last executing test programs: 21.146687089s ago: executing program 0 (id=1): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet_icmp_raw(0x2, 0x3, 0x1) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) inotify_init1(0x80800) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000000)={'raw\x00', 0x4, [{}, {}, {}, {}]}, 0x68) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x141091, 0x0) mkdir(&(0x7f0000000240)='./file2\x00', 0x122) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000a00)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) chdir(&(0x7f00000001c0)='./bus\x00') r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) writev(r3, &(0x7f0000000480)=[{&(0x7f0000000100)='\f7', 0x2}], 0x1) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) pidfd_getfd(r3, r0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_CAP_HYPERV_SYNIC2(r6, 0x4068aea3, &(0x7f0000000140)) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f00000001c0)={0x1, 0x0, [{0x40000084, 0x0, 0xffffffffffffffff}]}) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, &(0x7f0000000080)={0x2, 0xdc0}) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f00000001c0)={'veth0\x00'}) rmdir(&(0x7f0000000380)='./file0/../file0\x00') setsockopt$packet_int(r1, 0x107, 0xa, 0x0, 0x0) symlink(&(0x7f0000000180)='./bus\x00', &(0x7f0000000280)='./file1\x00') 21.032773196s ago: executing program 0 (id=8): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYRESOCT=r0], 0x44}, 0x1, 0x0, 0x0, 0x4000804}, 0x20004000) r1 = socket$netlink(0x10, 0x3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) writev(r1, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000140)="faed9fe47a4a52e09fea5054a8f1a6f5f88ce4b06af871f8351fd37acf2afd8c0d4002d4d177998d03806de124cb1fc437b4df2126faa7d7132503b9e976cb8915685d9e29130f03ef0c", 0x4a}], 0x2) r2 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12013f00000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581d7"], 0x0) syz_usb_control_io$hid(r2, 0x0, 0x0) syz_usb_control_io$hid(r2, &(0x7f0000000840)={0x24, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00220f"], 0x0}, 0x0) r3 = syz_open_dev$hiddev(&(0x7f0000000540), 0x0, 0x40) ioctl$HIDIOCGREPORT(r3, 0x400c4807, &(0x7f0000000040)={0x3, 0x100, 0x7}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_TIOCINQ(r4, 0x541b, &(0x7f0000000040)) socket$inet_icmp_raw(0x2, 0x3, 0x1) 20.929587281s ago: executing program 0 (id=11): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x88842, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, &(0x7f00000000c0)="d8df0f23b3b9ce000000b807000000ba000000000f30658154fea900600000c4e28ddc8dcd000000c182fd3f0000c8b950020000b801000000ba000000000f300fc79d53bf0000c4e16dd3010f2202", 0x4f}], 0x1, 0x4d, 0x0, 0x0) r3 = syz_kvm_add_vcpu$x86(0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)=[@nested_amd_stgi={0x17e, 0x10}, @nested_vmlaunch={0x12f, 0x18}, @wrmsr={0x65, 0x20, {0x33e, 0x7}}, @in_dx={0x69, 0x20, {0x48de, 0x1}}, @set_irq_handler={0xc8, 0x20, {0xd4}}], 0x88}) ioctl$KVM_SET_CPUID2(r3, 0x4008ae90, &(0x7f0000000280)={0x6, 0x0, [{0xb, 0x506, 0x4, 0x8d, 0x2, 0x91c, 0xba}, {0x4, 0x4, 0x2, 0x3000, 0x2, 0x2, 0x5862}, {0x80000000, 0x400, 0x1, 0x1, 0x7, 0x7092, 0x7f00000}, {0x1, 0x7, 0x4, 0x10, 0x3, 0x5, 0x6}, {0x40000001, 0x8, 0x6, 0xfffffffd, 0xdb, 0xaf0, 0x1}, {0x7, 0x9, 0x1, 0x4, 0x5, 0x7, 0x7}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20.874554105s ago: executing program 32 (id=11): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x88842, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, &(0x7f00000000c0)="d8df0f23b3b9ce000000b807000000ba000000000f30658154fea900600000c4e28ddc8dcd000000c182fd3f0000c8b950020000b801000000ba000000000f300fc79d53bf0000c4e16dd3010f2202", 0x4f}], 0x1, 0x4d, 0x0, 0x0) r3 = syz_kvm_add_vcpu$x86(0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)=[@nested_amd_stgi={0x17e, 0x10}, @nested_vmlaunch={0x12f, 0x18}, @wrmsr={0x65, 0x20, {0x33e, 0x7}}, @in_dx={0x69, 0x20, {0x48de, 0x1}}, @set_irq_handler={0xc8, 0x20, {0xd4}}], 0x88}) ioctl$KVM_SET_CPUID2(r3, 0x4008ae90, &(0x7f0000000280)={0x6, 0x0, [{0xb, 0x506, 0x4, 0x8d, 0x2, 0x91c, 0xba}, {0x4, 0x4, 0x2, 0x3000, 0x2, 0x2, 0x5862}, {0x80000000, 0x400, 0x1, 0x1, 0x7, 0x7092, 0x7f00000}, {0x1, 0x7, 0x4, 0x10, 0x3, 0x5, 0x6}, {0x40000001, 0x8, 0x6, 0xfffffffd, 0xdb, 0xaf0, 0x1}, {0x7, 0x9, 0x1, 0x4, 0x5, 0x7, 0x7}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10.65466157s ago: executing program 3 (id=42): prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x7, 0x100}, 0x0) (async) r0 = getpid() openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/kheaders.tar.xz', 0x900, 0x11) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') (async) sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x7) (async) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(0xffffffffffffffff, 0x0, 0x24000010) ioctl$USBDEVFS_DISCONNECT_CLAIM(0xffffffffffffffff, 0x8108551b, 0x0) (async) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$bt_hci(r1, 0x0, 0x0) (async) r2 = userfaultfd(0x1) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x79}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) read(r2, &(0x7f00000002c0)=""/153, 0x20) 9.141907938s ago: executing program 1 (id=43): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x34}}, 0x0) 9.140697478s ago: executing program 2 (id=44): r0 = socket$nl_generic(0x10, 0x3, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) r1 = inotify_init1(0x800) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x5400014e) setxattr$incfs_metadata(&(0x7f0000000f80)='./file0\x00', &(0x7f0000000fc0), 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='user.incfs.metadata\x00') r2 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000380)={'team_slave_0\x00', &(0x7f00000000c0)=@ethtool_rxnfc={0x30, 0x12, 0x0, {0x3, @ether_spec={@local, @remote, 