last executing test programs: 7m37.503683052s ago: executing program 1 (id=195): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x100008b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x400000bce) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) memfd_secret(0x80000) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000080)='binder\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, 0x0, 0x0, 0x0) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) 7m33.096347072s ago: executing program 1 (id=202): prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x420000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) landlock_restrict_self(0xffffffffffffffff, 0x0) ioctl$KDFONTOP_SET(0xffffffffffffffff, 0x560a, 0x0) r4 = syz_open_dev$video(&(0x7f00000000c0), 0x7, 0x80040) ioctl$VIDIOC_CROPCAP(r4, 0xc02c563a, 0x0) socket$nl_generic(0x10, 0x3, 0x10) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, 0x0) socket$inet6_sctp(0xa, 0x801, 0x84) 7m31.523188835s ago: executing program 1 (id=207): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x6) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x20000240, 0x20000270, 0x200002a0], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}]}, 0x108) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x24, r4, 0x1, 0x70bd24, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_SCAN_FLAGS={0x8, 0x9e, 0x380b}]}, 0x24}, 0x1, 0x0, 0x0, 0x4014001}, 0x9590f6cc3aa755b6) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44004090}, 0x80) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1000004, 0x10012, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x3fc, 0x0, 0x32}, 0x9c) 7m30.292492784s ago: executing program 1 (id=210): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) sched_setparam(r0, &(0x7f0000000080)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xd25d5000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) lstat(0x0, 0x0) r3 = memfd_create(&(0x7f0000000100)=';e\x00\x00\xa4\xd8\xe0\x9c\x7f9\x8aZ]3N\xbb\xe1^\x9c\xe1\x9b6s$0Y\xf8\x90\x00\x00\x00\x00\xd2~l\xf6\x12\xde\xdd\xd5\x1d\x96\xb0a\xad\xcd\x16\xd8G\xae\xd9DZm\xabO\xad\x11%\x7f`@\x16c\xc0\xb6\x1f\xe3\x00\x1a_\xc7\xbf\xa7T\xbe\x13\x8b\xb3r\x8fL\xe6\xba\xe7\x18\xb4$BIj\xa3\xc9\xc6|\x9b\x88\xddPx\x02I\xde\xe8\xcd\x02\xc1\xedc2\x06\xcbM\xfb\x13jZ\x96\xeej\x9b\xe4XjN\xb9>\xdf3U\r \x8dh8T/h)\x90\xff\x8d\xd9\x89\xab\xf8P\xacYtk\xa3\xed\xfa*8\x13\b\xce\xf8z\xed\xadnz\x96\xa3\x9a9R\xd9]\xe11We\xfe3\xe06\x1a^\x04^\xef\xa3\x0fU\x9b1\xc6J\x83\x9d[\\a\xfd\xdc\xa1\xcd\xbe\x9b\xc5z7\xe8VP\x89\x16MK`\xe5\x137\b\x00\x00\x00\xd5\x01\xea\x98\xe6Z\x95j\xe3\x0ek>\x14\x80\rXS\xce\xf9\x0e\x89\xc4\xc6\x1bOm4Lla\r\xce\x17\xb5r&\xf3\x96\xbc\xc39\xa7\x95\xd9F\x17', 0x0) syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) r4 = syz_open_dev$dri(&(0x7f00000008c0), 0xd21, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r4, 0xc06864a1, &(0x7f00000002c0)={0x0}) r5 = socket(0x2000000000000021, 0x2, 0x2) shutdown(r5, 0x2) keyctl$clear(0x7, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) 7m29.323717607s ago: executing program 1 (id=213): syz_emit_ethernet(0x6e, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, 0x0) r1 = add_key$user(&(0x7f0000000000), 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) r2 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r1, 0xffffffffffffffff, r2, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f00000001c0)={0x4, 0x6}) r3 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r3, 0x110, 0x3) r4 = msgget$private(0x0, 0x70b) msgctl$IPC_RMID(r4, 0x0) socket$inet(0x2, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xa, 0x4, 0x4, 0xc, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='mmap_lock_acquire_returned\x00'}, 0x10) prctl$PR_SET_IO_FLUSHER(0x43, 0x1) 7m27.980552723s ago: executing program 1 (id=217): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x6, 0x7}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x1) read$msr(r0, &(0x7f0000032680)=""/102392, 0x18ff8) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='ip6gre0\x00', 0x10) r2 = dup(r1) write$FUSE_INIT(r2, &(0x7f0000000180)={0x50, 0x0, 0x0, {0x7, 0x29, 0x5, 0x4200, 0x200, 0x2, 0x1, 0x8, 0x0, 0x0, 0x8, 0x6}}, 0x50) openat$dma_heap(0xffffffffffffff9c, 0x0, 0x521002, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @private1}]}, &(0x7f00000002c0)=0x10) getsockopt$bt_hci(r3, 0x84, 0x81, &(0x7f0000000080)=""/4060, &(0x7f00000010c0)=0xfdc) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x2) ioperm(0x0, 0x44, 0x7) syz_open_procfs(0x0, &(0x7f0000000040)='attr/prev\x00') ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001080)=ANY=[@ANYBLOB="02014f4d6ca47dd1185600004c8fe1b10846d78b48bb11091a251ed7000000f4"], 0x10}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 7m12.611551622s ago: executing program 32 (id=217): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x6, 0x7}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x1) read$msr(r0, &(0x7f0000032680)=""/102392, 0x18ff8) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='ip6gre0\x00', 0x10) r2 = dup(r1) write$FUSE_INIT(r2, &(0x7f0000000180)={0x50, 0x0, 0x0, {0x7, 0x29, 0x5, 0x4200, 0x200, 0x2, 0x1, 0x8, 0x0, 0x0, 0x8, 0x6}}, 0x50) openat$dma_heap(0xffffffffffffff9c, 0x0, 0x521002, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @private1}]}, &(0x7f00000002c0)=0x10) getsockopt$bt_hci(r3, 0x84, 0x81, &(0x7f0000000080)=""/4060, &(0x7f00000010c0)=0xfdc) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x2) ioperm(0x0, 0x44, 0x7) syz_open_procfs(0x0, &(0x7f0000000040)='attr/prev\x00') ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001080)=ANY=[@ANYBLOB="02014f4d6ca47dd1185600004c8fe1b10846d78b48bb11091a251ed7000000f4"], 0x10}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 5m52.057922122s ago: executing program 5 (id=387): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @queue}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @control}, {}], 0x54) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, 0x0, &(0x7f0000000200)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(0x3) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/packet\x00') read$FUSE(r3, &(0x7f00000020c0)={0x2020}, 0x2020) io_pgetevents(0x0, 0x6, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xfffffffffffffffe}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8923, &(0x7f0000000040)={'vlan0\x00', 0x40}) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrlimit(0x3, &(0x7f0000000180)) socket$nl_generic(0x10, 0x3, 0x10) syz_open_procfs(0x0, 0x0) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) 5m50.393617678s ago: executing program 5 (id=391): ppoll(&(0x7f00000000c0), 0x2a, 0x0, &(0x7f00000001c0)={[0x2a]}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000540)={'wlan0\x00'}) socket$inet_udp(0x2, 0x2, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xcc) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x5, 0x1000087}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)=0x1400200bce) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x1) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f000001b700)=""/102392, 0x18ff8) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x23894) r4 = openat$userio(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) mknod(&(0x7f0000000540)='./file1\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB="1b7766", @ANYRESHEX=r4]) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000001300)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') write$sndseq(0xffffffffffffffff, 0x0, 0x0) 5m48.081215498s ago: executing program 4 (id=396): syz_emit_ethernet(0x56, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$kcm(0x29, 0x5, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xe67e75e799bb5a7f}, 0xc, 0x0, 0x1, 0x0, 0x0, 0xc000}, 0x4818) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x11e, 0x1, &(0x7f0000000540)=@gcm_256={{}, "dd1f67eeaee232bc", "33dcff273dcda64434083fc81269ec10a61ee1d936119116fc6dfa718b8b5f9a", "15f71a38", "56544408ce8ac9f0"}, 0x38) listen(r1, 0x0) listxattr(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 5m47.106682368s ago: executing program 5 (id=399): ioperm(0x0, 0x8, 0x400000000000008) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x1000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x301, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x28, 0x3, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_ID={0x8}]}], {0x14, 0x10}}, 0x70}}, 0x0) r1 = openat$kvm(0x0, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001200)={0x14, 0x4f, 0x501, 0x0, 0x0, {0x8}}, 0x14}}, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r5 = getpid() sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r6, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r6, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) r8 = syz_open_procfs(0x0, &(0x7f0000000000)='setgroups\x00') write$vhost_msg(r8, &(0x7f0000000840)={0x796e6564, {0x0, 0x0, 0x0}}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000040)=0x9, 0x4) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000005c0)=[{{&(0x7f0000000200)={0x2, 0x4e23, @remote}, 0x10, 0x0}}], 0x1, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4048aecb, &(0x7f0000000080)) 5m46.800247998s ago: executing program 4 (id=401): r0 = syz_open_dev$vim2m(&(0x7f0000000100), 0x7, 0x2) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0cc5605, &(0x7f0000000180)={0x1, @vbi={0x0, 0x0, 0x35314258}}) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@ccm_128={{}, "ad25dda89a2d6247", "a2d292ffdfbb62a9a753a534ebf222dc", "975c82f5", "56eb855e20aa8db9"}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b40)={0x18, 0x10, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYBLOB="da2261875f58323cf5704ca92bdcc7e39a892ad9ce2e9482b397d74faa777043c79850203e844203a9e2442046a6d5429a7a66ed82d75475981032f61c1771fdfdafc95b6573e353000000"], &(0x7f0000000080)='syzkaller\x00', 0x8, 0xac, &(0x7f0000000140)=""/172, 0x41000, 0x48, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x6) kcmp(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setaffinity(0x0, 0x8, &(0x7f0000000740)=0x2) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0x2, 0x4e21, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0xa, 0x0, 0x0, @mcast2}, r6}}, 0x48) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000580)=0x1, r8, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r7, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @remote}, r8}}, 0x48) close(r7) 5m45.958142748s ago: executing program 5 (id=402): io_uring_setup(0x59f1, &(0x7f0000000000)={0x0, 0x4e00, 0x100, 0x21, 0x231}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0b000010000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000da6ceb2f28f59572dc00feffffff00"], 0x50) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0), 0x1, 0x0) pwrite64(r0, 0x0, 0x0, 0x8d6) r1 = getpid() r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000001c0), 0x50000, 0x0) ioctl$MEDIA_REQUEST_IOC_REINIT(r2, 0x7c81, 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000400)={0x2710, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="66bad004ec66baf80cb8e44eda8def66bafc0cb886e90000effdd93ac744240000980000c74424029100c0fe0f01cb0f011c24c74424002b010000c74424020d000000ff2c243e65f3420f0936262626460f01cf260f01c966b8e7008ec867d9e9", 0x61}], 0x1, 0x74, 0x0, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, 0x0}], 0x1, 0x7, 0x0, 0x0) 5m45.220589593s ago: executing program 4 (id=403): r0 = socket$rxrpc(0x21, 0x2, 0x2) sendmsg$inet(r0, 0x0, 0x48000) io_setup(0x8, &(0x7f0000004200)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2, 0x0, 0x1}, 0x18) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r3, &(0x7f0000019680)=""/102392, 0x18ff8) sched_setaffinity(0x0, 0xfffffef7, &(0x7f0000000740)=0x410000002) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x80041285, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) ioctl$SNDCTL_DSP_CHANNELS(0xffffffffffffffff, 0xc0045006, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f00000002c0)=""/223, 0x26, 0xdf, 0x1, 0x0, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) r5 = dup(r4) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000004002, 0x0) r7 = dup(r6) sendfile(r7, r5, 0x0, 0x89ffc) 5m44.309171183s ago: executing program 4 (id=404): bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0xc01c64ae, &(0x7f00000001c0)={0x0, 0x400, 0x1, 0x3, 0x20, 0x4, 0x9d8}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0x44, 0x30, 0x1, 0x0, 0x0, {}, [{0x30, 0x1, [@m_ct={0x2c, 0x2, 0x0, 0x0, {{0x7}, {0x4}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x804}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) sched_setaffinity(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$TCSETA(r3, 0x5406, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000000)=0x17) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040), 0x8002, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) rt_sigqueueinfo(0x0, 0x2, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="18000000", @ANYRES16=r6, @ANYBLOB="05f300000000000000002000000004000380"], 0x18}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r5, 0x40505330, 0x0) 5m41.761514032s ago: executing program 5 (id=407): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)=ANY=[], 0x48) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(0x0, r4) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/power/pm_trace', 0x169282, 0x19c) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000004c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, @void, @value}, 0x94) fsopen(&(0x7f0000000040)='binfmt_misc\x00', 0x1) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in=@rand_addr=0x64010102, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x2000000000000}, 0x0, 0x0, 0x1}, [@tmpl={0x44, 0x5, [{{@in=@empty, 0xfffffffe, 0x3c}, 0x0, @in=@private=0xa010101}]}]}, 0xfc}}, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r6, &(0x7f0000000080)={0x10, 0x0, 0x0, 0xfffffffffffffffd}, 0xc) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r7, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) 5m41.759668021s ago: executing program 4 (id=408): r0 = socket$netlink(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0xfffffffffffffc33, &(0x7f0000000280)=0x2) syz_open_dev$I2C(&(0x7f0000003000), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000480)=[{0x20, 0xfc, 0xff, 0xfffff00c}, {0x6, 0xfc, 0x2, 0x4}]}, 0x10) syz_emit_ethernet(0x4a, &(0x7f00000004c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd600180f200140600fe8000000000000000000000000000bbfe800000aa000000002327d8b9d999cb2f6e93e7ad9037f5c11094c113d9d64bf18357744d6a3fa73ec0bf0c3f9818d34fecc421c16bc5e30c628efc40f994a5c167e8dd1593f35fc6512fb0d78fcff7e3a57b0fa7fb4aca2e20f8f6f4df893ca74320b5f165c73784bf58fec437b8fbde2ab691b468804d5999aeb2d000b0dddd3ad6f5ae9ff539176a151a5c859855aa20ed83ee0b532257a2352c8e569a20c8454a3187db629c055b6fd9ec9ef3e58644be697421a921abd6cb2a9bca280cd9792479d8", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) r4 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r4, &(0x7f0000000040)={0x24, @long={0x3, 0xffff, {0xaaaaaaaaaaaa0202}}}, 0x14) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mq_open(0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x80000000001}) r5 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000200)={r5, r5, r5}, &(0x7f0000000040)=""/217, 0xd9, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0x8, 0x4) r6 = socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, 0x0, 0x0) 5m39.916130534s ago: executing program 4 (id=411): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$char_usb(0xc, 0xb4, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00c00e}, 0x44004840) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000bce) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) sysinfo(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000006580)={0x1, &(0x7f0000006540)=[{0x6, 0x5, 0x1, 0xffff}]}) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, 0x0) ppoll(&(0x7f0000006c40)=[{r3, 0x2002}], 0x1, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) write$cgroup_devices(r4, &(0x7f0000000100)=ANY=[@ANYRES32=r2, @ANYRESDEC=r2], 0xa) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x40, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x5607, 0x38) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETMODE(r5, 0x4b3a, 0x1) 5m39.83741388s ago: executing program 5 (id=412): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/partitions\x00', 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000bce) syz_open_dev$MSR(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) socket$inet_dccp(0x2, 0x6, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x1) sched_setaffinity(0x0, 0x0, 0x0) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x149802, 0x0) r3 = dup(r2) sendfile(r2, r3, 0x0, 0x80006) bpf$MAP_CREATE(0x0, 0x0, 0x48) openat$procfs(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/mdstat\x00', 0x0, 0x0) r4 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/vm/compact_memory\x00', 0x1, 0x0) sendfile(r4, r0, &(0x7f00000000c0)=0x58, 0x9) syz_usb_connect(0x0, 0x24, 0x0, 0x0) 5m24.58044097s ago: executing program 33 (id=412): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/partitions\x00', 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000bce) syz_open_dev$MSR(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) socket$inet_dccp(0x2, 0x6, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x1) sched_setaffinity(0x0, 0x0, 0x0) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x149802, 0x0) r3 = dup(r2) sendfile(r2, r3, 0x0, 0x80006) bpf$MAP_CREATE(0x0, 0x0, 0x48) openat$procfs(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/mdstat\x00', 0x0, 0x0) r4 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/vm/compact_memory\x00', 0x1, 0x0) sendfile(r4, r0, &(0x7f00000000c0)=0x58, 0x9) syz_usb_connect(0x0, 0x24, 0x0, 0x0) 5m23.480910458s ago: executing program 34 (id=411): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$char_usb(0xc, 0xb4, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00c00e}, 0x44004840) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000bce) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) sysinfo(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000006580)={0x1, &(0x7f0000006540)=[{0x6, 0x5, 0x1, 0xffff}]}) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, 0x0) ppoll(&(0x7f0000006c40)=[{r3, 0x2002}], 0x1, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) write$cgroup_devices(r4, &(0x7f0000000100)=ANY=[@ANYRES32=r2, @ANYRESDEC=r2], 0xa) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x40, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x5607, 0x38) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETMODE(r5, 0x4b3a, 0x1) 2m8.004069396s ago: executing program 7 (id=1844): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000340), 0x0, &(0x7f0000000080)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) creat(&(0x7f0000000340)='./file0/file0\x00', 0x0) chdir(&(0x7f0000000140)='./bus\x00') openat$dir(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000000), 0x28, 0x0) 2m7.864780725s ago: executing program 7 (id=1846): syz_80211_inject_frame(&(0x7f0000000240)=@device_b, 0x0, 0xb5) r0 = socket$unix(0x1, 0x2, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r4 = syz_open_dev$sndpcmc(&(0x7f0000002600), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_RESUME(r4, 0xc0844123, 0x20000000) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r6 = syz_io_uring_setup(0x239, &(0x7f0000000300)={0x0, 0x200000, 0x10100}, &(0x7f0000000080)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r6, 