last executing test programs: 53m26.971727867s ago: executing program 32 (id=306): openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) r1 = socket$inet(0x2, 0x3, 0x8) setsockopt$inet_int(r1, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) setsockopt$MRT_ADD_MFC(r1, 0x0, 0x5, &(0x7f0000000240)={@multicast1, @empty, 0xfffb, "c2e7400000008c84aea31700251ab800", 0x96ba, 0x4, 0x7e, 0x6d}, 0x3c) r2 = socket$inet(0x2, 0x3, 0x6) dup3(r1, r2, 0x0) pipe(0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@abs, 0x2d) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000c00)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r7, 0x40345410, &(0x7f0000000080)={{0x0, 0x3, 0x0, 0x1}}) ioctl$SNDRV_TIMER_IOCTL_START(r7, 0x54a0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) clock_gettime(0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x22, 0x0, 0x0) write$binfmt_register(r0, &(0x7f0000000440)={0x3a, 'syz1', 0x3a, 'M', 0x3a, 0x0, 0x3a, 'usrjquota=', 0x3a, '', 0x3a, './file2'}, 0x31) 52m54.508327637s ago: executing program 33 (id=348): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x7, 0x4, 0x100, 0x1, 0x28}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000400)='sys_enter\x00', r1}, 0x18) getrandom(0x0, 0x0, 0x3) getpgrp(0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x9) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0x7, &(0x7f00000007c0)=ANY=[@ANYRES8=r0, @ANYRES32=r5, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r6}, 0x10) r7 = getpgid(0x0) ptrace$PTRACE_SETSIGMASK(0x4206, r7, 0xfffffffffffffec1, 0x0) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x10}]}, 0x3c}}, 0x0) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000080)='./file1\x00', 0x1010000, &(0x7f0000000600)={[{@utf8}, {@iocharset={'iocharset', 0x3d, 'maccyrillic'}}, {@uni_xlateno}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@utf8no}, {@utf8}, {@shortname_winnt}, {@numtail}, {}, {@shortname_lower}, {@utf8no}, {@shortname_win95}, {@shortname_lower}, {@uni_xlateno}, {@shortname_lower}, {@fat=@check_strict}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffbb2}}]}, 0x1, 0x363, &(0x7f0000000280)="$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") openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000700)=@o_path={&(0x7f0000000180)='./file1\x00', r5}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) 36m27.580862631s ago: executing program 34 (id=1979): bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x9, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x2400, 0x0) syz_emit_ethernet(0xb4, &(0x7f0000000440)={@broadcast, @empty, @val={@val={0x88a8, 0x5}, {0x8100, 0x0, 0x0, 0x3}}, {@ipv4={0x800, @udp={{0x16, 0x4, 0x3, 0x7, 0x9e, 0x68, 0x0, 0xf8, 0x11, 0x0, @loopback, @remote, {[@cipso={0x86, 0x44, 0x2, [{0x6, 0x4, '1G'}, {0x6, 0x3, '%'}, {0x5, 0x12, "914da2471f0dd0ef8671c47167e2698d"}, {0x7, 0x10, "6c27b7abbf7790f67fbe487561a5"}, {0x6, 0x12, "4607f8f75d63244e3b00000400000000"}, {0x6, 0x3, "8f"}]}]}}, {0x4e20, 0x4e21, 0x46, 0x0, @opaque="e789c98079d97bc7c014e2bfe34d782d3792c720aac614f0e4d025398166cd374aeec7d1ac5ae7a492771aeced0770f5726e842901d1f8a6f41a8fdd7871"}}}}}, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) io_uring_setup(0xfffffff9, &(0x7f0000000180)={0x0, 0x9101, 0x2000, 0x1, 0x400000}) r2 = io_uring_setup(0x4f73, &(0x7f00000000c0)={0x0, 0xec19, 0x80, 0x1000000, 0x4}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) gettid() timer_create(0x0, 