0x1ff}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 0x0, 0x8000, [0x2, 0x2]}, @udp_ip6_spec={@ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, @mcast1, 0x4e23, 0x4e22, 0x9c}, {0x0, @broadcast, 0x3, 0x0, [0x3, 0x5]}, 0xfffffffffffffffe, 0x1}}}) r4 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r4, &(0x7f0000000100), 0x10) bind$can_raw(r4, &(0x7f0000000140), 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000003ebec3d0eea2f4128939541035801b279fcda1f77c54c26d267e9d5a7667e0b5f202c7d5224f48da2569ba71d8195000f29004552ee4aa89a44b47df4b54990b7d4890262cd5384c3f67d2d19edbea2d26c8e87eb86d7a4bd40b329f8dba2a42d57ed5d670172f22c0939d6c35f1f45997f4a29ca8efc7b985da440c94888b5eb18c5acd58ee390c0d9ac091489ee9d95283019cdf2e582042ce5f494d867e3bbe6210a6dfdacd412b507d776ee200e7b19ad1a439d7425027fd95848524dd6e471e2c9cb1f6fcb0316cc5e394c97a391204c40798d56f3dbb4971aa7170d3dbc56d9be97831fae91f62784750efd02780", @ANYRES16=r2, @ANYBLOB="090302000000fcdbdf251d000000"], 0x14}, 0x1, 0x0, 0x0, 0x4008915}, 0x20040000) 9.140470858s ago: executing program 3 (id=45): r0 = ioctl$KVM_GET_STATS_FD_vm(0xffffffffffffffff, 0xaece) syz_usb_connect(0x6, 0x8f, &(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES16=r0, @ANYRESDEC=r0, @ANYRESDEC=r0, @ANYRES8=r0, @ANYBLOB="5b90fc2e5ceeaa89e0e0ea9d105bb4a0a086a07c6cee85e84caf4f5ed624dffd9b5b214ba3e05b4e32fc3c0c33a872"], 0x0) 7.483894694s ago: executing program 1 (id=46): mount(0x0, 0x0, 0x0, 0x3b070cd, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat\x00') pread64(r0, &(0x7f0000000480)=""/14, 0xd, 0x8000) futex(&(0x7f0000000100)=0x6, 0x4, 0x4, 0x0, 0x0, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r0, 0x80286722, &(0x7f0000000040)={&(0x7f0000000180)=""/195, 0xc3, 0x9, 0xfffffeff}) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000000)=0x572, 0x4) 7.482953635s ago: executing program 2 (id=47): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000005c0), r0) sendmsg$IEEE802154_LLSEC_ADD_DEV(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)={0x14, r1, 0x615, 0x70bd26, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x801}, 0xc040) r2 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x10c4, 0xea90, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x7}}}}]}}]}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000140)="8cebf438b4202fe4555bbe9a526c2483c87faa37d38f61df69dcf429e030a33b9daf8c35eb4c312b8cd3609555e5034571a63dbcafe7f4fbbbf77d886b2d30d528d94cdd696f04a17362e59994849c3aca4dabe8c840949218b2f226fd46daf140069739ff3bae2943c1853dc300abddc5e7cb1c42b07cbbf4631822d9acffb87d99bbf567119e3af9b596bc657bbe834818d6948af79637c5e6f1dc1a036c260c788d1bbfa197e5d577231d24d0daf8cedd9463bc90653e714bc3f3cfe2c666c46ea36ab8175d9c4edc4442926a4b2f853ed247ccb255a0c5175ef9111741e11c87892273313fa88645b3b1286b908d3b5ecc5d7f92342200c8ce4c6eb86e07") syz_usb_control_io$hid(r2, 0x0, 0x0) syz_usb_control_io(r2, &(0x7f00000000c0)={0x2c, &(0x7f0000000100)={0x0, 0x0, 0x8, {0x8, 0x0, "392cdaab4a73"}}, 0x0, 0x0, 0x0, 0x0}, 0x0) 7.482379325s ago: executing program 3 (id=48): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000000)={0x1}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r1, 0x26, &(0x7f0000000040)={0x0, 0x0, 0x10, 0x3}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x1, 0x0, 0x12, 0x10}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r3, 0x7, &(0x7f0000000180)={0x1, 0x0, 0x12, 0x10}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_int(r4, 0x1, 0x10, &(0x7f0000000040)=0x200, 0x4) sendmmsg$unix(r4, &(0x7f0000000140)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400c0}}], 0x1, 0x80) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r5) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r5, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={0x34, r6, 0x1, 0x70bd26, 0x25dfdc00, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}]}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x5}]}, 0x34}}, 0x4044094) connect$unix(r4, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) ioctl$sock_inet_SIOCGIFADDR(r4, 0x8915, &(0x7f00000000c0)={'wg1\x00'}) r7 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff8000}]}) r8 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='cpuset.effective_cpus\x00', r8) close_range(r7, 0xffffffffffffffff, 0x0) 5.788844053s ago: executing program 1 (id=49): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet_icmp_raw(0x2, 0x3, 0x1) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) inotify_init1(0x80800) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000000)={'raw\x00', 0x4, [{}, {}, {}, {}]}, 0x68) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x141091, 0x0) mkdir(&(0x7f0000000240)='./file2\x00', 0x122) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000a00)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) chdir(&(0x7f00000001c0)='./bus\x00') r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) writev(r3, &(0x7f0000000480)=[{&(0x7f0000000100)='\f7', 0x2}], 0x1) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) pidfd_getfd(r3, r0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_CAP_HYPERV_SYNIC2(r6, 0x4068aea3, &(0x7f0000000140)) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, &(0x7f0000000080)={0x2, 0xdc0}) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f00000001c0)={'veth0\x00'}) rmdir(&(0x7f0000000380)='./file0/../file0\x00') setsockopt$packet_int(r1, 0x107, 0xa, 0x0, 0x0) symlink(&(0x7f0000000180)='./bus\x00', &(0x7f0000000280)='./file1\x00') 5.788168923s ago: executing program 2 (id=50): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz0\x00', {0x9, 0x8004, 0x6, 0xfffa}, 0x1d, [0x6, 0xc95a, 0xfffffbf2, 0xfff, 0x7e, 0x2, 0x3, 0x7f, 0x0, 0x4d, 0x39cc191a, 0x5c, 0x9, 0x5, 0xfffff807, 0x0, 0x5, 0x48, 0x0, 0x2ab, 0x4, 0x5, 0x4, 0x3c5b, 0x7fff, 0xa, 0x9, 0x1, 0x4, 0x7, 0xe661, 0x7fff, 0x66, 0x3, 0x7fff, 0x4c74, 0x80000000, 0x800242, 0xffffffff, 0xe, 0xfffffffe, 0x71, 0x1, 