0x2def, 0x4000, 0x0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r5, 0xc06c4124, 0x0) r9 = socket$kcm(0x10, 0x2, 0x0) r10 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$binfmt_register(r10, &(0x7f0000000180)={0x3a, 'syz2', 0x3a, 'M', 0x3a, 0xffffffffffffffff, 0x3a, '.', 0x3a, 'GPL\x00', 0x3a, './file0', 0x3a, [0x50, 0x43, 0x46, 0x0, 0x46]}, 0x31) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0xc, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000010008188e6b62aa73772cc9f1ba1f848480000005e140602000000000e000a000f000000028000001294", 0x2e}], 0x1}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 2m5.741765103s ago: executing program 7 (id=1858): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x100008b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x400000bce) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x1) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) getpid() r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x121301, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000002300)) 2m5.136047177s ago: executing program 7 (id=1860): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x6) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) connect$unix(r1, &(0x7f0000002540)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) flistxattr(r2, 0x0, 0x0) sched_setaffinity(0x0, 0xfffffffffffffc33, &(0x7f0000000280)=0x2) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000000)) socket$xdp(0x2c, 0x3, 0x0) r3 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @private=0xa010101}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000480), 0x0) 2m4.131482701s ago: executing program 7 (id=1864): mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=0x0]) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000040)='autofs\x00', 0x0, &(0x7f0000000400)) chdir(&(0x7f0000000080)='./file1\x00') mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1607010, 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x87, r1}, './file0\x00'}) 2m3.451807121s ago: executing program 7 (id=1867): openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x74, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, 0x0) r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000a80)=@newqdisc={0x14c, 0x24, 0xf0b, 0x70bd28, 0x25dfdbfe, {0x0, 0x0, 0x12, r1, {0x0, 0x10}, {0xffff, 0xffff}, {0x10, 0xe}}, [@qdisc_kind_options=@q_choke={{0xa}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x1000, 0xfff, 0x8, 0x4, 0x8e, 0x3, 0x7}}]}}]}, 0x14c}}, 0x0) 1m48.369200583s ago: executing program 35 (id=1867): openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x74, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, 0x0) r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000a80)=@newqdisc={0x14c, 0x24, 0xf0b, 0x70bd28, 0x25dfdbfe, {0x0, 0x0, 0x12, r1, {0x0, 0x10}, {0xffff, 0xffff}, {0x10, 0xe}}, [@qdisc_kind_options=@q_choke={{0xa}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x1000, 0xfff, 0x8, 0x4, 0x8e, 0x3, 0x7}}]}}]}, 0x14c}}, 0x0) 7.037517737s ago: executing program 6 (id=2562): syz_80211_inject_frame(&(0x7f0000000240)=@device_b, 0x0, 0xb5) r0 = socket$unix(0x1, 0x2, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r5 = syz_open_dev$sndpcmc(&(0x7f0000002600), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_RESUME(r5, 0xc0844123, 0x20000000) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r7 = syz_io_uring_setup(0x239, &(0x7f0000000300)={0x0, 0x200000, 0x10100}, &(0x7f0000000080)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r7, 0x2def, 0x4000, 0x0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r6, 0xc06c4124, 0x0) r10 = socket$kcm(0x10, 0x2, 0x0) r11 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$binfmt_register(r11, &(0x7f0000000180)={0x3a, 'syz2', 0x3a, 'M', 0x3a, 0xffffffffffffffff, 0x3a, '.', 0x3a, 'GPL\x00', 0x3a, './file0', 0x3a, [0x50, 0x43, 0x46, 0x0, 0x46]}, 0x31) sendmsg$kcm(r10, &(0x7f0000000600)={0x0, 0xc, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000010008188e6b62aa73772cc9f1ba1f848480000005e140602000000000e000a000f000000028000001294", 0x2e}], 0x1}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 6.466023393s ago: executing program 2 (id=2565): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000600), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000640)={0x81, 0x0, 'client0\x00', 0x0, "1e1dc136d6f4bdda", "a973ee4846d9504bc69a10238bcd150b0e95547bd679f139106e78e15913759d"}) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000000), 0x4) r4 = syz_io_uring_setup(0xdaa, &(0x7f0000000380)={0x0, 0x0, 0x13291, 0x0, 0x2000}, &(0x7f0000000100), &(0x7f0000000000)) io_uring_enter(r4, 0x1, 0xffffffff, 0x1, 0x0, 0x0) r5 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r6 = fcntl$dupfd(r5, 0x406, r5) ioctl$SG_EMULATED_HOST(r6, 0x2203, &(0x7f0000000040)) ioctl$KIOCSOUND(r6, 0x4b2f, 0x8) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000001ac0)={&(0x7f0000000080)={0x14, 0x2c, 0x1, 0x70bd26, 0x25dfdbfc, {0x4}}, 0x14}, 0x1, 0x0, 0x0, 0x4000d}, 0x20000000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000400)={0x0, 0xc7, "cf9b969f9446e0f8ce7dd2daa536b23fcbef6c9314de8f66f5fdb4f789da24852611260baeb5e6b8568a520c3f7f6ef9dcb9c0183aa5ccb163cc999554973c557babef9a4afbdcc6c075a8d3a63e15e0e2e124167bcfef19e0dbb9df2ef013eadaa1c2cdd3dc0f46e57af0ee1687799582a6cb0c8f4158217b08354501acb0bd9ed2eecf7459161f3a5fd3b5816218610f2c6f7e892416cdfef2f419a0d9cad84ee7975e778cdebfac1a28e88dc7a3f4878faa6246aabd3ab94d1461c45fb8f41c628a7075ba31"}, &(0x7f0000000040)=0xcf) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000000c0)={r8, 0x80}, 0x8) 6.355348287s ago: executing program 2 (id=2566): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x0, 0x0}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000ac0), 0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r1) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000009f991adea0f6a1cc2c478ae195aa941b8d77455902fe93d9081ba8fab3c3ef451b8896dab0eb7100cc9f9e6a31ab415915c4f932dd95246bb6b460621638f94bce951b3a5c51d5b34820e146b6496ca54bfbb4fac9e94125f1c3218cb10937343724f3559ee8350b1549caa70b740298a474530a39512360e8e7a2aa28f0", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r2}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2}, &(0x7f0000000100), &(0x7f0000000180)=r1}, 0x20) close(r1) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r3, &(0x7f0000019680)=""/102392, 0x18ff8) sched_setaffinity(0x0, 0xfffffef7, &(0x7f0000000740)=0x410000002) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) r4 = syz_open_dev$vim2m(&(0x7f0000000580), 0x0, 0x2) ioctl$vim2m_VIDIOC_STREAMOFF(r4, 0x40045612, &(0x7f0000000140)=0x2) rt_sigaction(0x19, &(0x7f0000000000)={0xfffffffffffffffc, 0x44000006, 0x0}, 0x0, 0x8, &(0x7f0000000440)) r5 = memfd_create(&(0x7f00000006c0)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\xf2\xed\x04\x00\x00\x00\xd4N\x12\x9b\x1f\t\xd1Z+\x86T\x16\xf8\x01\x00\x00\x00\x9f+\x8d!\x0fG\xab\xc2\xdc\xa3\xb3\xae8\x9f9?\xefo\xa4k\x01\xb2>\xa1\x9c\x86xm\xe6\x9bZ4\x91\x1a\xdb\xdd\x89\xb9\xc0LF;\xd6\x84\x195\x06\x00\x00\x00~\xf3S\x12\"p^\xc1jP\x8a\xc6[\xbd\xe7q]\xdd\r\x1aZS\x01*\x1b\xfd\xbcMA\xdcq\xa1\x00\xb3\xf9\x91r\x7f\xdc\xf1\xc3G,\xdb\xccS\x15\x95b\x17\xab\xe4?\x96\x95\xa4kP\x99YO\xb8V\xd5p\x90X\xaaf', 0x0) fallocate(r5, 0x0, 0x400000000000000, 0x2) 6.271296463s ago: executing program 2 (id=2568): r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000000040), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x118) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000180)=0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0x2) read$msr(r3, &(0x7f0000019680)=""/102392, 0x18ff8) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) msgget$private(0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @dev}, 0x10) sendto$inet(r2, &(0x7f00000001c0)="e1", 0x1, 0x0, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x1, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0x6}, 0x8) 5.925748334s ago: executing program 0 (id=2572): r0 = syz_open_dev$cec(&(0x7f0000000100), 0x0, 0x0) r1 = epoll_create(0x7fff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0xa0000002}) ioctl$CEC_ADAP_S_LOG_ADDRS(r0, 0xc05c6104, &(0x7f00000001c0)={"fe403ca4", 0x0, 0x5, 0x81, 0x0, 0x7, "de6c0a5bcee099303c9842579a1c19", "dba0a737", "4da264d5", "e75aef41", ["4fdd51b5a333d64fd52f79de", "0c13895a26e4cb6b2f9782fc", "674a440d6cdaaf6be57cc8cd", "2d66f09cea6bb67ada4fa6da"]}) r2 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_RECV_OWN_MSGS(r2, 0x65, 0x8, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$usbfs(0x0, 0x77, 0x0) syz_open_dev$video4linux(&(0x7f0000000140), 0x1b, 0x40000) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r4 = gettid() process_vm_writev(r4, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x8) socket$inet_sctp(0x2, 0x1, 0x84) ioctl$SYNC_IOC_MERGE(r1, 0xc0303e03, &(0x7f0000000040)={"29332a1e0efd459322906bb6fffae010a835cd82809aa4076c9b07ceab641271"}) close_range(r3, 0xffffffffffffffff, 0x2) r5 = inotify_init() inotify_add_watch(r5, &(0x7f00000000c0)='./file0\x00', 0x20000002) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$CEC_ADAP_S_LOG_ADDRS(r0, 0xc05c6104, &(0x7f0000000140)={"04f16c91", 0x0, 0x0, 0x0, 0x0, 0x0, "6f99e65664cdfb5f24cf398a3f7a92", '\x00', "246a8a96", "12caa207", ['\x00', "9d09b43157145fa9a5c56bcf", "2b4af2886e6d02546f0ad9b4", "000000010100"]}) 5.599304065s ago: executing program 0 (id=2574): openat$vmci(0xffffffffffffff9c, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) ioctl$SNDRV_PCM_IOCTL_XRUN(0xffffffffffffffff, 0x4148, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0, 0x4, 0xb7, &(0x7f0000000040)=""/183, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={0xffffffffffffffff, r1}) shutdown(0xffffffffffffffff, 0x2) syz_emit_ethernet(0x4a, 0x0, 0x0) 5.580028093s ago: executing program 0 (id=2576): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) timerfd_settime(0xffffffffffffffff, 0x2, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) writev(r5, &(0x7f00000025c0)=[{&(0x7f0000000240)='4', 0x1}, {0x0, 0x900}], 0x2) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cpuacct.usage_sys\x00', 0x275a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) 5.509738591s ago: executing program 6 (id=2578): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r0 = syz_open_dev$sndmidi(&(0x7f0000000440), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) socket$inet_udp(0x2, 0x2, 0x0) syz_emit_ethernet(0x6a, &(0x7f00000003c0)=ANY=[], 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r2}, 0x10) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1804"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x67000000, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) open(&(0x7f0000000340)='./bus\x00', 0x82840, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00'}, 0x10) mount(&(0x7f0000000080)=@nullb, &(0x7f0000000380)='./bus\x00', &(0x7f0000000180)='xfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x2) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x0, &(0x7f0000000080)=0x3, 0x0, 0x4) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) bind$llc(r4, 0x0, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r5, 0x6, 0x9, 0x0, 0x0) listen(r4, 0x3) 4.642879177s ago: executing program 6 (id=2582): bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000040)={0x0, 0x1c000, 0x800}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setscheduler(r3, 0x1, &(0x7f0000000100)=0x5) openat$drirender128(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$key(r2, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[], 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {0x0, 0x9}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr=0x64010100, 0x4d5, 0x32}, 0x0, @in6=@mcast1, 0x0, 0x0, 0x0, 0xb7}}, 0xe8) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) 4.070849237s ago: executing program 0 (id=2584): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() syz_open_procfs(0xffffffffffffffff, 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r5 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r5, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x7, 0x30}, 0xc) sendto$inet(r5, &(0x7f0000000040)='}', 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x4e22, @local}, 0x10) sendto$inet(r5, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0) sendto$inet(r5, &(0x7f0000000300)="ab", 0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000440), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r6, 0x8933, 0x0) sendmsg$NL802154_CMD_GET_SEC_LEVEL(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0, 0x1c}, 0x1, 0x3000000}, 0x0) sendmsg$NFC_CMD_LLC_SDREQ(r0, 0x0, 0x10) 4.025338458s ago: executing program 8 (id=2585): madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) r0 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f00000008c0), 0x43) socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f00000008c0), 0x67) socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r4 = fsopen(&(0x7f0000000200)='cramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x31e3) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x2000003, 0x8c4b815a5465c2b2, 0xffffffffffffffff, 0x0) r5 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r5, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/74, 0x328000, 0x1000}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) syz_clone(0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 3.638467435s ago: executing program 8 (id=2586): openat$vmci(0xffffffffffffff9c, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) ioctl$SNDRV_PCM_IOCTL_XRUN(0xffffffffffffffff, 0x4148, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000030000000000000026d0000095002b000000000093adff012255f674412d02000000880b5f04596a5e99fce658be2e200c839223886d8be4b50000005ab527ee3697f98125f30e6326996a3cfee33025a30b45bdcf2c69d105e5e55a1d273683623f1a5dc6e3c7e2a5b7a98ecf3bd2cf898e924abe26ac296f660e69ba982fd76e00113c6b4698ac8f3eff5baff0dd50c786dcff7f0000ca6b78ad833488cfe4109eaf009edd0d69613d3cde2f00150200000001000000520a0000151d010000000100bf00000000cc587424363da52001a3cdf2000000db74596fd72c002a60c1bc7dc8b28b7d2e13c50424b9dd1145d03ff45f70685c6bd9ff41c69b7de406e89dcbb7677e65a88a8407a9e7f9c0e91028b0856eb1ed9474480737a55ebb0bd701f7fb21135c6172eba7eb8a341f07e5a2d1e88b3cfc22df01e4bac9d97328fa2a82b5e8741e02056d93a433f50479387467824262852c7939db5672d07cdbe8e14abf56497e5d56dbe37551b870b2851c3f0a1a9ebfcba105a6ccdd01b0f04edb256c0200000073f6db43661bd7f0e2536ffbfe5ca31b4083145531458b7d1e341c6b351ebc5223f54d6bec7ef4ef088e5d1be2515226988d664709ff03f1aa3dc7f1580ace9bf2abd28d7157e67fb98d121ad6eb372713255012e028cb2654d493a0b43bf21375709f348f5eda2967199cc936859a53c100070000000000dc10e13ef227f627a40000ad1fa253d33fa74f172d3407ae4e1e347c0c6ef9dd2b6bb700000000000000000c586272c3f4d79bc36315745cb149f3cb385e6add14652003c7cdd3324f07d134d3a6c718bbd1aafe1140cff0be4c6f8df084c5e9734ae30aa9af030025f01ab03a9b1074407136bc506031f0916a39d3057d55183612b39e73ae00"], 0x0, 0x4, 0xb7, &(0x7f0000000040)=""/183, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={0xffffffffffffffff, r1}) shutdown(0xffffffffffffffff, 0x2) syz_emit_ethernet(0x4a, 0x0, 0x0) 3.581721608s ago: executing program 8 (id=2587): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x7ff}, 0xe) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x9, &(0x7f0000000100)=""/4096, &(0x7f0000001100)=0x1000) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000200), 0x4, 0x40) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x6) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000002180)=ANY=[@ANYBLOB="14001e000000000000000000000000000000000a20000000000a01030000000000000000010000000900010073797a300000000038000000030a01020000000000000000010000000900030073797a32000000000c00048008000140000000000900010073797a3000000000140000001100010000000000000000000000000a"], 0x80}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r7, 0x0, 0x60, 0x0, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x0, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x8, 0x3, 0x4d8, 0x340, 0x11, 0x148, 0x340, 0x0, 0x440, 0x2a8, 0x2a8, 0x440, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x88000000, 0x3, 0x7}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@quota={{0x38}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538) r9 = syz_init_net_socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_bt_hidp_HIDPCONNADD(r9, 0x400448c8, &(0x7f0000000340)={r0, r0, 0x8, 0x0, 0x0, 0x82, 0xca, 0x15c2, 0x5886, 0x801, 0x0, 0x8, 'syz1\x00'}) 3.467415499s ago: executing program 8 (id=2588): syz_80211_inject_frame(&(0x7f0000000240)=@device_b, 0x0, 0xb5) r0 = socket$unix(0x1, 0x2, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r5 = syz_open_dev$sndpcmc(&(0x7f0000002600), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_RESUME(r5, 0xc0844123, 0x20000000) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r7 = syz_io_uring_setup(0x239, &(0x7f0000000300)={0x0, 0x200000, 0x10100}, &(0x7f0000000080)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r7, 0x2def, 0x4000, 0x0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r6, 0xc06c4124, 0x0) r10 = socket$kcm(0x10, 0x2, 0x0) r11 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$binfmt_register(r11, &(0x7f0000000180)={0x3a, 'syz2', 0x3a, 'M', 0x3a, 0xffffffffffffffff, 0x3a, '.', 0x3a, 'GPL\x00', 0x3a, './file0', 0x3a, [0x50, 0x43, 0x46, 0x0, 0x46]}, 0x31) sendmsg$kcm(r10, &(0x7f0000000600)={0x0, 0xc, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000010008188e6b62aa73772cc9f1ba1f848480000005e140602000000000e000a000f000000028000001294", 0x2e}], 0x1}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 3.442075256s ago: executing program 6 (id=2589): ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_procfs(0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, 0x0) ioctl$sock_bt_hci(r3, 0x400448e0, &(0x7f00000003c0)) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x149000, 0x0) ioctl$PTP_EXTTS_REQUEST2(r6, 0xc4c03d12, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) setsockopt$inet_MCAST_MSFILTER(r5, 0x0, 0x30, &(0x7f00000012c0)=ANY=[@ANYBLOB="020000000000000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000100000002"], 0x110) 3.182600572s ago: executing program 0 (id=2590): r0 = syz_usb_connect(0x0, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="120100008010bd40820514009dbb0000000109022400011b00"], 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0/file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x5, &(0x7f0000000300)=ANY=[@ANYRES8=r0], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYRES32=0x0], 0x20}}, 0x0) syz_usb_disconnect(r0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000400)={0x1, &(0x7f00000008c0)=[{0x4, 0x0, 0x9, 0x80}]}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x220, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x7, 0x0, &(0x7f0000000500)=ANY=[]}, 0x78) socket$nl_netfilter(0x10, 0x3, 0xc) socket$kcm(0x23, 0x2, 0x0) r6 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000300), 0x100) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r6, 0xc0145401, &(0x7f0000000340)={0x3, 0x0, 0x1, 0x1, 0xf5f}) 3.151248217s ago: executing program 3 (id=2591): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'IDLETIMER\x00'}, &(0x7f00000000c0)=0x1e) syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$sndctrl(&(0x7f0000000180), 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r1, 0xc0045543, &(0x7f0000000080)) r2 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'macsec0\x00', 0x0}) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@getchain={0x24, 0x11, 0x839, 0x20000000, 0x0, {0x0, 0x0, 0x0, r3, {0x2}}}, 0x24}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r7, 0xf, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000002c0)={'bond_slave_0\x00', &(0x7f00000004c0)=@ethtool_channels={0x3d, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2}}) r8 = signalfd4(r7, &(0x7f0000000000)={[0xfe73]}, 0x8, 0x800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='kmem_cache_free\x00', r8, 0x0, 0x31}, 0x18) mkdirat(0xffffffffffffff9c, 0x0, 0x1c0) setreuid(0xffffffffffffffff, 0xee01) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x1, 0xfffffffd, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r9 = syz_open_procfs(0x0, &(0x7f0000000240)='clear_refs\x00') madvise(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x15) writev(r9, &(0x7f0000000780)=[{&(0x7f00000004c0)='4', 0x1}], 0x1) mount$tmpfs(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x0, 0x0) close_range(r6, 0xffffffffffffffff, 0x0) 3.071373144s ago: executing program 2 (id=2592): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="1400000015000103000000000000000005"], 0x14}}, 0x0) syz_open_dev$cec(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x10, &(0x7f0000000680)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x8, 0xba, &(0x7f0000000140)=""/186, 0x41000, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340), 0x10, 0x37, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0xffffffffffffff2b, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0xb8}}, 0x804) r4 = memfd_create(&(0x7f0000000480)='%\x00\xae\xdb\xb8\x18\xc1\xecWbNO\xde^\xff\x19\x17QE{*X\xe3\xe2\x06\x00\x00\x00\xf6\xc0H\xa2\x83\x92\xee\n_\xcc\x1cC\xe5\x9f n\xbe?