0x0, &(0x7f0000000380)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000841, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty}, 0x1c) socket$nl_netfilter(0x10, 0x3, 0xc) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r6}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="5c0000002000010000000000000000000220000000000000000000000500150002000000080009000000000008000b0005000000080017004e214e22080001"], 0x5c}}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r2, 0x18, &(0x7f0000000000), 0x1) 27m3.841161844s ago: executing program 35 (id=5568): socket$vsock_stream(0x28, 0x1, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000030000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='sys_enter\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0xbe, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "7b4b143b7461fd777b1c012bd14efb9f49fcdb8f080c26a04883ad5c8c82b8af", "584cbf2649a50f2dbc43efa8698dfa871c51852e4451b57d037ad3c045942824251d7d17b5191584cdd4fbe40a27424d", "bcfd56f1373669caaa2f19935e6996c7096ffe4f3a4745a8f762b964", {"9a3bfbc1f39cb307b3472eb9cdb042d2", "643fcbb2c5a57df67d544af6e8dafe09"}}}}}}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3}, 0x94) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x6}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x5, 0xb68, 0x6, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) unshare(0x2040600) pselect6(0x40, &(0x7f00000001c0)={0x2, 0x3000000, 0x3, 0xfffffffffffffffd, 0x3, 0x0, 0x0, 0xe}, 0x0, &(0x7f0000000040)={0x3ff, 0x7e7, 0x0, 0x9, 0x1, 0x0, 0x7ffffffb, 0x83f8}, 0x0, 0x0) 14m1.196864859s ago: executing program 3 (id=7659): userfaultfd(0x1) syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x200000, &(0x7f0000000040)={[{@grpquota}]}, 0x1, 0xbac, &(0x7f00000017c0)="$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") bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x5aa7bac0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e0000000000000005000000"], 0x48) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[{0x0}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0x1}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0x42, 0x0) pwrite64(r0, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) lseek(r0, 0x5, 0x4) socket$tipc(0x1e, 0x5, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = syz_io_uring_setup(0x4f0e, &(0x7f0000000480)={0x0, 0x0, 0x1}, &(0x7f0000000080)=0x0, &(0x7f0000000040)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x40, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00'}, 0x18) io_uring_enter(r3, 0x62dd, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='sys_enter\x00', r2}, 0x10) pselect6(0x40, &(0x7f00000001c0)={0x2, 0x0, 0x3, 0xfffffffffffffffd, 0x3, 0x0, 0x0, 0xe}, 0x0, &(0x7f0000000300)={0x3ff, 0x7e7, 0x0, 0x9, 0x4, 0x0, 0x7fffffff, 0x3f8}, 0x0, 0x0) 13m58.06418037s ago: executing program 3 (id=7668): openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$inet6_icmp(0xa, 0x2, 0x3a) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x6}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) dup2(0xffffffffffffffff, r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1b, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000400000000dfffff1918120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r4}, 0x10) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x4, &(0x7f0000000640)={[{@max_batch_time={'max_batch_time', 0x3d, 0x6}}, {@i_version}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@dont_hash}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_user={'obj_user', 