc: denied { open } for pid=5834 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=3453 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2505.814772][ C1] vkms_vblank_simulate: vblank timer overrun [ 2505.850605][ T30] audit: type=1400 audit(2000001257.141:40666): avc: denied { ioctl } for pid=5834 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=3453 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2506.115654][T30805] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2506.122280][T30805] audit: audit_lost=237 audit_rate_limit=0 audit_backlog_limit=64 [ 2508.878229][T30849] netlink: 32 bytes leftover after parsing attributes in process `syz.1.5285'. [ 2508.901975][ T30] kauditd_printk_skb: 228 callbacks suppressed [ 2508.947623][ T30] audit: type=1400 audit(2000001261.601:40876): avc: denied { prog_load } for pid=30838 comm="syz.1.5285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2509.108865][ T30] audit: type=1400 audit(2000001261.601:40877): avc: denied { bpf } for pid=30838 comm="syz.1.5285" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2509.129717][ T30] audit: type=1400 audit(2000001261.601:40878): avc: denied { mounton } for pid=30838 comm="syz.1.5285" path="/1009" dev="tmpfs" ino=5592 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2509.157355][ T30] audit: type=1400 audit(2000001261.611:40879): avc: denied { recv } for pid=30838 comm="syz.1.5285" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2509.339519][T30851] xt_CT: No such helper "pptp" [ 2509.355553][ T30] audit: type=1400 audit(2000001261.631:40880): avc: denied { prog_load } for pid=30838 comm="syz.1.5285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2510.163997][ C0] vkms_vblank_simulate: vblank timer overrun [ 2510.245321][ T30] audit: type=1400 audit(2000001261.631:40881): avc: denied { bpf } for pid=30838 comm="syz.1.5285" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2510.279109][T30860] 9pnet_fd: Insufficient options for proto=fd [ 2510.292796][ T30] audit: type=1400 audit(2000001261.631:40882): avc: denied { perfmon } for pid=30838 comm="syz.1.5285" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2510.494843][T30872] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2510.502957][T30872] audit: audit_lost=244 audit_rate_limit=0 audit_backlog_limit=64 [ 2510.510983][T30872] audit: backlog limit exceeded [ 2513.185297][T30903] 9pnet_fd: Insufficient options for proto=fd [ 2514.022010][ T30] kauditd_printk_skb: 209 callbacks suppressed [ 2514.022029][ T30] audit: type=1400 audit(2000001266.621:41068): avc: denied { recv } for pid=30905 comm="syz.2.5304" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2514.054023][ C0] vkms_vblank_simulate: vblank timer overrun [ 2514.141091][ T30] audit: type=1400 audit(2000001266.911:41069): avc: denied { read write } for pid=5828 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2514.165349][ C0] vkms_vblank_simulate: vblank timer overrun [ 2514.172951][ T30] audit: type=1400 audit(2000001266.911:41070): avc: denied { open } for pid=5828 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2514.197087][ C0] vkms_vblank_simulate: vblank timer overrun [ 2514.318607][T30915] /dev/sg0: Can't lookup blockdev [ 2514.374625][ T30] audit: type=1400 audit(2000001266.911:41071): avc: denied { ioctl } for pid=5828 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=649 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2514.400235][ C0] vkms_vblank_simulate: vblank timer overrun [ 2514.413485][ T30] audit: type=1400 audit(2000001266.911:41072): avc: denied { create } for pid=30900 comm="syz.0.5302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2514.518755][ T30] audit: type=1400 audit(2000001266.911:41073): avc: denied { read } for pid=30900 comm="syz.0.5302" dev="nsfs" ino=4026533197 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2514.620696][T30923] program syz.2.5309 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 2514.641175][ T30] audit: type=1400 audit(2000001266.911:41074): avc: denied { open } for pid=30900 comm="syz.0.5302" path="net:[4026533197]" dev="nsfs" ino=4026533197 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2514.664545][ C0] vkms_vblank_simulate: vblank timer overrun [ 2514.693595][ T30] audit: type=1400 audit(2000001266.911:41075): avc: denied { create } for pid=30900 comm="syz.0.5302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 2514.718463][ T30] audit: type=1400 audit(2000001266.951:41076): avc: denied { recv } for pid=30 comm="kauditd" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2514.743525][ C0] vkms_vblank_simulate: vblank timer overrun [ 2514.884504][T30926] 9pnet_fd: Insufficient options for proto=fd [ 2514.910234][ T30] audit: type=1400 audit(2000001266.981:41077): avc: denied { recv } for pid=30 comm="kauditd" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2516.471999][T30954] netlink: 512 bytes leftover after parsing attributes in process `syz.0.5318'. [ 2517.768460][T30972] 9pnet_fd: Insufficient options for proto=fd [ 2518.584525][T30982] netlink: 'syz.1.5328': attribute type 1 has an invalid length. [ 2518.743671][T30982] netlink: 16 bytes leftover after parsing attributes in process `syz.1.5328'. [ 2519.099868][ T30] kauditd_printk_skb: 257 callbacks suppressed [ 2519.099884][ T30] audit: type=1400 audit(2000001271.581:41335): avc: denied { getopt } for pid=30980 comm="syz.0.5327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 2519.185039][ T30] audit: type=1400 audit(2000001271.581:41336): avc: denied { read } for pid=30980 comm="syz.0.5327" name="iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2519.207717][ C1] vkms_vblank_simulate: vblank timer overrun [ 2519.215046][ T30] audit: type=1400 audit(2000001271.591:41337): avc: denied { open } for pid=30980 comm="syz.0.5327" path="/dev/iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2519.238159][ C1] vkms_vblank_simulate: vblank timer overrun [ 2519.245007][ T30] audit: type=1400 audit(2000001271.591:41338): avc: denied { ioctl } for pid=30980 comm="syz.0.5327" path="/dev/iommu" dev="devtmpfs" ino=624 ioctlcmd=0x3b81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2519.270018][ T30] audit: type=1400 audit(2000001271.601:41339): avc: denied { prog_load } for pid=30980 comm="syz.0.5327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2519.289197][ C1] vkms_vblank_simulate: vblank timer overrun [ 2519.378619][ T30] audit: type=1400 audit(2000001271.601:41340): avc: denied { bpf } for pid=30980 comm="syz.0.5327" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2519.402544][ T30] audit: type=1400 audit(2000001271.601:41341): avc: denied { ioctl } for pid=30980 comm="syz.0.5327" path="/dev/iommu" dev="devtmpfs" ino=624 ioctlcmd=0x3ba0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2520.398554][ T30] audit: type=1400 audit(2000001271.621:41342): avc: denied { read } for pid=30980 comm="syz.0.5327" name="card1" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 2520.935977][ T5825] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2520.940682][ T5834] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2523.740977][T31038] 9pnet_fd: Insufficient options for proto=fd [ 2524.302695][ T30] kauditd_printk_skb: 260 callbacks suppressed [ 2524.302727][ T30] audit: type=1400 audit(2000001277.071:41587): avc: denied { recv } for pid=5815 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2524.506671][ T30] audit: type=1400 audit(2000001277.121:41588): avc: denied { read write } for pid=31046 comm="syz.2.5344" name="rdma_cm" dev="devtmpfs" ino=1271 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 2524.531343][ T30] audit: type=1400 audit(2000001277.131:41590): avc: denied { recv } for pid=5815 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2524.556972][ C1] vkms_vblank_simulate: vblank timer overrun [ 2524.726508][ T30] audit: type=1400 audit(2000001277.131:41591): avc: denied { recv } for pid=31039 comm="syz.0.5342" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2524.898155][ T30] audit: type=1400 audit(2000001277.141:41592): avc: denied { recv } for pid=31047 comm="modprobe" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2524.923589][ C1] vkms_vblank_simulate: vblank timer overrun [ 2525.038697][ T30] audit: type=1400 audit(2000001277.121:41589): avc: denied { read write open } for pid=31046 comm="syz.2.5344" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=1271 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 2525.071464][ T30] audit: type=1400 audit(2000001277.201:41593): avc: denied { prog_load } for pid=31049 comm="syz.1.5345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2525.616393][ T30] audit: type=1400 audit(2000001277.201:41594): avc: denied { allowed } for pid=31046 comm="syz.2.5344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2525.664336][T31068] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2525.680502][ T30] audit: type=1400 audit(2000001277.201:41595): avc: denied { sqpoll } for pid=31046 comm="syz.2.5344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2528.541785][ T1297] ieee802154 phy0 wpan0: encryption failed: -22 [ 2528.548376][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 [ 2528.758974][T31122] netlink: 'syz.2.5365': attribute type 9 has an invalid length. [ 2528.766866][T31122] netlink: 'syz.2.5365': attribute type 9 has an invalid length. [ 2529.342369][ T30] kauditd_printk_skb: 260 callbacks suppressed [ 2529.342385][ T30] audit: type=1400 audit(2000001282.111:41845): avc: denied { read write } for pid=5834 comm="syz-executor" name="loop1" dev="devtmpfs" ino=3453 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2529.411328][ T30] audit: type=1400 audit(2000001282.111:41846): avc: denied { create } for pid=31124 comm="syz.2.5366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2529.433735][ T30] audit: type=1400 audit(2000001282.111:41847): avc: denied { write } for pid=31124 comm="syz.2.5366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2529.472783][ T30] audit: type=1400 audit(2000001282.151:41848): avc: denied { recv } for pid=9484 comm="kworker/u8:17" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2529.548843][T31129] netlink: 56 bytes leftover after parsing attributes in process `syz.2.5368'. [ 2529.569046][ T30] audit: type=1400 audit(2000001282.151:41849): avc: denied { recv } for pid=9484 comm="kworker/u8:17" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2529.675560][ T30] audit: type=1400 audit(2000001282.161:41850): avc: denied { read write open } for pid=5834 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=3453 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2529.756571][ T30] audit: type=1400 audit(2000001282.161:41851): avc: denied { ioctl } for pid=5834 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=3453 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2529.834905][ T30] audit: type=1400 audit(2000001282.171:41852): avc: denied { read write } for pid=5828 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2530.704572][ T30] audit: type=1400 audit(2000001282.171:41853): avc: denied { open } for pid=5828 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2530.742514][ T5837] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2533.279705][T31200] netlink: 'syz.1.5391': attribute type 2 has an invalid length. [ 2533.291799][T31200] netlink: 12 bytes leftover after parsing attributes in process `syz.1.5391'. [ 2534.458671][ T30] kauditd_printk_skb: 344 callbacks suppressed [ 2534.458686][ T30] audit: type=1400 audit(2000001286.681:42193): avc: denied { execmem } for pid=31204 comm="syz.5.5393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2534.471163][T31206] 9pnet_fd: Insufficient options for proto=fd [ 2534.538478][ T30] audit: type=1400 audit(2000001287.151:42194): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2535.226182][T31222] overlayfs: option "workdir=./file0" is useless in a non-upper mount, ignore [ 2535.235162][T31222] overlayfs: missing 'lowerdir' [ 2535.648455][ T30] audit: type=1400 audit(2000001287.231:42195): avc: denied { mounton } for pid=31204 comm="syz.5.5393" path="/1014" dev="tmpfs" ino=5596 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2535.722355][ T30] audit: type=1400 audit(2000001287.271:42196): avc: denied { read write } for pid=5834 comm="syz-executor" name="loop1" dev="devtmpfs" ino=3453 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2535.800718][T31227] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2535.807269][T31227] audit: audit_lost=265 audit_rate_limit=0 audit_backlog_limit=64 [ 2535.862371][T31230] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2535.873642][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2535.880209][ C0] audit: audit_lost=266 audit_rate_limit=0 audit_backlog_limit=64 [ 2535.887991][ C0] audit: backlog limit exceeded [ 2536.480399][T31239] netlink: 32 bytes leftover after parsing attributes in process `syz.0.5402'. [ 2538.909835][T31264] 9pnet_fd: Insufficient options for proto=fd [ 2539.486745][ T30] kauditd_printk_skb: 260 callbacks suppressed [ 2539.486761][ T30] audit: type=1400 audit(2000001292.251:42436): avc: denied { create } for pid=31278 comm="syz.2.5417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2539.794738][ T30] audit: type=1400 audit(2000001292.271:42437): avc: denied { create } for pid=31282 comm="syz.5.5418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2539.831846][ T30] audit: type=1400 audit(2000001292.291:42438): avc: denied { read } for pid=31278 comm="syz.2.5417" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 2539.854833][ C1] vkms_vblank_simulate: vblank timer overrun [ 2540.048674][ T30] audit: type=1400 audit(2000001292.291:42439): avc: denied { open } for pid=31278 comm="syz.2.5417" path="/dev/cpu/0/msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 2540.072418][ C1] vkms_vblank_simulate: vblank timer overrun [ 2540.078946][ T30] audit: type=1400 audit(2000001292.361:42440): avc: denied { create } for pid=31278 comm="syz.2.5417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2540.082025][T31289] 9pnet_fd: Insufficient options for proto=fd [ 2540.529529][ T30] audit: type=1400 audit(2000001292.361:42441): avc: denied { setopt } for pid=31278 comm="syz.2.5417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2540.565923][ T30] audit: type=1400 audit(2000001292.471:42442): avc: denied { create } for pid=31282 comm="syz.5.5418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2540.691817][ T30] audit: type=1400 audit(2000001292.471:42443): avc: denied { write } for pid=31282 comm="syz.5.5418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2540.738711][ T30] audit: type=1400 audit(2000001292.471:42444): avc: denied { read } for pid=31282 comm="syz.5.5418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2540.855489][ T30] audit: type=1400 audit(2000001292.471:42445): avc: denied { execmem } for pid=31281 comm="syz.1.5416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2541.028986][T31314] netlink: 8 bytes leftover after parsing attributes in process `syz.3.5427'. [ 2542.104282][T31316] 9pnet_fd: Insufficient options for proto=fd [ 2543.832133][T31342] 9pnet_fd: Insufficient options for proto=fd [ 2544.235178][T31353] 9pnet_fd: Insufficient options for proto=fd [ 2544.563088][ T30] kauditd_printk_skb: 255 callbacks suppressed [ 2544.563100][ T30] audit: type=1400 audit(2000001297.251:42701): avc: denied { execmem } for pid=31362 comm="syz.5.5442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2544.619095][ T30] audit: type=1400 audit(2000001297.371:42702): avc: denied { create } for pid=31364 comm="syz.2.5443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2544.639713][ T30] audit: type=1400 audit(2000001297.381:42703): avc: denied { create } for pid=31356 comm="syz.3.5440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2544.662849][ T30] audit: type=1400 audit(2000001297.431:42704): avc: denied { read } for pid=31356 comm="syz.3.5440" dev="nsfs" ino=4026532943 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2544.728509][ T30] audit: type=1400 audit(2000001297.431:42705): avc: denied { read open } for pid=31356 comm="syz.3.5440" path="net:[4026532943]" dev="nsfs" ino=4026532943 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2544.757636][T31368] 9pnet_fd: Insufficient options for proto=fd [ 2544.907232][ T30] audit: type=1400 audit(2000001297.431:42706): avc: denied { create } for pid=31356 comm="syz.3.5440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 2545.271815][ T30] audit: type=1400 audit(2000001297.431:42707): avc: denied { ioctl } for pid=31364 comm="syz.2.5443" path="socket:[96615]" dev="sockfs" ino=96615 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2545.567849][ T30] audit: type=1400 audit(2000001297.431:42708): avc: denied { read } for pid=31356 comm="syz.3.5440" dev="nsfs" ino=4026532943 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2545.600520][ T30] audit: type=1400 audit(2000001297.441:42709): avc: denied { read open } for pid=31356 comm="syz.3.5440" path="net:[4026532943]" dev="nsfs" ino=4026532943 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2545.705727][ T30] audit: type=1400 audit(2000001297.441:42710): avc: denied { create } for pid=31356 comm="syz.3.5440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 2546.579428][ T5903] usb 3-1: new high-speed USB device number 107 using dummy_hcd [ 2547.102789][T31395] 9pnet_fd: Insufficient options for proto=fd [ 2547.183012][ T5903] usb 3-1: New USB device found, idVendor=0813, idProduct=0001, bcdDevice=3a.08 [ 2547.202309][ T5903] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2547.221850][T31402] tmpfs: Bad value for 'mpol' [ 2547.228039][ T5903] usb 3-1: config 0 descriptor?? [ 2547.350597][ T5903] gspca_main: cpia1-2.14.0 probing 0813:0001 [ 2547.437858][T31405] 9pnet_fd: Insufficient options for proto=fd [ 2547.774304][ T5903] gspca_cpia1: usb_control_msg 03, error -32 [ 2547.780824][ T5903] gspca_cpia1: usb_control_msg 03, error -71 [ 2547.792639][ T5903] gspca_cpia1: usb_control_msg 01, error -71 [ 2547.799572][ T5903] cpia1 3-1:0.0: only firmware version 1 is supported (got: 0) [ 2548.431016][ T5903] usb 3-1: USB disconnect, device number 107 [ 2549.585572][ T30] kauditd_printk_skb: 253 callbacks suppressed [ 2549.585584][ T30] audit: type=1400 audit(2000001302.351:42964): avc: denied { prog_load } for pid=31449 comm="syz.5.5467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2549.709061][ T30] audit: type=1400 audit(2000001302.351:42965): avc: denied { bpf } for pid=31449 comm="syz.5.5467" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2549.759213][ T30] audit: type=1400 audit(2000001302.351:42966): avc: denied { perfmon } for pid=31449 comm="syz.5.5467" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2549.790097][ T30] audit: type=1400 audit(2000001302.371:42967): avc: denied { recv } for pid=31451 comm="modprobe" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2549.816753][ T30] audit: type=1400 audit(2000001302.391:42968): avc: denied { execmem } for pid=31449 comm="syz.5.5467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2549.836219][ T30] audit: type=1400 audit(2000001302.511:42969): avc: denied { read write } for pid=5828 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2549.935545][ T30] audit: type=1400 audit(2000001302.511:42970): avc: denied { read write open } for pid=5828 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2549.969228][T31457] netlink: 16 bytes leftover after parsing attributes in process `syz.3.5468'. [ 2549.999508][ T30] audit: type=1400 audit(2000001302.511:42971): avc: denied { ioctl } for pid=5828 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=649 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2550.025899][ T30] audit: type=1400 audit(2000001302.521:42972): avc: denied { recv } for pid=31409 comm="syz.0.5456" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2550.181369][ T30] audit: type=1400 audit(2000001302.641:42973): avc: denied { prog_load } for pid=31449 comm="syz.5.5467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2550.851733][ T5903] libceph: connect (1)[c::]:6789 error -22 [ 2550.875568][ T5903] libceph: mon0 (1)[c::]:6789 connect error [ 2550.977055][T31469] ceph: No mds server is up or the cluster is laggy [ 2551.260464][ T5903] libceph: connect (1)[c::]:6789 error -22 [ 2551.304037][ T5903] libceph: mon0 (1)[c::]:6789 connect error [ 2554.219510][T31507] overlayfs: missing 'lowerdir' [ 2554.658406][ T30] kauditd_printk_skb: 172 callbacks suppressed [ 2554.658421][ T30] audit: type=1400 audit(2000001307.421:43146): avc: denied { prog_load } for pid=31501 comm="syz.5.5482" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2554.783406][ T30] audit: type=1400 audit(2000001307.451:43147): avc: denied { bpf } for pid=31501 comm="syz.5.5482" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2554.806638][ T30] audit: type=1400 audit(2000001307.451:43148): avc: denied { create } for pid=31501 comm="syz.5.5482" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2554.827216][ C1] vkms_vblank_simulate: vblank timer overrun [ 2554.844839][ T30] audit: type=1400 audit(2000001307.451:43149): avc: denied { allowed } for pid=31501 comm="syz.5.5482" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2554.894485][ T30] audit: type=1400 audit(2000001307.451:43150): avc: denied { create } for pid=31501 comm="syz.5.5482" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2555.083765][ T30] audit: type=1400 audit(2000001307.461:43151): avc: denied { create } for pid=31501 comm="syz.5.5482" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2556.248293][T31522] ceph: No mds server is up or the cluster is laggy [ 2556.370588][ T30] audit: type=1400 audit(2000001307.511:43152): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2556.394869][ C1] vkms_vblank_simulate: vblank timer overrun [ 2556.494770][ T30] audit: type=1400 audit(2000001307.511:43153): avc: denied { open } for pid=5825 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2556.619079][ T30] audit: type=1400 audit(2000001307.511:43154): avc: denied { ioctl } for pid=5825 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2556.769258][ T30] audit: type=1400 audit(2000001307.521:43155): avc: denied { recv } for