\xe7\x89*\xf1\xc5b\v\xec\xe4\xb0\xa2\xc5\xee\x04\x98\xa9\xb9\xe5\x8c\xc3\x97B\xaa+\x81\xcfJ\xf2o\xf6k\xcc\xf7\x057\x8d\xb1\xa0\x86\xe8\xda\x90\xc2\x1e\x15\x11\x92\x9d\xc1M\xe5@\v\x001\xae\x19$\xf8\x96\x81\xcbR\xae`\xd3\xf8_R~7\xf5\x1c\xc8\xf9\xe2z\x00<\xdc\x11\x89\xc9&f', 0x4) r5 = syz_io_uring_setup(0x5c91, &(0x7f0000000300)={0x0, 0x2002, 0x0, 0xfffffffe, 0xfffffffc}, &(0x7f0000000380), &(0x7f0000000180)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r5, 0x17, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) write(r4, &(0x7f0000000540)="7f069304f0fd2fd9492dcb79a2bc17c490159b086dbec8b2a8ca10eb36d65f0781fd5fe90f52f568bb786b6a369e45c05ccfa2dfae98347424cb4e660c0be1318ca9f5a71e71834c0c6f006a5764b2d4c5ae74c9be985de971e55cc96fbf7f711ebd59894ac56e4d6763380a6c0a5a619d4ee0c785c8628d31d0597a249d", 0x7e) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x200000f, 0x4002012, r4, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r7) sendmsg$IEEE802154_LIST_IFACE(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r8, 0x313, 0x70bd26, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x200c000d}, 0x800) 2.882444746s ago: executing program 3 (id=2593): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=@newtaction={0x64, 0x30, 0xb, 0x0, 0x0, {}, [{0x50, 0x1, [@m_ct={0x4c, 0x1, 0x0, 0x0, {{0x7}, {0x24, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}, @TCA_CT_MARK={0x8, 0x10}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x3}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x1, 0x4, 0x101, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFULA_CFG_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0xd}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040050}, 0x40000054) sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) socket$netlink(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) kcmp(r1, r1, 0x6, r3, r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.overlay.redirect\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000780)=ANY=[@ANYBLOB='\v\x00\x00\x00syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s'], 0x1bd) r4 = syz_open_dev$usbfs(&(0x7f0000000080), 0x70, 0x101301) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000200)) r5 = openat$binfmt_register(0xffffff9c, &(0x7f0000000040), 0x1, 0x0) write$binfmt_register(r5, &(0x7f00000006c0)={0x3a, 'syz2', 0x3a, 'E', 0x3a, 0x6, 0x3a, 'e\xc9K\xc0K\"\xe8&\x86(\xdf*\x94x\xaa\xb1\x1c\x1cf\xf4\xa6c\xf6y\x84\x80\xec\x87\xf6G\xe5Uy\x8f1x\xb0\xc6 \x14\xf0\xcf\x88H3\xf0\xb0\xdfp7\xb9-E_\xeb\xca)/\xaa\xf7\x89\f\xe63\x9b\xebL\xff\x81\xef\xdd\x90\x8f\xb0j', 0x3a, '\x00\x00eh`\x1a\x00+^\x01\xa0\xfdZ\x020\x93-M\x93\xf4\x7fj\x05B\xf5,\xf4\xe8\x18<\xfd{\xe9\xd2\xfb\xf6\xa2COg\x84\xc8\xd7\x1c\x93\x87\xc2Q\xd3\xceM:\xb0\xf8y\xe4%\xff\x14\x91\xfc\xbdRDs[\xc0\x03^~\x1d\xda\xd5\xf5\x83B\xc4?\xe9[:\x1d\xf9\x95\x8e\xfe\x10,\\^\x84\x8d\xb39\xfeu\xbd\x05cN ~\xbf:Z\xfd!$\xfc\x01@\xc0\xc2\xe0i+\xd7\xac\xaa\xd2!\b\x1b\xa8\x9f\x9f\xe3\x06\xe3~&\xe0x8\x84\xa9\xc3\xb6\xed\x92\x95\xa5\xbb\xb8\x04dB\xfd', 0x3a, './file1/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa'}, 0x1fe) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 2.864081092s ago: executing program 2 (id=2594): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8a}, 0x0) getpid() openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001c40)=ANY=[@ANYBLOB="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"/3590], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r1}, 0x10) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000380)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='debugfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}, 0x3a}], [], 0x2f}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) getdents(r5, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x201, 0x2) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1000002, 0x11012, r6, 0x0) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000840)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="00022dbd7000fcdbdf2509000000040002802c0003800800020005fc000008000100080000000800030001"], 0x148}, 0x1, 0x0, 0x0, 0x800}, 0x64080) 2.692648539s ago: executing program 2 (id=2595): r0 = socket$xdp(0x2c, 0x3, 0x0) openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000140)={0x2, @pix_mp={0x0, 0x0, 0x34324152, 0x0, 0xa, [{}, {0x10}]}}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0xfffffe60, &(0x7f00000002c0)=0x400001000000002) read$msr(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r2, 0x4028af11, &(0x7f00000001c0)={0x0, 0x0, 0x0, &(0x7f0000000380)=""/138, 0x0}) close(r0) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f0000000040)) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000240)={0x0, 0x0, 0x80000, 0x0, 0xffffffffffffffff}) write$midi(r3, &(0x7f0000000440)="97904d559ddaf5cbdc5c4feb8c1c8dfb98d7ea3e696c5d78bd9aa167c7c13734addc1ef72caf89ba76150be2f6413db282b5f6c6f51304e43690393183166a61cc4d5902f8fa3b3e82596ceaf12db304b7cbcc3162986184087a15e2a1bef9ac8afbe4f25204cafc3b156b97a910851cd7bb32718613484d5e12df29a439d7deed5396c5272268e8c91b7913e65730f1d9b910", 0x93) ioctl$VHOST_SET_VRING_ADDR(r2, 0x4028af11, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f00000000c0)=""/87, 0x0}) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r1, 0xf507, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000002f40)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)={{0x14}, [@NFT_MSG_NEWRULE={0x2c, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x54}}, 0x0) syz_usb_connect$hid(0x2, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f0000000680)) 2.691915232s ago: executing program 6 (id=2596): r0 = socket$kcm(0x10, 0x2, 0x10) socket$nl_generic(0x10, 0x3, 0x10) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x88, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000040)=0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r5 = syz_open_procfs(r2, &(0x7f0000000540)='net/ip_vs\x00') syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x0) ioctl$IOMMU_IOAS_ALLOC(0xffffffffffffffff, 0x3b81, 0x0) mount(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000000)='tmpfs\x00', 0x0, &(0x7f0000000300)='usrquota') chdir(0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x0, 0x0}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='net_prio.prioidx\x00', 0x275a, 0x0) quotactl_fd$Q_SETQUOTA(r6, 0xffffffff80000800, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10006}) pread64(r5, &(0x7f000001a240)=""/102400, 0x19000, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0e05403, &(0x7f0000000000)={{0xffffffffffffffff, 0x2, 0xffffffff, 0x3, 0x6}, 0xf3e, 0x3, 'id1\x00', 'timer1\x00', 0x0, 0x10000, 0x1, 0x400, 0x77c1907b}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r6, 0x89f1, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="1400000035000b63d25a80648c2594f90624fc60", 0x14}], 0x1}, 0x0) 2.635429845s ago: executing program 3 (id=2597): openat$vmci(0xffffffffffffff9c, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) ioctl$SNDRV_PCM_IOCTL_XRUN(0xffffffffffffffff, 0x4148, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0, 0x4, 0xb7, &(0x7f0000000040)=""/183, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={0xffffffffffffffff, r1}) shutdown(0xffffffffffffffff, 0x2) syz_emit_ethernet(0x4a, 0x0, 0x0) 2.599419977s ago: executing program 3 (id=2598): r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f00000003c0)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) connect$unix(r3, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101301) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x5522, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x180, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x11}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'vlan0\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) r6 = syz_open_dev$vcsa(0x0, 0x3, 0x8000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), r6) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r7, 0x8b22, &(0x7f0000000040)) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) r8 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) read$alg(r8, &(0x7f0000000080)=""/16, 0x10) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x4, &(0x7f0000006680)) 2.231916506s ago: executing program 3 (id=2599): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) r0 = gettid() prctl$PR_SCHED_CORE(0x3e, 0x1, r0, 0x2, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000640), 0xffffffffffffffff) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x400000bce) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) syz_io_uring_setup(0x237, 0x0, 0x0, 0x0) r2 = socket(0x10, 0x3, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x10rust\xe3c*sgrVdn:Dd', 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004}, &(0x7f0000bbdffc)=0x0) timer_settime(r3, 0x1, &(0x7f0000000280), 0x0) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000080)={0x1}, 0x8) r4 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r4, &(0x7f0000000100)={0x1d, r5}, 0x18) connect$can_j1939(r4, &(0x7f0000000140)={0x1d, r5, 0x0, {0x0, 0xf0, 0x3}, 0x3}, 0x18) sendmsg$can_j1939(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, &(0x7f0000000340)={[{0x122e, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5, 0xff, 0x1f, 0x40}, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7}, {0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) r9 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGRAB(r9, 0x40044590, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) 2.143349697s ago: executing program 3 (id=2600): r0 = landlock_create_ruleset(&(0x7f0000000140)={0x895, 0x3, 0x3}, 0x18, 0x0) landlock_restrict_self(r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000200000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYBLOB], 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x8, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @none}, 0xe) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000140)='contention_end\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x20, 0x4, 0x2, 0x0, 0x201, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 2.114987795s ago: executing program 8 (id=2601): open(&(0x7f0000000140)='./file0\x00', 0x2a4c0, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r0) r1 = timerfd_create(0x0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r3 = dup(r0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) timerfd_settime(r1, 0x3, &(0x7f0000000440)={{0x0, 0x989680}}, 0x0) clock_adjtime(0x0, &(0x7f0000000480)={0xd54, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xb, 0x8000000}) 1.058562131s ago: executing program 8 (id=2602): gettid() r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x6) kcmp(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0xfffffffffffffc33, &(0x7f0000000280)=0x2) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x3fc, 0x0, 0x32}, 0x9c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x54}, 0x9c) getsockopt$inet6_dccp_int(r2, 0x21, 0x11, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000c40)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000850000002300000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r7, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x68}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendto$packet(r0, &(0x7f0000000180)="a6bea8a120e5f8320c30ce5086dda5e986f34c10d8c39c3002de8ec445ae083a4b7fc08a086fc691", 0x28, 0x0, &(0x7f0000000140)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @local}, 0x14) 943.206705ms ago: executing program 6 (id=2603): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}]}, 0x48}}, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x2146, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xc356f52505ee0ebe) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000000100)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) mkdir(&(0x7f0000001140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='btrfs\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00') writev(r4, &(0x7f0000000100)=[{&(0x7f00000004c0)='4', 0x1}], 0x9) r5 = syz_open_dev$vim2m(&(0x7f0000000180), 0xecb, 0x2) ioctl$vim2m_VIDIOC_ENUM_FMT(r5, 0xc0405602, 0x0) 0s ago: executing program 0 (id=2604): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000140)=ANY=[@ANYRES64=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) process_madvise(0xffffffffffffffff, &(0x7f00000003c0)=[{0xffffffffffffffff}], 0x22, 0x0, 0x0) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='(\x00', @ANYBLOB="080027bd7000fcdbdf251a0000000400cc00080001004700"], 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x40800) fsetxattr$security_ima(r2, &(0x7f0000000180), 0x0, 0x0, 0x3) syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002ac0)={0x0, 0x0, 0x0}, 0x0) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'ipvlan1\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)=@newneigh={0x30, 0x1c, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, r6, 0xe0, 0x14}, [@NDA_DST_MAC={0xa, 0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, @NDA_FLAGS_EXT={0x8, 0xf, 0x1}]}, 0x30}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000700000001000100"], 0x48) r7 = syz_open_dev$evdev(&(0x7f00000000c0), 0x20000000000, 0x822b01) r8 = openat$null(0xffffffffffffff9c, 0x0, 0x115002, 0x0) poll(&(0x7f0000000140)=[{r7, 0x3}, {r8, 0x281}], 0x2, 0x40000) write$char_usb(r7, &(0x7f0000000040)="e2", 0x1068) ioctl$TIOCVHANGUP(r3, 0x5437, 0x2) capset(0x0, &(0x7f0000000040)={0x0, 0x0, 0xfffffffe, 0x40000, 0x0, 0xfffffffc}) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): binder_alloc: 12481: binder_install_single_page failed to insert page at offset 1000 with -14 [ 497.783521][ T5892] asix 4-1:0.0 (unnamed net_device) (uninitialized): Failed to write reg index 0x0000: -71 [ 497.794559][ T5892] asix 4-1:0.0: probe with driver asix failed with error -71 [ 497.807978][ T5892] usb 4-1: USB disconnect, device number 32 [ 497.913342][T12352] Bluetooth: hci2: command tx timeout [ 498.202676][ T5894] usb 7-1: new high-speed USB device number 22 using dummy_hcd [ 498.383787][ T5894] usb 7-1: too many configurations: 13, using maximum allowed: 8 [ 498.416690][ T5894] usb 7-1: config 0 has no interfaces? [ 498.425225][ T5894] usb 7-1: config 0 has no interfaces? [ 498.432120][ T5894] usb 7-1: config 0 has no interfaces? [ 498.438789][ T5894] usb 7-1: config 0 has no interfaces? [ 498.445339][ T5894] usb 7-1: config 0 has no interfaces? [ 498.451736][ T5894] usb 7-1: config 0 has no interfaces? [ 498.459750][ T5894] usb 7-1: config 0 has no interfaces? [ 498.466139][ T5894] usb 7-1: config 0 has no interfaces? [ 498.506798][ T5894] usb 7-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 498.528613][ T5894] usb 7-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 498.536956][ T5894] usb 7-1: Product: syz [ 498.541342][ T5894] usb 7-1: Manufacturer: syz [ 498.546689][ T5894] usb 7-1: SerialNumber: syz [ 498.567609][ T5894] usb 7-1: config 0 descriptor?? [ 498.903813][ T5894] usb 7-1: USB disconnect, device number 22 [ 499.244312][T12439] tipc: Disabling bearer [ 499.433682][ T29] audit: type=1400 audit(1734003041.114:814): avc: denied { execmem } for pid=12495 comm="syz.0.1966" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 499.662472][T12499] netlink: 'syz.0.1966': attribute type 10 has an invalid length. [ 500.038443][T12352] Bluetooth: hci2: command tx timeout [ 500.111023][ T29] audit: type=1400 audit(1734003041.804:815): avc: denied { read } for pid=12500 comm="syz.3.1967" dev="9p" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 500.125385][T12434] chnl_net:caif_netlink_parms(): no params data found [ 500.140590][ T5893] usb 7-1: new high-speed USB device number 23 using dummy_hcd [ 500.167204][T12503] binder: BINDER_SET_CONTEXT_MGR already set [ 500.178813][T12503] binder: 12502:12503 ioctl 4018620d 20000040 returned -16 [ 500.348287][T12434] bridge0: port 1(bridge_slave_0) entered blocking state [ 500.370138][T12434] bridge0: port 1(bridge_slave_0) entered disabled state [ 500.395807][ T5893] usb 7-1: Using ep0 maxpacket: 32 [ 500.402782][ T5893] usb 7-1: config 0 interface 0 altsetting 0 bulk endpoint 0x85 has invalid maxpacket 1024 [ 500.418997][T12434] bridge_slave_0: entered allmulticast mode [ 500.428816][ T5893] usb 7-1: New USB device found, idVendor=12d8, idProduct=0001, bcdDevice=de.79 [ 500.439194][ T5893] usb 7-1: New USB device strings: Mfr=1, Product=236, SerialNumber=2 [ 500.444848][T12434] bridge_slave_0: entered promiscuous mode [ 500.458809][ T5893] usb 7-1: Product: syz [ 500.467699][ T5893] usb 7-1: Manufacturer: syz [ 500.476467][T12434] bridge0: port 2(bridge_slave_1) entered blocking state [ 500.477887][ T5893] usb 7-1: SerialNumber: syz [ 500.497451][T12434] bridge0: port 2(bridge_slave_1) entered disabled state [ 500.506756][ T5893] usb 7-1: config 0 descriptor?? [ 500.512824][T12434] bridge_slave_1: entered allmulticast mode [ 500.517028][T12488] raw-gadget.0 gadget.6: fail, usb_ep_enable returned -22 [ 500.533123][T12434] bridge_slave_1: entered promiscuous mode [ 500.594290][T12434] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 500.629224][T12434] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 500.709146][T12434] team0: Port device team_slave_0 added [ 500.728759][T12434] team0: Port device team_slave_1 added [ 500.790583][T12434] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 500.811440][T12434] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 500.829230][ T5893] usb 7-1: USB disconnect, device number 23 [ 500.846688][T12434] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 500.860390][T12434] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 500.896086][T12434] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 500.942962][T12434] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 501.035279][T12434] hsr_slave_0: entered promiscuous mode [ 501.053894][T12434] hsr_slave_1: entered promiscuous mode [ 501.119339][T12524] netlink: 'syz.2.1974': attribute type 29 has an invalid length. [ 501.887895][T12434] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 