0x3d, 'max_batch_time'}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}, 0x6, 0x5fd, &(0x7f0000000c00)="$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") r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a80)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5721}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 13m52.215573789s ago: executing program 3 (id=7678): r0 = socket(0x10, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000440)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @private2={0xfc, 0x2, '\x00', 0x1}, 0x700, 0x80, 0xfffffff9, 0x9}}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl1\x00', &(0x7f00000000c0)={'ip6_vti0\x00', r4, 0x0, 0x0, 0x0, 0x0, 0xd, @dev={0xfe, 0x80, '\x00', 0x8}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x700, 0x0, 0xfffffffc}}) r6 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) sendmsg$netlink(r6, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002cc0)={0x28, 0x2d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @uid=r7}, @nested={0x6, 0x0, 0x0, 0x1, [@generic="976b"]}, @nested={0x5, 0x1, 0x0, 0x1, [@generic='\r']}]}, 0x28}], 0x1}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000007c0)=@acquire={0x128, 0x17, 0x1, 0x0, 0x1, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0xfe, 0x0}}}, @in=@loopback, {@in=@private=0xa010100, @in6=@remote, 0x0, 0x0, 0x4e22, 0x80}, {{@in=@local, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0, 0x80, 0x0, r5, r7}, {0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, {0x3}, 0x1, 0x20, 0x0, 0x1, 0x0, 0x3}, 0x0, 0x0, 0x0, 0x70bd25}}, 0x128}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x3d}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7d}, @exit={0x95, 0x0, 0x33}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb8000000}, 0x70) 13m47.67245226s ago: executing program 3 (id=7691): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/resume', 0x149a82, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00'}, 0x10) socket$netlink(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x8, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r4, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) ptrace$peeksig(0x4209, r1, &(0x7f0000000100)={0x2, 0x1, 0x7}, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}, {}]) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xeb}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setgroups(0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000700)=ANY=[], 0x104}}, 0x0) write$cgroup_int(r0, &(0x7f0000000040)=0x1c9, 0x12) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x25, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x78}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) 13m46.18811117s ago: executing program 3 (id=7694): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x18) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40840) mknod$loop(0x0, 0xfff, 0x1) pipe2$9p(0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6028d}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r6}]}}}, @IFLA_MTU={0x8, 0x4, 0x44}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 13m43.426077199s ago: executing program 3 (id=7700): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7f, 0x8b}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x80, 0x20) preadv(r0, &(0x7f0000001b00), 0x0, 0x2, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r5}, 0x18) r6 