pid=5834 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2557.653527][T31543] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 2558.069318][T31552] netlink: 172 bytes leftover after parsing attributes in process `syz.3.5493'. [ 2558.125407][T31552] netlink: 40 bytes leftover after parsing attributes in process `syz.3.5493'. [ 2558.174441][T31552] netlink: 168 bytes leftover after parsing attributes in process `syz.3.5493'. [ 2559.704192][ T30] kauditd_printk_skb: 201 callbacks suppressed [ 2559.704208][ T30] audit: type=1400 audit(2000001312.471:43357): avc: denied { recv } for pid=5828 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2559.899065][ T30] audit: type=1400 audit(2000001312.471:43358): avc: denied { recv } for pid=5828 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2559.927389][ T30] audit: type=1400 audit(2000001312.471:43359): avc: denied { recv } for pid=5828 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2559.963850][ T30] audit: type=1400 audit(2000001312.481:43360): avc: denied { map_create } for pid=31573 comm="syz.3.5499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2560.540646][ T30] audit: type=1400 audit(2000001312.481:43361): avc: denied { map_read map_write } for pid=31573 comm="syz.3.5499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2560.562379][ T30] audit: type=1400 audit(2000001312.501:43362): avc: denied { prog_load } for pid=31573 comm="syz.3.5499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2560.606690][ T30] audit: type=1400 audit(2000001312.501:43363): avc: denied { bpf } for pid=31573 comm="syz.3.5499" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2560.795336][ T30] audit: type=1400 audit(2000001312.501:43364): avc: denied { perfmon } for pid=31573 comm="syz.3.5499" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2560.816501][ T30] audit: type=1400 audit(2000001312.501:43365): avc: denied { prog_run } for pid=31573 comm="syz.3.5499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2560.849734][ T30] audit: type=1400 audit(2000001312.511:43366): avc: denied { create } for pid=31569 comm="syz.5.5498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2561.028218][T31592] overlayfs: missing 'lowerdir' [ 2563.492494][T31636] 9pnet_fd: Insufficient options for proto=fd [ 2564.608689][T24237] usb 3-1: new high-speed USB device number 108 using dummy_hcd [ 2564.938769][ T30] kauditd_printk_skb: 301 callbacks suppressed [ 2564.947354][ T30] audit: type=1400 audit(2000001317.541:43668): avc: denied { prog_load } for pid=31652 comm="syz.5.5520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2565.152506][ T30] audit: type=1400 audit(2000001317.541:43669): avc: denied { bpf } for pid=31652 comm="syz.5.5520" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2565.173306][ C1] vkms_vblank_simulate: vblank timer overrun [ 2565.271400][T24237] usb 3-1: Using ep0 maxpacket: 32 [ 2565.307827][ T30] audit: type=1400 audit(2000001317.551:43670): avc: denied { create } for pid=31652 comm="syz.5.5520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2565.318907][T24237] usb 3-1: New USB device found, idVendor=0ac8, idProduct=0321, bcdDevice=6f.be [ 2565.344196][T24237] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2565.363985][T24237] usb 3-1: config 0 descriptor?? [ 2565.383375][ T30] audit: type=1400 audit(2000001317.561:43671): avc: denied { allowed } for pid=31652 comm="syz.5.5520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2565.418636][T24237] gspca_main: vc032x-2.14.0 probing 0ac8:0321 [ 2565.460333][ T30] audit: type=1400 audit(2000001317.611:43672): avc: denied { create } for pid=31652 comm="syz.5.5520" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2565.538550][ T30] audit: type=1400 audit(2000001317.681:43673): avc: denied { create } for pid=31652 comm="syz.5.5520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2565.597600][ T30] audit: type=1400 audit(2000001317.691:43674): avc: denied { recv } for pid=31657 comm="syz.3.5522" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2565.641583][ T30] audit: type=1400 audit(2000001317.711:43675): avc: denied { prog_load } for pid=31657 comm="syz.3.5522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2565.673376][ T30] audit: type=1400 audit(2000001317.711:43676): avc: denied { bpf } for pid=31657 comm="syz.3.5522" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2565.695041][ T30] audit: type=1400 audit(2000001317.711:43677): avc: denied { create } for pid=31657 comm="syz.3.5522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2566.300195][T24237] gspca_vc032x: reg_w err -71 [ 2566.304907][T24237] gspca_vc032x: I2c Bus Busy Wait 00 [ 2566.318471][T24237] gspca_vc032x: I2c Bus Busy Wait 00 [ 2566.334934][T24237] gspca_vc032x: I2c Bus Busy Wait 00 [ 2566.358462][T24237] gspca_vc032x: I2c Bus Busy Wait 00 [ 2566.366049][T24237] gspca_vc032x: I2c Bus Busy Wait 00 [ 2566.374679][T24237] gspca_vc032x: I2c Bus Busy Wait 00 [ 2566.384165][T24237] gspca_vc032x: I2c Bus Busy Wait 00 [ 2566.389865][T31684] 9pnet_fd: Insufficient options for proto=fd [ 2566.396509][T24237] gspca_vc032x: I2c Bus Busy Wait 00 [ 2566.406936][T24237] gspca_vc032x: I2c Bus Busy Wait 00 [ 2566.415187][T24237] gspca_vc032x: I2c Bus Busy Wait 00 [ 2566.422114][T24237] gspca_vc032x: I2c Bus Busy Wait 00 [ 2566.427411][T24237] gspca_vc032x: I2c Bus Busy Wait 00 [ 2566.434707][T24237] gspca_vc032x: I2c Bus Busy Wait 00 [ 2566.440068][T24237] gspca_vc032x: I2c Bus Busy Wait 00 [ 2566.445394][T24237] gspca_vc032x: I2c Bus Busy Wait 00 [ 2566.451282][T24237] gspca_vc032x: I2c Bus Busy Wait 00 [ 2566.456610][T24237] gspca_vc032x: I2c Bus Busy Wait 00 [ 2566.462158][T24237] gspca_vc032x: I2c Bus Busy Wait 00 [ 2566.467495][T24237] gspca_vc032x: Unknown sensor... [ 2566.472649][T24237] vc032x 3-1:0.0: probe with driver vc032x failed with error -22 [ 2566.482756][T24237] usb 3-1: USB disconnect, device number 108 [ 2566.903994][T29492] usb 4-1: new high-speed USB device number 92 using dummy_hcd [ 2567.068377][T29492] usb 4-1: Using ep0 maxpacket: 32 [ 2567.101601][T29492] usb 4-1: config 0 has an invalid interface number: 1 but max is 0 [ 2567.113515][T29492] usb 4-1: config 0 has no interface number 0 [ 2567.123171][T29492] usb 4-1: New USB device found, idVendor=8086, idProduct=9500, bcdDevice=b6.d8 [ 2567.134528][T29492] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2567.144662][T29492] usb 4-1: Product: syz [ 2567.154389][T29492] usb 4-1: Manufacturer: syz [ 2567.159382][T29492] usb 4-1: SerialNumber: syz [ 2567.190793][T29492] usb 4-1: config 0 descriptor?? [ 2567.205402][T29492] usb 4-1: dvb_usb_v2: found a 'Intel CE9500 reference design' in warm state [ 2567.342672][T29492] usb 4-1: selecting invalid altsetting 1 [ 2567.353146][T29492] usb 4-1: dvb_usb_ce6230: usb_set_interface() failed=-22 [ 2567.403446][T31702] 9pnet_fd: Insufficient options for proto=fd [ 2567.413486][T29492] usb 4-1: dvb_usb_v2: will pass the complete MPEG2 transport stream to the software demuxer [ 2567.424721][T29492] dvbdev: DVB: registering new adapter (Intel CE9500 reference design) [ 2567.439258][T29492] usb 4-1: media controller created [ 2567.480504][T29492] dvbdev: dvb_create_media_entity: media entity 'dvb-demux' registered. [ 2567.553710][T29492] usb 4-1: dvb_usb_ce6230: usb_control_msg() failed=-71 [ 2567.598505][T29492] zl10353_read_register: readreg error (reg=127, ret==-71) [ 2567.608289][T29492] usb 4-1: dvb_usb_ce6230: usb_set_interface() failed=-71 [ 2567.644563][T29492] usb 4-1: USB disconnect, device number 92 [ 2568.848937][T29492] usb 3-1: new high-speed USB device number 109 using dummy_hcd [ 2568.860145][T31732] 9pnet_fd: Insufficient options for proto=fd [ 2569.468516][T29492] usb 3-1: Using ep0 maxpacket: 32 [ 2569.483452][T29492] usb 3-1: config 0 interface 0 altsetting 0 bulk endpoint 0x85 has invalid maxpacket 1024 [ 2569.512693][T29492] usb 3-1: New USB device found, idVendor=12d8, idProduct=0001, bcdDevice=de.79 [ 2569.534970][T29492] usb 3-1: New USB device strings: Mfr=1, Product=236, SerialNumber=2 [ 2569.544862][T29492] usb 3-1: Product: syz [ 2569.550019][T29492] usb 3-1: Manufacturer: syz [ 2569.555030][T29492] usb 3-1: SerialNumber: syz [ 2569.566778][T29492] usb 3-1: config 0 descriptor?? [ 2569.574311][T31725] raw-gadget.1 gadget.2: fail, usb_ep_enable returned -22 [ 2569.593027][T29492] hub 3-1:0.0: bad descriptor, ignoring hub [ 2569.599572][T29492] hub 3-1:0.0: probe with driver hub failed with error -5 [ 2569.989288][ T30] kauditd_printk_skb: 317 callbacks suppressed [ 2569.989304][ T30] audit: type=1400 audit(2000001322.761:43995): avc: denied { read write } for pid=5837 comm="syz-executor" name="loop0" dev="devtmpfs" ino=3445 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2570.042481][ T30] audit: type=1400 audit(2000001322.791:43996): avc: denied { recv } for pid=15428 comm="dhcpcd" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2570.084919][ T30] audit: type=1400 audit(2000001322.801:43997): avc: denied { read write open } for pid=5837 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=3445 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2570.135829][ T30] audit: type=1400 audit(2000001322.801:43998): avc: denied { ioctl } for pid=5837 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=3445 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2570.164946][ T30] audit: type=1400 audit(2000001322.841:43999): avc: denied { create } for pid=31743 comm="syz.5.5549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 2570.188553][T29492] usb 3-1: USB disconnect, device number 109 [ 2570.225289][ T30] audit: type=1400 audit(2000001322.841:44000): avc: denied { create } for pid=31743 comm="syz.5.5549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2570.251963][ T30] audit: type=1400 audit(2000001322.841:44001): avc: denied { write } for pid=31743 comm="syz.5.5549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2570.278044][ T30] audit: type=1400 audit(2000001322.841:44002): avc: denied { read } for pid=31743 comm="syz.5.5549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2570.316198][ T30] audit: type=1400 audit(2000001322.851:44003): avc: denied { create } for pid=31743 comm="syz.5.5549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2570.338971][ T30] audit: type=1400 audit(2000001322.851:44004): avc: denied { write } for pid=31743 comm="syz.5.5549" path="socket:[97561]" dev="sockfs" ino=97561 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2571.570929][T31764] 9pnet_fd: Insufficient options for proto=fd [ 2571.769948][T31773] 9pnet_fd: Insufficient options for proto=fd [ 2571.779906][T31774] netlink: 204 bytes leftover after parsing attributes in process `syz.2.5559'. [ 2572.218826][ T5903] usb 3-1: new high-speed USB device number 110 using dummy_hcd [ 2573.028639][ T5903] usb 3-1: Using ep0 maxpacket: 8 [ 2573.036682][ T5903] usb 3-1: config index 0 descriptor too short (expected 30, got 18) [ 2573.056956][ T5903] usb 3-1: New USB device found, idVendor=1660, idProduct=0932, bcdDevice=80.ea [ 2573.399441][ T5903] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2573.425068][ T5903] usb 3-1: Product: syz [ 