last executing test programs: 6.005711334s ago: executing program 2 (id=3): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_mount_image$exfat(&(0x7f0000000180), &(0x7f0000000000)='./file0\x00', 0x40, &(0x7f0000000040)={[{@time_offset={'time_offset', 0x3d, 0x3}}, {@gid}, {@allow_utime={'allow_utime', 0x3d, 0x7}}, {@errors_continue}, {@umask={'umask', 0x3d, 0x7}}, {}, {@namecase}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}, {@gid}, {@namecase}]}, 0x1, 0x152d, &(0x7f00000034c0)="$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") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) ioctl(r2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000140)="be38", 0xffe7}], 0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="ac1414aaac14140000000b001400000000000000000000000700000007038b0100000000"], 0x38}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='clear_refs\x00') writev(r4, &(0x7f0000000100)=[{&(0x7f0000000000)='4', 0x1}], 0x1) write$P9_RWALK(r4, &(0x7f0000000200)={0x16, 0x6f, 0x1, {0x1, [{0x10, 0x3, 0x6}]}}, 0x16) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) syz_kvm_add_vcpu$x86(0x0, &(0x7f0000000100)={0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0100000000000000690000000000000066baa100b004ee"], 0x69}) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) r8 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0xff, 0x7fff7ffc}]}) close_range(r8, 0xffffffffffffffff, 0x0) 5.979800034s ago: executing program 3 (id=4): r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000002040), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000980)=ANY=[@ANYRESDEC=r0, @ANYRES64=0x0, @ANYRES8=0x0, @ANYRES64=r0, @ANYRESOCT=r0, @ANYBLOB="39d508ef6ada4db292514fa3dff4c7fa63c664fc9a90cd6553473692246af3c99df107cdc1edceb45b96b172adfecd06ad467283", @ANYRES16=r0, @ANYRESOCT=r0], 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x0) gettid() fchown(r2, 0x0, 0xee01) socket$inet6(0x10, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800714, &(0x7f0000000500), 0xff, 0x485, &(0x7f0000001500)="$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") syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x21081e, &(0x7f0000001400)={[{@data_err_ignore}, {@barrier}, {@nojournal_checksum}, {@nombcache}, {@barrier_val={'barrier', 0x3d, 0x3}}]}, 0x0, 0x534, &(0x7f0000000440)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000840)='./bus\x00', 0xa4) chdir(0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42042, 0x14a) fallocate(r3, 0x8, 0x0, 0x8000) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x80000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000002c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000030000000800000001"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000280)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) poll(&(0x7f0000b2c000)=[{}], 0x2c, 0xffffffffffbffff8) tkill(0x0, 0x13) 5.906876105s ago: executing program 0 (id=1): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socket(0x10, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$igmp(0x2, 0x3, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000280)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004000000", @ANYRES32=0x0, @ANYBLOB='\x00'/14, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/13], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000018500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r6}, 0x10) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000400)={{0x2, 0x4e21, @broadcast}, {}, 0x60, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3c}}, 'lo\x00'}) socket$netlink(0x10, 0x3, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000040), 0x0, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) r8 = openat$incfs(r7, &(0x7f0000000000)='.pending_reads\x00', 0x0, 0x0) ioctl$TIOCL_GETKMSGREDIRECT(r8, 0x40106726, &(0x7f00000000c0)) setsockopt$TIPC_IMPORTANCE(r8, 0x10f, 0x7f, &(0x7f0000000080)=0x80, 0x4) 5.63292074s ago: executing program 1 (id=2): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x48e80, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r6}, 0x10) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x4, &(0x7f00000002c0)={[{@max_batch_time={'max_batch_time', 0x3d, 0x6}}, {@i_version}]}, 0x6, 0x5fd, &(0x7f0000000c00)="$eJzs3c9rHFUcAPDvzCYxaaNpRcQWxYCHFqRpUotVL7b1YA8FC/Yg4qGhSWro9gdNCrYWTMGDgoKIV5Fe/Ae8S+/eRFBvnoUqUlFQ6crszrabZDfdttmdNPP5wGTnvZnd9747eZn3dvJ2Aiit8exHGrEj4taJJGKsZdtoNDaO5/vd/OPKyWxJolZ78/ckkjyvuX+SP27NE8MR8f3hiMcrq8tduHT59HS11vBBxN7FM+f3Lly6vGf+zPSp2VOzZ6f2vbT/wOTLU/un1iXOrfnjkaNvPP3ph+++OPdDdU8SB+P44PszsSKO9TIe43ErD7E1fyAiDmQrbd6Xh80mCKHUKvnv42BEPBljUamnGsZi/pNCKwf0VK0SUQNKKtH+oaSa/YDm2L67cfDxHvdK+ufGocYAaHX8A43PRmK4PjbacjNpGRk1PtvYtg7lZ2X8d2Xnl9kSyz6H+Pv20RlYh3I6WboaEU+1iz+p121bPdIs/nTZWD+JiMmIGMrr99oD1CFpWe/F5zBruZf4W49DGhEH88cs//B9lj++It3v+AEop+uH8hP5Upa6c/7L+h7N/k+06f+Mtjl33Y+iz3+d+3/N8/1wvd+TruiHZX2WY+1fcnBlxi8fH/m8U/mt/b9sycpv9gX74cbViJ0r4v8oCzbv/2TxJ22Of7bLiYPdlfH6j78d6bSt6Phr1yJ2tR3/3OmVZmtrXJ/cOzdfnZ1s/GxbxrffvfN1p/KLjj87/ls6xN9y/NOVz8vek/NdlvHNsWtnOm0bvWv86a9DSWO8OZTnvDe9uHhhKmIoOZrv0pK/b+26NPdpvkYW/+7n2rf/Zb//V5e/zkjzT2YXzr91+manbfdz/FsuJt+qdVmHTrL4Z+5+/Fe1/yzvsy7L+Ovti8902rZW/CMPEhgAAAAAAACUUFq/BpukE7fX03RiojFf9onYklbPLSw+P3fu4tmZiN31/4ccTJtXusca6SRLT+X/D9tM71uRfiEitkfEF5WRenri5LnqTNHBAwAAAAAAAAAAAAAAAAAAwAaxNZ//37xP9Z+Vxvx/oCR6eYM5YGPT/qG86u1/1S2egDJw/ofy0v6hvLR/KC/tH8pL+4fy0v6hvLR/KC/tHwAAAAA2pe3PXv85iYilV0bqS2Yo32ZGEGxug0VXAChMpegKAIW5felfZx9Kp6v+/z/5lwP2vjpAAZJ2mfXOQW3txn+97TMBAAAAAAAAAAAAgB7YtaPz/H9zg2FzM+0PyusB5v/76gB4yPnqfygvY3zgbrP4hzttMP8fAAAAAAAAAAAAAPpmtL4k6UQ+F3g00nRiIuLRiNgWg8ncfHV2MiIei4ifKoOPZOmpoisNAAAAAAAAAAAAAAAAAAAAm8zCpcunp6vV2QutK/+uytncK827oPahrFfjHp8VSf/flpGIKPyg9GxloCUniVjKjvyGqNiFhdgY1aivFPyHCQAAAAAAAAAAAAAAAAAASqhl7nF7O7/qc40AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoP/u3P+/dytFxwgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPJz+DwAA///LLUAr") syz_emit_ethernet(0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f00000003c0)={0x2, 0x0, @ioapic={0x0, 0x2, 0x3, 0xeffffdff, 0x0, [{0x0, 0x80}, {0x19, 0x5, 0x0, '\x00', 0x10}, {0xfc, 0x4}, {0xfe, 0x0, 0x7f, '\x00', 0x2}, {0x8, 0x0, 0x5, '\x00', 0x9}, {0x1}, {0x0, 0x82, 0xbe}, {0x40, 0x6}, {0x0, 0x0, 0x0, '\x00', 0x7f}, {0x8, 0x6, 0xfe, '\x00', 0x42}, {0x0, 0x2}, {0x0, 0x50}, {0x4, 0x0, 0x4, '\x00', 0x3}, {0x1, 0x4e}, {0x2, 0x2, 0x4, '\x00', 0x9}, {}, {0x1, 0x0, 0x4, '\x00', 0x4}, {0x0, 0x0, 0x0, '\x00', 0xfd}, {0x1, 0x4, 0x7, '\x00', 0x3}, {0x80, 0x0, 0x0, '\x00', 0x6}, {0x0, 0x4}, {0x0, 0x0, 0x0, '\x00', 0x70}, {0x1, 0xfe, 0x0, '\x00', 0xe}, {0x10, 0x83, 0xe}]}}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x0, 0x111, 0x4b4, 0x0, 0x700, 0x2d8, 0x278, 0x278, 0x2d8, 0x278, 0x3, 0x0, {[{{@ipv6={@mcast2, @empty, [], [], 'vlan0\x00', 'team_slave_0\x00', {}, {}, 0x88}, 0x0, 0x128, 0x190, 0x0, {}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private1, [], [], 'geneve1\x00', 'erspan0\x00'}, 0x0, 0xe0, 0x148, 