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="2c0000001a00010000000000000000000a800020000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4004840}, 0x0) 13m25.719865779s ago: executing program 36 (id=7700): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7f, 0x8b}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x80, 0x20) preadv(r0, &(0x7f0000001b00), 0x0, 0x2, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r5}, 0x18) r6 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="2c0000001a00010000000000000000000a800020000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4004840}, 0x0) 10m58.561485891s ago: executing program 4 (id=7941): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d00000085"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000080)={@loopback={0xfd, 0x307}, 0x3d, r4}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000004c0)='setgroups\x00') writev(r5, &(0x7f00000011c0)=[{&(0x7f0000000ac0)="42eca01a1d04464f", 0x8}], 0x1) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r6) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r8 = ioctl$LOOP_CTL_GET_FREE(r7, 0x4c82) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r8) 10m55.638595622s ago: executing program 4 (id=7948): socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x8b}, 0x0) r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000000100)=0x5) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x64, 0x0, 0x1, 0x401, 0x11, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x10, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SEQ_ADJ_REPLY={0x14, 0xf, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8}, @CTA_SEQADJ_OFFSET_BEFORE={0x8}]}]}, 0x64}}, 0x20044000) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) madvise(&(0x7f00002e5000/0x400000)=nil, 0x400000, 0xf) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000020000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000006c0)='sched_switch\x00', r6}, 0x18) r7 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r7) ptrace$pokeuser(0x6, r7, 0x388, 0x41d9fda7) 10m49.00564106s ago: executing program 4 (id=7954): write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000cc0)={'syz1\x00', {0xfff9, 0x2, 0x240, 0x9b99}, 0x37, [0x6, 0x8, 0x5, 0x9, 0x8, 0x155f, 0x6, 0x5, 0x25cd, 0x1, 0xa4, 0x6, 0xa2b9, 0x6, 0x7, 0xe4, 0x6, 0xfc000000, 0x3, 0xbbf, 0x4a732f64, 0x8, 0x9, 0xd, 0x4, 0x12a3, 0x6, 0x1, 0x2, 0x4, 0x7, 0x81, 0x8a, 0x79, 0x2, 0x4, 0x0, 0x91, 0x4, 0x4, 0x7, 0x2, 0x5, 0x400, 0x7ff7, 0x5, 0xa7, 0x81, 0x9, 0xf9a2, 0x80000001, 0xff, 0x0, 0x2, 0x2, 0x3, 0x1, 0x1, 0x7ff, 0x4, 0x4007f, 0xffffffff, 0x6, 0x6], [0x9, 0x3, 0x6, 0x5f, 0x4, 0xc66, 0xa8a9, 0x20000073, 0x8e, 0xd50, 0x7, 0x5, 0x2, 0x809, 0x4, 0xa, 0x1000, 0x0, 0x200b398, 0x400000, 0x0, 0x2, 0x1c, 0x7, 0x1, 0x2, 0x54f5bad8, 0x8, 0xfffffffd, 0x400, 0x6, 0x4c2336d3, 0x4, 0x0, 0xfffffff8, 0x401, 0x46, 0xf1, 0x4, 0xab00040, 0x5, 0x6, 0x2, 0x5, 0x3ff, 0x1ff, 0x1, 0x7fff, 0x762, 0x1cb, 0x1, 0x4, 0x6, 0x438, 0x2, 0x9, 0x95, 0xfffff50f, 0x4, 0xfffffff9, 0x1, 0x1000, 0xfffff801, 0x5], [0x2, 0x1, 0xffff, 0x3, 0x2, 0x2e6bf783, 0x80000001, 0xb, 0x5, 0x491, 0x8d3, 0x6, 0x8, 0x400, 0x2, 0x400, 0x41, 0x6, 0xee4b, 0x7, 0x5, 0x8000003, 0x5, 0x9, 0x0, 0x3, 0x9, 0x3, 0xc7, 0xfff, 0x100006, 0x8000, 0x400, 0x3e55, 0xff, 0xd3, 0x8, 0x3437, 0x3, 0x9, 0xfd, 0x401, 0x101, 0xdd80, 0x60a2, 0x7f, 0x9d26, 0x0, 0x8, 0x2, 0x2, 0x6, 0x8000, 0xf45, 0x3, 0xd500, 0x8, 0x77, 0x9, 0x4, 0x10000, 0x1, 0x8, 0x1], [0xa772, 0x1, 0x5, 0x1afa, 0xbfc, 0x8, 0x7c81, 0x7f, 0x56, 0x40, 0xff, 