2573.483596][ T5903] usb 3-1: Manufacturer: syz [ 2573.493658][ T5903] usb 3-1: SerialNumber: syz [ 2573.516150][ T5903] usb 3-1: config 0 descriptor?? [ 2573.561698][ T5903] dvb-usb: found a 'Medion MD95700 (MDUSBTV-HYBRID)' in warm state. [ 2573.584938][ T5903] usb 3-1: setting power ON [ 2573.603145][ T5903] dvb-usb: bulk message failed: -22 (2/0) [ 2573.624560][ T5903] dvb-usb: will pass the complete MPEG2 transport stream to the software demuxer. [ 2573.651077][ T5903] dvbdev: DVB: registering new adapter (Medion MD95700 (MDUSBTV-HYBRID)) [ 2573.671583][ T5903] usb 3-1: media controller created [ 2573.721663][ T5903] dvbdev: dvb_create_media_entity: media entity 'dvb-demux' registered. [ 2573.754344][T31807] netlink: 92 bytes leftover after parsing attributes in process `syz.0.5570'. [ 2573.765737][ T5903] usb 3-1: selecting invalid altsetting 6 [ 2573.780818][ T5903] usb 3-1: digital interface selection failed (-22) [ 2573.798109][ T5903] dvb-usb: no frontend was attached by 'Medion MD95700 (MDUSBTV-HYBRID)' [ 2573.813383][ T5903] usb 3-1: setting power OFF [ 2573.820135][ T5903] dvb-usb: bulk message failed: -22 (2/0) [ 2573.836339][ T5903] dvb-usb: Medion MD95700 (MDUSBTV-HYBRID) successfully initialized and connected. [ 2573.846071][ T5903] (NULL device *): no alternate interface [ 2573.918272][ T5903] dvb-usb: Medion MD95700 (MDUSBTV-HYBRID) successfully deinitialized and disconnected. [ 2573.970880][ T5903] usb 3-1: USB disconnect, device number 110 [ 2575.038403][ T30] kauditd_printk_skb: 267 callbacks suppressed [ 2575.038419][ T30] audit: type=1400 audit(2000001327.651:44272): avc: denied { execmem } for pid=31819 comm="syz.5.5575" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2575.159012][ T30] audit: type=1400 audit(2000001327.711:44273): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2575.204976][ T30] audit: type=1400 audit(2000001327.791:44274): avc: denied { recv } for pid=5834 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2575.541961][T31828] 9pnet_fd: Insufficient options for proto=fd [ 2575.578158][ T30] audit: type=1400 audit(2000001327.791:44275): avc: denied { read write } for pid=5834 comm="syz-executor" name="loop1" dev="devtmpfs" ino=3453 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2575.623755][ T30] audit: type=1400 audit(2000001327.791:44276): avc: denied { open } for pid=5834 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=3453 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2575.791087][ T30] audit: type=1400 audit(2000001327.791:44277): avc: denied { ioctl } for pid=5834 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=3453 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2575.965567][ T30] audit: type=1400 audit(2000001327.791:44278): avc: denied { recv } for pid=5834 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2576.170860][T31847] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2576.177439][T31847] audit: audit_lost=274 audit_rate_limit=0 audit_backlog_limit=64 [ 2576.185356][T31847] audit: backlog limit exceeded [ 2576.610323][T31842] netlink: 32 bytes leftover after parsing attributes in process `syz.2.5580'. [ 2577.089979][T31841] 9pnet_fd: Insufficient options for proto=fd [ 2580.054900][ T30] kauditd_printk_skb: 259 callbacks suppressed [ 2580.054917][ T30] audit: type=1400 audit(2000001332.821:44481): avc: denied { create } for pid=31889 comm="syz.5.5595" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2580.090057][T29492] usb 3-1: new high-speed USB device number 111 using dummy_hcd [ 2580.259551][T29492] usb 3-1: Using ep0 maxpacket: 8 [ 2580.271321][T29492] usb 3-1: config 0 has an invalid interface number: 55 but max is 0 [ 2580.394938][ T30] audit: type=1400 audit(2000001332.871:44482): avc: denied { ioctl } for pid=31869 comm="syz.2.5589" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2580.420419][ T30] audit: type=1400 audit(2000001332.921:44483): avc: denied { read } for pid=31878 comm="syz.3.5592" dev="nsfs" ino=4026532943 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2580.451935][T29492] usb 3-1: config 0 has no interface number 0 [ 2580.528483][ T30] audit: type=1400 audit(2000001332.921:44484): avc: denied { open } for pid=31878 comm="syz.3.5592" path="net:[4026532943]" dev="nsfs" ino=4026532943 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2580.544443][T29492] usb 3-1: config 0 interface 55 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 2580.572204][T29492] usb 3-1: config 0 interface 55 altsetting 0 has an endpoint descriptor with address 0xAB, changing to 0x8B [ 2580.696386][ T30] audit: type=1400 audit(2000001332.921:44485): avc: denied { create } for pid=31878 comm="syz.3.5592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 2580.719105][T29492] usb 3-1: config 0 interface 55 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7 [ 2580.719955][ T30] audit: type=1400 audit(2000001332.931:44486): avc: denied { prog_load } for pid=31879 comm="syz.0.5593" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2580.757229][ T30] audit: type=1400 audit(2000001332.931:44487): avc: denied { bpf } for pid=31879 comm="syz.0.5593" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2580.780549][ T30] audit: type=1400 audit(2000001332.931:44488): avc: denied { perfmon } for pid=31879 comm="syz.0.5593" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2580.821710][T31899] 9pnet_fd: Insufficient options for proto=fd [ 2580.862165][ T30] audit: type=1400 audit(2000001332.941:44489): avc: denied { ioctl } for pid=31869 comm="syz.2.5589" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2580.897763][T29492] usb 3-1: config 0 interface 55 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 2 [ 2580.920713][T29492] usb 3-1: New USB device found, idVendor=0f11, idProduct=1080, bcdDevice=fc.6a [ 2580.930112][T29492] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2580.959083][T29492] usb 3-1: config 0 descriptor?? [ 2581.032901][T29492] ldusb 3-1:0.55: LD USB Device #0 now attached to major 180 minor 0 [ 2581.080854][ T30] audit: type=1400 audit(2000001333.031:44490): avc: denied { ioctl } for pid=31869 comm="syz.2.5589" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2581.627081][ T5903] usb 3-1: USB disconnect, device number 111 [ 2581.682272][ T5903] ldusb 3-1:0.55: LD USB Device #0 now disconnected [ 2582.248620][ T5903] usb 3-1: new high-speed USB device number 112 using dummy_hcd [ 2582.448536][ T5903] usb 3-1: Using ep0 maxpacket: 16 [ 2582.467024][ T5903] usb 3-1: config 0 interface 0 altsetting 16 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2582.549693][T31929] 9pnet_fd: Insufficient options for proto=fd [ 2582.558602][ T5903] usb 3-1: config 0 interface 0 altsetting 16 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2582.765446][ T5903] usb 3-1: config 0 interface 0 altsetting 16 has 1 endpoint descriptor, different from the interface descriptor's value: 28 [ 2583.230204][ T5903] usb 3-1: config 0 interface 0 has no altsetting 0 [ 2583.237237][ T5903] usb 3-1: New USB device found, idVendor=056a, idProduct=0331, bcdDevice= 0.00 [ 2583.256102][ T5903] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2583.281308][ T5903] usb 3-1: config 0 descriptor?? [ 2583.705627][ T5903] hid (null): report_id 53977 is invalid [ 2583.731255][ T5903] hid (null): unknown global tag 0xc3 [ 2583.746859][ T5903] hid (null): unknown global tag 0xd [ 2583.756953][ T5903] hid (null): unknown global tag 0xc [ 2583.768221][ T5903] hid (null): global environment stack underflow [ 2583.791788][ T5903] hid (null): invalid report_count 14229 [ 2583.807641][ T5903] hid (null): global environment stack underflow [ 2583.950885][ T5903] usb 3-1: USB disconnect, device number 112 [ 2585.298140][ T30] kauditd_printk_skb: 308 callbacks suppressed [ 2585.319601][ T30] audit: type=1400 audit(2000001337.801:44799): avc: denied { perfmon } for pid=31978 comm="syz.1.5623" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2585.879797][ T30] audit: type=1400 audit(2000001337.801:44800): avc: denied { execmem } for pid=31978 comm="syz.1.5623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2585.900171][ T30] audit: type=1400 audit(2000001337.951:44801): avc: denied { create } for pid=31975 comm="syz.3.5622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2585.921325][ T30] audit: type=1400 audit(2000001337.961:44802): avc: denied { bpf } for pid=31975 comm="syz.3.5622" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2586.094316][ T30] audit: type=1400 audit(2000001337.961:44803): avc: denied { create } for pid=31975 comm="syz.3.5622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2586.118282][ T30] audit: type=1400 audit(2000001337.981:44804): avc: denied { write } for pid=31975 comm="syz.3.5622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2586.217213][ T30] audit: type=1400 audit(2000001337.991:44805): avc: denied { create } for pid=31985 comm="syz.0.5625" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2586.349877][ T30] audit: type=1400 audit(2000001337.991:44806): avc: denied { map } for pid=31985 comm="syz.0.5625" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=97904 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2586.384779][ T30] audit: type=1400 audit(2000001337.991:44807): avc: denied { read write } for pid=31985 comm="syz.0.5625" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=97904 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2586.679844][T32000] 9pnet_fd: Insufficient options for proto=fd [ 2586.687964][ T30] audit: type=1400 audit(2000001338.051:44808): avc: denied { prog_load } for pid=31978 comm="syz.1.5623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2588.854643][T32030] netlink: 32 bytes leftover after parsing attributes in process `syz.0.5634'. [ 2589.519279][T32032] 9pnet_fd: Insufficient options for proto=fd [ 2590.193603][ T1297] ieee802154 phy0 wpan0: encryption failed: -22 [ 2590.200005][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 [ 2590.302516][ T30] kauditd_printk_skb: 189 callbacks suppressed [ 2590.302532][ T30] audit: type=1400 audit(2000001343.071:44998): avc: denied { prog_load } for pid=32019 comm="syz.5.5633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2590.344874][T32041] netlink: 32 bytes leftover after parsing attributes in process `syz.5.5633'. [ 2590.369483][ T30] audit: type=1400 audit(2000001343.111:44999): avc: denied { bpf } for pid=32019 comm="syz.5.5633" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2590.392492][ T30] audit: type=1400 audit(2000001343.111:45000): avc: denied { perfmon } for pid=32019 comm="syz.5.5633" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2590.414466][ T30] audit: type=1400 audit(2000001343.171:45001): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2590.559302][ T30] audit: type=1400 audit(2000001343.171:45002): avc: denied { open } for pid=5825 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2590.584583][ T30] audit: type=1400 audit(2000001343.171:45003): avc: denied { ioctl } for pid=5825 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2590.618587][ T30] audit: type=1400 audit(2000001343.211:45004): avc: denied { recv } for pid=15 comm="ksoftirqd/0" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2590.646772][ T30] audit: type=1400 audit(2000001343.211:45005): avc: denied { create } for pid=32019 comm="syz.5.5633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2590.722496][T32052] 9pnet_fd: Insufficient options for proto=fd [ 2590.741399][ T30] audit: type=1400 audit(2000001343.211:45006): avc: denied { read write } for pid=32042 comm="syz.0.5640" name="rdma_cm" dev="devtmpfs" ino=1271 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 2590.824099][ T30] audit: type=1400 audit(2000001343.211:45007): avc: denied { open } for pid=32042 comm="syz.0.5640" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=1271 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 2593.463736][T32086] netlink: 44 bytes leftover after parsing attributes in process `syz.5.5653'. [ 2593.482686][T32086] netlink: 59 bytes leftover after parsing attributes in process `syz.5.5653'. [ 2593.493654][T32086] netlink: 59 bytes leftover after parsing attributes in process `syz.5.5653'. [ 2593.666453][T32093] 9pnet_fd: Insufficient options for proto=fd [ 2594.503089][T32103] block nbd3: shutting down sockets [ 2594.690129][T32109] netlink: 32 bytes leftover after parsing attributes in process `syz.1.5655'. [ 2595.038774][ T5903] usb 4-1: new high-speed USB device number 93 using dummy_hcd [ 2595.231301][ T5903] usb 4-1: New USB device found, idVendor=0cf3, idProduct=9375, bcdDevice=1a.9e [ 2595.240986][ T5903] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2595.287502][ T5903] usb 4-1: config 0 descriptor?? [ 2595.392685][ T30] kauditd_printk_skb: 260 callbacks suppressed [ 2595.392701][ T30] audit: type=1400 audit(2000001348.161:45268): avc: denied { recv } for pid=9930 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2595.424820][ C1] vkms_vblank_simulate: vblank timer overrun [ 2595.458360][ T30] audit: type=1400 audit(2000001348.191:45269): avc: denied { read write } for pid=32119 comm="syz.2.5663" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2595.536607][ T30] audit: type=1400 audit(2000001348.191:45270): avc: denied { open } for pid=32119 comm="syz.2.5663" path="/dev/raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2595.631853][ T30] audit: type=1400 audit(2000001348.191:45271): avc: denied { ioctl } for pid=32119 comm="syz.2.5663" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2595.656908][ C1] vkms_vblank_simulate: vblank timer overrun [ 2595.671093][T29492] usb 3-1: new high-speed USB device number 113 using dummy_hcd [ 2595.796941][ T5903] ath6kl: Unsupported hardware version: 0x0 [ 2595.861308][ T5903] ath6kl: Failed to init ath6kl core: -22 [ 2595.870796][ T5903] ath6kl_usb 4-1:0.0: probe with driver ath6kl_usb failed with error -22 [ 2595.928240][ T30] audit: type=1400 audit(2000001348.201:45272): avc: denied { ioctl } for pid=32119 comm="syz.2.5663" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2595.953374][ C1] vkms_vblank_simulate: vblank timer overrun [ 2595.984870][T29492] usb 3-1: config 27 interface 0 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7 [ 2595.992654][ T30] audit: type=1400 audit(2000001348.231:45273): avc: denied { create } for pid=32121 comm="syz.5.5664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2596.017081][T29492] usb 3-1: config 27 interface 0 altsetting 0 bulk endpoint 0xB has invalid maxpacket 47 [ 2596.017122][T29492] usb 3-1: New USB device found, idVendor=0582, idProduct=0014, bcdDevice=bb.9d [ 2596.017145][T29492] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2596.141196][ T30] audit: type=1400 audit(2000001348.241:45274): avc: denied { recv } for pid=6104 comm="kworker/u8:9" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2596.168152][ T30] audit: type=1400 audit(2000001348.251:45275): avc: denied { write } for pid=32121 comm="syz.5.5664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2596.188691][ C1] vkms_vblank_simulate: vblank timer overrun [ 2596.712659][ T30] audit: type=1400 audit(2000001348.251:45276): avc: denied { read } for pid=32121 comm="syz.5.5664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2596.745376][T32120] raw-gadget.1 gadget.2: fail, usb_ep_enable returned -22 [ 2596.754553][T28891] usb 4-1: USB disconnect, device number 93 [ 2596.878951][T29492] usb 3-1: Quirk or no altset; falling back to MIDI 1.0 [ 2596.895544][ T30] audit: type=1400 audit(2000001348.261:45277): avc: denied { ioctl } for pid=32121 comm="syz.5.5664" path="socket:[98857]" dev="sockfs" ino=98857 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2597.095840][T32134] usb 3-1: USB disconnect, device number 113 [ 2597.266509][T32145] netlink: 32 bytes leftover after parsing attributes in process `syz.1.5669'. [ 2598.054754][T32163] use of bytesused == 0 is deprecated and will be removed in the future, [ 2598.068376][T32163] use the actual size instead. [ 2599.389463][T32160] netlink: 32 bytes leftover after parsing attributes in process `syz.0.5675'. [ 2600.652789][ T30] kauditd_printk_skb: 249 callbacks suppressed [ 2600.652807][ T30] audit: type=1400 audit(2000001353.231:45527): avc: denied { create } for pid=32192 comm="syz.3.5688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 2600.854734][ T30] audit: type=1400 audit(2000001353.231:45528): avc: denied { prog_load } for pid=32192 comm="syz.3.5688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2601.118638][ T30] audit: type=1400 audit(2000001353.231:45529): avc: denied { bpf } for pid=32192 comm="syz.3.5688" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2601.139327][ C0] vkms_vblank_simulate: vblank timer overrun [ 2601.148968][ T30] audit: type=1400 audit(2000001353.231:45530): avc: denied { perfmon } for pid=32192 comm="syz.3.5688" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2601.184324][ T30] audit: type=1400 audit(2000001353.231:45531): avc: denied { bpf } for pid=32192 comm="syz.3.5688" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2601.205034][ C0] vkms_vblank_simulate: vblank timer overrun [ 2601.221645][ T30] audit: type=1400 audit(2000001353.231:45532): avc: denied { prog_run } for pid=32192 comm="syz.3.5688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2601.242200][ T30] audit: type=1400 audit(2000001353.231:45533): avc: denied { read write } for pid=5837 comm="syz-executor" name="loop0" dev="devtmpfs" ino=3445 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2601.268029][ T30] audit: type=1400 audit(2000001353.231:45534): avc: denied { open } for pid=5837 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=3445 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2601.292457][ T30] audit: type=1400 audit(2000001353.231:45535): avc: denied { ioctl } for pid=5837 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=3445 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2601.328152][ T30] audit: type=1400 audit(2000001353.241:45536): avc: denied { execmem } for pid=32192 comm="syz.3.5688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2601.542967][T32214] netlink: 28 bytes leftover after parsing attributes in process `syz.2.5695'. [ 2601.558541][T32214] netlink: 'syz.2.5695': attribute type 7 has an invalid length. [ 2601.567544][T32214] netlink: 'syz.2.5695': attribute type 8 has an invalid length. [ 2601.582817][T32214] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5695'. [ 2605.660845][ T30] kauditd_printk_skb: 242 callbacks suppressed [ 2605.660857][ T30] audit: type=1400 audit(2000001358.421:45779): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2605.692088][ C0] vkms_vblank_simulate: vblank timer overrun [ 2605.766449][ T30] audit: type=1400 audit(2000001358.511:45780): avc: denied { read write } for pid=5837 comm="syz-executor" name="loop0" dev="devtmpfs" ino=3445 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2605.790805][ C0] vkms_vblank_simulate: vblank timer overrun [ 2605.808395][ T30] audit: type=1400 audit(2000001358.511:45781): avc: denied { open } for pid=5837 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=3445 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2605.894193][ T30] audit: type=1400 audit(2000001358.511:45782): avc: denied { ioctl } for pid=5837 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=3445 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2606.061143][ T30] audit: type=1400 audit(2000001358.531:45783): avc: denied { read write } for pid=5828 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2606.103797][ T30] audit: type=1400 audit(2000001358.531:45784): avc: denied { open } for pid=5828 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2606.226964][ T30] audit: type=1400 audit(2000001358.571:45786): avc: denied { read write } for pid=5834 comm="syz-executor" name="loop1" dev="devtmpfs" ino=3453 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2606.461225][ T30] audit: type=1400 audit(2000001358.571:45787): avc: denied { open } for pid=5834 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=3453 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2606.518861][ T30] audit: type=1400 audit(2000001358.571:45788): avc: denied { ioctl } for pid=5834 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=3453 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2606.588250][ T30] audit: type=1400 audit(2000001358.531:45785): avc: denied { ioctl } for pid=5828 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=649 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2609.628501][T29492] usb 3-1: new high-speed USB device number 114 using dummy_hcd [ 2609.828987][T29492] usb 3-1: Using ep0 maxpacket: 8 [ 2609.986923][T29492] usb 3-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 2610.153949][T29492] usb 3-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 2610.190483][T29492] usb 3-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 2610.201741][T29492] usb 3-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 2610.215209][T29492] usb 3-1: New USB device found, idVendor=ee8d, idProduct=db1a, bcdDevice=61.23 [ 2610.230051][T29492] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2610.281139][T32341] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5736'. [ 2610.478459][T29492] usb 3-1: usb_control_msg returned -32 [ 2610.489344][T29492] usbtmc 3-1:16.0: can't read capabilities [ 2610.744541][ T30] kauditd_printk_skb: 288 callbacks suppressed [ 2610.744557][ T30] audit: type=1400 audit(2000001363.501:46077): avc: denied { prog_load } for pid=32342 comm="syz.0.5737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2610.769920][ C0] vkms_vblank_simulate: vblank timer overrun [ 2610.880071][ T30] audit: type=1400 audit(2000001363.501:46078): avc: denied { bpf } for pid=32342 comm="syz.0.5737" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2610.916573][ T30] audit: type=1400 audit(2000001363.511:46079): avc: denied { create } for pid=32342 comm="syz.0.5737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2610.939893][ T30] audit: type=1400 audit(2000001363.511:46080): avc: denied { read } for pid=32342 comm="syz.0.5737" dev="nsfs" ino=4026533197 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2610.961358][ T30] audit: type=1400 audit(2000001363.511:46081): avc: denied { open } for pid=32342 comm="syz.0.5737" path="net:[4026533197]" dev="nsfs" ino=4026533197 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2610.987229][ T30] audit: type=1400 audit(2000001363.511:46082): avc: denied { create } for pid=32342 comm="syz.0.5737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 2611.112084][ T30] audit: type=1400 audit(2000001363.511:46083): avc: denied { read } for pid=32342 comm="syz.0.5737" dev="nsfs" ino=4026533197 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2611.138487][ T30] audit: type=1400 audit(2000001363.511:46084): avc: denied { open } for pid=32342 comm="syz.0.5737" path="net:[4026533197]" dev="nsfs" ino=4026533197 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2611.162265][ T30] audit: type=1400 audit(2000001363.511:46085): avc: denied { create } for pid=32342 comm="syz.0.5737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 2611.182714][ T30] audit: type=1400 audit(2000001363.511:46086): avc: denied { connect } for pid=32342 comm="syz.0.5737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 2611.298552][T32358] 9pnet_fd: Insufficient options for proto=fd [ 2612.822065][T29492] usb 3-1: USB disconnect, device number 114 [ 2613.148620][T32134] usb 4-1: new high-speed USB device number 94 using dummy_hcd [ 2613.378610][T32134] usb 4-1: too many configurations: 9, using maximum allowed: 8 [ 2613.413596][T32134] usb 4-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 2613.495357][T32134] usb 4-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 2613.525701][T32134] usb 4-1: config 0 interface 0 has no altsetting 0 [ 2613.544248][T32134] usb 4-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 2613.793840][T32134] usb 4-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 2613.872858][T32134] usb 4-1: config 0 interface 0 has no altsetting 0 [ 2614.027494][T32134] usb 4-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 2614.068790][T32134] usb 4-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 2614.189238][T32134] usb 4-1: config 0 interface 0 has no altsetting 0 [ 2614.197834][T32134] usb 4-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 2614.211349][T32134] usb 4-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 2614.232557][T32134] usb 4-1: config 0 interface 0 has no altsetting 0 [ 2614.240617][T32134] usb 4-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 2614.258268][T32134] usb 4-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 2614.287968][T32134] usb 4-1: config 0 interface 0 has no altsetting 0 [ 2614.299478][T32134] usb 4-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 2614.769739][T32134] usb 4-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 2614.781867][T32134] usb 4-1: config 0 interface 0 has no altsetting 0 [ 2614.791807][T32134] usb 4-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 2614.800948][T32134] usb 4-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 2614.813010][T32134] usb 4-1: config 0 interface 0 has no altsetting 0 [ 2614.827510][T32134] usb 4-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 2615.188433][T32134] usb 4-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 2615.199455][T32134] usb 4-1: config 0 interface 0 has no altsetting 0 [ 2615.213438][T32134] usb 4-1: New USB device found, idVendor=0c45, idProduct=1010, bcdDevice=49.8e [ 2615.222971][T32134] usb 4-1: New USB device strings: Mfr=41, Product=64, SerialNumber=168 [ 2615.231575][T32134] usb 4-1: Product: syz [ 2615.237799][T32134] usb 4-1: Manufacturer: syz [ 2615.258421][T32134] usb 4-1: SerialNumber: syz [ 2615.317037][T32134] usb 4-1: config 0 descriptor?? [ 2615.492286][T32134] yurex 4-1:0.0: USB YUREX device now attached to Yurex #0 [ 2615.771973][ T30] kauditd_printk_skb: 214 callbacks suppressed [ 2615.771989][ T30] audit: type=1400 audit(2000001368.541:46301): avc: denied { recv } for pid=32373 comm="syz.0.5742" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2615.899527][ T30] audit: type=1400 audit(2000001368.581:46302): avc: denied { read write } for pid=5834 comm="syz-executor" name="loop1" dev="devtmpfs" ino=3453 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2615.949059][T32134] usb 4-1: USB disconnect, device number 94 [ 2615.983383][T32134] yurex 4-1:0.0: USB YUREX #0 now disconnected [ 2616.006699][ T30] audit: type=1400 audit(2000001368.581:46303): avc: denied { open } for pid=5834 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=3453 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2616.047207][ T30] audit: type=1400 audit(2000001368.581:46304): avc: denied { ioctl } for pid=5834 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=3453 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2616.072949][ C0] vkms_vblank_simulate: vblank timer overrun [ 2616.095003][ T30] audit: type=1400 audit(2000001368.601:46305): avc: denied { recv } for pid=29151 comm="kworker/u8:7" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2616.111991][T32423] loop2: detected capacity change from 0 to 7 [ 2616.120753][ C0] vkms_vblank_simulate: vblank timer overrun [ 2616.145179][T31706] Dev loop2: unable to read RDB block 7 [ 2616.158368][T31706] loop2: AHDI p1 p2 p3 [ 2616.162560][T31706] loop2: partition table partially beyond EOD, truncated [ 2616.183216][ T30] audit: type=1400 audit(2000001368.641:46306): avc: denied { create } for pid=32415 comm="syz.5.5754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2616.203026][ C0] vkms_vblank_simulate: vblank timer overrun [ 2616.218519][T31706] loop2: p1 start 1601398130 is beyond EOD, truncated [ 2616.229883][T31706] loop2: p2 start 1702059890 is beyond EOD, truncated [ 2616.258909][T32423] Dev loop2: unable to read RDB block 7 [ 2616.265114][ T30] audit: type=1400 audit(2000001368.651:46307): avc: denied { prog_load } for pid=32415 comm="syz.5.5754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2616.270354][T32423] loop2: AHDI p1 p2 p3 [ 2616.303085][T32423] loop2: partition table partially beyond EOD, truncated [ 2616.313169][ T30] audit: type=1400 audit(2000001368.651:46308): avc: denied { bpf } for pid=32415 comm="syz.5.5754" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2616.318467][T32423] loop2: p1 start 1601398130 is beyond EOD, truncated [ 2616.360304][ T30] audit: type=1400 audit(2000001368.661:46309): avc: denied { perfmon } for pid=32415 comm="syz.5.5754" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2616.391788][T32423] loop2: p2 start 1702059890 is beyond EOD, truncated [ 2616.423288][ T30] audit: type=1400 audit(2000001368.661:46310): avc: denied { prog_run } for pid=32415 comm="syz.5.5754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2616.461721][T31706] udevd[31706]: symlink '../../loop2' '/dev/disk/by-diskseq/102.tmp-b7:2' failed: Read-only file system [ 2616.537979][T31706] udevd[31706]: symlink '../../loop2' '/dev/disk/by-diskseq/102.tmp-b7:2' failed: Read-only file system [ 2617.488242][T32434] 9pnet_fd: Insufficient options for proto=fd [ 2617.594176][T31706] udevd[31706]: symlink '../../loop2' '/dev/disk/by-diskseq/102.tmp-b7:2' failed: Read-only file system [ 2617.753359][T31706] udevd[31706]: symlink '../../loop2' '/dev/disk/by-diskseq/102.tmp-b7:2' failed: Read-only file system [ 2617.923055][T31706] udevd[31706]: symlink '../../loop2' '/dev/disk/by-diskseq/102.tmp-b7:2' failed: Read-only file system [ 2619.325114][T32474] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5772'. [ 2619.473037][T32477] netlink: 27 bytes leftover after parsing attributes in process `syz.3.5773'. [ 2619.541855][T32479] 9pnet_fd: Insufficient options for proto=fd [ 2620.050949][T32494] 9pnet_fd: Insufficient options for proto=fd [ 2620.825870][ T30] kauditd_printk_skb: 312 callbacks suppressed [ 2620.825880][ T30] audit: type=1400 audit(2000001373.591:46623): avc: denied { search } for pid=32507 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2620.896929][ T30] audit: type=1400 audit(2000001373.631:46624): avc: denied { read } for pid=32507 comm="cmp" name="resolv.conf" dev="tmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2620.958391][ T30] audit: type=1400 audit(2000001373.631:46625): avc: denied { open } for pid=32507 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2621.063938][T31706] udevd[31706]: symlink '../../loop2' '/dev/disk/by-diskseq/103.tmp-b7:2' failed: Read-only file system [ 2621.093919][ T30] audit: type=1400 audit(2000001373.631:46626): avc: denied { search } for pid=32507 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2621.154139][ T30] audit: type=1400 audit(2000001373.631:46627): avc: denied { search } for pid=32507 comm="cmp" name="dhcpcd" dev="tmpfs" ino=1839 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2621.227212][ T30] audit: type=1400 audit(2000001373.631:46628): avc: denied { search } for pid=32507 comm="cmp" name="hook-state" dev="tmpfs" ino=1843 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2621.260541][T31706] udevd[31706]: symlink '../../loop2' '/dev/disk/by-diskseq/103.tmp-b7:2' failed: Read-only file system [ 2621.281999][ T30] audit: type=1400 audit(2000001373.631:46629): avc: denied { read } for pid=32507 comm="cmp" name="resolv.conf.wlan9.link" dev="tmpfs" ino=15847 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2621.305265][ C0] vkms_vblank_simulate: vblank timer overrun [ 2621.366544][ T30] audit: type=1400 audit(2000001373.631:46630): avc: denied { open } for pid=32507 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.wlan9.link" dev="tmpfs" ino=15847 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2621.391850][ C0] vkms_vblank_simulate: vblank timer overrun [ 2621.449746][ T30] audit: type=1400 audit(2000001373.631:46631): avc: denied { getattr } for pid=32507 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2621.472421][ C0] vkms_vblank_simulate: vblank timer overrun [ 2621.484222][ T30] audit: type=1400 audit(2000001373.691:46632): avc: denied { create } for pid=32505 comm="syz.2.5779" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2621.548741][T31706] udevd[31706]: symlink '../../loop2' '/dev/disk/by-diskseq/103.tmp-b7:2' failed: Read-only file system [ 2621.719087][T31706] udevd[31706]: symlink '../../loop2' '/dev/disk/by-diskseq/103.tmp-b7:2' failed: Read-only file system [ 2622.787663][T31706] udevd[31706]: symlink '../../loop2' '/dev/disk/by-diskseq/103.tmp-b7:2' failed: Read-only file system [ 2623.088573][T24237] usb 3-1: new high-speed USB device number 115 using dummy_hcd [ 2623.336527][T24237] usb 3-1: Using ep0 maxpacket: 32 [ 2623.356170][T24237] usb 3-1: New USB device found, idVendor=0fd9, idProduct=0025, bcdDevice=29.40 [ 2623.371479][T24237] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2623.390699][T24237] usb 3-1: config 0 descriptor?? [ 2623.765838][T24237] dvb-usb: found a 'Elgato EyeTV Sat' in warm state. [ 2623.846420][T24237] dvb-usb: will pass the complete MPEG2 transport stream to the software demuxer. [ 2623.883124][T24237] dvbdev: DVB: registering new adapter (Elgato EyeTV Sat) [ 2623.912045][T24237] usb 3-1: media controller created [ 2623.957195][T24237] dvbdev: dvb_create_media_entity: media entity 'dvb-demux' registered. [ 2623.957766][T32556] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5794'. [ 2624.017856][T24237] az6027: usb out operation failed. (-71) [ 2624.039659][T24237] az6027: usb out operation failed. (-71) [ 2624.045397][T24237] stb0899_attach: Driver disabled by Kconfig [ 2624.052347][T24237] az6027: no front-end attached [ 2624.052347][T24237] [ 2624.062475][T24237] az6027: usb out operation failed. (-71) [ 2624.068208][T24237] dvb-usb: no frontend was attached by 'Elgato EyeTV Sat' [ 2624.153777][T24237] input: IR-receiver inside an USB DVB receiver as /devices/platform/dummy_hcd.2/usb3/3-1/input/input48 [ 2624.197313][T24237] dvb-usb: schedule remote query interval to 400 msecs. [ 2624.229092][T24237] dvb-usb: Elgato EyeTV Sat successfully initialized and connected. [ 2624.271476][T24237] usb 3-1: USB disconnect, device number 115 [ 2624.625650][T24237] dvb-usb: Elgato EyeTV Sat successfully deinitialized and disconnected. [ 2624.650993][T31706] udevd[31706]: symlink '../../loop2' '/dev/disk/by-diskseq/103.tmp-b7:2' failed: Read-only file system [ 2624.759183][T32573] netlink: 'syz.2.5802': attribute type 29 has an invalid length. [ 2624.770893][T32573] netlink: 'syz.2.5802': attribute type 29 has an invalid length. [ 2624.841547][T31706] udevd[31706]: symlink '../../loop2' '/dev/disk/by-diskseq/103.tmp-b7:2' failed: Read-only file system [ 2624.931950][T32574] 9pnet_fd: Insufficient options for proto=fd [ 2625.088228][T32578] 9pnet_fd: Insufficient options for proto=fd [ 2625.208603][T24237] usb 3-1: new high-speed USB device number 116 using dummy_hcd [ 2625.899303][ T30] kauditd_printk_skb: 294 callbacks suppressed [ 2625.899318][ T30] audit: type=1400 audit(2000001378.671:46927): avc: denied { recv } for pid=32575 comm="syz.2.5804" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2625.968458][T24237] usb 3-1: Using ep0 maxpacket: 16 [ 2625.976752][T24237] usb 3-1: New USB device found, idVendor=2137, idProduct=0001, bcdDevice=2a.35 [ 2625.999092][T24237] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2626.058244][T24237] usb 3-1: Product: syz [ 2626.084444][T24237] usb 3-1: Manufacturer: syz [ 2626.089175][ T30] audit: type=1400 audit(2000001378.671:46928): avc: denied { recv } for pid=32575 comm="syz.2.5804" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2626.121279][T24237] usb 3-1: SerialNumber: syz [ 2626.176856][T24237] usb 3-1: config 0 descriptor?? [ 2626.220526][ T30] audit: type=1400 audit(2000001378.671:46929): avc: denied { recv } for pid=32575 comm="syz.2.5804" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2626.458707][T24237] as10x_usb: device has been detected [ 2626.468821][T24237] dvbdev: DVB: registering new adapter (Sky IT Digital Key (green led)) [ 2627.032066][T24237] usb 3-1: DVB: registering adapter 1 frontend 0 (Sky IT Digital Key (green led))... [ 2627.079964][ T30] audit: type=1400 audit(2000001378.671:46930): avc: denied { ioctl } for pid=32575 comm="syz.2.5804" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2627.105360][ T30] audit: type=1400 audit(2000001378.671:46931): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2627.159143][T24237] as10x_usb: error during firmware upload part1 [ 2627.168624][ T30] audit: type=1400 audit(2000001378.701:46932): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2627.196763][ T30] audit: type=1400 audit(2000001378.701:46933): avc: denied { read write open } for pid=5825 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2627.264492][ T30] audit: type=1400 audit(2000001378.701:46934): avc: denied { ioctl } for pid=5825 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2627.290306][ T30] audit: type=1400 audit(2000001378.741:46935): avc: denied { ioctl } for pid=32575 comm="syz.2.5804" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2627.397045][ T30] audit: type=1400 audit(2000001378.781:46936): avc: denied { recv } for pid=32564 comm="syz.5.5799" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2627.427838][T24237] Registered device Sky IT Digital Key (green led) [ 2627.544938][T24237] usb 3-1: USB disconnect, device number 116 [ 2627.796464][T24237] Unregistered device Sky IT Digital Key (green led) [ 2627.799029][T24237] as10x_usb: device has been disconnected [ 2627.894817][T32148] udevd[32148]: symlink '../../loop2' '/dev/disk/by-diskseq/103.tmp-b7:2' failed: Read-only file system [ 2628.041948][T31706] udevd[31706]: symlink '../../loop2' '/dev/disk/by-diskseq/103.tmp-b7:2' failed: Read-only file system [ 2628.467544][T31706] udevd[31706]: symlink '../../loop2' '/dev/disk/by-diskseq/103.tmp-b7:2' failed: Read-only file system [ 2628.523276][T32614] netlink: 24 bytes leftover after parsing attributes in process `syz.2.5813'. [ 2628.541496][T32614] netlink: 'syz.2.5813': attribute type 1 has an invalid length. [ 2628.668501][T32614] netlink: 'syz.2.5813': attribute type 2 has an invalid length. [ 2628.676265][T32614] netlink: 16 bytes leftover after parsing attributes in process `syz.2.5813'. [ 2629.071589][T31706] udevd[31706]: symlink '../../loop2' '/dev/disk/by-diskseq/103.tmp-b7:2' failed: Read-only file system [ 2629.438424][T28891] usb 3-1: new high-speed USB device number 117 using dummy_hcd [ 2630.061399][T28891] usb 3-1: Using ep0 maxpacket: 8 [ 2630.068846][T28891] usb 3-1: config index 0 descriptor too short (expected 5924, got 36) [ 2630.168408][T28891] usb 3-1: config 250 has an invalid interface number: 228 but max is -1 [ 2630.199548][T28891] usb 3-1: config 250 has 1 interface, different from the descriptor's value: 0 [ 2630.251343][T28891] usb 3-1: config 250 has no interface number 0 [ 2630.275274][T28891] usb 3-1: config 250 interface 228 altsetting 255 endpoint 0x1 has invalid maxpacket 65280, setting to 1024 [ 2630.313294][T28891] usb 3-1: config 250 interface 228 altsetting 255 bulk endpoint 0x1 has invalid maxpacket 1024 [ 2630.338433][T28891] usb 3-1: config 250 interface 228 altsetting 255 endpoint 0x82 has invalid wMaxPacketSize 0 [ 2630.367737][T28891] usb 3-1: config 250 interface 228 altsetting 255 bulk endpoint 0x82 has invalid maxpacket 0 [ 2630.385407][T28891] usb 3-1: config 250 interface 228 altsetting 255 has 2 endpoint descriptors, different from the interface descriptor's value: 17 [ 2630.493968][T28891] usb 3-1: config 250 interface 228 has no altsetting 0 [ 2630.504053][T28891] usb 3-1: New USB device found, idVendor=0525, idProduct=d292, bcdDevice= 0.07 [ 2630.514802][T28891] usb 3-1: New USB device strings: Mfr=0, Product=106, SerialNumber=59 [ 2630.523980][T28891] usb 3-1: Product: syz [ 2630.528200][T28891] usb 3-1: SerialNumber: syz [ 2630.542189][T28891] hub 3-1:250.228: bad descriptor, ignoring hub [ 2630.560273][T28891] hub 3-1:250.228: probe with driver hub failed with error -5 [ 2630.612321][T32651] 9pnet_fd: Insufficient options for proto=fd [ 2630.785238][T28891] usblp 3-1:250.228: usblp0: USB Bidirectional printer dev 117 if 228 alt 255 proto 3 vid 0x0525 pid 0xD292 [ 2630.939785][ T30] kauditd_printk_skb: 269 callbacks suppressed [ 2630.939803][ T30] audit: type=1400 audit(2000001383.621:47206): avc: denied { execmem } for pid=32654 comm="syz.0.5825" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2631.012487][ T30] audit: type=1400 audit(2000001383.781:47207): avc: denied { recv } for pid=5834 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2631.090677][ T30] audit: type=1400 audit(2000001383.811:47208): avc: denied { read write } for pid=5834 comm="syz-executor" name="loop1" dev="devtmpfs" ino=3453 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2631.121994][T28891] usb 3-1: USB disconnect, device number 117 [ 2631.155257][T28891] usblp0: removed [ 2631.183372][T32659] 9pnet_fd: Insufficient options for proto=fd [ 2631.268352][ T30] audit: type=1400 audit(2000001383.811:47209): avc: denied { open } for pid=5834 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=3453 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2631.280337][ T12] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 2631.308910][ T30] audit: type=1400 audit(2000001383.811:47210): avc: denied { ioctl } for pid=5834 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=3453 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2631.418346][ T30] audit: type=1400 audit(2000001383.951:47211): avc: denied { mounton } for pid=32654 comm="syz.0.5825" path="/1137" dev="tmpfs" ino=6225 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2631.510123][ T30] audit: type=1400 audit(2000001384.111:47212): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2631.652899][T31706] udevd[31706]: symlink '../../loop2' '/dev/disk/by-diskseq/103.tmp-b7:2' failed: Read-only file system [ 2631.716759][T32665] netlink: 'syz.2.5829': attribute type 11 has an invalid length. [ 2631.773853][T32665] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5829'. [ 2631.800551][ T30] audit: type=1400 audit(2000001384.111:47213): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2631.825665][ C0] vkms_vblank_simulate: vblank timer overrun [ 2631.926239][ T30] audit: type=1400 audit(2000001384.141:47214): avc: denied { read write } for pid=5834 comm="syz-executor" name="loop1" dev="devtmpfs" ino=3453 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2631.929619][T32665] netlink: 'syz.2.5829': attribute type 11 has an invalid length. [ 2631.998062][ T30] audit: type=1400 audit(2000001384.141:47215): avc: denied { open } for pid=5834 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=3453 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2632.075991][T32665] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5829'. [ 2633.610981][T31706] udevd[31706]: symlink '../../loop2' '/dev/disk/by-diskseq/103.tmp-b7:2' failed: Read-only file system [ 2633.773473][T31706] udevd[31706]: symlink '../../loop2' '/dev/disk/by-diskseq/103.tmp-b7:2' failed: Read-only file system [ 2634.773910][T31706] udevd[31706]: symlink '../../loop2' '/dev/disk/by-diskseq/103.tmp-b7:2' failed: Read-only file system [ 2634.887840][T32709] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5839'. [ 2635.648747][ C0] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 2635.998445][ T30] kauditd_printk_skb: 224 callbacks suppressed [ 2635.998464][ T30] audit: type=1400 audit(2000001388.181:47440): avc: denied { prog_load } for pid=32712 comm="syz.1.5842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2636.375267][T32720] 9pnet_fd: Insufficient options for proto=fd [ 2636.404501][ T30] audit: type=1400 audit(2000001388.181:47441): avc: denied { bpf } for pid=32712 comm="syz.1.5842" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2636.815588][T32736] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2636.822241][T32736] audit: audit_lost=294 audit_rate_limit=0 audit_backlog_limit=64 [ 2636.830120][T32736] audit: backlog limit exceeded [ 2636.836128][T32736] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2636.842666][T32736] audit: audit_lost=295 audit_rate_limit=0 audit_backlog_limit=64 [ 2636.850663][T32736] audit: backlog limit exceeded [ 2637.033941][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2637.040510][ C0] audit: audit_lost=296 