0x7, 0x3, 0xe, 0x5, 0x4, 0x8f, 0x6, 0x3, 0x3, 0x6, 0x4, 0x1, 0x30000000, 0x80, 0x1, 0x7, 0x6, 0x8, 0x800004, 0x1, 0x40], [0x4, 0xffff, 0x12f, 0x6, 0x10, 0x8, 0x4f6, 0xcb, 0xf9, 0xd, 0x2bf, 0x9a, 0x40, 0xfffffffc, 0x3, 0x7a35e85d, 0x7, 0x5, 0x2f, 0xe, 0x40, 0x1, 0x0, 0xfffffffe, 0x0, 0x5, 0x8004, 0x9, 0x3fe, 0x401, 0x6, 0x4, 0xfb, 0x5, 0x8cd, 0x5f31, 0x4, 0x900000, 0xffffffff, 0x2, 0x9, 0x4, 0xffff7aff, 0x8, 0x5, 0x6, 0xb, 0xa, 0x1, 0x9, 0x9, 0x2, 0x7f, 0x9, 0x1, 0x1, 0x9, 0xffffffff, 0x7, 0x1, 0x1, 0x48c93690, 0x42, 0x400005], [0x6, 0x3, 0x80000400, 0x60, 0xff, 0x100, 0x8d2, 0xd0, 0x5, 0x7fff, 0x400, 0x800001, 0xb, 0x6, 0x5, 0x1005, 0x0, 0x3, 0xfffffffd, 0x2, 0x86, 0x1, 0x9, 0x6, 0x8001, 0x5, 0x2, 0x2, 0x800, 0x8, 0x5, 0x8001, 0x6, 0x38, 0x800003, 0x440, 0x80, 0x3, 0x2cc52, 0x950bfaf, 0x1000, 0xa2, 0x7, 0x53cf697b, 0xfffffff9, 0x6, 0xac8, 0x3f, 0x10001, 0xba9, 0x400, 0x3, 0x0, 0x1, 0xffff, 0x1, 0x6, 0x1d, 0x7, 0x3, 0x6, 0xaa6d, 0x0, 0xff], [0x83, 0xbb31, 0x203, 0x8, 0x5, 0x1, 0x6, 0x5, 0x0, 0x3, 0x10080ce7, 0x80001ff, 0x4, 0x7, 0x71, 0x1003, 0x101, 0x10000, 0x6, 0x7fff, 0xffff, 0xe620, 0xc, 0x2, 0x2001, 0x6, 0x14c, 0x100009, 0x6, 0x4, 0xffffffff, 0x80000000, 0x6, 0x8, 0xc6, 0x10001, 0x0, 0xffff, 0x3, 0x40000004, 0x100, 0x20009602, 0x4, 0x2, 0xffff, 0x6, 0x80000001, 0x400, 0x6, 0x8, 0x30b1d693, 0x5a2b, 0xc, 0x7, 0x1, 0x7, 0x4, 0x4, 0xa5f, 0xb1b, 0x1, 0x200, 0xffff3441, 0xfff]}, 0x45c) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="300000001c0021002dbd7000000000000700000005000000000002000a0002"], 0x30}, 0x1, 0x0, 0x0, 0x4014}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r1, 0x0, r3, 0x0, 0x725e65a6, 0x0) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xfffffd88) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) sendmsg$AUDIT_TTY_GET(r2, &(0x7f0000000900)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x10, 0x3f8, 0x720, 0x70bd27, 0x25dfdbfd, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000050}, 0x41) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x74, 0x0, 0x0) request_key(&(0x7f00000001c0)='rxrpc_s\x00', 0x0, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x4, 0x6, 0x9, 0x7fffffff, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}, @mcast2, 0x700, 0x80, 0x9, 0xfffffff1}}) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) getgroups(0x3, &(0x7f0000000680)=[0xffffffffffffffff, 0xee01, 0xee01]) syz_io_uring_setup(0x11d39, &(0x7f0000000180)={0x0, 0x2079d6, 0x3fff, 0x1, 0x29d}, 0x0, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = socket$inet(0x2, 0x2, 0x0) close_range(r9, 0xffffffffffffffff, 0x0) setsockopt$inet_buf(r8, 0x0, 0x10, &(0x7f0000000080)="170000000200020000ffbe8c5ee17688a2003c000303000afdff02a257fc5ad90200bb6a880000d6c9db0000db00000200df01800a0000ebfc0607bdff59100ac45761547a681f009cee4a5acba400001fb700674f00c88ebbf9315033bf79ac2dfc061f15003901dee2ffffffffe9000000000000000062068f5ee50ce5af9b1c568302ffff02ff0331dd3bab0840024f0298e9e90539062a80e605007f71174ab498a30b3e5a1b47b63a6323ded2aa084cd36276a3afff", 0xb8) sendmsg$nl_xfrm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="bc010000190001000000000000000000fc0200000000000000000000000000000000000000000000000000000000000000000040000000000a000000080000000d", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000001d00000000000000000000000000000000000000000000000000000000000000dd020000000000000000000000000000000000020000000004010500ac14143b000000000000000000000000000004d32b00000000000000ac14140c000000000000000000000000000000000000ff00000000000000000000000000fc020000000000000000000000000000000000003200000000000000ac1414aa000000000000000000000000000000000100000000000000ffffffff0000000000000000000000000000000000000001000000003c00000002000000fc000000000000000000000000000001000000000103000000000000060000000000000000000000000000000000000000000000000000006c0000000200000000000000000000000000000000000000ffffffff00000000000000000000000000004000"], 0x1bc}}, 0x0) ioctl$sock_SIOCDELDLCI(r6, 0x8981, &(0x7f0000000200)={'veth1_macvtap\x00', 0xfff7}) socket$inet6_tcp(0xa, 0x1, 0x0) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r11 = ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) ioctl$KVM_CAP_DIRTY_LOG_RING_ACQ_REL(r11, 0x4068aea3, &(0x7f0000000140)={0xdf, 0x0, 0x4000}) ioctl$KVM_GET_DIRTY_LOG(r11, 0x4010ae42, &(0x7f0000000000)={0x1fe, 0x0, &(0x7f0000001000/0x1000)=nil}) 5.787159493s ago: executing program 3 (id=51): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000090024206d041cc340000000000109022400010000a00009040000010301010009210008000122010009058103"], 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000abb000/0x1000)=nil, 0x1000, 0x0, 0x102000200032, 0xffffffffffffffff, 0x87f64000) setsockopt$sock_timeval(r1, 0x1, 0x2f, &(0x7f0000abaff9)={0x0, 0xea60}, 0x10) syz_usb_control_io$hid(r0, &(0x7f00000002c0)={0x24, &(0x7f0000000380)=ANY=[@ANYBLOB="c60009"], 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x9}) fsopen(0x0, 0x1) syz_usb_control_io$hid(r0, &(0x7f0000001640)={0x24, 0x0, 0x0, &(0x7f0000001bc0)={0x0, 0x22, 0x1, {[@main=@item_012={0x0, 0x0, 0x9}]}}, 0x0}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)={0x14, 0x1a, 0x1, 0x70bd28, 0x4, {0x2}}, 0x14}}, 0x800) syz_open_dev$hidraw(&(0x7f0000000080), 0x0, 0x0) r3 = syz_usb_connect(0x2, 0x24, &(0x7f0000000000)=ANY=[@ANYBLOB="120100009e173610ef171e7206de0102030109021200010000000009040000000206"], 0x0) syz_usb_control_io$cdc_ncm(r3, 0x0, 0x0) syz_usb_control_io(r3, &(0x7f0000000340)={0x2c, 0x0, 0x0, &(0x7f0000000140)={0x0, 0xf, 0x5, {0x5, 0xf, 0x5}}, 0x0, 0x0}, &(0x7f0000000880)={0x84, &(0x7f0000000380)={0x0, 0x10, 0x81, "9b94205c07264580ae8d9a7c065e3db0c81130d0a4fac6b7d31bff51ed20dc540ad42f6d0fcbd3d34a9939ecd102f8a6201bbb631e7cf53cf0720940daabae630bc2a08dd8c9ccdbff3fdc6bf4137f78bc8ecd7c81fc7b80f342764cfb4d04f583a16fca89c91264971aeef6d82847f761e9b7d6c5623ea5a5fc8a2f068825b222"}, &(0x7f0000000480)={0x0, 0xa, 0x1, 