0x5, 0x7fffffff, 0x7, 0xe, 0x9, 0x81, 0x3, 0x9d86, 0xd, 0xfffffff7, 0x8, 0x40f1, 0x2, 0x3, 0x6, 0x80000001, 0x7777, 0x1, 0x2, 0x100, 0xd8ce, 0x7fffffff, 0x624dfaee, 0xc, 0x32d, 0x1000, 0x1ff, 0x2000003, 0xffffffff, 0x10000, 0x0, 0x8001, 0x7fff, 0x3, 0x6, 0xf, 0xe, 0x5337, 0x26d, 0x6, 0xfffffff9, 0x4, 0xfffffff9, 0x9, 0x4, 0x463f, 0x4, 0xdab, 0x3, 0x8, 0x13ffd, 0x1, 0x9]}, 0x45c) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="34000000150a03000000000000000000020000000900020073"], 0x34}}, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000140)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000400)=[@increfs], 0x0, 0x0, 0x0}) r5 = dup3(r4, r3, 0x0) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f00000004c0)={0x18, 0x0, &(0x7f0000000180)=[@acquire, @request_death={0x400c630e, 0x2}], 0x0, 0x0, 0x0}) r6 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000880)={0x0, 0x0, @pic={0x2a, 0xc0, 0x7, 0x6, 0xfb, 0x2, 0xf, 0x4, 0x3, 0x0, 0x3, 0x58, 0x9e, 0x6, 0x6, 0x7f}}) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000000)={[0x35, 0xfff, 0x0, 0x180, 0x4, 0x14, 0xf1, 0x0, 0x7fffffffffffe, 0x7, 0x5, 0x3, 0xfffffffffffffffe, 0x45, 0x4, 0xbdb], 0x1, 0x1c4213}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) r7 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r8 = dup(r7) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000000840)={0x1fe, 0x2, 0x3000, 0x2000, &(0x7f0000003000/0x2000)=nil}) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r9, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f00000000c0)="c20000361e0f01c3660fd2eff30f10f1b961020000b80e000000ba000000000f30b98d0200000f320b99f3530000660f6af7c4e2f91d20", 0x37}], 0x1, 0x11, 0x0, 0x0) syz_kvm_setup_cpu$x86(r7, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000200)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r9, 0xae80, 0x0) 10m47.002761274s ago: executing program 4 (id=7956): timer_create(0x3, 0x0, &(0x7f00000002c0)) r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0xc, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, 0x0, 0x48) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) syz_mount_image$fuse(0x0, &(0x7f00000000c0)='./bus\x00', 0x3000009, 0x0, 0x1, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./bus\x00', &(0x7f0000000b80), 0x204008, &(0x7f0000000100)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './cgroup'}}, {@upperdir={'upperdir', 0x3d, './file0'}}]}) syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f00000002c0)='./bus\x00', 0x3b26028, &(0x7f00000008c0)=ANY=[], 0x1, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x18) mkdir(&(0x7f0000000540)='./file0\x00', 0x0) 10m40.596776079s ago: executing program 4 (id=7964): openat$kvm(0xffffff9c, &(0x7f00000000c0), 0x800, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x801, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000540)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000b70200000100000085"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000c80)={'lo\x00'}) r7 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r7) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) close_range(r0, 0xffffffffffffffff, 0x0) 10m36.811522817s ago: executing program 4 (id=7968): prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000280), 0x1, 0x0) pwritev(r1, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000100)="6abed3c581c6", 0x6}], 0x2, 0xfffffffe, 0x1fd) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000240)={0x8, 0x2, 0x10000, 0x4, 