501.915165][T12434] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 501.925850][T12434] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 501.945413][T12434] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 502.155236][T12352] Bluetooth: hci2: command tx timeout [ 502.887305][T12434] 8021q: adding VLAN 0 to HW filter on device bond0 [ 502.928733][T12434] 8021q: adding VLAN 0 to HW filter on device team0 [ 502.971337][ T11] bridge0: port 1(bridge_slave_0) entered blocking state [ 502.978507][ T11] bridge0: port 1(bridge_slave_0) entered forwarding state [ 502.997533][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 503.004709][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 503.184627][ T5892] usb 3-1: new high-speed USB device number 36 using dummy_hcd [ 503.190569][T12434] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 503.223385][ T5893] usb 7-1: new high-speed USB device number 24 using dummy_hcd [ 503.333165][ T5892] usb 3-1: Using ep0 maxpacket: 32 [ 503.350591][ T5892] usb 3-1: config 0 has an invalid interface number: 1 but max is 0 [ 503.362316][ T5892] usb 3-1: config 0 has no interface number 0 [ 503.372316][ T5892] usb 3-1: config 0 interface 1 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 503.387169][ T5893] usb 7-1: Using ep0 maxpacket: 8 [ 503.395593][T12434] veth0_vlan: entered promiscuous mode [ 503.408883][ T5893] usb 7-1: config 168 descriptor has 1 excess byte, ignoring [ 503.420775][ T5893] usb 7-1: config 168 interface 0 altsetting 0 endpoint 0x3 has an invalid bInterval 255, changing to 11 [ 503.421738][T12434] veth1_vlan: entered promiscuous mode [ 503.432458][ T5892] usb 3-1: New USB device found, idVendor=28bd, idProduct=0094, bcdDevice= 0.00 [ 503.468909][ T5893] usb 7-1: config 168 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 503.480050][T12434] veth0_macvtap: entered promiscuous mode [ 503.498603][T12434] veth1_macvtap: entered promiscuous mode [ 503.507362][ T5892] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 503.518075][ T5893] usb 7-1: config 168 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 503.531708][T12434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 503.532212][ T5892] usb 3-1: config 0 descriptor?? [ 503.554061][ T5893] usb 7-1: config 168 interface 0 altsetting 0 endpoint 0x8F has invalid maxpacket 59391, setting to 1024 [ 503.557400][T12434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 503.595310][ T5892] usbhid 3-1:0.1: couldn't find an input interrupt endpoint [ 503.609524][T12434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 503.640636][T12434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 503.659875][T12434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 503.678425][T12434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 503.694230][ T5893] usb 7-1: config 168 descriptor has 1 excess byte, ignoring [ 503.701681][ T5893] usb 7-1: config 168 interface 0 altsetting 0 endpoint 0x3 has an invalid bInterval 255, changing to 11 [ 503.714100][ T5893] usb 7-1: config 168 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 503.727541][T12434] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 503.751421][ T5893] usb 7-1: config 168 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 503.772128][T12434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 503.789717][ T5893] usb 7-1: config 168 interface 0 altsetting 0 endpoint 0x8F has invalid maxpacket 59391, setting to 1024 [ 503.813900][T12434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 503.828686][T12434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 503.853162][ T5893] usb 7-1: config 168 descriptor has 1 excess byte, ignoring [ 503.860603][ T5893] usb 7-1: config 168 interface 0 altsetting 0 endpoint 0x3 has an invalid bInterval 255, changing to 11 [ 503.872238][T12434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 503.882599][ T5893] usb 7-1: config 168 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 503.895004][T12434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 503.905918][ T5893] usb 7-1: config 168 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 503.918033][T12434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 503.928520][ T5893] usb 7-1: config 168 interface 0 altsetting 0 endpoint 0x8F has invalid maxpacket 59391, setting to 1024 [ 503.941189][T12434] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 503.971716][T12434] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 503.981003][ T5893] usb 7-1: string descriptor 0 read error: -22 [ 503.991171][ T5893] usb 7-1: New USB device found, idVendor=0a07, idProduct=0064, bcdDevice=40.6e [ 504.012613][T12434] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 504.021397][ T5893] usb 7-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 504.029956][T12434] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 504.039612][T12434] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 504.356871][ T6158] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 504.398491][ T6158] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 505.587504][ T12] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 505.601694][T12579] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1990'. [ 505.628724][ T12] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 505.753196][ T29] audit: type=1400 audit(1734003047.424:816): avc: denied { mounton } for pid=12434 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 505.829994][ T29] audit: type=1400 audit(1734003047.494:817): avc: denied { create } for pid=12583 comm="syz.0.1991" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 505.999535][T11439] usb 3-1: USB disconnect, device number 36 [ 506.060801][ T5893] adutux 7-1:168.0: ADU100 now attached to /dev/usb/adutux0 [ 506.076636][ T5893] usb 7-1: USB disconnect, device number 24 [ 506.342863][ T29] audit: type=1326 audit(1734003047.994:818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12592 comm="syz.3.1996" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fd5fd185d19 code=0x0 [ 506.909351][ T29] audit: type=1800 audit(1734003048.604:819): pid=12603 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed comm="syz.8.1997" name="file1" dev="overlay" ino=31 res=0 errno=0 [ 507.481337][T12617] overlayfs: failed to resolve './file0': -2 [ 508.376302][ T29] audit: type=1400 audit(1734003050.074:820): avc: denied { sqpoll } for pid=12625 comm="syz.0.2005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 508.773195][ T5893] usb 1-1: new high-speed USB device number 33 using dummy_hcd [ 508.924419][ T5893] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 508.955576][ T5893] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 508.990373][ T5893] usb 1-1: New USB device found, idVendor=10c4, idProduct=ea90, bcdDevice= 0.00 [ 509.034934][ T5893] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 509.060072][ T5893] usb 1-1: config 0 descriptor?? [ 509.482001][ T5893] cp2112 0003:10C4:EA90.001D: unknown main item tag 0x0 [ 510.066601][ T5893] cp2112 0003:10C4:EA90.001D: hidraw0: USB HID v0.00 Device [HID 10c4:ea90] on usb-dummy_hcd.0-1/input0 [ 510.536215][ T5893] cp2112 0003:10C4:EA90.001D: Part Number: 0x82 Device Version: 0xFE [ 510.545331][ T5893] cp2112 0003:10C4:EA90.001D: error requesting SMBus config [ 510.554574][ T5893] cp2112 0003:10C4:EA90.001D: probe with driver cp2112 failed with error -32 [ 510.699815][T12352] Bluetooth: hci0: Malformed LE Event: 0x0d [ 510.720174][ T29] audit: type=1400 audit(1734003052.334:821): avc: denied { create } for pid=12660 comm="syz.6.2015" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 510.998969][T12672] binder: BINDER_SET_CONTEXT_MGR already set [ 511.005178][T12672] binder: 12669:12672 ioctl 4018620d 20000040 returned -16 [ 511.009214][ T5893] usb 1-1: USB disconnect, device number 33 [ 511.125416][T12676] netlink: 4 bytes leftover after parsing attributes in process `syz.6.2022'. [ 511.292802][ T25] usb 4-1: new high-speed USB device number 33 using dummy_hcd [ 511.444057][ T25] usb 4-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 511.455072][ T25] usb 4-1: New USB device found, idVendor=0471, idProduct=0304, bcdDevice=e4.df [ 511.464371][ T25] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 511.480518][ T25] usb 4-1: config 0 descriptor?? [ 511.489424][ T25] pwc: Askey VC010 type 2 USB webcam detected. [ 511.916135][ T25] pwc: recv_control_msg error -32 req 02 val 2b00 [ 511.928705][ T25] pwc: recv_control_msg error -32 req 02 val 2700 [ 511.936114][ T25] pwc: recv_control_msg error -32 req 02 val 2c00 [ 511.947728][ T25] pwc: recv_control_msg error -32 req 04 val 1000 [ 511.955324][ T25] pwc: recv_control_msg error -32 req 04 val 1300 [ 511.963823][ T25] pwc: recv_control_msg error -32 req 04 val 1400 [ 511.971494][ T25] pwc: recv_control_msg error -32 req 02 val 2000 [ 512.137869][T12687] binder_alloc: 12686: pid 12686 spamming oneway? 1 buffers allocated for a total size of 4096 [ 512.209403][ T25] pwc: recv_control_msg error -71 req 04 val 1500 [ 512.216287][ T25] pwc: recv_control_msg error -71 req 02 val 2500 [ 512.223589][ T25] pwc: recv_control_msg error -71 req 02 val 2400 [ 512.230328][ T25] pwc: recv_control_msg error -71 req 02 val 2600 [ 512.237424][ T25] pwc: recv_control_msg error -71 req 02 val 2900 [ 512.244256][ T25] pwc: recv_control_msg error -71 req 02 val 2800 [ 512.251078][ T25] pwc: recv_control_msg error -71 req 04 val 1100 [ 512.257883][ T25] pwc: recv_control_msg error -71 req 04 val 1200 [ 512.265447][ T25] pwc: Registered as video103. [ 512.271705][ T25] input: PWC snapshot button as /devices/platform/dummy_hcd.3/usb4/4-1/input/input27 [ 512.350605][ T25] usb 4-1: USB disconnect, device number 33 [ 512.475935][T12694] overlayfs: failed to resolve './file0': -2 [ 512.975818][ T29] audit: type=1326 audit(1734003054.664:822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12693 comm="syz.2.2028" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1a6d985d19 code=0x7ffc0000 [ 513.092850][ T29] audit: type=1326 audit(1734003054.694:823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12693 comm="syz.2.2028" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1a6d985d19 code=0x7ffc0000 [ 513.137754][ T29] audit: type=1326 audit(1734003054.694:824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12693 comm="syz.2.2028" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1a6d985d19 code=0x7ffc0000 [ 513.180240][ T29] audit: type=1326 audit(1734003054.694:825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12693 comm="syz.2.2028" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1a6d985d19 code=0x7ffc0000 [ 513.204812][ T29] audit: type=1326 audit(1734003054.694:826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12693 comm="syz.2.2028" exe="/root/syz-executor" sig=0 arch=c000003e syscall=283 compat=0 ip=0x7f1a6d985d19 code=0x7ffc0000 [ 513.228901][ T29] audit: type=1326 audit(1734003054.704:827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12693 comm="syz.2.2028" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1a6d985d19 code=0x7ffc0000 [ 513.253391][ T29] audit: type=1326 audit(1734003054.704:828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12693 comm="syz.2.2028" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f1a6d985d19 code=0x7ffc0000 [ 513.277072][ T29] audit: type=1326 audit(1734003054.704:829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12693 comm="syz.2.2028" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1a6d985d19 code=0x7ffc0000 [ 513.301043][ T29] audit: type=1326 audit(1734003054.704:830): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12693 comm="syz.2.2028" exe="/root/syz-executor" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f1a6d985d19 code=0x7ffc0000 [ 513.325396][ T29] audit: type=1326 audit(1734003054.724:831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12693 comm="syz.2.2028" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1a6d985d19 code=0x7ffc0000 [ 513.432699][ T5894] usb 7-1: new high-speed USB device number 25 using dummy_hcd [ 513.592890][ T5894] usb 7-1: Using ep0 maxpacket: 32 [ 513.634873][ T5894] usb 7-1: device descriptor read/all, error -71 [ 514.977716][T12742] bridge0: port 4(syz_tun) entered blocking state [ 514.999278][T12742] bridge0: port 4(syz_tun) entered disabled state Dec 12 11:30:56 syzkaller kern.info kernel: [ 514.977716][T12742] bridge0: port 4(syz_tun) entered blocking state Dec 12 11:30:56 syzkaller ke[ 515.019180][T12742] syz_tun: entered allmulticast mode rn.info kernel: [ 514.999278][T12742] bridge0: port 4(syz_tun) entered disabled state Dec 12 11:30:56 syzkaller kern.info kernel: [ 515.019180][T12742] syz_tun: entered allmulticast mode [ 515.050687][T12742] syz_tun: entered promiscuous mode [ 515.067491][T12742] bridge0: port 4(syz_tun) entered blocking state [ 515.074850][T12742] bridge0: port 4(syz_tun) entered forwarding state Dec 12 11:30:56 syzkaller kern.info kernel: [ 515.050687][T12742] syz_tun: entered promiscuous mode Dec 12 11:30:56 syzkaller kern.info kernel: [ 515.067491][T12742] bridge0: port 4(syz_tun) entered blocking state Dec 12 11:30:56 syzkaller kern.info kernel: [ 515.074850][T12742] bridge0: port 4(syz_tun) entered forwarding state [ 515.712312][T12756] lo speed is unknown, defaulting to 1000 Dec 12 11:30:57 syzkaller kern.warn kernel: [ 515.712312][T12756] lo speed is unknown, defaulting to 1000 [ 518.001102][ T29] kauditd_printk_skb: 150 callbacks suppressed [ 518.001120][ T29] audit: type=1400 audit(1734003059.694:982): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Dec 12 11:30:59 syzkaller kern.warn kernel: [ 518.001102][ T29] kauditd_printk_skb: 150 callbacks suppressed Dec 12 11:30:59 syzkaller kern.notice kernel: [ 518.001120][ T29] audit: type=1400 audit(1734003059.694:982): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix [ 518.069418][ T29] audit: type=1400 audit(1734003059.734:983): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 11:30:59 syzkaller kern.notice kernel: [ 518.069418][ T29] audit: type=1400 audit(1734003059.734:983): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:objec[ 518.132726][ T29] audit: type=1400 audit(1734003059.734:984): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 t_r:var_t tclass=l Dec 12 11:30:59 syzkaller kern.notice kernel: [ 518.132726][ T29] audit: type=1400 audit(1734003059.734:984): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontex[ 518.182584][ T29] audit: type=1400 audit(1734003059.754:985): avc: denied { execmem } for pid=12807 comm="syz.6.2072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 t=system_u:object_r:var_t tclass=l Dec 12 11:30:59 syzkaller kern.notice kernel: [ 518.182584][ T29] audit: type=1400 audit(1734003059.754:985): avc: denied { execmem } for pid=12807 comm="syz.6.2072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 518.335104][ T29] audit: type=1400 audit(1734003059.794:986): avc: denied { prog_load } for pid=12809 comm="syz.3.2073" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Dec 12 11:31:00 syzkaller kern.notice kernel: [ 518.335104][ T29] audit: type=1400 audit(1734003059.794:986): avc: denied { prog_load } for pid=12809 comm="syz.3.2073" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 518.414643][ T29] audit: type=1400 audit(1734003059.804:987): avc: denied { read } for pid=12809 comm="syz.3.2073" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 Dec 12 11:31:00 [ 518.548545][ T29] audit: type=1400 audit(1734003059.804:988): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.notice kernel: [ 518.414643][ T29] audit: type=1400 audit(1734003059.804:987): avc: denied { read } for pid=12809 comm="syz[ 518.583341][ T29] audit: type=1400 audit(1734003059.864:989): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 .3.2073" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r[ 518.610827][ T29] audit: type=1400 audit(1734003059.904:990): avc: denied { read } for pid=12807 comm="syz.6.2072" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 :sysadm_t tcontext=system_u:object_r:kvm_device_t Dec 12 11:31:00 syzkaller kern.notice kernel: [ 518.548545][ T29] audit: type=1400 audit(1734003059.804:988): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Dec 12 11:31:00 syzkaller kern.notice kernel: [ 518.583[ 518.667486][ T29] audit: type=1400 audit(1734003059.914:991): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 341][ T29] audit: type=1400 audit(1734003059.864:989): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Dec 12 11:31:00 syzkaller kern.notice kernel: [ 518.610827][ T29] audit: type=1400 audit(1734003059.904:990): avc: denied { read } for pid=12807 comm="syz.6.2072" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t Dec 12 11:31:00 syzkaller kern.notice kernel: [ 518.667486][ T29] audit: type=1400 audit(1734003059.914:991): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 519.603161][T12352] Bluetooth: hci1: Controller not accepting commands anymore: ncmd = 0 [ 519.613967][T12352] Bluetooth: hci1: Injecting HCI hardware error event [ 519.624032][ T5819] Bluetooth: hci1: hardware error 0x00 Dec 12 11:31:01 syzkaller kern.err kernel: [ 519.603161][T12352] Bluetooth: hci1: Controller not accepting commands anymore: ncmd = 0 Dec 12 11:31:01 syzkaller kern.err kernel: [ 519.613967][T12352] Bluetooth: hci1: Injecting HCI hardware error event Dec 12 11:31:01 syzkaller kern.err kernel: [ 519.624032][ T5819] Bluetooth: hci1: hardware error 0x00 [ 521.753288][ T5819] Bluetooth: hci1: Opcode 0x0c03 failed: -110 Dec 12 11:31:03 syzkaller kern.err kernel: [ 521.753288][ T5819] Bluetooth: hci1: Opcode 0x0c03 failed: -110 [ 523.057090][ T29] kauditd_printk_skb: 126 callbacks suppressed [ 523.057107][ T29] audit: type=1400 audit(1734003064.754:1118): avc: denied { read write } for pid=8013 comm="syz-executor" name="loop6" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Dec 12 11:31:04 syzkaller kern.warn kernel: [ 523.057090][ T29] kauditd_printk_skb: 126 callbacks suppressed Dec 12 11:31:04 syzkaller kern.notice kernel: [ 523.057107][ T29] audit: type=1400 audit(1734003064.754:1118): avc: denied { read write } for pid=8013 comm="syz-executor" name="loop6" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 523.134636][ T29] audit: type=1400 audit(1734003064.784:1119): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 11:31:04 syzkaller kern.notice kernel: [ 523.134636][ T29] audit: type=1400 audit(1734003064.784:1119): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 523.213724][ T29] audit: type=1400 audit(1734003064.784:1120): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 11:31:04 syzkaller kern.notice kernel: [ 523.213724][ T29] audit: type=1400 audit(1734003064.784:1120): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 523.303085][ T29] audit: type=1400 audit(1734003064.794:1121): avc: denied { read write } for pid=5824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Dec 12 11:31:05 syzkaller kern.notice kernel: [ 523.303085][ T29] audit: type=1400 audit(1734003064.794:1121): avc: denied { read write } for pid=5824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 523.417373][ T29] audit: type=1400 audit(1734003064.824:1122): avc: denied { map_create } for pid=12894 comm="syz.2.2104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 523.452642][ T29] audit: type=1400 audit(1734003064.834:1123): avc: denied { create } for pid=12894 comm="syz.2.2104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 Dec 12 11:31:05 syzkaller kern.notice kernel: [ 523.417373][ T29] audit: type=1400 audit(1734003064.824:1122): avc: denied { map_create } for pid=12894 co[ 523.502642][ T29] audit: type=1400 