0xa}, &(0x7f00000004c0)={0x0, 0x8, 0x1}, &(0x7f0000000500)={0x20, 0x0, 0x4, {0x1, 0x3}}, &(0x7f0000000540)={0x20, 0x0, 0x4, {0x20, 0x2}}, &(0x7f00000005c0)={0x40, 0x7, 0x2, 0x34e1}, &(0x7f0000000600)={0x40, 0x9, 0x1, 0xd1}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={0x40, 0x19, 0x2, "fc90"}, 0x0, 0x0, 0x0, 0x0}) close(r1) syz_usb_disconnect(r0) 3.977159569s ago: executing program 1 (id=52): r0 = socket(0x1e, 0x2, 0x0) r1 = epoll_create1(0x80000) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000ec0), r2) sendmsg$IEEE802154_START_REQ(r2, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000f00)={0x4c, r3, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@IEEE802154_ATTR_CHANNEL={0x5, 0x7, 0x10}, @IEEE802154_ATTR_COORD_PAN_ID={0x6, 0xa, 0x1}, @IEEE802154_ATTR_SF_ORD={0x5, 0x18, 0x5}, @IEEE802154_ATTR_BCN_ORD={0x5, 0x17, 0x96}, @IEEE802154_ATTR_BAT_EXT={0x5, 0x1a, 0x7f}, @IEEE802154_ATTR_BAT_EXT={0x5, 0x1a, 0x7}, @IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xaaa0}]}, 0x4c}, 0x1, 0x0, 0x0, 0x2000008c}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000500)={0xe000200c}) 3.976796929s ago: executing program 2 (id=53): r0 = syz_init_net_socket$bt_rfcomm(0x1f, 0x1, 0x3) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000180)={0x0, 0x4}, 0x2) (async) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000180)={0x0, 0x4}, 0x2) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000380), &(0x7f00000003c0)=0x4) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000140)={0xa, 0x0, [{0x80000001, 0x40, 0x7fffffff, 0x3a, 0x3}, {0x7, 0x3, 0x5, 0xfffffffb, 0x8001}, {0x6, 0x5, 0xb, 0x5, 0x6}, {0x80000001, 0x6, 0x6, 0x1, 0xf}, {0xe, 0x4, 0x7, 0xafb4, 0x4}, {0xb, 0x4, 0x10001, 0x101, 0x4}, {0x80000001, 0x5, 0x1, 0x1, 0x60}, {0x2, 0x3, 0xfffffffe, 0xfff, 0x2}, {0x2, 0x3, 0x466, 0x8, 0x9}, {0x2, 0x4, 0x8000, 0x2}]}) r2 = openat$kvm(0x0, &(0x7f0000000080), 0x101400, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) (async) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = eventfd2(0x60000, 0x80803) ioctl$KVM_SET_BOOT_CPU_ID(r3, 0xae78, &(0x7f0000000000)) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000140)='./binderfs/binder0\x00', 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={0x0}}, 0x88c0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5}, 0x0) openat$kvm(0xffffff9c, &(0x7f00000000c0), 0x800, 0x0) (async) r5 = openat$kvm(0xffffff9c, &(0x7f00000000c0), 0x800, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000000)={0x1, 0x0, [{0xf88e470f, 0xed}]}) (async) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000000)={0x1, 0x0, [{0xf88e470f, 0xed}]}) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) (async) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) (async) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f0000000300)={[0x2, 0x9, 0xfffffffffffffffb, 0x2, 0x2, 0x0, 0x4002004c4, 0x1004, 0x8000000000000000, 0xc595, 0x0, 0x1, 0xffffffffffffffff, 0x2000000000000000, 0xb3, 0x8d], 0xeeee8000, 0x2010d3}) (async) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f0000000300)={[0x2, 0x9, 0xfffffffffffffffb, 0x2, 0x2, 0x0, 0x4002004c4, 0x1004, 0x8000000000000000, 0xc595, 0x0, 0x1, 0xffffffffffffffff, 0x2000000000000000, 0xb3, 0x8d], 0xeeee8000, 0x2010d3}) ioctl$KVM_RUN(r7, 0xae80, 0x0) (async) ioctl$KVM_RUN(r7, 0xae80, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0xfffffffc}) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) syz_clone(0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r8 = syz_clone(0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r8) ptrace$setregs(0xd, r8, 0x7fff, &(0x7f0000000240)="12d6cacc400cb28384641a92606ff1d67f7718dadaa571f32ee2eb179974146cb14384e0e9a430de36da9cfa0941cbdb45400dbbf771a9f0d840b73de0cb08d1d3be1afc468f2a26a39cdfba80aa009e0b6b4bab31776e6f4b3cbe471b323c3e805335edbad98b115636442e777dce7bc27e899b8bc13ebd3a9b22f3813b493bcddc5ecc46eada68531ae03f1bb0b359b18b6d79166b19d986d6a6a09da8e03277") ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000100)={0x1, 0x0, 0x0, r4, 0xc}) 3.975750449s ago: executing program 3 (id=54): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) setuid(0xee00) r1 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(r1, 0x0, 0x2, 0x0) tkill(r1, 0xe) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) recvmmsg(r0, &(0x7f0000001640)=[{{&(0x7f0000000240)=@hci, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/8, 0x8}, {&(0x7f00000002c0)=""/133, 0x85}], 0x2, &(0x7f0000000380)=""/49, 0x31}, 0x3606aa52}, {{&(0x7f00000003c0)=@can, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)=""/94, 0x5e}], 0x1, &(0x7f0000000500)=""/126, 0x7e}, 0x10}, {{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/230, 0xe6}, {&(0x7f00000006c0)=""/183, 0xb7}, {&(0x7f0000000800)=""/106, 0x6a}, {&(0x7f0000000880)=""/163, 0xa3}, {&(0x7f0000000940)=""/231, 0xe7}, {&(0x7f0000000780)=""/12, 0xc}, {&(0x7f0000000a40)=""/120, 0x78}], 0x8, &(0x7f0000000b40)=""/141, 0x8d}, 0x1}, {{0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/17, 0x11}, {&(0x7f0000000c40)=""/83, 0x53}, {&(0x7f0000000cc0)=""/15, 0xf}, {&(0x7f0000000d00)=""/134, 0x86}], 0x4}, 0x7}, {{&(0x7f0000000e00)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000e80)=""/209, 0xd1}], 0x1, &(0x7f0000000fc0)=""/211, 0xd3}, 0x2}, {{&(0x7f00000010c0)=@sco, 0x80, &(0x7f0000001580)=[{&(0x7f0000001140)=""/104, 0x68}, {&(0x7f00000011c0)=""/232, 0xe8}, {&(0x7f00000012c0)=""/207, 0xcf}, {&(0x7f00000013c0)=""/158, 0x9e}, {&(0x7f0000001480)=""/255, 0xff}], 0x5, &(0x7f0000001600)=""/1, 0x1}, 0x7fff}], 0x6, 0x2005, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000200)=[@sack_perm, @mss={0x2, 0x40}, @mss={0x2, 0x2}, @mss={0x2, 0x1}, @window={0x3, 0x8, 0x6}, @timestamp, @sack_perm, @timestamp], 0x8) sendto$inet(r0, &(0x7f00000007c0)='%', 0x1, 0xe044, 0x0, 0x0) r2 = socket$inet6(0x10, 0x2, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040), 