0x4, 0x1c}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x0, 0x0, 0x0, 0xce0f, 0x0, 0x0, 0x41100, 0x11, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x3, 0x10, 0x3, 0x8}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) unshare(0x26020480) r5 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(r5, 0x111, 0x3, 0x1, 0x4) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) 10m19.709349588s ago: executing program 37 (id=7968): prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000280), 0x1, 0x0) pwritev(r1, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000100)="6abed3c581c6", 0x6}], 0x2, 0xfffffffe, 0x1fd) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000240)={0x8, 0x2, 0x10000, 0x4, 0x4, 0x1c}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x0, 0x0, 0x0, 0xce0f, 0x0, 0x0, 0x41100, 0x11, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x3, 0x10, 0x3, 0x8}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) unshare(0x26020480) r5 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(r5, 0x111, 0x3, 0x1, 0x4) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) 10m5.656988778s ago: executing program 0 (id=7990): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x5) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r4 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x48, 0xffffffffffffffff) keyctl$revoke(0x3, r4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000001180)=ANY=[], 0x0}, 0x94) r5 = syz_open_dev$usbfs(&(0x7f0000000480), 0x76, 0x160341) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x11, &(0x7f0000000100)={[{@noblock_validity}, {@noinit_itable}, {@norecovery}, {@min_batch_time={'min_batch_time', 0x3d, 0x71d}}, {@abort}]}, 0x1, 0x610, &(0x7f0000000a40)="$eJzs3c9rFGcfAPDvTH6avO+bKC+8rz3UQCkKrYmJWqQUau5F7I9/IDVRxGgkSaFRwQjtsfTSQ6GnHmr/i1borfTQaw+9F0FK8VCL1C2zOxs3m93Nz/3h7ucDa+aZmczznTXfPM88eWY2gJ41kf2TRhyNiJtJxFjFtv7IN06U9nv8x51L2SuJQuH935O4czdZrzxWkn8dzb/577FIfk4jjvRtrXdl7da1ucXFheW8PLV6/ebUytqtk1evz11ZuLJwY+aNmXNnz5w9N31qX+c3UGPdN189Taa//fVCEufjWR5bdl7V+w3tq+bsPZuIQsmTyvXZ+3pun8fuFH+OlX9OnkuqV9CxLud5m+XJ/2Is+ir+N8fi03fbGhzQVIUkym0U0HOSOvn/42yj3wzDTYsHaJVyP6B8bV/rOnirtMm9EqAVHs2WBqRKuT8QEeX87y+NDcZwcWxg5HGyaZwniYj9jcyVZHX89MOFT7JX1BmHA5pj/V55lLu6/U+KuTkew8XSyON0c/6vFwpp3hPI1r+3x/onqsryH1pn/V5E/D9v/wdjx/mf5rlbzv8P91i//AcAAAAAAICD82A2Il6vNf8v3Zj/M1hj/s9oRJw/gPq3//tf+jBfSKp2HTyA6qGnPZqNeKvm/N+NOb7jfXnp38X5ALeTy1cXF05FxH8i4kQMDGXl6arjVs4QPvnZkS/r1V85/y97ZfWX5wLmR3rYX3Uj7vzc6tx+zxuIeHQv4qXi/N9j+ZrN83+y9j+p0f5n+X1zh3UcefX+xXrbts9/oFkKX0ccr9n+P+9uJ42fzzFV7A9MlXsFW718+/Pv6tVfnf9NOEWgjqz9H2mc/0NJ5fN6VnZ3/Owi/fRaf6He9r32/weTD/qiYhDg47nV1eXpiMHkna3rZ3YXM3SrPB+ORZ4vWf6feKXx+N9G/78iDw9FxPoO6hveZrv+P7RPlv/zjdv/8c3t/+4XZu6Pf1+v/os7av/PFNv0E/ka439QaevzOHaaoG0JFwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABecGlE/CuSdHJjOU0nJyNGI+K/MZIuLq2svnZ56aMb89m2iPEYSMuf9DtWKiflz/8fryjPVJVPR8ThiPii71CxPHlpaXG+3ScPAAAAAAAAAAAAAAAAAAAAHWK0eM9/Yaj6/v/Mb33tjg5ouv78q3yH3tO/5+8sDB1oIEDL7T3/gRdYds2/i/wfaGYsQBvUz/8nTwtFLQ0HaCH9f+hde8x/fy6ALqD9h161wzG94WbHAbSD9h8AAAAAALrK4WMPfkkiYv3NQ8VXZjDfZrI/dLe03QEAbWMOL/Su/qV2RwC0i2t8INlY+qvmzf71Z/8nzQkIAAAAAAAAAAAAANji+FH3/0Ovanz/v7n90M0a3P9fK/k9LgC6SP2P/tD2Q7dzjQ9s19q7/x8AAAAAAAAAAAAAOsDwrWtzi4sLyytrL97C250Rxu4W1uc6IoxdLBTuRjTe51lzah+IiE55E5ZXsmhaVVf5ERxtPOU2/14CAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA2/BMAAP//cdEbCg==") r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000003c0)='sched_switch\x00', r6}, 0x18) bind$packet(0xffffffffffffffff, 