audit(1734003064.834:1124): avc: denied { create } for pid=12894 comm="syz.2.2104" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 mm="syz.2.2104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Dec 12 11:31:05 syzkaller kern.notice kernel: [ 523.452642][ T29] audit: type=1400 audit(1734003064.834:1123): avc: denied { create } for pid=12894 comm="syz.2.2104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 Dec 12 11:31:05 syzkaller kern.notice kernel: [ 523.502642][ T29] audit: type=1400 audit(1734003064.834:1124): avc: denied { create } for pid=12894 comm="syz.2.2104" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode [ 523.650107][ T29] audit: type=1400 audit(1734003064.834:1125): avc: denied { prog_load } for pid=12893 comm="syz.3.2103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 523.672600][ T29] audit: type=1400 audit(1734003064.834:1126): avc: denied { create } for pid=12893 comm="syz.3.2103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 523.692360][ T29] audit: type=1400 audit(1734003064.834:1127): avc: denied { prog_load } for pid=12894 comm="syz.2.2104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Dec 12 11:31:05 syzkaller kern.notice kernel: [ 523.650107][ T29] audit: type=1400 audit(1734003064.834:1125): avc: denied { prog_load } for pid=12893 comm="syz.3.2103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Dec 12 11:31:05 syzkaller kern.notice kernel: [ 523.672600][ T29] audit: type=1400 audit(1734003064.834:1126): avc: denied { create } for pid=12893 comm="syz.3.2103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 Dec 12 11:31:05 syzkaller kern.notice kernel: [ 523.692360][ T29] audit: type=1400 audit(1734003064.834:1127): avc: denied { prog_load } for pid=12894 comm="syz.2.2104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 524.267925][ T7229] bridge0: port 2(bridge_slave_1) entered disabled state Dec 12 11:31:05 syzkaller kern.info kernel: [ 524.267925][ T7229] bridge0: port 2(bridge_slave_1) entered disabled state [ 528.135589][ T29] kauditd_printk_skb: 186 callbacks suppressed [ 528.135605][ T29] audit: type=1400 audit(1734003069.834:1314): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Dec 12 11:31:09 syzkaller kern.warn kernel: [ 528.135589][ T29] kauditd_printk_skb: 186 callbacks suppressed Dec 12 11:31:09 syzkaller kern.notice kernel: [ 528.135605][ T29] audit: type=1400 audit(1734003069.834:1314): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 528.206785][ T29] audit: type=1400 audit(1734003069.864:1315): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 11:31:09 syzkaller kern.notice kernel: [ 528.206785][ T29] audit: type=1400 audit(1734003069.864:1315): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 528.259805][ T29] audit: type=1400 audit(1734003069.864:1316): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 11:31:09 syzkaller kern.notice kernel: [ 528.259805][ T29] audit: type=1400 audit(1734003069.864:1316): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 528.323740][ T29] audit: type=1400 audit(1734003069.924:1317): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 11:31:10 syzkaller kern.notice kernel: [ 528.323740][ T29] audit: type=1400 audit(1734003069.924:1317)[ 528.355979][ T29] audit: type=1400 audit(1734003069.934:1318): avc: denied { read } for pid=13014 comm="syz.3.2152" name="iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 : avc: denied [ 528.380310][ T29] audit: type=1400 audit(1734003069.934:1319): avc: denied { prog_load } for pid=13014 comm="syz.3.2152" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 11:31:10 syzkaller kern.notice kernel: [ 528.355979][ T29] audit: type=1400 audit(1734003069.934:1318): avc: denied { read } for[ 528.424754][ T29] audit: type=1400 audit(1734003069.994:1320): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 pid=13014 comm="syz.3.2152" name="iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t Dec 12 11:31:10 syzkaller kern.notice kernel: [ 528.380310][ T29] audit: type=1400 audit(1734003069.934:1319): avc: denied { prog_load } for pid=13014 comm="syz.3.2152" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Dec 12 11:31:10 syzkaller kern.notice kernel: [ 528.424754][ T29] audit: type=1400 audit(1734003069.994:1320): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 528.513642][ T29] audit: type=1400 audit(1734003070.004:1321): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Dec 12 11:31:10 syzkaller kern.notice kernel: [ 528.513642][ T29] audit: type=1400 audit(1734003070.004:1321): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 528.596229][ T29] audit: type=1400 audit(1734003070.044:1322): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 11:31:10 syzkaller kern.notice kernel: [ 528.596229][ T29] audit: type=1400 audit(1734003070.044:1322): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 528.679303][ T29] audit: type=1400 audit(1734003070.084:1323): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 11:31:10 syzkaller kern.notice kernel: [ 528.679303][ T29] audit: type=1400 audit(1734003070.084:1323): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 531.028529][T13062] [U] [ 531.031672][T13062] [U] [ 531.034579][T13062] [U] B-lrj[ќ6}%4 h@k-YLeU@f%Peze,9F* [ 531.044871][T13062] [U] Cw* 9JQ#esWCv1! GpX Dec 12 11:31:12 syzkaller kern.info kernel: [ 5[ 531.058761][T13062] [U] n%9C_nBc$4( [ 531.065385][T13062] [U] h q؛toRI#TNBs_R櫰:t 0W_[Hn% 31.028529][T13062] [U] Dec 12 11:31:12 syzkaller kern.info ker[ 531.078894][T13062] [U] 4RЛ<)6jG؃K^R\ nel: [ 531.031672][T13062] [U] Dec 12 11:31:1[ 531.088964][T13062] [U] 7R:j37 2 syzkaller kern.info kernel: [ 531.034579][T13062] [U] B-^Wlr^Fj[^Eќ6}%4 ^Zh^U@k-YLe[ 531.102365][T13062] [U] yPDyj>|h0=TXZY֦ʢĚ4i5Az~Za~k^tGsJI:OD!M2KWR>KC?x8H*@Qeۻu .j9ȓ~{`'r)-Ǭ=5֝JLy CB;+LP,fnY%3p&)][ȋ4l㶣!J> U^[@f%Peze,^P9F^S* Dec 12 11:31:12 syzkaller kern.info kerne[ 531.135154][T13062] [U] .CeJj@KJ605RxUTTO&XO\&N%y176`Iw l: [ 531.044871][T13062] [U] Cw[ 531.147561][T13062] [U] M<@nkJ(6))Vlr ^Z* ^T9J^B[ 531.156739][T13062] [U] >Yg z?`OmX"9+dE{$~byDUMe!xݛAAU}j2n%mbq Q#esW^[Cv1^X! GpX Dec 12 11:31:12 syzkaller kern.info kernel: [ 531.058761][T13062] [U] n%9C_nBc^P$^F4( Dec 12 11:31:12 syzkaller kern.info kernel: [ 531.065385][T13062] [U] h q؛toRI#TNBs_R^X櫰^A:^^t^L0^XW_[Hn% Dec 12 11:31:12 syzkaller kern.info kernel: [ 531.078894][T13062] [U] 4RЛ^N<)6^]^Z^O^FjG؃K^R\ Dec 12 11:31:12 syzkaller kern.info kernel: [ 531.088964][T13062] [U] 7^FR:j37^Q Dec 12 11:31:12 syzkaller kern.info kernel: [ 531.102365][T13062] [U] yPDy^Wj>|^Nh0=TXZY֦ʢ^AĚ4i5Az^X~^HZa~k^tGsJI:OD!M^F2K^DWR>^BKC?x8H*@Qeۻu ^X.j9ȓ~{`'r)-^NǬ^_=5 [ 531.183132][T13062] [U] WVw@HZ=(Ej~OS@bH:"!jIUJ=)U gԖ=y=kadr:=SaX X [ 531.184307][T13062] [U] BIe߄}ET@3( ߥv{κ~uk+{3T$ƻ.N[8sʇ""ʔ캄]RG5 [ 531.187315][T13062] [U] v{ըvNb>DmtQt [ 531.189280][T13062] [U] G*|9ٺ冸 [ 531.189293][T13062] [U] Gmiue! Tό*8a7i5-|6lk [ 531.189324][T13062] [U] NūD  S}RbYwIoQ&O,p],7훍uI [ 531.189368][T13062] [U] $Lu2f_3+|nWµZEP1w~N(o͝8d ScDʮf65zgR{tK"@ :5}GBdѸ\k [ 531.189382][T13062] [U] yҟ844n<; [ 531.189407][T13062] [U] uI7x#e4vml苬G픔A)-(N̗Nl#)׌Su6 [ 531.189428][T13062] [U] )<E?aUܤ9 %]dCCe+L<'t1Kȅ3. wSZYϼ9i>]Ȝ}{/`5'E 41 TnAXQI t%G7l~Bs [ 531.189449][T13062] [U]  [ 531.189493][T13062] [U] Zu4&e~8Eσ1l{ȨGvY$PnO4M*F`ATM0?*i#;Ѥ+4vGa%H[aYx)lG]F H|zve/ϧ17笳-ǽhO+^)8&E@A8g녌-wrs-v-ұO>q#9uaH)fSA֙inz@C>kLVD^1)m$/78..qa|)9">d>e#i`\|{ufh.. eMw}]5 -,Ţrk}FqCo*pNF [ 531.189690][T13062] [U]  [ 531.189723][T13062] [U] T0ԝ*XAɣa4WKc]x]L= [ 531.189733][T13062] [U] $cUGSe6tτPpZ3T2荣9W-֑aRnBڎ:^xϧB~{j [ 531.189801][T13062] [U] TE' 2l*a -;p;Bt.n`ߐ_;*U;5C#R/QK*msa#)aB>YؐO\;^'o5_yhlce&a`;œss{h TM0Bi^l>8٢VV8<-{$>D ]wu0?k ˼[uIrb_iL/eSi*ws*zS͎ђ [ 531.189827][T13062] [U] [ 531.254861][T13061] [U] Dec 12 11:31:12 syzkaller kern.info kernel: [ 531.135154][T13062] [U] .C^_^Be^FJj^A@KJ605RxUTTO^W&^QXO\^R&^\N^A%y176`^PIw Dec 12 11:31:12 syzkaller kern.info kernel: [ 531.147561][T13062] [U] ^QM<@n^_^W^Y^NkJ(^^6))^NV^_l^^r Dec 12 11:31:12 syzkaller kern.info kernel: [ 531.156739][T13062] [U] >Yg^Lz?`^ZOmX^V"9+d^YE{^P$^O~byDUMe!xݛAAU}j2n%mb^Tq Dec 12 11:31:12 syzkaller kern.info kernel: [ 531.183132][T13062] [U] ^RWVw@HZ=(Ej~OS^S@bH^D:"^H!jI^GUJ=)U g^TԖ^O=y=kad^Ar:=^\S^^aX^LX Dec 12 11:31:12 syzkaller kern.info kernel: [ 531.184307][T13062] [U] BIe߄}ET@3( ߥv{κ~uk+{3T$ƻ.N[8sʇ""ʔ^Z캄^C]^W^H^RRG5 Dec 12 11:31:12 syzkaller kern.info kernel: [ 531.187315][T13062] [U] v{ըvNb>DmtQt^A Dec 12 11:31:12 syzkaller kern.info kernel: [ 531.189280][T13062] [U] ^QG*|9ٺ冸 Dec 12 11:31:12 syzkaller kern.info kernel: [ 531.189293][T13062] [U] G^Emiue!^KT^Aό*8a7i^E5-^F|6lk Dec 12 11:31:12 syzkaller kern.info kernel: [ 531.189324][T13062] [U] ^NNūD^L^E S}Rb^EY^VwIoQ&^AO,p^S^F],7훍uI^_ Dec 12 11:31:12 syzkaller kern.info kernel: [ 531.189368][T13062] [U] $^^Lu2^R^Hf_3+^E|nW^SµZ^CEP1w~^^^PN(o͝8^Td S^]cDʮf65zgR{t^FK"@^H^K:5}GB^HdѸ^P\k Dec 12 11:31:12 syzkaller kern.info kernel: [ 531.189382][T13062] [U] ^L^Dy^Uҟ84^Q4n<; Dec 12 11:31:12 syzkaller kern.info kernel: [ 531.189407][T13062] [U] ^TuI7x^U#e4v^Bml苬G픔A)-(N̗Nl#^U)׌^\Su^\6^W Dec 12 11:31:12 syzkaller kern.info kernel: [ 531.189428][T13062] [U] )<^S^RE^F?aUܤ9^S^Q^L%]dCCe+L<'t1Kȅ^G3.^^^K^^w^HS^^^SZYϼ9i>^A^^]Ȝ}{^A/`^S5'E 41^G^C^KTnAXQI t%G7l~Bs Dec 12 11:31:13 syzkaller kern.info kernel: [ 531.189449][T13062] [U] ^V^V Dec 12 11:31:13 syzkaller kern.info kernel: [ 531.189493][T13062] [U] Z^Hu4&e~8^FEσ1^Bl{ȨGvY^D$PnO^R4M*F`A^H^NTM0^[?*i#;Ѥ+4v^AGa^A%H[aYx)lG^H]F H|zve/^Qϧ17笳-ǽhO+^]^W^^D)8&E^C@A8g녌-wr^Qs-v^T-^_ұO>^Uq^R^C#9u^OaH)f Dec 12 11:31:13 syzkaller kern.info kernel: [ 531.189690][T13062] [U] ^Q Dec 12 11:31:13 syzkaller kern.info kernel: [ 531.189723][T13062] [U] T0ԝ*^Y^AX^V^NAɣa4WKc]x]L= Dec 12 11:31:13 syzkaller kern.info kernel: [ 531.189733][T13062] [U] $c^AUGSe6^TtτPpZ3T2荣^R9W-֑a^[R^ZnBڎ^A:^x^ZϧB^\~{j Dec 12 11:31:13 syzkaller kern.info kernel: [ 531.189801][T13062] [U] TE^F^T' 2l*a^]^K-^H;p;Bt.n^U`ߐ_;^N*U;5^^C#R/QK*msa#)aB>YؐO\;^'^Wo5_yhl^Ace^Y^F&a`;œ^Bss{h TM0^VBi^l^H>^]^P8٢VV8<^F-{$>D ^T] Dec 12 11:31:13 syzkaller kern.info kernel: [ 531.189827][T13062] [U] Dec 12 11:31:13 syzkaller kern.info kernel: [ 531.254861][T13061] [U] [ 532.117888][T12352] Bluetooth: hci5: sending frame failed (-49) [ 532.126776][ T5819] Bluetooth: hci5: Opcode 0x1003 failed: -49 Dec 12 11:31:13 syzkaller kern.err kernel: [ 532.117888][T12352] Bluetooth: hci5: sending frame failed (-49) Dec 12 11:31:13 syzkaller kern.err kernel: [ 532.126776][ T5819] Bluetooth: hci5: Opcode 0x1003 failed: -49 [ 533.204332][ T29] kauditd_printk_skb: 166 callbacks suppressed [ 533.204349][ T29] audit: type=1400 audit(1734003074.904:1490): avc: denied { create } for pid=13097 comm="syz.8.2184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 Dec 12 11:31:14 syzkaller kern.warn kernel: [ 533.204332][ T29] kauditd_printk_skb: 166 callbacks suppressed Dec 12 11:31:14 syzkaller kern.notice kernel: [ 533.204349][ T29] audit: type=1400 audit(1734003074.904:1490): avc: denied { create } for pid=13097 comm="syz.8.2184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis [ 533.303473][ T29] audit: type=1400 audit(1734003074.944:1491): avc: denied { create } for pid=13099 comm="syz.6.2183" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 533.328681][ T5894] libceph: connect (1)[c::]:6789 error -101 Dec 12 11:31:15 [ 533.336407][ T5894] libceph: mon0 (1)[c::]:6789 connect error syzkaller kern.n[ 533.343207][ T29] audit: type=1400 audit(1734003074.944:1492): avc: denied { read } for pid=13099 comm="syz.6.2183" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 otice kernel: [ 533.303473][ T29] audit: type=1400 audit(1734003074.944:1491): avc: denied { create } for pid=13099 comm="syz.6.2183" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_[ 533.389458][ T29] audit: type=1400 audit(1734003074.944:1493): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 in Dec 12 11:31:15 syzkaller kern.err kernel: [ 533.328681][ T5894] libceph: connect (1)[c::]:[ 533.420048][ T29] audit: type=1400 audit(1734003074.944:1494): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 6789 error -101 Dec 12 11:31:15 syzkaller kern.warn kernel: [ [ 533.447180][ T29] audit: type=1400 audit(1734003074.954:1495): avc: denied { read } for pid=13097 comm="syz.8.2184" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 533.336407][ T58[ 533.471288][ T29] audit: type=1400 audit(1734003074.964:1496): avc: denied { create } for pid=13097 comm="syz.8.2184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 94] libceph: mon[ 533.492964][ T29] audit: type=1400 audit(1734003074.974:1497): avc: denied { read write } for pid=8013 comm="syz-executor" name="loop6" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 0 (1)[c::]:6789 connect error Dec 12 11:31:15 s[ 533.521364][ T29] audit: type=1400 audit(1734003075.034:1498): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.notice kernel: [ 533.343207][ T29] audit: type=1400 audit(1734003074.944:1492): avc: denied { read } for pid=13099 comm="syz.6.2183" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tconte[ 533.563382][ T29] audit: type=1400 audit(1734003075.034:1499): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 xt=system_u:object_r:kvm_device_t Dec 12 11:31:15 syzkaller kern.notice kernel: [ 533.389458][ T29] audit: type=1400 audit(1734003074.944:1493): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 11:31:15 syzkaller kern.notice kernel: [ 533.420048][ T29] audit: type=1400 audit(1734003074.944:1494): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 11:31:15 syzkaller kern.notice kernel: [ 533.447180][ T29] audit: type=1400 audit(1734003074.954:1495): avc: denied { read } for pid=13097 comm="syz.8.2184" name="msr" [ 533.653102][ T5894] libceph: connect (1)[c::]:6789 error -101 dev="devtmpfs" ino=87 scontext=r[ 533.662148][ T5894] libceph: mon0 (1)[c::]:6789 connect error oot:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t Dec 12 11:31:15 syzkaller kern.notice kernel: [ 533.471288][ T29] audit: type=1400 audit(1734003074.964:1496): avc: denied { create } for pid=13097 comm="syz.8.2184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis Dec 12 11:31:15 syzkaller kern.notice kernel: [ 533.492964][ T29] audit: type=1400 audit(1734003074.974:1497): avc: denied { read write } for pid=8013 comm="syz-executor" name="loop6" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Dec 12 11:31:15 syzkaller kern.notice kernel: [ 533.521364][ T29] audit: type=1400 audit(1734003075.034:1498): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 11:31:15 syzkaller kern.notice kernel: [ 533.563382][ T29] audit: type=1400 audit(1734003075.034:1499): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 11:31:15 syzkaller kern.err kernel: [ 533.653102][ T5894] libceph: connect (1)[c::]:6789 error -101 Dec 12 11:31:15 syzkaller kern.warn kernel: [ 533.662148][ T5894] libceph: mon0 (1)[c::]:6789 connect error [ 533.911902][T13116] serio: Serial port ptm0 Dec 12 11:31:15 syzkaller kern.info kernel: [ 533.911902][T13116] serio: Serial port ptm0 [ 534.007686][T13098] ceph: No mds server is up or the cluster is laggy Dec 12 11:31:15 syzkaller kern.info kernel: [ 534.007686][T13098] ceph: No mds server is up or the cluster is laggy [ 538.235334][ T29] kauditd_printk_skb: 111 callbacks suppressed [ 538.235351][ T29] audit: type=1400 audit(1734003079.934:1611): avc: denied { create } for pid=13179 comm="syz.2.2209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 Dec 12 11:31:19 syzkaller kern.warn kernel: [ 538.235334][ T29] kauditd_printk_skb: 111 callbacks suppressed Dec 12 11:31:19 syzkaller kern.notice kernel: [ 538.235351][ T29] audit: type=1400 audit(1734003079.934:1611): avc: denied [ 538.292677][ T29] audit: type=1400 audit(1734003079.934:1612): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 { create } for pid=13179 comm="syz.2.2209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 Dec 12 11:31:20 syzkaller kern.notice kernel: [ 538.292677][ T29] audit: type=1400 audit(1734003079.934:1612): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=sy[ 538.351392][ T29] audit: type=1400 audit(1734003079.964:1613): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 stem_u:object_r:fi Dec 12 11:31:20 syzkaller kern.notice kernel: [ 538.351392][ T29] audit: type=1400 audit(1734003079.964:1613): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:obje[ 538.400224][ T29] audit: type=1400 audit(1734003079.974:1614): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ct_r:var_t tclass= Dec 12 11:31:20 syzkaller kern.notice kernel: [ 538.400224][ T29] audit: type=1400 audit(1734003079.974:1614): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 538.453219][ T29] audit: type=1400 audit(1734003079.974:1615): avc: denied { create } for pid=13179 comm="syz.2.2209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 Dec 12 11:31:20 syzkaller kern.notice kernel: [ 538.453219][ T29] audit: type=1400 audit(1734003079.974:1615): avc: denied { create } for pid=13179 comm="syz.2.2209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 538.500687][ T29] audit: type=1400 audit(1734003079.974:1616): avc: denied { create } for pid=13179 comm="syz.2.2209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 Dec 12 11:31:20 syzkaller kern.notice kernel: [ 538.500687][ T29] audit: type=1400 audit(1734003079.974:1616): avc: denied { create } for pid=13179 comm="syz.2.2209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis [ 538.573081][ T29] audit: type=1400 audit(1734003079.974:1617): avc: denied { prog_load } for pid=13179 comm="syz.2.2209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Dec 12 11:31:20 syzkaller kern.notice kernel: [ 538.573081][ T29] audit: type=1400 audit(1734003079.974:1617): avc: denied { prog_load } for pid=13179 comm="syz.2.2209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 538.665096][ T29] audit: type=1400 audit(1734003079.974:1618): avc: denied { create } for pid=13179 comm="syz.2.2209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 Dec 12 11:31:20 syzkaller kern.notice kernel: [ 538.665096][ T29] audit: type=1400 audit(1734003079.974:1618): avc: denied { create } for pid=13179 comm="syz.2.2209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 538.710668][ T29] audit: type=1400 audit(1734003079.974:1619): avc: denied { create } for pid=13179 comm="syz.2.2209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 Dec 12 11:31:20 syzkaller kern.notice kernel: [ 538.710668][ T29] audit: type=1400 audit(1734003079.974:1619): avc: denied [ 538.742881][ T29] audit: type=1400 audit(1734003079.984:1620): avc: denied { map_create } for pid=13179 comm="syz.2.2209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 { create } for pid=13179 comm="syz.2.2209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissi Dec 12 11:31:20 syzkaller kern.notice kernel: [ 538.742881][ T29] audit: type=1400 audit(1734003079.984:1620): avc: denied { map_create } for pid=13179 comm="syz.2.2209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 541.369453][T13229] lo speed is unknown, defaulting to 1000 Dec 12 11:31:23 syzkaller kern.warn kernel: [ 541.369453][T13229] lo speed is unknown, defaulting to 1000 [ 543.536857][ T29] kauditd_printk_skb: 148 callbacks suppressed [ 543.536873][ T29] audit: type=1400 audit(1734003085.234:1769): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Dec 12 11:31:25 syzkaller kern.warn kernel: [ 543.536857][ T29] kauditd_printk_skb: 148 callbacks suppressed Dec 12 11:31:25 syzkaller kern.notice kernel: [ 543.536873][ T29] audit: type=1400 audit(1734003085.234:1769): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 543.612595][ T29] audit: type=1400 audit(1734003085.244:1770): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 11:31:25 