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, 0x0, &(0x7f0000000180)=0x2c) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x304}, "0000000400", "6abc00000000000000000000001000", "f0630400", "c1d346a95300e69f"}, 0x6) sendto$inet6(r2, &(0x7f0000000080)="4c00000012001f15b9409b849ac00a00a5784002000000000000030038c88cc055c5ac27a6c5b068d0bf46d323452536005ad94a461cdbfee9bdb942352359a351d1ec0cffc8792cd8000080", 0x4c, 0x810, 0x0, 0x0) 2.06092657s ago: executing program 1 (id=55): r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)={0x50, 0x0, 0x1, 0x401, 0x0, 0x0, {0xa}, [@CTA_TUPLE_REPLY={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x26}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x1}, 0x0) (async) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0x467c, 0x4) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000440)={0x7}, 0x10) (async) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000280)={0x1, &(0x7f0000000100)=[{0x6, 0xfc, 0x0, 0x2}]}) (async) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x12) (async) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000440)={0x0, 0xfffffffc, 0xffdffff8, 0xffffffff, 0x0, "ff0000bb719b98fb73e53a0000000600"}) (async) r4 = syz_open_pts(r3, 0x0) ioctl$TCSETA(r4, 0x5406, &(0x7f0000000100)={0xff7e, 0x20d, 0x9, 0x85, 0x8, "f86c000900"}) read(r4, &(0x7f0000000200)=""/115, 0x73) (async) close_range(r2, 0xffffffffffffffff, 0x0) (async) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="200000001200410a00040000000000008000f4"], 0x20}}, 0x0) 2.06060433s ago: executing program 2 (id=56): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) creat(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x164) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) clock_adjtime(0x0, &(0x7f0000000000)={0x3ff, 0x0, 0x0, 0x1d, 0x2, 0x0, 0x0, 0x0, 0x401, 0x100, 0x0, 0x0, 0x9, 0x3, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1000, 0x8, 0x100, 0x3, 0x8, 0x5}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000ffb000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000080)="3e0fae89f4c9660f38802f66b9800000c00f3266350100000066b81f0000000f23c00f21f8663503000c4f42f8badbc7a0a037a9000fde650f01d1ee0f20e06635000002000f22e0670f009afbd9f501c4e3f1ce25064f5b323235008000000f30ed", 0x62}], 0x1, 0x1b, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) fstatfs(r2, &(0x7f00000002c0)=""/242) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x8) 2.05960625s ago: executing program 3 (id=57): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KVM_GET_MSR_FEATURE_INDEX_LIST(r0, 0xc004ae0a, &(0x7f0000001880)) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000005c0)='./file0/file1\x00', 0xa8) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='./file1\x00', 0xc) mkdir(&(0x7f0000000100)='./bus\x00', 0xe8) clock_adjtime(0x0, &(0x7f0000000340)={0x0, 0x4, 0x9, 0x4, 0xffffffffffffffff, 0x3, 0x8, 0x9, 0x9, 0xffffffff, 0x3, 0x3, 0x8000, 0x58cc, 0x4, 0x1, 0x4, 0x0, 0xa, 0x2, 0x8, 0x268, 0x1, 0x4, 0x280, 0x2}) mount$overlay(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000a80)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@nfs_export_on}]}) getresgid(&(0x7f0000000500), &(0x7f0000000540)=0x0, &(0x7f0000000580)) mount$9p_tcp(&(0x7f0000000240), &(0x7f0000000440)='./bus\x00', &(0x7f0000000480), 0x15400, &(0x7f0000000600)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r1}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '\'/*\xe3*'}}]}}) stat(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f0000000200)='./bus\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) r4 = socket(0x2, 0x3, 0xff) sendmmsg$inet(r4, &(0x7f0000000500)=[{{&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, &(0x7f0000001480)=[{&(0x7f0000000300)="f5a7933a00"/20, 0x14}], 0x1, &(0x7f0000001500)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @local}}}], 0x20}}, {{&(0x7f0000000280)={0x2, 0x4e23, @empty}, 0x10, 0x0, 0x0, &(0x7f00000006c0)=[@ip_retopts={{0x18, 0x0, 0x7, {[@cipso={0x86, 0x6, 0xffffffffffffffff}]}}}], 0x18}}], 0x2, 0x20044000) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0/file1\x00', &(0x7f0000000080), 0x1, &(0x7f0000000340)={'trans=virtio,', {[{@mmap}, {@loose}], [{@euid_eq={'euid', 0x3d, r2}}, {@uid_gt={'uid>', r3}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'overlay\x00'}}, {@uid_eq={'uid', 0x3d, 0xee01}}]}}) r5 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r5, &(0x7f0000000680)=[{{&(0x7f0000000200)={0x2, 0x4e23, @remote}, 0x10, 0x0}}], 0x1, 0x8000) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) stat(&(0x7f0000000840)='./file1\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_xen(&(0x7f0000000780), &(0x7f00000007c0)='./file0/file1\x00', &(0x7f0000000800), 0xa021, &(0x7f0000000900)={'trans=xen,', {[{@version_9p2000}, {@access_user}, {@access_client}, {@uname={'uname', 0x3d, '$.}%'}}, {@directio}, {@noextend}, {@cache_none}, {@access_uid={'access', 0x3d, r3}}, {@cache_readahead}], [{@fsmagic={'fsmagic', 0x3d, 0x7}}, {@uid_eq={'uid', 0x3d, r7}}, {@uid_gt={'uid>', r3}}]}}) close_range(r6, 0xffffffffffffffff, 0x0) r8 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000700)='./file1\x00', &(0x7f0000000740)={0x284001, 0x1, 0x1b}, 0x18) unlinkat(r8, &(0x7f00000001c0)='./file0/file1\x00', 0x200) 335.85µs ago: executing program 1 (id=58): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8983, &(0x7f0000000040)={0x6, 'bridge_slave_0\x00', {0x2}, 0x3}) (async, rerun: 32) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000140)={0x0, 'veth1_to_batadv\x00', {0x3}, 0xb3}) (rerun: 32) 0s ago: executing program 2 (id=59): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet_icmp_raw(0x2, 0x3, 0x1) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) inotify_init1(0x80800) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000000)={'raw\x00', 0x4, [{}, {}, {}, {}]}, 