0x0, {}, [@common=@unspec=@statistic={{0x38}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) 5.412623832s ago: executing program 4 (id=5): r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000002040), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000980)=ANY=[@ANYRESDEC=r0, @ANYRES64=0x0, @ANYRES8=0x0, @ANYRES64=r0, @ANYRESOCT=r0, @ANYBLOB="39d508ef6ada4db292514fa3dff4c7fa63c664fc9a90cd6553473692246af3c99df107cdc1edceb45b96b172adfecd06ad467283", @ANYRES16=r0, @ANYRESOCT=r0], 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x0) gettid() fchown(r2, 0x0, 0xee01) socket$inet6(0x10, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800714, &(0x7f0000000500), 0xff, 0x485, &(0x7f0000001500)="$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") syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x21081e, &(0x7f0000001400)={[{@data_err_ignore}, {@barrier}, {@nojournal_checksum}, {@nombcache}, {@barrier_val={'barrier', 0x3d, 0x3}}]}, 0x0, 0x534, &(0x7f0000000440)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000840)='./bus\x00', 0xa4) chdir(0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42042, 0x14a) fallocate(r3, 0x8, 0x0, 0x8000) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x80000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000002c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000030000000800000001"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000280)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) r6 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r7, 0x5452, &(0x7f0000b28000)=0x3) poll(&(0x7f0000b2c000)=[{r8}], 0x2c, 0xffffffffffbffff8) dup2(r7, r8) fcntl$setown(r7, 0x8, r6) tkill(r6, 0x13) 4.138743641s ago: executing program 0 (id=6): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) sched_setaffinity(0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f0000000180), &(0x7f0000000400)='./file0\x00', 0x200048, &(0x7f00000003c0)=ANY=[], 0xfd, 0x1de, &(0x7f0000000640)="$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") mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f00000003c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}, 0x3a}], [], 0x2f}) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xd, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000850000002a000000180100002025642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000089cdc832850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000400)="b9ff03316844268cb89914f088a8", 0x0, 0x2005, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sys_enter\x00', r3}, 0x10) getitimer(0x1, &(0x7f00000001c0)) socket$nl_generic(0x10, 0x3, 0x10) r4 = open(&(0x7f0000000000)='./file3\x00', 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_PEER_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d03ef008c000000004c130000002400098008000200000093"], 0x38}}, 0x0) fcntl$setlease(r4, 0x400, 0x1) 3.427080561s ago: executing program 1 (id=7): r0 = socket$inet6(0xa, 0x3, 0xff) socket$packet(0x11, 0x3, 0x300) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) socket$inet6(0xa, 0x4, 0x72) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e27, 0x9, @remote, 0x7}, 0x1c) io_setup(0x20, &(0x7f0000001140)) 3.357035292s ago: executing program 3 (id=8): setxattr$security_selinux(&(0x7f0000000100)='.\x00', &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:man_t:s0\x00', 0x1b, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000600)='net\x00') getdents64(r0, &(0x7f0000000080)=""/46, 0x2e) getdents64(r0, &(0x7f00000015c0)=""/163, 0xa3) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f00000001c0)=ANY=[@ANYBLOB="00fb2c0100000044d120694fe26951167cb03a6cd39fc0792a1daa113a2c2d00000000000000001000000000"], 0x2c, 0x2) openat$ppp(0xffffffffffffff9c, 0x0, 0xc0802, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x1000005, &(0x7f0000000e40)=ANY=[], 0x0, 0x1df, &(0x7f0000000ac0)="$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") r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="01000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x82000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4000) openat$binderfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x42, 0x0) 3.354857492s ago: executing program 2 (id=9): socket$netlink(0x10, 0x3, 0x0) statx(0xffffffffffffffff, 0x0, 0x1000, 0x803, 0x0) geteuid() sched_setscheduler(0x0, 0x2, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000004f4b000000000000000000180100002020702000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000fdffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, 0x0, 0x0, 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0), 0x80980, 0x0) ioctl$TCFLSH(r4, 0x400455c8, 0x4) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000040)=0x32) r5 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r5, &(0x7f0000001980)=[{{&(0x7f00000002c0)={0x2, 0x4e21, @remote}, 0x10, 0x0}}], 0x1d6, 0x240080e4) 1.750325835s ago: executing program 2 (id=10): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000480)=@abs={0x0, 0x0, 0x8004e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000e8ffff05850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mkdir(&(0x7f0000000200)='./bus\x00', 0x10) mount$incfs(&(0x7f0000000000)='\x00', &(0x7f0000000240)='./bus\x00', &(0x7f0000000640), 0x0, 0x0) 1.749284765s ago: executing program 0 (id=11): r0 = socket$inet6(0xa, 0x3, 0xff) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e27, 0x9, @remote, 0x7}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast1}, 0x1c) 1.700670016s ago: executing program 4 (id=12): r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000002040), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000980)=ANY=[@ANYRESDEC=r0, @ANYRES64=0x0, @ANYRES8=0x0, @ANYRES64=r0, @ANYRESOCT=r0, @ANYBLOB="39d508ef6ada4db292514fa3dff4c7fa63c664fc9a90cd6553473692246af3c99df107cdc1edceb45b96b172adfecd06ad467283", @ANYRES16=r0, @ANYRESOCT=r0], 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x0) gettid() fchown(r2, 0x0, 0xee01) socket$inet6(0x10, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800714, &(0x7f0000000500), 0xff, 0x485, &(0x7f0000001500)="$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") syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x21081e, &(0x7f0000001400)={[{@data_err_ignore}, {@barrier}, {@nojournal_checksum}, {@nombcache}, {@barrier_val={'barrier', 0x3d, 0x3}}]}, 0x0, 0x534, &(0x7f0000000440)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000840)='./bus\x00', 0xa4) chdir(0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42042, 0x14a) fallocate(r3, 0x8, 0x0, 0x8000) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x80000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000002c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000030000000800000001"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000280)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) r6 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r7, 