syzkaller kern.notice kernel: [ 543.612595][ T29] audit: type=1400 audit(1734003085.244:1770): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tconte[ 543.662731][ T29] audit: type=1400 audit(1734003085.274:1771): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 xt=system_u:object_r:var_t tclass= Dec 12 11:31:25 syzkaller kern.notice kernel: [ 543.662731][ T29] audit: type=1400 audit(1734003085.274:1771): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 543.757815][ T29] audit: type=1400 audit(1734003085.344:1772): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 11:31:25 syzkaller kern.notice kernel: [ 543.757815][ T29] audit: type=1400 audit(1734003085.344:1772): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 543.837051][ T29] audit: type=1400 audit(1734003085.384:1773): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 11:31:25 syzkaller kern.notice kernel: [ 543.837051][ T29] audit: type=1400 audit(1734003085.384:1773): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 543.908139][ T29] audit: type=1400 audit(1734003085.394:1774): avc: denied { prog_load } for pid=13265 comm="syz.0.2239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Dec 12 11:31:25 syzkaller kern.notice kernel: [ 543.908139][ T29] audit: type=1400 audit(1734003085.394:1774): avc: denied { prog_load } for pid=13265 comm="syz.0.2239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 543.983134][ T29] audit: type=1400 audit(1734003085.474:1775): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 11:31:25 syzkaller kern.notice kernel: [ 543.983134][ [ 544.012290][ T29] audit: type=1400 audit(1734003085.554:1776): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 T29] audit: type=1400 audit(1734003085.474:1775): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=[ 544.045543][ T29] audit: type=1400 audit(1734003085.574:1777): avc: denied { read write } for pid=5824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 11:31:25 syzkaller kern.notice kernel: [ 544.012290][ T29] audit: type=1400 audit(1734003085.554:1776): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 11:31:25 syzkaller kern.notice kernel: [ 544.045[ 544.104556][ T29] audit: type=1400 audit(1734003085.644:1778): avc: denied { create } for pid=13271 comm="syz.2.2240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 543][ T29] audit: type=1400 audit(1734003085.574:1777): avc: denied { read write } for pid=5824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Dec 12 11:31:25 syzkaller kern.notice kernel: [ 544.104556][ T29] audit: type=1400 audit(1734003085.644:1778): avc: denied { create } for pid=13271 comm="syz.2.2240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis [ 545.978031][T13303] ip6t_srh: unknown srh match flags 4000 Dec 12 11:31:27 syzkaller kern.info kernel: [ 545.978031][T13303] ip6t_srh: unknown srh match flags 4000 [ 548.544109][ T29] kauditd_printk_skb: 141 callbacks suppressed [ 548.544126][ T29] audit: type=1400 audit(1734003090.244:1920): avc: denied { create } for pid=13344 comm="syz.2.2266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 Dec 12 11:31:30 syzkaller kern.warn kernel: [ 548.544109][ T29] kauditd_printk_skb: 141 callbacks suppressed Dec 12 11:31:30 syzkaller kern.notice kernel: [ 548.544126][ T29] audit: type=1400 audit(1734003090.244:1920): avc: denied { create } for pid=13344 comm="syz.2.2266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 548.613087][ T29] audit: type=1400 audit(1734003090.264:1921): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 11:31:30 syzkaller kern.notice kernel: [ 548.613087][ T29] audit: type=1400 audit(1734003090.264:1921): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 548.667331][ T29] audit: type=1400 audit(1734003090.264:1922): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 11:31:30 syzkaller kern.notice kernel: [ 548.667331][ T29] audit: type=1400 audit(1734003090.264:1922): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 548.733100][ T29] audit: type=1400 audit(1734003090.264:1923): avc: denied { prog_load } for pid=13344 comm="syz.2.2266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Dec 12 11:31:30 syzkaller kern.notice kernel: [ 548.733100][ T29] audit: type=1400 audit(1734003090.264:1923): avc: denied { prog_load } for pid=13344 comm="syz.2.2266" scontext=root:sysadm_r:sysadm_t tcontext=root:sys[ 548.779442][ T29] audit: type=1400 audit(1734003090.304:1924): avc: denied { prog_load } for pid=13346 comm="syz.0.2267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 adm_r:sysadm_t tclass=bpf permissive=0 [ 548.802619][ T29] audit: type=1400 audit(1734003090.334:1925): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 548.825191][ T29] audit: type=1400 audit(1734003090.344:1926): avc: denied { read } for pid=13346 comm="syz.0.2267" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 548.848198][ T29] audit: type=1400 audit(1734003090.344:1927): avc: denied { create } for pid=13346 comm="syz.0.2267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=0 [ 548.869495][ T29] audit: type=1400 audit(1734003090.344:1928): avc: denied { create } for pid=13346 comm="syz.0.2267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 548.890313][ T29] audit: type=1400 audit(1734003090.344:1929): avc: denied { create } for pid=13346 comm="syz.0.2267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 Dec 12 11:31:30 syzkaller kern.notice kernel: [ 548.779442][ T29] audit: type=1400 audit(1734003090.304:1924): avc: denied { prog_load } for pid=13346 comm="syz.0.2267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Dec 12 11:31:30 syzkaller kern.notice kernel: [ 548.802619][ T29] audit: type=1400 audit(1734003090.334:1925): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 11:31:30 syzkaller kern.notice kernel: [ 548.825191][ T29] audit: type=1400 audit(1734003090.344:1926): avc: denied { read } for pid=13346 comm="syz.0.2267" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t Dec 12 11:31:30 syzkaller kern.notice kernel: [ 548.848198][ T29] audit: type=1400 audit(1734003090.344:1927): avc: denied { create } for pid=13346 comm="syz.0.2267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket pe Dec 12 11:31:30 syzkaller kern.notice kernel: [ 548.869495][ T29] audit: type=1400 audit(1734003090.344:1928): avc: denied { create } for pid=13346 comm="syz.0.2267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis Dec 12 11:31:30 syzkaller kern.notice kernel: [ 548.890313][ T29] audit: type=1400 audit(1734003090.344:1929): avc: denied { create } for pid=13346 comm="syz.0.2267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis [ 553.980547][ T29] kauditd_printk_skb: 175 callbacks suppressed [ 553.980564][ T29] audit: type=1400 audit(1734003095.674:2105): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Dec 12 11:31:35 syzkaller kern.warn kernel: [ 553.980547][ T29] kauditd_printk_skb: 175 callbacks suppressed Dec 12 11:31:35 syzkaller kern.notice kernel: [ 553.980564][ T29] audit: type=1400 audit(1734003095.674:2105): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 554.212900][ T29] audit: type=1400 audit(1734003095.714:2106): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 11:31:35 syzkaller kern.notice kernel: [ 554.212900][ T29] audit: type=1400 audit(1734003095.714:2106): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 554.315718][ T29] audit: type=1400 audit(1734003095.714:2107): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 11:31:36 syzkaller kern.notice kernel: [ 554.315718][ T29] audit: type=1400 audit(1734003095.714:2107): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 554.414188][ T29] audit: type=1400 audit(1734003095.744:2108): avc: denied { read write } for pid=12434 comm="syz-executor" name="loop8" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Dec 12 11:31:36 syzkaller kern.notice kernel: [ 554.414188][ T29] audit: type=1400 audit(1734003095.744:2108): avc: denied { read write } for pid=12434 comm="syz-executor" name="loop8" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f [ 554.545964][ T29] audit: type=1400 audit(1734003095.804:2109): avc: denied { read } for pid=13443 comm="syz.0.2302" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 Dec 12 11:31:36 syzkaller kern.notice kernel: [ 554.545964][ T29] audit: type=1400 audit(1734003095.804:2109): avc: denied { read } for pid=13443 comm="syz.0.2302" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t [ 554.652852][ T29] audit: type=1400 audit(1734003095.804:2110): avc: denied { read } for pid=13443 comm="syz.0.2302" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 Dec 12 11:31:36 syzkaller kern.notice kernel: [ 554.652852][ T29] audit: type=1400 audit(1734003095.804:2110): avc: denied { read } for pid=13443 comm="syz.0.2302" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t [ 554.746970][ T29] audit: type=1400 audit(1734003095.804:2111): avc: denied { read } for pid=13443 comm="syz.0.2302" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 Dec 12 11:31:36 syzkaller kern.notice kernel: [ 554.746970][ T29] audit: type=1400 audit(1734003095.804:2111): avc: denied { read } for pid=13443 comm="syz.0.2302" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t [ 554.836120][ T29] audit: type=1400 audit(1734003095.804:2112): avc: denied { read } for pid=13443 comm="syz.0.2302" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 Dec 12 11:31:36 syzkaller kern.notice kernel: [ 554.836120][ T29] audit: type=1400 audit(1734003095.804:2112): avc: denied { read } for pid=13443 comm="syz.0.2302" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t [ 554.942835][ T29] audit: type=1400 audit(1734003095.864:2113): avc: denied { read } for pid=13443 comm="syz.0.2302" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 Dec 12 11:31:36 syzkaller kern.notice kernel: [ 554.942835][ T29] audit: type=1400 audit(1734003095.864:2113): avc: denied { read } for pid=13443 comm="syz.0.2302" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t [ 555.028113][ T29] audit: type=1400 audit(1734003095.864:2114): avc: denied { read } for pid=13442 comm="syz.8.2303" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 Dec 12 11:31:36 syzkaller kern.notice kernel: [ 555.028113][ T29] audit: type=1400 audit(1734003095.864:2114): avc: denied { read } for pid=13442 comm="syz.8.2303" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t [ 559.142883][ T29] kauditd_printk_skb: 169 callbacks suppressed [ 559.142903][ T29] audit: type=1400 audit(1734003100.824:2284): avc: denied { read write } for pid=12434 comm="syz-executor" name="loop8" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Dec 12 11:31:40 syzkaller kern.warn kernel: [ 559.142883][ T29] kauditd_printk_skb: 169 callbacks suppressed Dec 12 11:31:40 syzkaller kern.notice kernel: [ 559.142903][ T29] audit: type=1400 audit(1734003100.824:2284): avc: denied { read write } for pid=12434 comm="syz-executor" name="loop8" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f [ 559.228883][ T29] audit: type=1400 audit(1734003100.874:2285): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 11:31:40 syzkaller kern.notice kernel: [ 559.228883][ T29] audit: type=1400 audit(1734003100.874:2285): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 559.347175][ T29] audit: type=1400 audit(1734003100.874:2286): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 11:31:41 syzkaller kern.notice kernel: [ 559.347175][ T29] audit: type=1400 audit(1734003100.874:2286): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 559.432218][ T29] audit: type=1400 audit(1734003100.884:2287): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Dec 12 11:31:41 syzkaller kern.notice kernel: [ 559.432218][ T29] audit: type=1400 audit(1734003100.884:2287): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 559.483201][ T29] audit: type=1400 audit(1734003100.914:2288): avc: denied { read } for pid=13518 comm="syz.8.2332" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 Dec 12 11:31:41 syzkaller kern.notice kernel: [ 559.483201][ T29] audit: type=1400 audit(1734003100.914:2288): avc: denied { read } for pid=13518 comm="syz.8.2332" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t [ 559.565353][ T29] audit: type=1400 audit(1734003100.924:2289): avc: denied { read } for pid=13518 comm="syz.8.2332" dev="nsfs" ino=4026532855 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 Dec 12 11:31:41 syzkaller kern.notice kernel: [ 559.565353][ T29] audit: type=1400 audit(1734003100.924:2289): avc: denied { read } for pid=13518 comm="syz.8.2332" dev="nsfs" ino=4026532855 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file [ 559.624964][ T29] audit: type=1400 audit(1734003100.924:2290): avc: denied { read } for pid=13518 comm="syz.8.2332" dev="nsfs" ino=4026532855 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 Dec 12 11:31:41 syzkaller kern.notice kernel: [ 559.624964][ T29] audit: type=1400 audit(1734003100.924:2290): avc: denied { read } for pid=13518 comm="syz.8.2332" dev="nsfs" ino=4026532855 scontext=root:sysadm_r:sysad[ 559.673289][ T29] audit: type=1400 audit(1734003100.924:2291): avc: denied { create } for pid=13518 comm="syz.8.2332" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 m_t tcontext=system_u:object_r:nsfs_t tclass=file Dec 12 11:31:41 syzkaller kern.notice kernel: [ 559.673289][ T29] audit: type=1400 audit(1734003100.924:2291): avc: denied { create } for pid=13518 comm="syz.8.2332" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm[ 559.718001][ T29] audit: type=1400 audit(1734003100.954:2292): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 _r:sysadm_t tclass=netlink_generic_socket permissi Dec 12 11:31:41 syzkaller kern.notice kernel: [ 559.718001][ T29] audit: type=1400 audit(1734003100.954:2292): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tconte[ 559.766846][ T29] audit: type=1400 audit(1734003100.974:2293): avc: denied { execmem } for pid=13520 comm="syz.3.2333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 xt=system_u:object_r:var_t tclass= Dec 12 11:31:41 syzkaller kern.notice kernel: [ 559.766846][ T29] audit: type=1400 audit(1734003100.974:2293): avc: denied { execmem } for pid=13520 comm="syz.3.2333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 559.880978][T13535] net_ratelimit: 10 callbacks suppressed [ 559.880995][T13535] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) Dec 12 11:31:41 syzkaller kern.warn kernel: [ 559.880978][T13535] net_ratelimit: 10 callbacks suppressed Dec 12 11:31:41 syzkaller kern.warn kernel: [ 559.880995][T13535] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 562.569322][T13593] IPVS: length: 163 != 24 Dec 12 11:31:44 syzkaller kern.err kernel: [ 562.569322][T13593] IPVS: length: 163 != 24 [ 562.735086][T13595] xt_CT: You must specify a L4 protocol and not use inversions on it Dec 12 11:31:44 syzkaller kern.info kernel: [ 562.735086][T13595] xt_CT: You must specify a L4 protocol and not use inversions on it [ 562.793888][T13595] trusted_key: encrypted_key: insufficient parameters specified Dec 12 11:31:44 syzkaller kern.err kernel: [ 562.793888][T13595] trusted_key: encrypted_key: insufficient parameters specified [ 564.169703][ T29] kauditd_printk_skb: 202 callbacks suppressed [ 564.169721][ T29] audit: type=1400 audit(1734003105.864:2496): avc: denied { read write } for pid=12434 comm="syz-executor" name="loop8" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Dec 12 11:31:45 syzkaller kern.warn kernel: [ 564.169703][ T29] kauditd_printk_skb: 202 callbacks suppressed[ 564.216810][ T29] audit: type=1400 audit(1734003105.874:2497): avc: denied { execmem } for pid=13620 comm="syz.6.2369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Dec 12 11:31:45 syzkaller kern.notice kernel: [ 564.169721][ T29] audit: type=1400 audit(1734003105.864:2496): avc: denied { read write } for pid=12434 comm="syz-executor" name="loop8" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=[ 564.259552][ T29] audit: type=1400 audit(1734003105.904:2498): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 system_u:object_r:f Dec 12 11:31:45 syzkaller kern.notice kernel: [ 564.216810][ T29] audit: type=1400 audit(1734003105.874:2497): avc: denied { execmem } for pid=13620 comm="syz.6.2369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Dec 12 11:31:46 syzkaller kern.notice kernel: [ 564.259552][ T29] audit: type=1400 audit(1734003105.904:2498): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 564.343733][ T29] audit: type=1400 audit(1734003105.904:2499): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 11:31:46 syzkaller kern.notice kernel: [ 564.343733][ T29] audit: type=1400 audit(1734003105.904:2499): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:obje[ 564.388786][ T29] audit: type=1400 audit(1734003105.944:2500): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ct_r:var_t tclass= Dec 12 11:31:46 syzkaller kern.notice kernel: [ 564.388786][ T29] audit: type=1400 audit(1734003105.944:2500): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 564.493102][ T29] audit: type=1400 audit(1734003105.944:2501): avc: denied { create } for pid=13620 comm="syz.6.2369" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 Dec 12 11:31:46 syzkaller kern.notice kernel: [ 564.493102][ T29] audit: type=1400 audit(1734003105.944:2501): avc: denied { create } for pid=13620 comm="syz.6.2369" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode [ 564.543665][ T29] audit: type=1400 audit(1734003105.954:2502): avc: denied { read } for pid=13620 comm="syz.6.2369" name="v4l-subdev5" dev="devtmpfs" ino=945 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 Dec 12 11:31:46 syzkaller kern.notice kernel: [ 564.543665][ T29] audit: type=1400 audit(1734003105.954:2502): avc: denied { read } for pid=13620 comm="syz.6.2369" name="v4l-subdev5" dev="devtmpfs" ino=945 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dev [ 564.605282][ T29] audit: type=1400 audit(1734003106.004:2503): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 11:31:46 syzkaller kern.notice kernel: [ 564.605282][ T29] audit: type=1400 audit(1734003106.004:2503): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 564.652941][ T29] audit: type=1400 audit(1734003106.014:2504): avc: denied { prog_load } for pid=13622 comm="syz.2.2370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Dec 12 11:31:46 syzkaller kern.notice kernel: [ 564.652941][ T29] audit: type=1400 audit(1734003106.014:2504): avc: denied { prog_load } for pid=13622 comm="syz.2.2370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 564.698713][ T29] audit: type=1400 audit(1734003106.024:2505): avc: denied { read } for pid=13622 comm="syz.2.2370" dev="nsfs" ino=4026533362 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 Dec 12 11:31:46 syzkaller kern.notice kernel: [ 564.698713][ T29] audit: type=1400 audit(1734003106.024:2505): avc: denied { read } for pid=13622 comm="syz.2.2370" dev="nsfs" ino=4026533362 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file [ 565.746272][T13656] block device autoloading is deprecated and will be removed. Dec 12 11:31:47 syzkaller kern.warn kernel: [ 565.746272][T13656] block device autoloading is deprecated and will be removed. [ 565.815312][T13656] syz.6.2381: attempt to access beyond end of device [ 565.815312][T13656] md0: rw=2048, sector=0, nr_sectors = 8 limit=0 Dec 12 11:31:47 syzkaller kern.info kernel: [ 565.815312][T13656] syz.6.2381: attempt to access beyond end of device Dec 12 11:31:47 syzkaller kern.info kernel: [ 565.815312][T13656] md0: rw=2048, sector=0, nr_sectors = 8 limit=0 Dec 12 11:31:47 syzkaller kern.debug kernel: [ 565.874847][T13656] PM: Image not found (code -5) [ 566.939319][T13682] PKCS7: Unknown OID: [4] 2.19.13055.170809666(bad) [ 566.955645][T13682] PKCS7: Only support pkcs7_signedData type Dec 12 11:31:48 syzkaller kern.warn kernel: [ 566.939319][T13682] PKCS7: Unknown OID: [4] 2.19.13055.170809666(bad) Dec 12 11:31:48 syzkaller kern.warn kernel: [ 566.955645][T13682] PKCS7: Only support pkcs7_signedData type [ 569.431959][ T29] kauditd_printk_skb: 238 callbacks suppressed [ 569.431978][ T29] audit: type=1400 audit(1734003111.124:2744): avc: denied { read write } for pid=5824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Dec 12 11:31:51 syzkaller kern.warn kernel: [ 569.431959][ T29] kauditd_printk_skb: 238 callbacks suppressed Dec 12 11:31:51 syzkaller kern.notice kernel: [ 569.431978][ T29] audit: type=1400 audit(1734003111.124:2744): avc: denied { read write } for pid=5824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=r[ 569.511640][ T29] audit: type=1400 audit(1734003111.184:2745): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 oot:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Dec 12 11:31:51 syzkaller kern.notice kernel: [ 569.511640][ T29] audit: type=1400 audit(1734003111.184:2745): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:obje[ 569.573328][ T29] audit: type=1400 audit(1734003111.184:2746): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ct_r:var_t tclass= Dec 12 11:31:51 syzkaller kern.notice kernel: [ 569.573328][ T29] audit: type=1400 audit(1734003111.184:2746): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" [ 569.612681][ T29] audit: type=1400 audit(1734003111.194:2747): avc: denied { execmem } for pid=13718 comm="syz.2.2405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 ino=1915 scontex[ 569.633939][ T29] audit: type=1400 audit(1734003111.194:2748): avc: denied { read } for pid=13718 comm="syz.2.2405" dev="nsfs" ino=4026533362 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 t=system_u:syste[ 569.633975][ T29] audit: type=1400 audit(1734003111.194:2749): avc: denied { read } for pid=13718 comm="syz.2.2405" name="iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 m_r:syslogd_t tc[ 569.680502][ T29] audit: type=1400 audit(1734003111.194:2750): avc: denied { read } for pid=13718 comm="syz.2.2405" name="iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 ontext=system_u:[ 569.704376][ T29] audit: type=1400 audit(1734003111.194:2751): avc: denied { read } for pid=13718 comm="syz.2.2405" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 object_r:var_t t[ 569.728079][ T29] audit: type=1400 audit(1734003111.244:2752): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 class= [ 569.751733][ T29] audit: type=1400 audit(1734003111.274:2753): avc: denied { read write } for pid=5824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Dec 12 11:31:51 syzkaller kern.notice kernel: [ 569.612681][ T29] audit: type=1400 audit(1734003111.194:2747): avc: denied { execmem } for pid=13718 comm="syz.2.2405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Dec 12 11:31:51 syzkaller kern.notice kernel: [ 569.633939][ T29] audit: type=1400 audit(1734003111.194:2748): avc: denied { read } for pid=13718 comm="syz.2.2405" dev="nsfs" ino=4026533362 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file Dec 12 11:31:51 syzkaller kern.notice kernel: [ 569.633975][ T29] audit: type=1400 audit(1734003111.194:2749): avc: denied { read } for pid=13718 comm="syz.2.2405" name="iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t Dec 12 11:31:51 syzkaller kern.notice kernel: [ 569.680502][ T29] audit: type=1400 audit(1734003111.194:2750): avc: denied { read } for pid=13718 comm="syz.2.2405" name="iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t Dec 12 11:31:51 syzkaller kern.notice kernel: [ 569.704376][ T29] audit: type=1400 audit(1734003111.194:2751): avc: denied { read } for pid=13718 comm="syz.2.2405" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t Dec 12 11:31:51 syzkaller kern.notice kernel: [ 569.728079][ T29] audit: type=1400 audit(1734003111.244:2752): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 11:31:51 syzkaller kern.notice kernel: [ 569.751733][ T29] audit: type=1400 audit(1734003111.274:2753): avc: denied { read write } for pid=5824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 574.459279][ T29] kauditd_printk_skb: 153 callbacks suppressed [ 574.459296][ T29] audit: type=1400 audit(1734003116.154:2907): avc: denied { read write } for pid=5824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Dec 12 11:31:56 syzkaller kern.warn kernel: [ 574.459279][ T29] kauditd_print[ 574.498311][ T29] audit: type=1400 audit(1734003116.194:2908): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 153 callbacks suppressed Dec 12 11:31:56 syzkaller kern.notice kernel: [ 574.459296][ T29] audit: type=1400 audit(1734003116.154:2907[ 574.532358][ T29] audit: type=1400 audit(1734003116.194:2909): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ): avc: denied { read write } for pid=5824 comm="syz-executor" name="loop2" d[ 574.561555][ T29] audit: type=1400 audit(1734003116.224:2910): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Dec 12 11:31:56 syzkaller kern.notice kernel: [ 574.498311][ T29] audit: type=1400 audit[ 574.598987][ T29] audit: type=1400 audit(1734003116.254:2911): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 (1734003116.194:2908): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 11:31:56 syzkaller kern.notice kernel: [ 574.532358][ T29] audit: type=1400 audit(1734003116.194:2909): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 11:31:56 syzkaller kern.notice kernel: [ 574.561555][ T29] audit: type=1400 audit(1734003116.224:2910): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 11:31:56 syzkaller kern.notice kernel: [ 574.598987][ T29] audit: type=1400 audit(1734003116.254:2911): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 574.719053][ T29] audit: type=1400 audit(1734003116.294:2912): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 11:31:56 syzkaller kern.notice kernel: [ 574.719053][ T29] audit: type=1400 audit(1734003116.294:2912): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 574.788215][ T29] audit: type=1400 audit(1734003116.294:2913): avc: denied { prog_load } for pid=13802 comm="syz.2.2434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 574.818040][ T29] audit: type=1400 audit(1734003116.324:2914): avc: denied { execmem } for pid=13802 comm="syz.2.2434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 574.838389][ T29] audit: type=1400 audit(1734003116.324:2915): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 574.860965][ T29] audit: type=1400 audit(1734003116.364:2916): avc: denied { read write } for pid=12434 comm="syz-executor" name="loop8" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Dec 12 11:31:56 syzkaller kern.notice kernel: [ 574.788215][ T29] audit: type=1400 audit(1734003116.294:2913): avc: denied { prog_load } for pid=13802 comm="syz.2.2434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Dec 12 11:31:56 syzkaller kern.notice kernel: [ 574.818040][ T29] audit: type=1400 audit(1734003116.324:2914): avc: denied { execmem } for pid=13802 comm="syz.2.2434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Dec 12 11:31:56 syzkaller kern.notice kernel: [ 574.838389][ T29] audit: type=1400 audit(1734003116.324:2915): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 11:31:56 syzkaller kern.notice kernel: [ 574.860965][ T29] audit: type=1400 audit(1734003116.364:2916): avc: denied { read write } for pid=12434 comm="syz-executor" name="loop8" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f [ 575.921324][T13840] [U] [ 575.924031][T13840] [U] Dec 12 11:31:57 syzkaller kern.info kernel: [ 575.921324][T13840] [U] Dec 12 11:31:57 syzkall[ 575.935936][T13840] [U] B-lrj[ќ6}%4 h@k-YLeU@f%Peze,9F* er kern.info kernel: [ 575.924031][T13840] [U] Dec 12 11:31:57 syzkaller kern.info kernel: [ 575.935936][T13840] [U] B-^Wlr^Fj[^Eќ6}%4 ^Zh^U@k-YLeU^[@f%Peze,^P9F^S* [ 575.971501][T13840] [U] Cw* 9JQ#esWCv1! GpX Dec 12 11:31:57 syzkaller kern.i[ 575.981795][T13840] [U] n%9C_nBc$4( [ 575.987646][T13840] [U] h q؛toRI#TNBs_R櫰:t 0W_[Hn% nfo kernel: [ 575.971501][T13840] [U] Cw^Z*[ 575.999547][T13840] [U] 4RЛ<)6jG؃K^R\ ^T9J^BQ#esW^[Cv1^X! GpX Dec 12 11:31:57 syzkaller kern.info kernel: [ 575.981795][T13840] [U] n%9C_[ 576.016926][T13840] [U] 7R:j37 nBc^P$^F4( Dec 12 11:31:57 syzkaller kern.info kernel: [ 575.98764[ 576.027832][T13840] [U] yPDyj>|h0=TXZY֦ʢĚ4i5Az~Za~k^tGsJI:OD!M2KWR>KC?x8H*@Qeۻu .j9ȓ~{`'r)-Ǭ=5֝JLy CB;+LP,fnY%3p&)][ȋ4l㶣!J> [ 576.054454][ C1] vkms_vblank_simulate: vblank timer overrun 6][T13840] [U] h q؛toRI#TNBs_R^X櫰^A:^^t^L0^XW_[Hn% Dec 12 11:31:57 syzkaller kern.info kernel: [ 575.999547][T13840] [U] 4RЛ^N<)6^]^Z^O^FjG؃K^R\ Dec 12 11:31:57 syzkaller kern.info kernel: [ 576.016926][T13840] [U] 7^FR:j37^Q Dec 12 11:31:57 syzkaller ke[ 576.087766][T13840] [U] .CeJj@KJ605RxUTTO&XO\&N%y176`Iw rn.info kernel: [ 576.027832][T13840] [U] yPDy^Wj>|^Nh0=TXZY֦ʢ^AĚ4i5Az^X~^HZa~k^tGsJI:OD!M^F2K^D[ 576.114553][T13840] [U] M<@nkJ(6))Vlr WR>^BKC?x8H*@Qeۻu ^X.j9ȓ~{`[ 576.124422][T13840] [U] >Yg z?`OmX"9+dE{$~byDUMe!xݛAAU}j2n%mbq 'r)-^NǬ^_=5 Dec 12 11:31:57 syzkaller k[ 576.138041][T13840] [U] WVw@HZ=(Ej~OS@bH:"!jIUJ=)U gԖ=y=kadr:=SaX X ern.warn kernel:[ 576.152407][T13840] [U] BIe߄}ET@3( ߥv{κ~uk+{3T$ƻ.N[8sʇ""ʔ캄]RG5 [ 576.054454][ C1] vkms_vblank_simulate: vblank timer overrun Dec 12 11:31:57 syzkaller ke[ 576.170387][T13840] [U] v{ըvNb>DmtQt rn.info kernel: [ 576.176444][T13840] [U] G*|9ٺ冸 [ 576.180767][T13840] [U] Gmiue! Tό*8a7i5-|6lk [ 576.087766][T13840] [U] .C^_^Be^FJj^A@KJ605RxUT[ 576.191660][T13840] [U] NūD  S}RbYwIoQ&O,p],7훍uI TO^W&^QXO\^R&^\N^A%y176`^PIw Dec 12 11:31:57 syzkaller [ 576.212781][T13840] [U] $Lu2f_3+|nWµZEP1w~N(o͝8d ScDʮf65zgR{tK"@ :5}GBdѸ\k kern.info kernel: [ 576.114553][ 576.229223][T13840] [U] yҟ844n<; [T13840] [U] ^Q[ 576.235144][T13840] [U] uI7x#e4vml苬G픔A)-(N̗Nl#)׌Su6 [ 576.239349][T13840] [U] )<E?aUܤ9 %]dCCe+L<'t1Kȅ3. wSZYϼ9i>]Ȝ}{/`5'E 41 TnAXQI t%G7l~Bs M<@n^_^W^Y^NkJ(^^6))^NV^_l^^r Dec 12[ 576.262145][T13840] [U]  11:31:57 syzkal[ 576.267781][T13840] [U] Zu4&e~8Eσ1l{ȨGvY$PnO4M*F`ATM0?*i#;Ѥ+4vGa%H[aYx)lG]F H|zve/ϧ17笳-ǽhO+^)8&E@A8g녌-wrs-v-ұO>q#9uaH)fSA֙inz@C>kLVD^1)m$/78..qa|)9">d>e#i`\|{ufh.. eMw}]5 -,Ţrk}FqCo*pNF [ 576.301518][ C1] vkms_vblank_simulate: vblank timer overrun ler kern.info kernel: [ 576.124422][T13840] [U] >Yg^Lz?`^ZOmX^V"9+d^YE{^P$^O~byDUMe!xݛAAU}j2n%mb^Tq Dec 12 11:31:57 syzkaller kern.info kernel: [ 576.138041][T13840] [U] ^RWVw@HZ=(Ej[ 576.328158][T13840] [U]  ~OS^S@bH^D:"^H!jI^GUJ=)U g^TԖ^O=y=kad^Ar:=^\S[ 576.337573][T13840] [U] T0ԝ*XAɣa4WKc]x]L= ^^aX^LX D[ 576.346000][T13840] [U] $cUGSe6tτPpZ3T2荣9W-֑aRnBڎ:^xϧB~{j ec 12 11:31:57 syzkaller kern.info kernel: [ 576.152407][T13840[ 576.362485][T13840] [U] TE' 2l*a -;p;Bt.n`ߐ_;*U;5C#R/QK*msa#)aB>YؐO\;^'o5_yhlce&a`;œss{h TM0Bi^l>8٢VV8<-{$>D ]wu0?k ˼[uIrb_iL/eSi*ws*zS͎ђ [ 576.389232][T13840] [U] [ 576.391974][ C1] vkms_vblank_simulate: vblank timer overrun ] [U] BIe߄}ET@3( ߥv{κ~uk+{3T$ƻ.N[8sʇ""ʔ^Z캄^C]^W^H^RRG5 Dec 12 11:31:57 syzkaller kern.info kernel: [ 576.170387][T13840] [U] v{ըvNb>DmtQt^A Dec 12 11:31:57 syzkaller kern.info kernel: [ 576.176444][T13840] [U] ^QG*|9ٺ冸 Dec 12 11:31:57 syzkaller kern.info kernel: [ 576.180767][T13840] [U] G^Emiue!^KT^[ 576.429630][T13839] [U] Aό*8a7i^E5-^F|6lk Dec 12 11:31:57 syzkaller kern.info kernel: [ 576.191660][T13840] [U] ^NNūD^L^E S}Rb^EY^VwIoQ&^AO,p^S^F],7훍uI^_ Dec 12 11:31:57 syzkaller kern.info kernel: [ 576.212781][T13840] [U] $^^Lu2^R^Hf_3+^E|nW^SµZ^CEP1w~^^^PN(o͝8^Td S^]cDʮf65zgR{t^FK"@^H^K:5}GB^HdѸ^P\k Dec 12 11:31:57 syzkaller kern.info kernel: [ 576.229223][T13840] [U] ^L^Dy^Uҟ84^Q4n<; Dec 12 11:31:57 syzkaller kern.info kernel: [ 576.235144][T13840] [U] ^TuI7x^U#e4v^Bml苬G픔A)-(N̗Nl#^U)׌^\Su^\6^W Dec 12 11:31:57 syzkaller kern.info kernel: [ 576.239349][T13840] [U] )<^S^RE^F?aUܤ9^S^Q^L%]dCCe+L<'t1Kȅ^G3.^^^K^^w^HS^^^SZYϼ9i>^A^^]Ȝ}{^A/`^S5'E 41^G^C^KTnAXQI t%G7l~Bs Dec 12 11:31:57 syzkaller kern.info kernel: [ 576.262145][T13840] [U] ^V^V Dec 12 11:31:57 syzkaller kern.info kernel: [ 576.267781][T13840] [U] Z^Hu4&e~8^FEσ1^Bl{ȨGvY^D$PnO^R4M*F`A^H^NTM0^[?*i#;Ѥ+4v^AGa^A%H[aYx)lG^H]F H|zve/^Qϧ17笳-ǽhO+^]^W^^D)8&E^C@A8g녌-wr^Qs-v^T-^_ұO>^Uq^R^C#9u^OaH)f Dec 12 11:31:58 syzkaller kern.warn kernel: [ 576.301518][ C1] vkms_vblank_simulate: vblank timer overrun Dec 12 11:31:58 syzkaller kern.info kernel: [ 576.328158][T13840] [U] ^Q Dec 12 11:31:58 syzkaller kern.info kernel: [ 576.337573][T13840] [U] T0ԝ*^Y^AX^V^NAɣa4WKc]x]L= Dec 12 11:31:58 syzkaller kern.info kernel: [ 576.346000][T13840] [U] $c^AUGSe6^TtτPpZ3T2荣^R9W-֑a^[R^ZnBڎ^A:^x^ZϧB^\~{j Dec 12 11:31:58 syzkaller kern.info kernel: [ 576.362485][T13840] [U] TE^F^T' 2l*a^]^K-^H;p;Bt.n^U`ߐ_;^N*U;5^^C#R/QK*msa#)aB>YؐO\;^'^Wo5_yhl^Ace^Y^F&a`;œ^Bss{h TM0^VBi^l^H>^]^P8٢VV8<^F-{$>D ^T] Dec 12 11:31:58 syzkaller kern.info kernel: [ 576.389232][T13840] [U] Dec 12 11:31:58 syzkaller kern.warn kernel: [ 576.391974][ C1] vkms_vblank_simulate: vblank timer overrun Dec 12 11:31:58 syzkaller kern.info kernel: [ 576.429630][T13839] [U] [ 579.468775][ T29] kauditd_printk_skb: 276 callbacks suppressed [ 579.468792][ T29] audit: type=1400 audit(1734003121.164:3193): avc: denied { read write } for pid=12434 comm="syz-executor" name="loop8" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Dec 12 11:32:01 syzkaller kern.warn kernel: [ 579.468775][ T29] kauditd_printk_skb: 276 callbacks suppressed Dec 12 11:32:01 syzkaller kern.notice kernel: [ 579.468792][ T29] audit: type=1400 audit(1734003121.164:3193): avc: denied { read write } for pid=12434 comm="syz-executor" name="loop8" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f [ 579.554738][ T29] audit: type=1400 audit(1734003121.194:3194): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 11:32:01 syzkaller kern.notice kernel: [ 579.554738][ T29] audit: type=1400 audit(1734003121.194:3194): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 579.626501][ T29] audit: type=1400 audit(1734003121.194:3195): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 11:32:01 syzkaller kern.notice kernel: [ 579.626501][ T29] audit: type=1400 audit(1734003121.194:3195): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 579.696048][ T29] audit: type=1400 audit(1734003121.284:3196): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 11:32:01 syzkaller kern.notice kernel: [ 579.696048][ T29] audit: type=1400 audit(1734003121.284:3196): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 579.760833][ T29] audit: type=1400 audit(1734003121.294:3197): avc: denied { create } for pid=13913 comm="syz.8.2475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 Dec 12 11:32:01 syzkaller kern.notice kernel: [ 579.760833][ T29] audit: type=1400 audit(1734003121.294:3197): avc: denied { create } for pid=13913 comm="syz.8.2475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 579.809238][ T29] audit: type=1400 audit(1734003121.294:3198): avc: denied { create } for pid=13913 comm="syz.8.2475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 Dec 12 11:32:01 syzkaller kern.notice kernel: [ 579.809238][ T29] audit: type=1400 audit(1734003121.294:3198): avc: denied [ 579.850732][ T29] audit: type=1400 audit(1734003121.314:3199): avc: denied { create } for pid=13913 comm="syz.8.2475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 { create } for pid=13913 comm="syz.8.2475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissi Dec 12 11:32:01 syzkaller kern.notice kernel: [ [ 579.905960][ T29] audit: type=1400 audit(1734003121.314:3200): avc: denied { create } for pid=13913 comm="syz.8.2475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 579.850732][ T29] audit: type=1400 audit(1734003121.314:3199): avc: denied { create } for pid=13913 comm="syz.8.2475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 Dec 12 11:32:01 syzkaller kern.notice kernel: [ 579.905960][ T29] audit: type=1400 audit(1734003121.314:3200): avc: denied { create } for pid=13913 comm="syz.8.2475" scontext[ 579.960636][ T29] audit: type=1400 audit(1734003121.314:3201): avc: denied { create } for pid=13913 comm="syz.8.2475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=0 =root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 Dec 12 11:32:01 syzkaller kern.notice kernel: [ 579.960636][ T29] audit: type=1400 audit(1734003121.314:3201): avc: denied { create } for pid=13913 comm="syz.8.2475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc[ 580.010131][ T29] audit: type=1400 audit(1734003121.314:3202): avc: denied { read write } for pid=13913 comm="syz.8.2475" name="vbi2" dev="devtmpfs" ino=965 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 _socket permissive=0 Dec 12 11:32:01 syzkaller kern.notice kernel: [ 580.010131][ T29] audit: type=1400 audit(1734003121.314:3202): avc: denied { read write } for pid=13913 comm="syz.8.2475" name="vbi2" dev="devtmpfs" ino=965 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_ [ 581.113069][ T5819] Bluetooth: hci2: Controller not accepting commands anymore: ncmd = 0 [ 581.123877][ T5819] Bluetooth: hci2: Injecting HCI hardware error event [ 581.134215][ T5819] Bluetooth: hci2: hardware error 0x00 Dec 12 11:32:02 syzkaller kern.err kernel: [ 581.113069][ T5819] Bluetooth: hci2: Controller not accepting commands anymore: ncmd = 0 Dec 12 11:32:02 syzkaller kern.err kernel: [ 581.123877][ T5819] Bluetooth: hci2: Injecting HCI hardware error event Dec 12 11:32:02 syzkaller kern.err kernel: [ 581.134215][ T5819] Bluetooth: hci2: hardware error 0x00 [ 582.569557][T13972] sp0: Synchronizing with TNC Dec 12 11:32:04 syzkaller kern.info kernel: [ 582.569557][T13972] sp0: Synchronizing with TNC [ 583.192783][ T5819] Bluetooth: hci2: Opcode 0x0c03 failed: -110 Dec 12 11:32:04 syzkaller kern.err kernel: [ 583.192783][ T5819] Bluetooth: hci2: Opcode 0x0c03 failed: -110 [ 584.708923][ T29] kauditd_printk_skb: 228 callbacks suppressed [ 584.708935][ T29] audit: type=1400 audit(1734003126.404:3431): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Dec 12 11:32:06 syzkaller kern.warn kernel: [ 584.708923][ T29] kauditd_printk_skb: 228 callbacks suppressed Dec 12 11:32:06 syzkaller kern.notice kernel: [ 584.708935][ T29] audit: type=1400 audit(1734003126.404:3431): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 584.791371][ T29] audit: type=1400 audit(1734003126.444:3432): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 11:32:06 syzkaller kern.notice kernel: [ 584.791371][ T29] audit: type=1400 audit(1734003126.444:3432): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 584.885927][ T29] audit: type=1400 audit(1734003126.444:3433): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 11:32:06 syzkaller kern.notice kernel: [ 584.885927][ T29] audit: type=1400 audit(1734003126.444:3433): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 584.975053][ T29] audit: type=1400 audit(1734003126.524:3434): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 11:32:06 syzkaller kern.notice kernel: [ 584.975053][ T29] audit: type=1400 audit(1734003126.524:3434): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 585.058369][ T29] audit: type=1400 audit(1734003126.534:3435): avc: denied { read } for pid=14020 comm="syz.3.2512" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 Dec 12 11:32:06 syzkaller kern.notice kernel: [ 585.058369][ T29] audit: type=1400 audit(1734003126.534:3435): avc: denied { read } for pid=14020 comm="syz.3.2512" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t [ 585.130276][ T29] audit: type=1400 audit(1734003126.544:3436): avc: denied { read } for pid=14020 comm="syz.3.2512" dev="nsfs" ino=4026533150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 