0x68) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x141091, 0x0) mkdir(&(0x7f0000000240)='./file2\x00', 0x122) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000a00)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) chdir(&(0x7f00000001c0)='./bus\x00') r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) writev(r3, &(0x7f0000000480)=[{&(0x7f0000000100)='\f7', 0x2}], 0x1) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) pidfd_getfd(r3, r0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_CAP_HYPERV_SYNIC2(r6, 0x4068aea3, &(0x7f0000000140)) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, &(0x7f0000000080)={0x2, 0xdc0}) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f00000001c0)={'veth0\x00'}) rmdir(&(0x7f0000000380)='./file0/../file0\x00') setsockopt$packet_int(r1, 0x107, 0xa, 0x0, 0x0) symlink(&(0x7f0000000180)='./bus\x00', &(0x7f0000000280)='./file1\x00') kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.37' (ED25519) to the list of known hosts. [ 24.595769][ T36] audit: type=1400 audit(1770758997.720:64): avc: denied { mounton } for pid=283 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 24.599694][ T283] cgroup: Unknown subsys name 'net' [ 24.618539][ T36] audit: type=1400 audit(1770758997.730:65): avc: denied { mount } for pid=283 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.645978][ T36] audit: type=1400 audit(1770758997.750:66): avc: denied { unmount } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.646604][ T283] cgroup: Unknown subsys name 'devices' [ 24.808881][ T283] cgroup: Unknown subsys name 'hugetlb' [ 24.814522][ T283] cgroup: Unknown subsys name 'rlimit' [ 24.949889][ T36] audit: type=1400 audit(1770758998.080:67): avc: denied { setattr } for pid=283 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 24.973100][ T36] audit: type=1400 audit(1770758998.080:68): avc: denied { mounton } for pid=283 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 24.997904][ T36] audit: type=1400 audit(1770758998.080:69): avc: denied { mount } for pid=283 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 25.028348][ T285] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 25.037283][ T36] audit: type=1400 audit(1770758998.170:70): avc: denied { relabelto } for pid=285 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.062785][ T36] audit: type=1400 audit(1770758998.170:71): avc: denied { write } for pid=285 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.081853][ T283] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 25.088523][ T36] audit: type=1400 audit(1770758998.210:72): avc: denied { read } for pid=283 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.122741][ T36] audit: type=1400 audit(1770758998.210:73): avc: denied { open } for pid=283 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.951541][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.958784][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.965900][ T290] bridge_slave_0: entered allmulticast mode [ 25.972464][ T290] bridge_slave_0: entered promiscuous mode [ 25.979197][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.986229][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.993415][ T290] bridge_slave_1: entered allmulticast mode [ 25.999685][ T290] bridge_slave_1: entered promiscuous mode [ 26.050765][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.057941][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.065012][ T293] bridge_slave_0: entered allmulticast mode [ 26.071426][ T293] bridge_slave_0: entered promiscuous mode [ 26.080828][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.087929][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.095123][ T293] bridge_slave_1: entered allmulticast mode [ 26.101453][ T293] bridge_slave_1: entered promiscuous mode [ 26.153471][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.160568][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.167685][ T292] bridge_slave_0: entered allmulticast mode [ 26.173959][ T292] bridge_slave_0: entered promiscuous mode [ 26.188843][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.195921][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.203049][ T292] bridge_slave_1: entered allmulticast mode [ 26.209440][ T292] bridge_slave_1: entered promiscuous mode [ 26.217408][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.224470][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.231866][ T291] bridge_slave_0: entered allmulticast mode [ 26.238197][ T291] bridge_slave_0: entered promiscuous mode [ 26.256711][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.263784][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.270948][ T291] bridge_slave_1: entered allmulticast mode [ 26.277492][ T291] bridge_slave_1: entered promiscuous mode [ 26.393026][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.400121][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.407464][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.414510][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.434046][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.441179][ T290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.448524][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.455571][ T290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.485590][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.492704][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.500018][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.507084][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.535512][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.542623][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.550003][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.557111][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.583477][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.590797][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.598384][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.605648][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.613340][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.620607][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.627937][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.635107][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.652252][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.659368][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.667008][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.674039][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.694710][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.701896][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.715695][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.722801][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.738189][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.745271][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.761780][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.768861][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.776846][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.783906][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.791484][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.798557][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.822693][ T290] veth0_vlan: entered promiscuous mode [ 26.855502][ T290] veth1_macvtap: entered promiscuous mode [ 26.864477][ T291] veth0_vlan: entered promiscuous mode [ 26.893675][ T292] veth0_vlan: entered promiscuous mode [ 26.915285][ T290] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 26.932015][ T291] veth1_macvtap: entered promiscuous mode [ 26.943172][ T293] veth0_vlan: entered promiscuous mode [ 26.950193][ T292] veth1_macvtap: entered promiscuous mode [ 26.989764][ T293] veth1_macvtap: entered promiscuous mode [ 26.998808][ T334] vlan0: mtu less than device minimum [ 27.082503][ T340] overlayfs: failed to resolve './file1': -2 [ 27.101873][ T345] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 27.218122][ T13] bridge_slave_1: left allmulticast mode [ 27.224357][ T13] bridge_slave_1: left promiscuous mode [ 27.230462][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.238449][ T13] bridge_slave_0: left allmulticast mode [ 27.244206][ T13] bridge_slave_0: left promiscuous mode [ 27.250224][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.399609][ T13] veth1_macvtap: left promiscuous mode [ 27.405174][ T13] veth0_vlan: left promiscuous mode [ 29.596378][ T36] kauditd_printk_skb: 103 callbacks suppressed [ 29.596396][ T36] audit: type=1400 audit(1770759002.720:177): avc: denied { read } for pid=390 comm="syz.3.22" dev="nsfs" ino=4026532467 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 29.625511][ T36] audit: type=1400 audit(1770759002.730:178): avc: denied { read } for pid=390 comm="syz.3.22" dev="nsfs" ino=4026532467 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 29.646456][ T36] audit: type=1400 audit(1770759002.730:179): avc: denied { map } for pid=390 comm="syz.3.22" path="socket:[4139]" dev="sockfs" ino=4139 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=0 [ 29.669748][ T36] audit: type=1400 audit(1770759002.730:180): avc: denied { create } for pid=390 comm="syz.3.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 29.690010][ T36] audit: type=1400 audit(1770759002.750:181): avc: denied { execmem } for pid=386 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 29.709327][ T36] audit: type=1400 audit(1770759002.750:182): avc: denied { read write } for pid=292 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 29.841946][ T36] audit: type=1400 audit(1770759002.970:183): avc: denied { read write } for pid=388 comm="syz.1.20" name="rtc0" dev="devtmpfs" ino=195 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=0 [ 29.990327][ T36] audit: type=1400 audit(1770759003.120:184): avc: denied { read write } for pid=388 comm="syz.1.20" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 30.120949][ T36] audit: type=1400 audit(1770759003.250:185): avc: denied { read write } for pid=293 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 30.433923][ T36] audit: type=1400 audit(1770759003.560:186): avc: denied { execmem } for pid=397 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 31.372449][ T409] capability: warning: `syz.1.25' uses deprecated v2 capabilities in a way that may be insecure [ 33.522445][ T426] netlink: 4 bytes leftover after parsing attributes in process `syz.2.32'. [ 33.539119][ T426] bridge_slave_1: left allmulticast mode [ 33.544955][ T426] bridge_slave_1: left promiscuous mode [ 33.550938][ T426] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.558718][ T426] bridge_slave_0: left allmulticast mode [ 33.564374][ T426] bridge_slave_0: left promiscuous mode [ 33.570145][ T426] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.740669][ T36] kauditd_printk_skb: 60 callbacks suppressed [ 34.740686][ T36] audit: type=1400 audit(1770759007.870:247): avc: denied { execmem } for pid=432 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 34.787034][ T36] audit: type=1400 audit(1770759007.880:248): avc: denied { read write } for pid=433 comm="syz.2.35" name="uinput" dev="devtmpfs" ino=194 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=0 [ 34.810737][ T36] audit: type=1400 audit(1770759007.880:249): avc: denied { read } for pid=433 comm="syz.2.35" dev="nsfs" ino=4026532472 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 34.831997][ T36] audit: type=1400 audit(1770759007.880:250): avc: denied { read } for pid=433 comm="syz.2.35" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 34.854357][ T36] audit: type=1400 audit(1770759007.880:251): avc: denied { create } for pid=433 comm="syz.2.