0x5452, &(0x7f0000b28000)=0x3) fcntl$setsig(r7, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r8}], 0x2c, 0xffffffffffbffff8) dup2(r7, r8) tkill(r6, 0x13) 1.699840506s ago: executing program 1 (id=13): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRESOCT=r0, @ANYBLOB="0000000000000000b70300000003000085"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_REMOVE(r2, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x40, r3, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0xb}, @MPTCP_PM_ATTR_ADDR_REMOTE={0xc, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x568}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x20000000}, 0x1000) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000380), &(0x7f00000003c0), 0x2, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) syz_open_procfs(r4, &(0x7f0000000340)='schedstat\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500), &(0x7f0000000540)=[0x0], 0x0, 0xba, &(0x7f0000000580)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0xfa, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x10000, &(0x7f0000000080)={[{@nobh}, {@auto_da_alloc}, {@data_err_ignore}]}, 0x3, 0x4cd, &(0x7f0000000c80)="$eJzs3M9vFGUfAPDvbHdpgZfXioiCKAU0Nia2UFA4eMHExIMmRjzIsWkrQRYwtAchREpi8Ezi3Xg03jTxqkfjyT8ADx5MDAkxXABPa2Z3pt3ur+7CtqXs55Ns+zwzz8zzPDPzzD77PDsbwMAaS/8kEf+LiFsR8VQtujLBWO3f/btXZx7cvToTi5XKqX+Sarp7aTyTb7c9i4wXIgpfJg07rJm/fOXcdLk8dymLTy6c/2xy/vKV18+enz4zd2buwtSJE8eOHjn+5tQbvVeqRX5pve7t/eLivj3vnr75/kwxXz6S/a+vR1vF3oox1mHdK73t6rG3oy6cNB+na+taGLo2kl3WpbT9Xy0fPL3RBQLWTaVSqQy3X71YaXS9aQmwaSWx0SUANkb+Rp9+/s1f69T1eCzcOVn7AJTW+372qq0pRiFLU2r4fNtPYxHx8eK/36Sv6DQO8ecaFQAAGDi/nMx7go39v0Lsrkv3/2wOZTQino6InRHxTETsiohnI6ppn4uI5xszSCIqHfLf1RBfzv/HbBahcPuRK9lB2v97K5vbWtn/y3t/MTqUxXZE5B3mucPZMRmP0vAnZ8tzR9rsf8sq+df3/9JXmn/eF8zKcbvYMEA3O70w/XC1bXbnesTeYmP9k2J64vJpnCQi9kTE3h72O1oXPvvad/uWIqWV6Vavf1WlxZRez/NxrVS+jXi1dv4XY8X5X84x6Tw/OTkS5bnDk+lVcLhlHr/9fuODdvmvWv+f/mrc5J3jP5961GovSc//trrrP/L52+X6jyYRydJ87XxEZai3PG788VV1v2OHmtc97PW/JfmoGs7b1+fTCwuXjkRsSd5rXj61vG0ez9On9R8/1Lr978y2SY/ECxGRXsQvRsRLEbE/K/uBiDgYES2qtuTXt1/+tN26Lq//NZPWf7bl/W/F+V+er+8ykG+cLhk6d+DWgzY3j+7O/7FqaDxb0vr+l6y4RXRb0kc7egAAALA5FKL63f/CxFK4UJiYqI0B7YpthfLF+YX9EXFhtvaMwGiUCvlIV208uJTk45+jdfGphvjRbNz466Gt1fjEzMXy7EZXHgbc9mqbT5raf+rvHsd5gU2oD/NowCa1WvvffXOdCgKsO+//MLjq2v9imySLvikDTybv/zC4WrX/a/F9x2cX3DNg86toyzDQtH8YXMX4cClcfey55dO2wJPI+z8MpF6f6+8tUBluvWokWvxiwMjaFGNri7w2JJD2rPq4w1JEdJd468NkkXcB2//CQ6G3HQ5H86qh6LRV0sPvOOSB9KismvjM7r5f/PlvovT7svlhuZ2WujzdfQpsyO0IAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACg7/4LAAD///QJ1ng=") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000000), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r5, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000003"], 0x50) openat$kvm(0xffffffffffffff9c, &(0x7f0000000500), 0x84000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000003000000000000000200000d00000000000000000200000001002b00020000000000000000000005"], &(0x7f0000000100)=""/236, 0x43, 0xec, 0x1, 0x0, 0x0, @void, @value}, 0x28) 1.594594298s ago: executing program 0 (id=14): sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x2d) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = fsopen(0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, 0x0, 0x0, 0x0) fsmount(r3, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, 0x0, 0x1, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x1, 0x170bd27, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40421, 0x2100}, [@IFLA_GROUP={0x8}, @IFLA_AF_SPEC={0x14, 0x1a, 0x0, 0x1, [@AF_INET={0x10, 0x2, 0x0, 0x1, {0xc, 0x1, 0x0, 0x1, [{0x6, 0x1d, 0x0, 0x0, 0x10001}]}}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc0}, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f00000006c0), 0x1, 0x512, &(0x7f0000000c40)="$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") r5 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f0000001180)=ANY=[@ANYBLOB="000000004c900200090000000300010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000ffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000090000000000000002000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001eeddddd00"/381]) 1.40587936s ago: executing program 3 (id=15): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000640)='task\x00') r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d0000008500000050000000"], &(0x7f0000000140)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000f00)='kfree\x00', r1}, 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, 0x0, 0x0) fchdir(r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000380)='./file2\x00', 0x404, &(0x7f0000000740)={[{@bh}, {@noauto_da_alloc}, {@mblk_io_submit}, {@minixdf}, {@journal_dev={'journal_dev', 0x3d, 0x4}}, {@quota}]}, 0x13, 0x42f, &(0x7f0000000940)="$eJzs289rHFUcAPDvzCat/WViqT+aVo1WMfgjadJae/CiKHhQEPRQjzFJS+y2kSaCLUGjSD1Kwbt4FPwLPOlF1JPgVe9SKJJLq6eV2Z1Jdje7aZJustX9fGCS92be8t53Z97ue/N2AuhZw9mfJGJ/RPweEQO1bGOB4dq/W8uLU38vL04lUam89VdSLXdzeXGqKFq8bl+R6YtIP0viSIt65y9fOT9ZLs9cyvNjCxfeH5u/fOW52QuT52bOzVycOH365InxF05NPN+ROLO4bg59NHf08GvvXHtj6sy1d3/+Ninib4qjQ4bXO/hkpdLh6rrrQF066etiQ9iUUq2bRn+1/w9EKVZP3kC8+mlXGwdsq0qlUnmg/eGlCvA/lkS3WwB0R/FFn81/i22Hhh53hRsv1SZAWdy38q12pC/SvEx/0/y2k4Yj4szSP19lW2zPfQgAgAbfZ+OfZ1uN/9Kovy90b76GMhgR90XEwYg4FRGHIuL+iGrZByPioU3W37xIsnb8k17fUmAblI3/XszXthrHf8XoLwZLee5ANf7+5OxseeZ4/p6MRP/uLD++Th0/vPLbF+2O1Y//si2rvxgL5u243re78TXTkwuTdxJzvRufRAz1tYo/WVkJSCLicEQMbbGO2ae/Odru2O3jX0cH1pkqX0c8VTv/S9EUfyFZf31y7J4ozxwfK66KtX759eqb7eq/o/g7IDv/e1te/yvxDyb167Xzm6/j6h+ft53TbPX635W83bDvw8mFhUvjEbuS12uNrt8/0VRuYrV8Fv/Isdb9/2CsvhNHIiK7iB+OiEci4tG87Y9FxOMRcWyd+H96+Yn3th7/9srin97U+V9N7IrmPa0TpfM/ftdQ6eBm4s/O/8lqaiTfs5HPv420a2tXMwAAAPz3pBGxP5J0dCWdpqOjtd/wH4q9aXlufuGZs3MfXJyuPSMwGP1pcadroO5+6Hg+rS/yE035E/l94y9Le6r50am58nS3g4cet69N/8/8Wep264Bt53kt6F36P/Qu/R96l/4PvatF/9/TjXYAO6/V9//HXWgHsPOa+r9lP+gh5v/Qu/R/6F36P/Sk+T1x+4fkJSTWJCK9K5ohsU2Jbn8yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdMa/AQAA//9QOObV") creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x1010, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000283d0020850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r3, 0x800448d4, &(0x7f0000000080)={0x0, 0x200, "00fa00"}) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfa) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000000)='kfree\x00', r4}, 0x10) socket(0x11, 0x3, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='\x00', 0x0) getresuid(&(0x7f0000000440), &(0x7f0000000480), 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000b80), 0x0, &(0x7f0000000580)=ANY=[]) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f00000003c0)={0x90, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}}, 0x90) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/profiling', 0xa0042, 0x0) write$tcp_mem(r5, &(0x7f0000000300)={0x9, 0x2d, 0xfffffffffffffff9, 0x3a, 0x3, 0x2c}, 0x48) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1.205147363s ago: executing program 3 (id=16): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socket(0x10, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$igmp(0x2, 0x3, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000280)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004000000", @ANYRES32=0x0, @ANYBLOB='\x00'/14, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/13], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000018500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r6}, 0x10) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000400)={{0x2, 0x4e21, @broadcast}, {}, 0x60, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3c}}, 'lo\x00'}) socket$netlink(0x10, 0x3, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000040), 0x0, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) r8 = openat$incfs(r7, &(0x7f0000000000)='.pending_reads\x00', 0x0, 0x0) ioctl$TIOCL_GETKMSGREDIRECT(r8, 0x40106726, &(0x7f00000000c0)) setsockopt$TIPC_IMPORTANCE(r8, 0x10f, 0x7f, &(0x7f0000000080)=0x80, 0x4) 72.726849ms ago: executing program 1 (id=17): socket$inet(0x2, 0x2, 0x1) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) open(0x0, 0x64842, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, 0x0, 0x0, 0x2, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70200001400f400b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000280)='sched_switch\x00', r3}, 0x18) socket$nl_route(0x10, 0x3, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='map_files\x00') getdents64(r4, &(0x7f0000000000)=""/38, 0x26) getdents(r4, 0x0, 0x4a) 71.736099ms ago: executing program 2 (id=18): r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000002040), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000980)=ANY=[@ANYRESDEC=r0, @ANYRES64=0x0, @ANYRES8=0x0, @ANYRES64=r0, @ANYRESOCT=r0, @ANYBLOB="39d508ef6ada4db292514fa3dff4c7fa63c664fc9a90cd6553473692246af3c99df107cdc1edceb45b96b172adfecd06ad467283", @ANYRES16=r0, @ANYRESOCT=r0], 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x0) gettid() fchown(r2, 0x0, 0xee01) socket$inet6(0x10, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800714, &(0x7f0000000500), 0xff, 0x485, &(0x7f0000001500)="$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") syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x21081e, &(0x7f0000001400)={[{@data_err_ignore}, {@barrier}, {@nojournal_checksum}, {@nombcache}, {@barrier_val={'barrier', 0x3d, 0x3}}]}, 0x0, 0x534, &(0x7f0000000440)="$eJzs3c9vI1cdAPDvzK4dbzZttqWHgqBd2sKCVutsvO2q6oGWE0KoEqJHkLYh8UZR7DiKndKEPaRnrkhU4gRH/gDOPXHnguDGpRyQ+BGBGiSQjGY8znqz9iZqEnt3/flIo/nxxv5+X5x5z36J5wUwta5GxF5ElCPi/YiYL44nxRLv9JbsvM/27y0f7N9bTqLbfe8fSV6eHYuBx2QuF89ZiYgffCfix8nDcds7u+tLjUZ9q9hf6DQ3F9o7uzfWmkur9dX6Rq12e/H2zTdvvVE7s7q+3CwXW1/59Pd73/xpltZccWSwHmepV/XSYZzMxYj43nkEm4ALRX3Kk06EzyWNiOcj4pX8+p+PC/mrWbyoAMBTqdudj+784P4R6agCAOBJleZjYElaLcYC5iJNq9XeGN4LMZs2Wu3O9but7Y2V3ljZlSild9ca9ZvFWOGVKCXZ/mK+fX+/dmT/VkQ8FxE/n7mU71eXW42VSb3pAYApd/lI///vmV7/DwA85SqTTgAAGDv9PwBMH/0/AEwf/T8ATJ9e/39p0mkAAGPk8z8ATB/9PwBMle+/+262dA+K+1+vfLCzvd764MZKvb1ebW4vV5dbW5vV1VZrNb9nT/O452u0WpuLr8f2h1e+tdnuLLR3du80W9sbnTv5fb3v1Ev5WXtjqBkAMMpzL3/ypyTrkd+6lC8xMJdDaaKZAectnXQCwMRcmHQCwMSY5gum1yk+4xsegKfEkCl6H1AZ9gWhbrfbPb+UgHN27YvG/2FaDYz/+y9gmDKfd/z/f974wxPP+D9Mr243OenU/nHSEwGAx5sxfmDE3/+fL9a/Kf448KOVo2d8PPRxe0XzcnYJAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwGOoN//vXFSLucDnIk2r1YhnIuJKlJK7a436zYh4NiL+OFOayfYXJ500AHBK6V+TYv6va/OvzT1Q9NLlw81yRPzkl+/94sOlTmfrDxHl5J8z/eOdj4vjtfFnDwAcr99P5+uBD/Kf7d9b7i/jzOdv346ISi/+wX45Dg7jX4yL+boSpYiY/VeS788Uj0sOxy5OZ++jiHhxWP2TmMvHQHozn/bj92Wxnxlr/PSB+Gle1ltnP4svnEEuMG0+ydqfd4Zdf2lczdfDr/9K3kKdXtH+ZU+1fJC3gffj99u/C0PiZ9f81ZPGeP133+1tXXq47KOIL12M6Mc+GGh/+vGTEfFfO2H8P3/5pVdGlXV/FXEthscfjLXQaW4utHd2b6w1l1brq/WNWu324u2bb956o7aQj1EvjO4N/v7W9WdHlWX1nx0Rv3JM/b92wvr/+r/v//Crj4j/jVeHxU/jhUfEz/rEr58w/tLsbyujyrL4KyPqf9zrf/2E8T/9y+5D04YDAJPT3tldX2o06ltP6EYSj0UaZ7tRmWD07G30xKLPxjHnZL+yp42VxPkk//a4flDlEb/zP3u1d00fKep2H/2Ebw8vGtVi3P+cVR5HAwWcm8OLPiL+M+lkAAAAAAAAAAAAAACAocbxjaXBeC+exU17AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoPD/AAAA//8Dmcv+") mkdirat(0xffffffffffffff9c, &(0x7f0000000840)='./bus\x00', 0xa4) chdir(0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42042, 0x14a) fallocate(r3, 0x8, 0x0, 0x8000) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x80000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000002c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000030000000800000001"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000280)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) poll(&(0x7f0000b2c000)=[{}], 0x2c, 0xffffffffffbffff8) tkill(0x0, 0x13) 0s ago: executing program 3 (id=19): socket$inet(0x2, 0x2, 0x1) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) open(0x0, 0x64842, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, 0x0, 0x0, 0x2, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000800000", @ANYRES32=0x0, @ANYBLOB], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70200001400f400b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000280)='sched_switch\x00', r3}, 0x18) socket$nl_route(0x10, 0x3, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='map_files\x00') getdents64(r4, &(0x7f0000000000)=""/38, 0x26) getdents(r4, 0x0, 0x4a) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.10.18' (ED25519) to the list of known hosts. [ 23.713339][ T24] audit: type=1400 audit(1749142106.350:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 23.714589][ T267] cgroup: Unknown subsys name 'net' [ 23.736020][ T24] audit: type=1400 audit(1749142106.350:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.763328][ T24] audit: type=1400 audit(1749142106.370:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.763525][ T267] cgroup: Unknown subsys name 'devices' [ 23.934482][ T267] cgroup: Unknown subsys name 'hugetlb' [ 23.940076][ T267] cgroup: Unknown subsys name 'rlimit' [ 24.080799][ T24] audit: type=1400 audit(1749142106.710:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 24.104008][ T24] audit: type=1400 audit(1749142106.710:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 24.122222][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 24.129012][ T24] audit: type=1400 audit(1749142106.710:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 24.160575][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 24.160699][ T24] audit: type=1400 audit(1749142106.770:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.194773][ T24] audit: type=1400 audit(1749142106.770:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.220378][ T24] audit: type=1400 audit(1749142106.780:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.245874][ T24] audit: type=1400 audit(1749142106.780:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.839293][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.846632][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.854076][ T275] device bridge_slave_0 