Dec 12 11:32:06 syzkaller kern.notice kernel: [ 585.130276][ T29] audit: type=1400 audit(1734003126.544:3436): avc: denied { read } for pid=14020 comm="syz.3.2512" dev="nsfs" ino=4026533150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file [ 585.220934][ T29] audit: type=1400 audit(1734003126.554:3437): avc: denied { create } for pid=14020 comm="syz.3.2512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 Dec 12 11:32:06 syzkaller kern.notice kernel: [ 585.220934][ T29] audit: type=1400 audit(1734003126.554:3437): avc: denied { create } for pid=14020 comm="syz.3.2512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 585.389657][ T29] audit: type=1400 audit(1734003126.554:3438): avc: denied { create } for pid=14020 comm="syz.3.2512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 Dec 12 11:32:07 syzkaller kern.notice kernel: [ 585.389657][ T29] audit: type=1400 audit(1734003126.554:3438): avc: denied { create } for pid=14020 comm="syz.3.2512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 585.565032][ T29] audit: type=1400 audit(1734003126.554:3439): avc: denied { map_create } for pid=14020 comm="syz.3.2512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Dec 12 11:32:07 syzkaller kern.notice kernel: [ 585.565032][ T29] audit: type=1400 audit(1734003126.554:3439): avc: denied { map_create } for pid=14020 comm="syz.3.2512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 585.772119][ T29] audit: type=1400 audit(1734003126.614:3440): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 11:32:07 syzkaller kern.notice kernel: [ 585.772119][ T29] audit: type=1400 audit(1734003126.614:3440): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 587.903149][T14065] xt_hashlimit: max too large, truncated to 1048576 Dec 12 11:32:09 syzkaller kern.info kernel: [ 587.903149][T14065] xt_hashlimit: max too large, truncated to 1048576 [ 588.949876][T14085] serio: Serial port ptm0 Dec 12 11:32:10 syzkaller kern.info kernel: [ 588.949876][T14085] serio: Serial port ptm0 [ 589.843686][ T29] kauditd_printk_skb: 156 callbacks suppressed [ 589.843703][ T29] audit: type=1400 audit(1734003131.544:3597): avc: denied { create } for pid=14103 comm="syz.3.2539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 Dec 12 11:32:11 syzkaller kern.warn kernel: [ 589.843686][ T29] kauditd_printk_skb: 156 callbacks suppressed Dec 12 11:32:11 syzkaller kern.notice kernel: [ 589.843703][ T29] audit: type=1400 audit(1734003131.544:3597): avc: denied { create } for pid=14103 comm="syz.3.2539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive= [ 589.932761][ T29] audit: type=1400 audit(1734003131.544:3598): avc: denied { create } for pid=14103 comm="syz.3.2539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 589.953131][ T29] audit: type=1400 audit(1734003131.574:3599): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 589.975294][ T29] audit: type=1400 audit(1734003131.574:3600): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 589.997649][ T29] audit: type=1400 audit(1734003131.654:3601): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 590.052598][ T29] audit: type=1400 audit(1734003131.744:3602): avc: denied { execmem } for pid=14103 comm="syz.3.2539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 590.104801][ T29] audit: type=1400 audit(1734003131.754:3603): avc: denied { prog_load } for pid=14103 comm="syz.3.2539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Dec 12 11:32:11 syzkaller kern.notice kernel: [ 589.932761][ T29] audit: type=1400 audit(1734003131.544:3598): avc: denied { create } for pid=14103 comm="syz.3.2539" scon[ 590.171811][ T29] audit: type=1400 audit(1734003131.754:3604): avc: denied { read } for pid=14103 comm="syz.3.2539" dev="nsfs" ino=4026533150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 text=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive= Dec 12 11:32:11 syzkaller kern.notice kernel: [ 589.953131][ T29] audit: type=1400 audit(1734003131.574:3599): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontex[ 590.219657][ T29] audit: type=1400 audit(1734003131.754:3605): avc: denied { create } for pid=14103 comm="syz.3.2539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 t=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 11:32:11 syzkaller kern.notice kernel: [ 589.975294][ T29] audit: type=1400 audit(1734003131.574:3600): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 11:32:11 syzkaller kern.notice kernel: [ 589.997649][ T29] audit: type=1400 audit(1734003131.654:3601): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev[ 590.286115][ T29] audit: type=1400 audit(1734003131.854:3606): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 11:32:11 syzkaller kern.notice kernel: [ 590.052598][ T29] audit: type=1400 audit(1734003131.744:3602): avc: denied { execmem } for pid=14103 comm="syz.3.2539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Dec 12 11:32:11 syzkaller kern.notice kernel: [ 590.104801][ T29] audit: type=1400 audit(1734003131.754:3603): avc: denied { prog_load } for pid=14103 comm="syz.3.2539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Dec 12 11:32:11 syzkaller kern.notice kernel: [ 590.171811][ T29] audit: type=1400 audit(1734003131.754:3604): avc: denied { read } for pid=14103 comm="syz.3.2539" dev="nsfs" ino=4026533150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file Dec 12 11:32:11 syzkaller kern.notice kernel: [ 590.219657][ T29] audit: type=1400 audit(1734003131.754:3605): avc: denied { create } for pid=14103 comm="syz.3.2539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissi Dec 12 11:32:12 syzkaller kern.notice kernel: [ 590.286115][ T29] audit: type=1400 audit(1734003131.854:3606): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 594.873779][ T29] kauditd_printk_skb: 230 callbacks suppressed [ 594.873797][ T29] audit: type=1400 audit(1734003136.574:3837): avc: denied { write } for pid=14210 comm="syz.3.2577" name="qat_adf_ctl" dev="devtmpfs" ino=1272 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 Dec 12 11:32:16 syzkaller kern.w[ 594.908904][ T29] audit: type=1400 audit(1734003136.604:3838): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 594.873779][ T2[ 594.933866][ T29] audit: type=1400 audit(1734003136.604:3839): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_printk_skb: 230 callb[ 594.958626][ T29] audit: type=1400 audit(1734003136.604:3840): avc: denied { create } for pid=14210 comm="syz.3.2577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 acks suppressed[ 594.980949][ T29] audit: type=1400 audit(1734003136.664:3841): avc: denied { create } for pid=14210 comm="syz.3.2577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 Dec 12 11:32:16 syzkaller kern.notice kernel: [ 594.873797][ T29] audit: type=1400 audit(1734003136.574:3837): avc: denied { write } for pid=14210 comm="syz.3.2577" name="qat_adf_ctl" dev="devtmpfs" ino=1272 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:d Dec 12 11:32:16 syzkaller kern.notice kernel: [ 594.908904][ T29] audit: type=1400 audit(1734003136.604:3838): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 11:32:16 syzkaller kern.notice kernel: [ 594.933866][ T29] audit: type=1400 audit(1734003136.604:3839): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 11:32:16 syzkaller kern.notice kernel: [ 594.958626][ T29] audit: type=1400 audit(1734003136.604:3840): avc: denied { create } for pid=14210 comm="syz.3.2577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis Dec 12 11:32:16 syzkaller kern.notice kernel: [ 594.980949][ T29] audit: type=1400 audit(1734003136.664:3841): avc: denied { create } for pid=14210 comm="syz.3.2577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tcl[ 595.120137][ T29] audit: type=1400 audit(1734003136.664:3842): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ass=netlink_generic_socket permissi Dec 12 11:32:16 syzkaller kern.notice kernel: [ 595.120137][ T29] audit: type=1400 audit(1734003136.664:3842): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 595.259998][ T29] audit: type=1400 audit(1734003136.684:3843): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 11:32:16 syzkaller kern.notice kernel: [ 595.259998][ T29] audit: type=1400 audit(1734003136.684:3843): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 595.450680][ T29] audit: type=1400 audit(1734003136.704:3844): avc: denied { read } for pid=14212 comm="syz.6.2578" dev="nsfs" ino=4026532864 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 Dec 12 11:32:17 syzkaller kern.notice kernel: [ 595.450680][ T29] audit: type=1400 audit(1734003136.704:3844): avc: denied { read } for pid=14212 comm="syz.6.2578" dev="nsfs" ino=4026532864 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file [ 595.622699][ T29] audit: type=1400 audit(1734003136.704:3845): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 11:32:17 syzkaller kern.notice kernel: [ 595.622699][ T29] audit: type=1400 audit(1734003136.704:3845): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 595.716842][ T29] audit: type=1400 audit(1734003136.724:3846): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 11:32:17 syzkaller kern.notice kernel: [ 595.716842][ T29] audit: type=1400 audit(1734003136.724:3846): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 596.825000][T14243] xt_hashlimit: max too large, truncated to 1048576 Dec 12 11:32:18 syzkaller kern.info kernel: [ 596.825000][T14243] xt_hashlimit: max too large, truncated to 1048576 [ 600.375387][ T29] kauditd_printk_skb: 158 callbacks suppressed [ 600.375404][ T29] audit: type=1400 audit(1868220870.074:4005): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 600.430284][ T29] audit: type=1400 audit(1868220870.124:4006): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 600.458089][ T29] audit: type=1400 audit(1868220870.124:4007): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 600.483279][ T29] audit: type=1400 audit(1868220870.154:4008): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 600.506327][ T29] audit: type=1400 audit(1868220870.184:4009): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 600.555594][ T29] audit: type=1400 audit(1868220870.204:4010): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 600.579675][ T29] audit: type=1400 audit(1868220870.244:4011): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 600.604059][ T29] audit: type=1400 audit(1868220870.284:4012): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 600.627577][ T29] audit: type=1400 audit(1868220870.304:4013): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 600.650971][ T29] audit: type=1400 audit(1868220870.334:4014): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 703.322545][ C0] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 703.329542][ C0] rcu: 1-...0: (2 ticks this GP) idle=7c64/0/0x1 softirq=54243/54245 fqs=5197 [ 703.340315][ C0] rcu: hardirqs softirqs csw/system [ 703.346734][ C0] rcu: number: 0 0 0 [ 703.353147][ C0] rcu: cputime: 0 0 0 ==> 52510(ms) [ 703.360952][ C0] rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P14269/1:b..l [ 703.368983][ C0] rcu: (detected by 0, t=10502 jiffies, g=51281, q=557 ncpus=2) [ 703.376707][ C0] Sending NMI from CPU 0 to CPUs 1: [ 703.376733][ C1] NMI backtrace for cpu 1 [ 703.376753][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted 6.13.0-rc2-syzkaller-00036-g231825b2e1ff #0 [ 703.376775][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 703.376786][ C1] RIP: 0010:hlock_class+0x56/0x130 [ 703.376818][ C1] Code: 20 66 81 e3 ff 1f 0f b7 db be 08 00 00 00 48 89 d8 48 c1 e8 06 48 8d 3c c5 c0 cc e4 96 e8 d2 03 87 00 48 0f a3 1d 1a 0b 6f 15 <73> 13 48 69 c3 c8 00 00 00 5b 48 05 e0 d0 e4 96 c3 cc cc cc cc 48 [ 703.376835][ C1] RSP: 0018:ffffc90000a189f0 EFLAGS: 00000047 [ 703.376853][ C1] RAX: 0000000000000001 RBX: 0000000000000021 RCX: ffffffff8175c19e [ 703.376865][ C1] RDX: fffffbfff2dc9999 RSI: 0000000000000008 RDI: ffffffff96e4ccc0 [ 703.376877][ C1] RBP: ffffc90000a18b38 R08: 0000000000000000 R09: fffffbfff2dc9998 [ 703.376889][ C1] R10: ffffffff96e4ccc7 R11: 0000000000000000 R12: ffff88801d294880 [ 703.376901][ C1] R13: 0000000000000200 R14: 0000000000000009 R15: 1ffff92000143146 [ 703.376913][ C1] FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 [ 703.376931][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 703.376944][ C1] CR2: 00000000200f6030 CR3: 0000000079c68000 CR4: 00000000003526f0 [ 703.376956][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 703.376967][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 703.376979][ C1] Call Trace: [ 703.376985][ C1] [ 703.376994][ C1] ? nmi_cpu_backtrace+0x1d8/0x390 [ 703.377025][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 703.377050][ C1] ? nmi_handle+0x1ac/0x5d0 [ 703.377070][ C1] ? hlock_class+0x56/0x130 [ 703.377094][ C1] ? default_do_nmi+0x6a/0x160 [ 703.377121][ C1] ? exc_nmi+0x170/0x1e0 [ 703.377146][ C1] ? end_repeat_nmi+0xf/0x53 [ 703.377172][ C1] ? hlock_class+0x4e/0x130 [ 703.377197][ C1] ? hlock_class+0x56/0x130 [ 703.377222][ C1] ? hlock_class+0x56/0x130 [ 703.377247][ C1] ? hlock_class+0x56/0x130 [ 703.377272][ C1] [ 703.377277][ C1] [ 703.377283][ C1] mark_lock+0xb5/0xc60 [ 703.377301][ C1] ? hlock_class+0x4e/0x130 [ 703.377325][ C1] ? __lock_acquire+0x15a9/0x3c40 [ 703.377345][ C1] ? __pfx_mark_lock+0x10/0x10 [ 703.377366][ C1] ? hlock_class+0x4e/0x130 [ 703.377391][ C1] ? hlock_class+0x4e/0x130 [ 703.377415][ C1] ? __lock_acquire+0x15a9/0x3c40 [ 703.377436][ C1] __lock_acquire+0x9f1/0x3c40 [ 703.377460][ C1] ? __pfx___lock_acquire+0x10/0x10 [ 703.377480][ C1] ? lock_acquire.part.0+0x11b/0x380 [ 703.377502][ C1] lock_acquire.part.0+0x11b/0x380 [ 703.377522][ C1] ? advance_sched+0x679/0xc60 [ 703.377540][ C1] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 703.377561][ C1] ? rcu_is_watching+0x12/0xc0 [ 703.377586][ C1] ? trace_lock_acquire+0x14e/0x1f0 [ 703.377613][ C1] ? advance_sched+0x679/0xc60 [ 703.377629][ C1] ? lock_acquire+0x2f/0xb0 [ 703.377647][ C1] ? advance_sched+0x679/0xc60 [ 703.377664][ C1] advance_sched+0x67f/0xc60 [ 703.377681][ C1] ? advance_sched+0x679/0xc60 [ 703.377701][ C1] ? __pfx_advance_sched+0x10/0x10 [ 703.377717][ C1] __hrtimer_run_queues+0x20a/0xae0 [ 703.377746][ C1] ? __pfx___hrtimer_run_queues+0x10/0x10 [ 703.377771][ C1] ? read_tsc+0x9/0x20 [ 703.377798][ C1] hrtimer_interrupt+0x392/0x8e0 [ 703.377829][ C1] __sysvec_apic_timer_interrupt+0x10f/0x400 [ 703.377852][ C1] sysvec_apic_timer_interrupt+0x9f/0xc0 [ 703.377872][ C1] [ 703.377878][ C1] [ 703.377884][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 703.377908][ C1] RIP: 0010:acpi_safe_halt+0x1a/0x20 [ 703.377934][ C1] Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 65 48 8b 05 b8 d5 da 74 48 8b 00 a8 08 75 0c 66 90 0f 00 2d 48 67 b4 00 fb f4 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 [ 703.377951][ C1] RSP: 0018:ffffc900001a7d58 EFLAGS: 00000246 [ 703.377965][ C1] RAX: 0000000000004000 RBX: 0000000000000001 RCX: ffffffff8b28e679 [ 703.377976][ C1] RDX: 0000000000000001 RSI: ffff888020add800 RDI: ffff888020add864 [ 703.377989][ C1] RBP: ffff888020add864 R08: 0000000000000001 R09: ffffed10170e6fed [ 703.378001][ C1] R10: ffff8880b8737f6b R11: 0000000000000000 R12: ffff88801f79a800 [ 703.378014][ C1] R13: ffffffff8ee14e20 R14: 0000000000000001 R15: 0000000000000000 [ 703.378028][ C1] ? ct_kernel_exit+0x139/0x190 [ 703.378058][ C1] acpi_idle_enter+0xc5/0x160 [ 703.378082][ C1] cpuidle_enter_state+0xaa/0x4f0 [ 703.378105][ C1] ? __pfx_tsc_verify_tsc_adjust+0x10/0x10 [ 703.378125][ C1] cpuidle_enter+0x4e/0xa0 [ 703.378151][ C1] do_idle+0x310/0x3f0 [ 703.378170][ C1] ? __pfx_do_idle+0x10/0x10 [ 703.378190][ C1] cpu_startup_entry+0x4f/0x60 [ 703.378209][ C1] start_secondary+0x222/0x2b0 [ 703.378237][ C1] ? __pfx_start_secondary+0x10/0x10 [ 703.378266][ C1] common_startup_64+0x13e/0x148 [ 703.378294][ C1] [ 703.378728][ C0] task:syz.2.2595 state:R running task stack:27728 pid:14269 tgid:14268 ppid:5824 flags:0x00004000 [ 703.864396][ C0] Call Trace: [ 703.867676][ C0] [ 703.870616][ C0] __schedule+0xe58/0x5ad0 [ 703.875046][ C0] ? mark_lock+0xb5/0xc60 [ 703.879380][ C0] ? __pfx___lock_acquire+0x10/0x10 [ 703.884596][ C0] ? __pfx___schedule+0x10/0x10 [ 703.889470][ C0] ? preempt_schedule_thunk+0x1a/0x30 [ 703.894849][ C0] preempt_schedule_common+0x44/0xc0 [ 703.900145][ C0] preempt_schedule_thunk+0x1a/0x30 [ 703.905356][ C0] _raw_spin_unlock+0x3e/0x50 [ 703.910038][ C0] unmap_page_range+0xb87/0x3d60 [ 703.915007][ C0] ? __pfx_unmap_page_range+0x10/0x10 [ 703.920385][ C0] ? mas_next_slot+0x12d3/0x21b0 [ 703.925336][ C0] ? uprobe_munmap+0x20/0x5c0 [ 703.930026][ C0] unmap_single_vma+0x194/0x2b0 [ 703.934889][ C0] unmap_vmas+0x22f/0x490 [ 703.939226][ C0] ? __pfx_unmap_vmas+0x10/0x10 [ 703.944088][ C0] ? preempt_schedule_thunk+0x1a/0x30 [ 703.949470][ C0] ? preempt_schedule_common+0x44/0xc0 [ 703.954939][ C0] ? mlock_drain_local+0x24c/0x4f0 [ 703.960060][ C0] ? mlock_drain_local+0x3f9/0x4f0 [ 703.965188][ C0] exit_mmap+0x1c6/0xb20 [ 703.969446][ C0] ? __pfx_exit_mmap+0x10/0x10 [ 703.974226][ C0] ? __pfx_mark_lock+0x10/0x10 [ 703.979026][ C0] __mmput+0x12a/0x4c0 [ 703.983108][ C0] mmput+0x62/0x70 [ 703.986836][ C0] do_exit+0x9bf/0x2d70 [ 703.991044][ C0] ? get_signal+0x8f7/0x26c0 [ 703.995645][ C0] ? __pfx_do_exit+0x10/0x10 [ 704.000259][ C0] ? do_raw_spin_lock+0x12d/0x2c0 [ 704.005296][ C0] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 704.010689][ C0] do_group_exit+0xd3/0x2a0 [ 704.015208][ C0] get_signal+0x24ed/0x26c0 [ 704.019823][ C0] ? __pfx_get_signal+0x10/0x10 [ 704.024685][ C0] ? __pfx_do_futex+0x10/0x10 [ 704.029370][ C0] arch_do_signal_or_restart+0x90/0x7e0 [ 704.034934][ C0] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 704.041120][ C0] syscall_exit_to_user_mode+0x150/0x2a0 [ 704.046765][ C0] do_syscall_64+0xda/0x250 [ 704.051280][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 704.057189][ C0] RIP: 0033:0x7f1a6d985d19 [ 704.061622][ C0] RSP: 002b:00007f1a6e6da0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 704.070047][ C0] RAX: fffffffffffffe00 RBX: 00007f1a6db75fa8 RCX: 00007f1a6d985d19 [ 704.078022][ C0] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f1a6db75fa8 [ 704.085996][ C0] RBP: 00007f1a6db75fa0 R08: 0000000000000000 R09: 0000000000000000 [ 704.093973][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1a6db75fac [ 704.101949][ C0] R13: 0000000000000000 R14: 00007ffed40e15a0 R15: 00007ffed40e1688 [ 704.109942][ C0] [ 704.134774][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 704.134792][ T29] audit: type=1400 audit(1868220973.824:4017): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 704.178427][ T29] audit: type=1400 audit(1868220973.864:4018): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 704.213995][ T29] audit: type=1400 audit(1868220973.904:4019): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 704.250903][ T29] audit: type=1400 audit(1868220973.944:4020): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 704.286830][ T29] audit: type=1400 audit(1868220973.974:4021): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 704.314660][ T29] audit: type=1400 audit(1868220974.014:4022): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 704.351538][ T29] audit: type=1400 audit(1868220974.044:4023): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 704.388617][ T29] audit: type=1400 audit(1868220974.084:4024): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 704.425753][ T29] audit: type=1400 audit(1868220974.124:4025): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 704.464401][ T29] audit: type=1400 audit(1868220974.164:4026): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0