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 34.873808][ T36] audit: type=1400 audit(1770759007.880:252): avc: denied { create } for pid=433 comm="syz.2.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 34.893296][ T36] audit: type=1400 audit(1770759007.880:253): avc: denied { read } for pid=433 comm="syz.2.35" name="vsock" dev="devtmpfs" ino=207 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 34.915549][ T36] audit: type=1400 audit(1770759007.900:254): avc: denied { mounton } for pid=434 comm="syz.3.36" path="/10/bus" dev="tmpfs" ino=78 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 34.937447][ T36] audit: type=1400 audit(1770759007.900:255): avc: denied { create } for pid=434 comm="syz.3.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 34.957604][ T36] audit: type=1400 audit(1770759007.900:256): avc: denied { read append } for pid=435 comm="syz.1.34" name="rnullb0" dev="devtmpfs" ino=31 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 37.593921][ T457] netlink: 'syz.2.41': attribute type 4 has an invalid length. [ 37.601736][ T457] netlink: 'syz.2.41': attribute type 21 has an invalid length. [ 37.609545][ T457] netlink: 3657 bytes leftover after parsing attributes in process `syz.2.41'. [ 40.654008][ T36] kauditd_printk_skb: 42 callbacks suppressed [ 40.654026][ T36] audit: type=1400 audit(1770759013.780:299): avc: denied { execmem } for pid=465 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 40.685423][ T36] audit: type=1400 audit(1770759013.800:300): avc: denied { write } for pid=466 comm="syz.1.46" name="sockstat" dev="proc" ino=4026532353 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 [ 40.708183][ T36] audit: type=1400 audit(1770759013.810:301): avc: denied { read write } for pid=290 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 40.732200][ T36] audit: type=1400 audit(1770759013.810:302): avc: denied { read } for pid=467 comm="syz.2.47" dev="nsfs" ino=4026532472 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 40.753078][ T36] audit: type=1400 audit(1770759013.820:303): avc: denied { create } for pid=467 comm="syz.2.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 40.773355][ T36] audit: type=1400 audit(1770759013.820:304): avc: denied { read write } for pid=467 comm="syz.2.47" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 40.796639][ T36] audit: type=1400 audit(1770759013.820:305): avc: denied { create } for pid=467 comm="syz.2.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 40.861289][ T36] audit: type=1400 audit(1770759013.990:306): avc: denied { create } for pid=468 comm="syz.3.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 40.881502][ T36] audit: type=1400 audit(1770759013.990:307): avc: denied { create } for pid=468 comm="syz.3.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 40.903551][ T36] audit: type=1400 audit(1770759014.030:308): avc: denied { read write } for pid=292 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 42.448992][ T479] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8192 sclass=netlink_route_socket pid=479 comm=syz.2.50 [ 46.118306][ T36] kauditd_printk_skb: 29 callbacks suppressed [ 46.118326][ T36] audit: type=1400 audit(1770759019.250:338): avc: denied { execmem } for pid=496 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 46.154734][ T36] audit: type=1400 audit(1770759019.250:339): avc: denied { create } for pid=497 comm="syz.1.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 46.175128][ T36] audit: type=1400 audit(1770759019.250:340): avc: denied { read } for pid=499 comm="syz.3.57" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 46.197536][ T36] audit: type=1400 audit(1770759019.250:341): avc: denied { mounton } for pid=499 comm="syz.3.57" path="/17/file0" dev="tmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 46.219659][ T36] audit: type=1400 audit(1770759019.250:342): avc: denied { mounton } for pid=499 comm="syz.3.57" path="/17/bus" dev="tmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 46.241598][ T36] audit: type=1400 audit(1770759019.250:343): avc: denied { create } for pid=499 comm="syz.3.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 46.261024][ T36] audit: type=1400 audit(1770759019.280:344): avc: denied { mounton } for pid=499 comm="syz.3.57" path="/17/file0/file1" dev="tmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 46.283763][ T36] audit: type=1400 audit(1770759019.280:345): avc: denied { read write } for pid=498 comm="syz.2.56" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 46.307381][ T36] audit: type=1326 audit(1770759019.280:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=497 comm="syz.1.55" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f92fbb9bf79 code=0x0 [ 46.329943][ T36] audit: type=1400 audit(1770759019.280:347): avc: denied { remount } for pid=499 comm="syz.3.57" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 48.338119][ T46] veth1_macvtap: left promiscuous mode [ 48.343734][ T46] veth0_vlan: left promiscuous mode [ 48.619418][ T46] bridge_slave_1: left allmulticast mode [ 48.625099][ T46] bridge_slave_1: left promiscuous mode [ 48.630840][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.638596][ T46] bridge_slave_0: left allmulticast mode [ 48.644257][ T46] bridge_slave_0: left promiscuous mode [ 48.650029][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.658300][ T46] bridge_slave_1: left allmulticast mode [ 48.663965][ T46] bridge_slave_1: left promiscuous mode [ 48.669834][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.677451][ T46] bridge_slave_0: left allmulticast mode [ 48.683199][ T46] bridge_slave_0: left promiscuous mode [ 48.689035][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.860260][ T46] veth1_macvtap: left promiscuous mode [ 48.865845][ T46] veth0_vlan: left promiscuous mode [ 48.871566][ T46] veth1_macvtap: left promiscuous mode [ 48.877191][ T46] veth0_vlan: left promiscuous mode