0x0, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/cpuinfo\x00', 0x0, 0x0) preadv(r7, &(0x7f0000001280)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x4, 0x0) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, 0x2, 0x3, 0x3, 0x0, 0x0, {0x2, 0x0, 0xffff}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1, 0x0, 0x26}}]}, 0x1c}}, 0x0) 10m0.177437537s ago: executing program 0 (id=8019): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r3}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) pipe(&(0x7f0000000d00)) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) ioctl$BTRFS_IOC_RESIZE(r2, 0x50009403, &(0x7f0000000180)={{r5}, {@val, @max}}) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x41) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000008300), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000002080)='./file0\x00', 0x0, 0x0, &(0x7f0000002100)=ANY=[@ANYBLOB, @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000040000,user_id', @ANYRESDEC=0x0, @ANYBLOB=',gro', @ANYRESDEC=0x0]) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2400000020000103000000000000000002"], 0x24}, 0x1, 0x0, 0x0, 0x240480d4}, 0x0) 9m53.854762792s ago: executing program 0 (id=8027): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x2000044, &(0x7f0000000380)={[{@max_batch_time={'max_batch_time', 0x3d, 0x8}}, {@jqfmt_vfsold}, {@nojournal_checksum}]}, 0x2, 0x503, &(0x7f0000000500)="$eJzs3U1sI1cdAPD/TD7spmmTQg+AKrqUwoJWayfeNqp6oZwqhCoheuSwDYkTRbHjKHZKE/aQPXJHohInOHHmwLkn7kgc4MalHJD4WIE2SByMPLY3zoc31m5s78a/nzSa92HP/70dzXvRs3ZeABPrRkQcRcRsRHwUEQud8qRzxHvto/W5hw/urR0/uLeWRLP54T+TrL5VFj3faXmxc818RPzw/YgfJ2eC/jGifnC4vVqplPc6RcVGdbdYPzi8vVVd3SxvlndKpZXllaV37rxdurK+vl79bbcln//h6Ns/bWXmOwW9/bhK7YAzj+K0TEfE94cRbAymOv2ZfZIvP9GXuEppRHwhIt7Inv+FmMru5mmnb9N3Rtg6AGAYms2FaC705gGA6y7N1sCStNBZC5iPNC0U2mt4r8ZcWqnVG7c2avs76+21ssWYSTe2KuWlzlrhYswkG1vT5eUs3c1XyqUz+TsR8UpE/Dz3QpYvrNUq6+P8wwcAJtiLZ+b//+Ta8z8AcM3lT5K5cbYDABid/LgbAACMnPkfACaP+R8AJo/5HwAmj/kfACaP+R8AJsoPPvigdTSPO++/Xv/4YH+79vHt9XJ9u1DdXyus1fZ2C5u12mb2zp7qZder1Gq7y2/F/ifFRrneKNYPDu9Wa/s7jbvZe73vlmdG0isA4HFeef2zPycRcfTuC9kRPe/7v3Sufm3YrQOGKR13A4CxmRp3A4CxOb/bFzAprMcDPVv03u8pzp9LnPXpQJdP7RsKz56bX36K9X/guWb9HybXk63/+1sergPr/zC5ms3Env8AMGGs8QPJJfW9v/8vNXsyg/3+DwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANfSfHYkaaGzF/h8pGmhEPFSRCzGTLKxVSkvRcTLEfGn3EyulV+OCPsGAcDzLP1b0tn/6+bCm/Nna2dz/81l54j4yS8//MUnq43G3nLEbPKvR+WNTzvlpXG0HwC4THee7s7jXQ8f3FvrHr2fv2xf0Kf19++2NxdtxT3uHO2a6ZjOzvlsrWHu30knf9KuqSuIf3Q/Ir50Uf+TbG1ksbPz6dn4rdgvjTR+eip+mtW1z61/iy9eQVtg0nzWGn/eu+j5S+NGdr74+c9nI9TT645/x+fGv/TR+DfVZ/y7MWiMt37/vXOFzYV23f2Ir0xHHHcv3jP+dOMnfeK/OWD8v7z21Tf61TV/FXEzLup/cipWsVHdLdYPDm9vVVc3y5vlnVJpZXll6Z07b5eK2Rp1sbtSfd4/3r31cr/4rf7P9Ymfv6T/3xiw/7/+30c/+tpj4n/r6xff/1cfE781J35zwPirc7/L96trxV/v0//L7v+tAeN//tfD9QE/CgCMQP3gcHu1UinvDTuRDj9ElkgijkbQnXYi95ufvT+qWENMxBVcJz/2Xpx0J56JZjzniXGPTMCwnTz0424JAAAAAAAAAAAAAADQzyj+O9G4+wgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMD19f8AAAD//3uF0Lw=") mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x1, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file1\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x1c, 0x0) write$tcp_mem(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000740)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xc000, &(0x7f00000006c0), 0x2, 0x246, &(0x7f0000000ac0)="$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") r4 = creat(&(0x7f00000000c0)='./file1\x00', 0x1) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x20052f9, 