entered promiscuous mode [ 25.861183][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.868247][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.875617][ T275] device bridge_slave_1 entered promiscuous mode [ 25.975007][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.982048][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.989470][ T276] device bridge_slave_0 entered promiscuous mode [ 25.997931][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.004981][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.012281][ T276] device bridge_slave_1 entered promiscuous mode [ 26.020035][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.027077][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.034866][ T278] device bridge_slave_0 entered promiscuous mode [ 26.041547][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.048618][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.055967][ T278] device bridge_slave_1 entered promiscuous mode [ 26.075754][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.082812][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.090246][ T279] device bridge_slave_0 entered promiscuous mode [ 26.097262][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.104415][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.111733][ T279] device bridge_slave_1 entered promiscuous mode [ 26.150481][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.157532][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.164825][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.171864][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.233116][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.240167][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.247726][ T277] device bridge_slave_0 entered promiscuous mode [ 26.261883][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.268981][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.276392][ T277] device bridge_slave_1 entered promiscuous mode [ 26.300961][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.308098][ T278] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.315365][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.322467][ T278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.364825][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.371879][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.379138][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.386175][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.405445][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.412636][ T279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.420116][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.427155][ T279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.443406][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.450557][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.457895][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.466056][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.473537][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.481727][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.488950][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.496272][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.503692][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.511447][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 26.518929][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.527437][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.535640][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.542677][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.554182][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.562346][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.569386][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.581405][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.624140][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.631995][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.640338][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.647402][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.654966][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.663059][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.670978][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.679282][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.686319][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.693723][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.701830][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.708863][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.716153][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.724410][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.731508][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.738921][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.746882][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.754930][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 26.773548][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.781039][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.789412][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.796542][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.804609][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.812812][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.819828][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.827274][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.835435][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.853671][ T278] device veth0_vlan entered promiscuous mode [ 26.861522][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.869995][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.878588][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.886904][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.894882][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.902971][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.910805][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.918781][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.926842][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 26.935216][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.943441][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.950448][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.957934][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.965446][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.982035][ T276] device veth0_vlan entered promiscuous mode [ 26.992186][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.000475][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.009323][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.017294][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.025362][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.033443][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.041285][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.049614][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.057652][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.065937][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.074341][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.081696][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.095970][ T276] device veth1_macvtap entered promiscuous mode [ 27.105509][ T278] device veth1_macvtap entered promiscuous mode [ 27.115657][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.123924][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.132020][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.140597][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.148968][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.157230][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.175532][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.184683][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.193253][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.201069][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.209506][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.217436][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.226121][ T275] device veth0_vlan entered promiscuous mode [ 27.234207][ T277] device veth0_vlan entered promiscuous mode [ 27.242973][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.250452][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.258161][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.265686][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.273217][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.281376][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.290745][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.299006][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.308138][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.316526][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.329801][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.337967][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.352471][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.361363][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.369737][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.378306][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.386781][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.395020][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.405449][ T275] device veth1_macvtap entered promiscuous mode [ 27.413734][ T277] device veth1_macvtap entered promiscuous mode [ 27.423126][ T278] request_module fs-gadgetfs succeeded, but still no fs? [ 27.440967][ T278] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 27.452352][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.460214][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.471750][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.483855][ T279] device veth0_vlan entered promiscuous mode [ 27.499269][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.509683][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.517689][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.524732][ T303] fuse: Unknown parameter '00000000000000000003' [ 27.526189][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.543394][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.551685][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.571362][ T279] device veth1_macvtap entered promiscuous mode [ 27.579009][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.587249][ T304] ====================================================== [ 27.587249][ T304] WARNING: the mand mount option is being deprecated and [ 27.587249][ T304] will be removed in v5.15! [ 27.587249][ T304] ====================================================== [ 27.598877][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.613958][ T304] exfat: Deprecated parameter 'namecase' [ 27.627085][ T304] exfat: Deprecated parameter 'namecase' [ 27.633192][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.642125][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.650975][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.659264][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.667716][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.700402][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.708986][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.731503][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.740270][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.987399][ T308] EXT4-fs error (device loop3): ext4_orphan_get:1395: inode #15: comm syz.3.4: casefold flag without casefold feature [ 28.013570][ T304] exFAT-fs (loop2): failed to load upcase table (idx : 0x00010000, chksum : 0xbe675ead, utbl_chksum : 0xe619d30d) [ 28.169850][ T318] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 28.240732][ T320] fuse: Unknown parameter '00000000000000000003' [ 28.251316][ T308] EXT4-fs error (device loop3): ext4_orphan_get:1400: comm syz.3.4: couldn't read orphan inode 15 (err -117) [ 28.713803][ T308] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 28.772722][ T24] kauditd_printk_skb: 37 callbacks suppressed [ 28.772754][ T24] audit: type=1400 audit(1749142111.390:111): avc: denied { mount } for pid=302 comm="syz.3.4" name="/" dev="loop3" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 29.214986][ T24] audit: type=1400 audit(1749142111.850:112): avc: denied { prog_run } for pid=299 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 29.291927][ T24] audit: type=1400 audit(1749142111.920:113): avc: denied { unmount } for pid=275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 29.552646][ C1] sched: RT throttling activated [ 29.589971][ T24] audit: type=1400 audit(1749142112.220:114): avc: denied { write } for pid=299 comm="syz.2.3" name="/" dev="loop2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 29.615432][ T326] EXT4-fs error (device loop1): ext4_read_block_bitmap_nowait:476: comm syz.1.2: Invalid block bitmap block 0 in block_group 0 [ 29.629424][ T326] Quota error (device loop1): write_blk: dquota write failed [ 29.636940][ T326] Quota error (device loop1): qtree_write_dquot: Error -117 occurred while creating quota [ 29.647056][ T326] EXT4-fs error (device loop1): ext4_acquire_dquot:6226: comm syz.1.2: Failed to acquire dquot type 0 [ 29.659068][ T326] EXT4-fs error (device loop1): ext4_free_blocks:5685: comm syz.1.2: Freeing blocks not in datazone - block = 0, count = 4096 [ 29.673001][ T326] EXT4-fs error (device loop1): ext4_read_inode_bitmap:140: comm syz.1.2: Invalid inode bitmap blk 0 in block_group 0 [ 29.686010][ T326] EXT4-fs error (device loop1) in ext4_free_inode:360: Corrupt filesystem [ 29.695776][ T326] EXT4-fs (loop1): 1 orphan inode deleted [ 29.701531][ T326] EXT4-fs (loop1): mounted filesystem without journal. Opts: ; max_batch_time=0x0000000000000006,i_version,,errors=continue [ 29.728306][ T7] Quota error (device loop1): remove_tree: Getting block too big (0 >= 9) [ 29.737625][ T7] EXT4-fs error (device loop1): ext4_release_dquot:6262: comm kworker/u4:0: Failed to release dquot type 0 [ 29.775117][ T318] xt_CT: No such helper "netbios-ns" [ 29.854126][ T24] audit: type=1400 audit(1749142112.220:115): avc: denied { add_name } for pid=299 comm="syz.2.3" name="memory.swap.current" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 29.922520][ T24] audit: type=1400 audit(1749142112.220:116): avc: denied { create } for pid=299 comm="syz.2.3" name="memory.swap.current" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 29.944351][ T24] audit: type=1400 audit(1749142112.220:117): avc: denied { associate } for pid=299 comm="syz.2.3" name="memory.swap.current" scontext=root:object_r:unlabeled_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 29.955021][ T320] EXT4-fs error (device loop4): ext4_orphan_get:1395: inode #15: comm syz.4.5: casefold flag without casefold feature [ 29.980935][ T320] EXT4-fs error (device loop4): ext4_orphan_get:1400: comm syz.4.5: couldn't read orphan inode 15 (err -117) [ 30.001333][ T332] erofs: (device loop0): mounted with root inode @ nid 36. [ 30.022686][ T320] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 30.071042][ T338] netlink: 24 bytes leftover after parsing attributes in process `syz.0.6'. [ 30.295708][ T344] SELinux: Context system_u:object_r:man_t:s0 is not valid (left unmapped). [ 31.713854][ T344] erofs: (device loop3): mounted with root inode @ nid 36. [ 31.907685][ T362] fuse: Unknown parameter '00000000000000000003' [ 32.009429][ T358] EXT4-fs (loop1): Ignoring removed nobh option [ 32.039058][ T358] EXT4-fs error (device loop1): ext4_free_branches:1026: inode #11: comm syz.1.13: invalid indirect mapped block 256 (level 2) [ 32.061433][ T358] EXT4-fs (loop1): 2 truncates cleaned up [ 32.074582][ T358] EXT4-fs (loop1): mounted filesystem without journal. Opts: nobh,auto_da_alloc,data_err=ignore,,errors=continue [ 32.089309][ T364] EXT4-fs error (device loop4): ext4_orphan_get:1395: inode #15: comm syz.4.12: casefold flag without casefold feature [ 32.120886][ T364] EXT4-fs error (device loop4): ext4_orphan_get:1400: comm syz.4.12: couldn't read orphan inode 15 (err -117) [ 32.150625][ T364] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 32.219238][ T372] kernel profiling enabled (shift: 9) [ 32.246244][ T358] EXT4-fs error (device loop1): ext4_validate_block_bitmap:429: comm syz.1.13: bg 0: block 5: invalid block bitmap [ 32.322921][ T358] EXT4-fs (loop1): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1792 with error 28 [ 32.344727][ T358] EXT4-fs (loop1): This should not happen!! Data will be lost [ 32.344727][ T358] [ 32.366005][ T358] EXT4-fs (loop1): Total free blocks count 0 [ 32.372213][ T358] EXT4-fs (loop1): Free/Dirty block details [ 32.379025][ T358] EXT4-fs (loop1): free_blocks=0 [ 32.384163][ T358] EXT4-fs (loop1): dirty_blocks=1792 [ 32.389754][ T358] EXT4-fs (loop1): Block reservation details [ 32.395888][ T358] EXT4-fs (loop1): i_reserved_data_blocks=1792 [ 32.876354][ T380] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 33.255156][ T380] EXT4-fs (loop0): 1 orphan inode deleted [ 33.273641][ T380] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 33.308268][ T278] ------------[ cut here ]------------ [ 33.320126][ T278] WARNING: CPU: 1 PID: 278 at fs/inode.c:304 drop_nlink+0xc5/0x110 [ 33.330278][ T380] ext4 filesystem being mounted at /3/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 33.340731][ T278] Modules linked in: [ 33.344777][ T278] CPU: 1 PID: 278 Comm: syz-executor Not tainted 5.10.237-syzkaller-00010-gcf6ed0f1511d #0 [ 33.365465][ T278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 33.406228][ T278] RIP: 0010:drop_nlink+0xc5/0x110 [ 33.411289][ T278] Code: 1b 48 8d bb b8 04 00 00 be 08 00 00 00 e8 a3 23 f2 ff f0 48 ff 83 b8 04 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 cb 31 b8 ff <0f> 0b eb 86 44 89 f1 80 e1 07 80 c1 03 38 c1 0f 8c 5e ff ff ff 4c [ 33.457445][ T278] RSP: 0018:ffffc90000977ce8 EFLAGS: 00010293 [ 33.465620][ T278] RAX: ffffffff81ab60a5 RBX: ffff88810f89dd60 RCX: ffff88811d6713c0 [ 33.474664][ T278] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 33.512923][ T278] RBP: ffffc90000977d10 R08: 0000000000000004 R09: 0000000000000003 [ 33.532711][ T278] R10: fffff5200012ef8c R11: 1ffff9200012ef8c R12: dffffc0000000000 [ 33.544069][ T278] R13: 1ffff11021f13bb5 R14: ffff88810f89dda8 R15: 0000000000000000 [ 33.557503][ T278] FS: 000055557aafe500(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 33.572671][ T278] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 33.584863][ T278] CR2: 0000001b2d011ff8 CR3: 0000000125b69000 CR4: 00000000003506b0 [ 33.598338][ T278] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 33.612652][ T278] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 33.630826][ T278] Call Trace: [ 33.634190][ T278] shmem_rmdir+0x5b/0x90 [ 33.638616][ T278] vfs_rmdir+0x1b3/0x3e0 [ 33.652708][ T278] incfs_kill_sb+0xfe/0x210 [ 33.657257][ T278] deactivate_locked_super+0xa0/0x100 [ 33.662693][ T278] deactivate_super+0xaf/0xe0 [ 33.667376][ T278] cleanup_mnt+0x446/0x500 [ 33.671795][ T278] __cleanup_mnt+0x19/0x20 [ 33.686352][ T278] task_work_run+0x127/0x190 [ 33.690951][ T278] exit_to_user_mode_loop+0xcb/0xe0 [ 33.702667][ T278] syscall_exit_to_user_mode+0x68/0x90 [ 33.708188][ T278] do_syscall_64+0x3d/0x40 [ 33.712616][ T278] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 33.723013][ T278] RIP: 0033:0x7f7b6a2bcc57 [ 33.727438][ T278] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 [ 33.759775][ T278] RSP: 002b:00007ffdd8815f48 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 33.772855][ T278] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f7b6a2bcc57 [ 33.784118][ T278] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffdd8816000 [ 33.795470][ T278] RBP: 00007ffdd8816000 R08: 0000000000000000 R09: 0000000000000000 [ 33.803841][ T278] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffdd8817090 [ 33.811876][ T278] R13: 00007f7b6a33d925 R14: 0000000000007f31 R15: 00007ffdd88170d0 [ 33.819972][ T278] ---[ end trace 4de433a960eae329 ]--- [ 33.825507][ T278] ================================================================== [ 33.833573][ T278] BUG: KASAN: null-ptr-deref in ihold+0x20/0x60 [ 33.839897][ T278] Write of size 4 at addr 0000000000000170 by task syz-executor/278 [ 33.847856][ T278] [ 33.850189][ T278] CPU: 0 PID: 278 Comm: syz-executor Tainted: G W 5.10.237-syzkaller-00010-gcf6ed0f1511d #0 [ 33.861549][ T278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 33.871596][ T278] Call Trace: [ 33.874884][ T278] __dump_stack+0x21/0x24 [ 33.879206][ T278] dump_stack_lvl+0x169/0x1d8 [ 33.883890][ T278] ? thaw_kernel_threads+0x220/0x220 [ 33.889176][ T278] ? show_regs_print_info+0x18/0x18 [ 33.894365][ T278] ? _raw_spin_lock+0x8e/0xe0 [ 33.899057][ T278] ? _raw_spin_trylock_bh+0x130/0x130 [ 33.904419][ T278] ? ihold+0x20/0x60 [ 33.908304][ T278] kasan_report+0xd8/0x130 [ 33.912715][ T278] ? ihold+0x20/0x60 [ 33.916607][ T278] kasan_check_range+0x280/0x290 [ 33.921536][ T278] __kasan_check_write+0x14/0x20 [ 33.926482][ T278] ihold+0x20/0x60 [ 33.930213][ T278] vfs_rmdir+0x247/0x3e0 [ 33.934452][ T278] incfs_kill_sb+0xfe/0x210 [ 33.938966][ T278] deactivate_locked_super+0xa0/0x100 [ 33.944331][ T278] deactivate_super+0xaf/0xe0 [ 33.949007][ T278] cleanup_mnt+0x446/0x500 [ 33.953425][ T278] __cleanup_mnt+0x19/0x20 [ 33.957834][ T278] task_work_run+0x127/0x190 [ 33.962417][ T278] exit_to_user_mode_loop+0xcb/0xe0 [ 33.967620][ T278] syscall_exit_to_user_mode+0x68/0x90 [ 33.973076][ T278] do_syscall_64+0x3d/0x40 [ 33.977489][ T278] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 33.983371][ T278] RIP: 0033:0x7f7b6a2bcc57 [ 33.987785][ T278] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 [ 34.007387][ T278] RSP: 002b:00007ffdd8815f48 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 34.015795][ T278] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f7b6a2bcc57 [ 34.023850][ T278] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffdd8816000 [ 34.031815][ T278] RBP: 00007ffdd8816000 R08: 0000000000000000 R09: 0000000000000000 [ 34.039784][ T278] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffdd8817090 [ 34.047754][ T278] R13: 00007f7b6a33d925 R14: 0000000000007f31 R15: 00007ffdd88170d0 [ 34.055723][ T278] ================================================================== [ 34.063788][ T278] Disabling lock debugging due to kernel taint [ 34.071131][ T278] BUG: kernel NULL pointer dereference, address: 0000000000000170 [ 34.072765][ T24] kauditd_printk_skb: 73 callbacks suppressed [ 34.072778][ T24] audit: type=1400 audit(1749142116.700:191): avc: denied { read } for pid=76 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 34.078931][ T278] #PF: supervisor write access in kernel mode [ 34.078937][ T278] #PF: error_code(0x0002) - not-present page [ 34.078948][ T278] PGD 10cae8067 [ 34.091584][ T24] audit: type=1400 audit(1749142116.700:192): avc: denied { search } for pid=76 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 34.106678][ T278] P4D 10cae8067 PUD 0 [ 34.106695][ T278] Oops: 0002 [#1] PREEMPT SMP KASAN [ 34.106708][ T278] CPU: 0 PID: 278 Comm: syz-executor Tainted: G B W 5.10.237-syzkaller-00010-gcf6ed0f1511d #0 [ 34.106713][ T278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 34.106728][ T278] RIP: 0010:ihold+0x26/0x60 [ 34.106743][ T278] Code: 00 00 00 00 55 48 89 e5 41 56 53 48 89 fb e8 e1 29 b8 ff 48 8d bb 70 01 00 00 be 04 00 00 00 e8 90 1b f2 ff 41 be 01 00 00 00 44 0f c1 b3 70 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 61 [ 34.134531][ T24] audit: type=1400 audit(1749142116.700:193): avc: denied { write } for pid=76 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 34.143615][ T278] RSP: 0018:ffffc90000977d28 EFLAGS: 00010246 [ 34.143628][ T278] RAX: ffff88811d671300 RBX: 0000000000000000 RCX: 0000000000000286 [ 34.143636][ T278] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000ffffffff [ 34.143644][ T278] RBP: ffffc90000977d38 R08: 0000000000000004 R09: 0000000000000003 [ 34.143653][ T278] R10: fffffbfff0d8e248 R11: 1ffffffff0d8e248 R12: 1ffff1102126fde2 [ 34.143668][ T278] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [ 34.157835][ T24] audit: type=1400 audit(1749142116.700:194): avc: denied { add_name } for pid=76 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 34.164327][ T278] FS: 000055557aafe500(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 34.164335][ T278] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 34.164343][ T278] CR2: 0000000000000170 CR3: 0000000125b69000 CR4: 00000000003506b0 [ 34.164354][ T278] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 34.164360][ T278] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 34.164378][ T278] Call Trace: [ 34.191826][ T24] audit: type=1400 audit(1749142116.700:195): avc: denied { create } for pid=76 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 34.198496][ T278] vfs_rmdir+0x247/0x3e0 [ 34.198511][ T278] incfs_kill_sb+0xfe/0x210 [ 34.198525][ T278] deactivate_locked_super+0xa0/0x100 [ 34.198544][ T278] deactivate_super+0xaf/0xe0 [ 34.248260][ T24] audit: type=1400 audit(1749142116.700:196): avc: denied { append open } for pid=76 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 34.250275][ T278] cleanup_mnt+0x446/0x500 [ 34.250294][ T278] __cleanup_mnt+0x19/0x20 [ 34.400023][ T278] task_work_run+0x127/0x190 [ 34.404639][ T278] exit_to_user_mode_loop+0xcb/0xe0 [ 34.409846][ T278] syscall_exit_to_user_mode+0x68/0x90 [ 34.415290][ T278] do_syscall_64+0x3d/0x40 [ 34.419696][ T278] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 34.425659][ T278] RIP: 0033:0x7f7b6a2bcc57 [ 34.430061][ T278] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 [ 34.449652][ T278] RSP: 002b:00007ffdd8815f48 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 34.458146][ T278] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f7b6a2bcc57 [ 34.466108][ T278] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffdd8816000 [ 34.474065][ T278] RBP: 00007ffdd8816000 R08: 0000000000000000 R09: 0000000000000000 [ 34.482028][ T278] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffdd8817090 [ 34.489983][ T278] R13: 00007f7b6a33d925 R14: 0000000000007f31 R15: 00007ffdd88170d0 [ 34.498038][ T278] Modules linked in: [ 34.501941][ T278] CR2: 0000000000000170 [ 34.506094][ T278] ---[ end trace 4de433a960eae32a ]--- [ 34.511541][ T278] RIP: 0010:ihold+0x26/0x60 [ 34.516027][ T278] Code: 00 00 00 00 55 48 89 e5 41 56 53 48 89 fb e8 e1 29 b8 ff 48 8d bb 70 01 00 00 be 04 00 00 00 e8 90 1b f2 ff 41 be 01 00 00 00 44 0f c1 b3 70 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 61 [ 34.535618][ T278] RSP: 0018:ffffc90000977d28 EFLAGS: 00010246 [ 34.541685][ T278] RAX: ffff88811d671300 RBX: 0000000000000000 RCX: 0000000000000286 [ 34.550167][ T278] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000ffffffff [ 34.558134][ T278] RBP: ffffc90000977d38 R08: 0000000000000004 R09: 0000000000000003 [ 34.566100][ T278] R10: fffffbfff0d8e248 R11: 1ffffffff0d8e248 R12: 1ffff1102126fde2 [ 34.574060][ T278] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [ 34.582025][ T278] FS: 000055557aafe500(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 34.590943][ T278] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 34.597513][ T278] CR2: 0000000000000170 CR3: 0000000125b69000 CR4: 00000000003506b0 [ 34.605472][ T278] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 34.613439][ T278] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 34.621409][ T278] Kernel panic - not syncing: Fatal exception [ 34.627717][ T278] Kernel Offset: disabled [ 34.632063][ T278] Rebooting in 86400 seconds..