audit_rate_limit=0 audit_backlog_limit=64 [ 2640.420474][ T308] netlink: 'syz.0.5855': attribute type 29 has an invalid length. [ 2640.452614][ T308] netlink: 'syz.0.5855': attribute type 29 has an invalid length. [ 2640.516906][ T308] netlink: 500 bytes leftover after parsing attributes in process `syz.0.5855'. [ 2640.577190][T31706] udevd[31706]: symlink '../../loop2' '/dev/disk/by-diskseq/103.tmp-b7:2' failed: Read-only file system [ 2641.039486][ T30] kauditd_printk_skb: 262 callbacks suppressed [ 2641.039516][ T30] audit: type=1400 audit(2000001393.811:47679): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2641.318147][ T30] audit: type=1400 audit(2000001393.971:47680): avc: denied { create } for pid=313 comm="syz.0.5858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 2641.339420][ T30] audit: type=1400 audit(2000001393.991:47681): avc: denied { read write } for pid=318 comm="syz.1.5859" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2641.513308][ T30] audit: type=1400 audit(2000001393.991:47682): avc: denied { open } for pid=318 comm="syz.1.5859" path="/dev/raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2641.548520][ T30] audit: type=1400 audit(2000001393.991:47683): avc: denied { ioctl } for pid=318 comm="syz.1.5859" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2641.638323][ T30] audit: type=1400 audit(2000001393.991:47684): avc: denied { ioctl } for pid=318 comm="syz.1.5859" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2641.729905][ T30] audit: type=1400 audit(2000001394.001:47685): avc: denied { execmem } for pid=313 comm="syz.0.5858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2641.853503][T31706] udevd[31706]: symlink '../../loop2' '/dev/disk/by-diskseq/103.tmp-b7:2' failed: Read-only file system [ 2641.919851][ T30] audit: type=1400 audit(2000001394.161:47686): avc: denied { allowed } for pid=313 comm="syz.0.5858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2641.944500][ T30] audit: type=1400 audit(2000001394.171:47687): avc: denied { create } for pid=313 comm="syz.0.5858" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2641.979160][ T30] audit: type=1400 audit(2000001394.171:47688): avc: denied { map } for pid=313 comm="syz.0.5858" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=101035 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2642.188482][T28891] usb 3-1: new high-speed USB device number 118 using dummy_hcd [ 2642.370481][T28891] usb 3-1: config 0 has an invalid interface number: 98 but max is 0 [ 2642.432717][T28891] usb 3-1: config 0 has no interface number 0 [ 2642.830190][T28891] usb 3-1: config 0 interface 98 has no altsetting 0 [ 2642.913638][T28891] usb 3-1: New USB device found, idVendor=1110, idProduct=9024, bcdDevice=db.24 [ 2642.974532][T28891] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2643.039875][T28891] usb 3-1: Product: syz [ 2643.057685][T28891] usb 3-1: Manufacturer: syz [ 2643.098076][T28891] usb 3-1: SerialNumber: syz [ 2643.192279][T28891] usb 3-1: config 0 descriptor?? [ 2643.729060][ C0] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 2644.122982][T28891] usb 3-1: [ueagle-atm] ADSL device founded vid (0X1110) pid (0X9024) Rev (0XDB24): Eagle II [ 2644.289825][ T350] 9pnet_fd: Insufficient options for proto=fd [ 2644.803689][T32148] udevd[32148]: symlink '../../loop2' '/dev/disk/by-diskseq/103.tmp-b7:2' failed: Read-only file system [ 2644.900132][T32148] udevd[32148]: symlink '../../loop2' '/dev/disk/by-diskseq/103.tmp-b7:2' failed: Read-only file system [ 2645.114361][T28891] usb 3-1: [ueagle-atm] pre-firmware device, uploading firmware [ 2645.122492][T28891] usb 3-1: [ueagle-atm] loading firmware ueagle-atm/eagleII.fw [ 2645.924578][T32134] usb 3-1: Direct firmware load for ueagle-atm/eagleII.fw failed with error -2 [ 2646.092977][ T30] kauditd_printk_skb: 178 callbacks suppressed [ 2646.092993][ T30] audit: type=1400 audit(2000001398.861:47867): avc: denied { recv } for pid=337 comm="syz.5.5865" saddr=10.128.0.169 src=30006 daddr=10.128.1.175 dest=34326 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2646.125678][T32134] usb 3-1: Falling back to sysfs fallback for: ueagle-atm/eagleII.fw [ 2646.145195][T28891] usb 3-1: USB disconnect, device number 118 [ 2646.175770][T32134] ------------[ cut here ]------------ [ 2646.181611][T32134] WARNING: CPU: 1 PID: 32134 at fs/kernfs/dir.c:537 kernfs_get.part.0+0x6e/0x80 [ 2646.190727][T32134] Modules linked in: [ 2646.194800][T32134] CPU: 1 UID: 0 PID: 32134 Comm: kworker/1:1 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT(full) [ 2646.205216][T32134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 2646.215268][T32134] Workqueue: events request_firmware_work_func [ 2646.221440][T32134] RIP: 0010:kernfs_get.part.0+0x6e/0x80 [ 2646.226972][T32134] Code: 78 2c 5c ff 85 ed 74 1c e8 2f 31 5c ff be 04 00 00 00 48 89 df e8 d2 8c c1 ff f0 ff 03 5b 5d e9 08 bc 29 09 e8 13 31 5c ff 90 <0f> 0b 90 eb d9 48 89 df e8 b5 84 c1 ff eb c0 0f 1f 00 90 90 90 90 [ 2646.246584][T32134] RSP: 0018:ffffc90016a77790 EFLAGS: 00010293 [ 2646.252648][T32134] RAX: 0000000000000000 RBX: ffff888074fd02d0 RCX: ffffffff825fb738 [ 2646.260692][T32134] RDX: ffff888052292440 RSI: ffffffff825fb75d RDI: 0000000000000005 [ 2646.268660][T32134] RBP: 0000000000000000 R08: 0000000000000005 R09: 0000000000000000 [ 2646.276618][T32134] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88806bfd00b0 [ 2646.284584][T32134] R13: ffff888075113cb0 R14: 0000000000000000 R15: ffff888075113ca8 [ 2646.293516][T32134] FS: 0000000000000000(0000) GS:ffff888124820000(0000) knlGS:0000000000000000 [ 2646.302461][T32134] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2646.309053][T32134] CR2: 0000001b2fe1fffc CR3: 000000004b46b000 CR4: 00000000003526f0 [ 2646.317003][T32134] Call Trace: [ 2646.320278][T32134] [ 2646.323201][T32134] kernfs_get+0x1f/0x30 [ 2646.327333][T32134] kobject_add_internal+0x353/0x9b0 [ 2646.332529][T32134] kobject_add+0x16e/0x240 [ 2646.336923][T32134] ? __pfx_kobject_add+0x10/0x10 [ 2646.341863][T32134] get_device_parent+0x399/0x4e0 [ 2646.346783][T32134] device_add+0x1ad/0x1a70 [ 2646.351205][T32134] ? __pfx_device_add+0x10/0x10 [ 2646.356038][T32134] ? __init_waitqueue_head+0xca/0x150 [ 2646.361408][T32134] firmware_fallback_sysfs+0x2ec/0xbe0 [ 2646.366853][T32134] _request_firmware+0xfe9/0x1470 [ 2646.371925][T32134] ? __pfx__request_firmware+0x10/0x10 [ 2646.377367][T32134] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 2646.383172][T32134] ? debug_object_deactivate+0x1ec/0x3a0 [ 2646.388801][T32134] ? finish_task_switch.isra.0+0x89b/0xc10 [ 2646.394589][T32134] request_firmware_work_func+0xea/0x250 [ 2646.400221][T32134] ? __pfx_request_firmware_work_func+0x10/0x10 [ 2646.406445][T32134] ? rcu_is_watching+0x12/0xc0 [ 2646.411225][T32134] process_one_work+0x9cf/0x1b70 [ 2646.416146][T32134] ? __pfx_process_one_work+0x10/0x10 [ 2646.421515][T32134] ? assign_work+0x1a0/0x250 [ 2646.426082][T32134] worker_thread+0x6c8/0xf10 [ 2646.430676][T32134] ? __kthread_parkme+0x19e/0x250 [ 2646.435695][T32134] ? __pfx_worker_thread+0x10/0x10 [ 2646.440797][T32134] kthread+0x3c5/0x780 [ 2646.444841][T32134] ? __pfx_kthread+0x10/0x10 [ 2646.449479][T32134] ? rcu_is_watching+0x12/0xc0 [ 2646.454224][T32134] ? __pfx_kthread+0x10/0x10 [ 2646.458811][T32134] ret_from_fork+0x5d4/0x6f0 [ 2646.463382][T32134] ? __pfx_kthread+0x10/0x10 [ 2646.467946][T32134] ret_from_fork_asm+0x1a/0x30 [ 2646.472713][T32134] [ 2646.475711][T32134] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 2646.482966][T32134] CPU: 1 UID: 0 PID: 32134 Comm: kworker/1:1 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT(full) [ 2646.493349][T32134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 2646.503389][T32134] Workqueue: events request_firmware_work_func [ 2646.509532][T32134] Call Trace: [ 2646.512788][T32134] [ 2646.515705][T32134] dump_stack_lvl+0x3d/0x1f0 [ 2646.520278][T32134] panic+0x71c/0x800 [ 2646.524150][T32134] ? __pfx_panic+0x10/0x10 [ 2646.528546][T32134] ? show_trace_log_lvl+0x29b/0x3e0 [ 2646.533735][T32134] ? check_panic_on_warn+0x1f/0xb0 [ 2646.538826][T32134] ? kernfs_get.part.0+0x6e/0x80 [ 2646.543737][T32134] check_panic_on_warn+0xab/0xb0 [ 2646.548656][T32134] __warn+0xf6/0x3c0 [ 2646.552522][T32134] ? kernfs_get.part.0+0x6e/0x80 [ 2646.557430][T32134] report_bug+0x3c3/0x580 [ 2646.561745][T32134] ? kernfs_get.part.0+0x6e/0x80 [ 2646.566655][T32134] handle_bug+0x184/0x210 [ 2646.570962][T32134] exc_invalid_op+0x17/0x50 [ 2646.575438][T32134] asm_exc_invalid_op+0x1a/0x20 [ 2646.580261][T32134] RIP: 0010:kernfs_get.part.0+0x6e/0x80 [ 2646.585779][T32134] Code: 78 2c 5c ff 85 ed 74 1c e8 2f 31 5c ff be 04 00 00 00 48 89 df e8 d2 8c c1 ff f0 ff 03 5b 5d e9 08 bc 29 09 e8 13 31 5c ff 90 <0f> 0b 90 eb d9 48 89 df e8 b5 84 c1 ff eb c0 0f 1f 00 90 90 90 90 [ 2646.605358][T32134] RSP: 0018:ffffc90016a77790 EFLAGS: 00010293 [ 2646.611399][T32134] RAX: 0000000000000000 RBX: ffff888074fd02d0 RCX: ffffffff825fb738 [ 2646.619343][T32134] RDX: ffff888052292440 RSI: ffffffff825fb75d RDI: 0000000000000005 [ 2646.627286][T32134] RBP: 0000000000000000 R08: 0000000000000005 R09: 0000000000000000 [ 2646.635230][T32134] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88806bfd00b0 [ 2646.643173][T32134] R13: ffff888075113cb0 R14: 0000000000000000 R15: ffff888075113ca8 [ 2646.651124][T32134] ? kernfs_get.part.0+0x48/0x80 [ 2646.656033][T32134] ? kernfs_get.part.0+0x6d/0x80 [ 2646.660945][T32134] kernfs_get+0x1f/0x30 [ 2646.665075][T32134] kobject_add_internal+0x353/0x9b0 [ 2646.670252][T32134] kobject_add+0x16e/0x240 [ 2646.674643][T32134] ? __pfx_kobject_add+0x10/0x10 [ 2646.679573][T32134] get_device_parent+0x399/0x4e0 [ 2646.684488][T32134] device_add+0x1ad/0x1a70 [ 2646.688881][T32134] ? __pfx_device_add+0x10/0x10 [ 2646.693707][T32134] ? __init_waitqueue_head+0xca/0x150 [ 2646.699061][T32134] firmware_fallback_sysfs+0x2ec/0xbe0 [ 2646.704500][T32134] _request_firmware+0xfe9/0x1470 [ 2646.709507][T32134] ? __pfx__request_firmware+0x10/0x10 [ 2646.714958][T32134] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 2646.720754][T32134] ? debug_object_deactivate+0x1ec/0x3a0 [ 2646.726377][T32134] ? finish_task_switch.isra.0+0x89b/0xc10 [ 2646.732168][T32134] request_firmware_work_func+0xea/0x250 [ 2646.737788][T32134] ? __pfx_request_firmware_work_func+0x10/0x10 [ 2646.744010][T32134] ? rcu_is_watching+0x12/0xc0 [ 2646.748754][T32134] process_one_work+0x9cf/0x1b70 [ 2646.753674][T32134] ? __pfx_process_one_work+0x10/0x10 [ 2646.759026][T32134] ? assign_work+0x1a0/0x250 [ 2646.763592][T32134] worker_thread+0x6c8/0xf10 [ 2646.768183][T32134] ? __kthread_parkme+0x19e/0x250 [ 2646.773203][T32134] ? __pfx_worker_thread+0x10/0x10 [ 2646.778314][T32134] kthread+0x3c5/0x780 [ 2646.782359][T32134] ? __pfx_kthread+0x10/0x10 [ 2646.786926][T32134] ? rcu_is_watching+0x12/0xc0 [ 2646.791683][T32134] ? __pfx_kthread+0x10/0x10 [ 2646.796253][T32134] ret_from_fork+0x5d4/0x6f0 [ 2646.800824][T32134] ? __pfx_kthread+0x10/0x10 [ 2646.805388][T32134] ret_from_fork_asm+0x1a/0x30 [ 2646.810134][T32134] [ 2646.813315][T32134] Kernel Offset: disabled [ 2646.817617][T32134] Rebooting in 86400 seconds..