0xfffffff8, 0x100802, 0x2, 0x8}) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, 0x0, 0x40000) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') lseek(r5, 0x10001, 0x0) 9m50.138127919s ago: executing program 0 (id=8036): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000074"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b7"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r4}, 0x10) munmap(&(0x7f0000ff3000/0xb000)=nil, 0xb000) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff1000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff0000/0xd000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) brk(0x200000ffc000) syz_mount_image$fuse(0x0, &(0x7f0000002080)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x8011, 0x0) syz_mount_image$fuse(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x808c20, &(0x7f0000000a40)=ANY=[], 0x1, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000240)='./bus\x00', 0x20000, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) syz_clone(0x41200100, 0x0, 0x0, 0x0, 0x0, 0x0) 9m46.370180066s ago: executing program 0 (id=8046): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1341, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x18, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x18) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r6, {0x0, 0xfff1}, {0xffff, 0xffff}, {0xffe0}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=@newtfilter={0x44, 0x2c, 0xd27, 0x70bd25, 0x2, {0x0, 0x0, 0x0, r6, {0x0, 0x1}, {}, {0x8, 0x2}}, [@filter_kind_options=@f_flow={{0x9}, {0x14, 0x2, [@TCA_FLOW_KEYS={0x8, 0x1, 0x18011}, @TCA_FLOW_MODE={0x8, 0x2, 0x1}]}}]}, 0x44}}, 0x0) close_range(r0, 0xffffffffffffffff, 0x10000000000000) 9m44.701259657s ago: executing program 0 (id=8047): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x7, 0x4, 0x8, 0xd9}, 0x50) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="adffa88800000000140012800b0001006d616373656300002a00028008000500", @ANYRES32=r7, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r7], 0x44}}, 0x8000) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x3014850, &(0x7f0000000140)={[{@acl}, {@barrier_val={'barrier', 0x3d, 0x1003}}, {@errors_remount}, {@noauto_da_alloc}, {@dioread_lock}]}, 0x1, 0x4e4, &(0x7f0000002d40)="$eJzs3c9PXFsdAPDvHZgCLc/hqYvnS3w2+gxttDNQbEtcVEyMrppY68YVIgyEMDCEGdpCGkPjH2Bi/BVduXJj4tqYmP4JxqSJ7o0xmkbbunChjrnDHYu8AYaUYSjz+SSn95z763tO4R7m3HMzN4C+dTkiZiJiICKuRkQhW5/LUuzspnS/F88fzacpicbQvb8lkWTrWudKsuWl7LDhiPjaVyK+lXwwbm1re2WuUilvZOVSfXW9VNvavra8OrdUXiqvzUxN3py+NX1jeuLE2nr7S3/+4Xd//uXbv/nsgz/O/vXKt9NqjWbb9rajEzsd7rfb9Hzz/6JlMCI2jhPsDBvI2pPvdUUAAOhI+hn/wxHxyYh4+ZNe1wYAAADohsYXRuNfSUQDAAAAOLdyzWdgk1wxexZgNHK5YnH3Gd6PxsVcpVqrf2axurm2sPus7Fjkc4vLlfJE9qzwWOSTtDzZzL8qX99XnoqItyPi+4WRZrk4X60s9PrmBwAAAPSJS/vG//8o7I7/AQAAgHNmrNcVAAAAALrO+B8AAADOvwPH/8ng6VYEAAAA6Iav3rmTpkbr/dcL97c2V6r3ry2UayvF1c354nx1Y724VK0uNb+zb/Wo81Wq1fXPxdrmw1K9XKuXalvbs6vVzbX6bPO93rPlRuFUmgUAAADs8fYnnvwhiYidz480U+pCti1/9OEz3a0d0E254+2edKsewOkb6HUFgJ7xgC/0rw7G+MA5d8TA/gf7yse8bQAAAJwF4x97rfl/84HwBjOQh/5l/h/6l/l/6F/m/6HPDR29y/BBG357wnUBAAC6ZrSZklwxmwscjVyuWIx4q/lagHyyuFwpT0TEhyLi94X8UFqe7HWlAQAAAAAAAAAAAAAAAAAAAAAAAOAN02gk0QAAAADOtYjcX5LsRf7jhfdH998fuJD8s9BcRsSDn9770cO5en1jMl3/9/+tr/84W3+9tSb1jVO+kwEAAAC0tMbprXE8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJykF88fzbfSacZ99sWIGGsXfzCGm8vhXxUi4uLLJAb3HJdExMAJxN95HBHvtIufpNWKsawW++PnImKkx/EvnUB86GdP0v5nJr3+8vuuv1xcbi7bX3+DWXpdzy4f1P/lWv1fs59r1/+9dfiph1uZd5/+snRg/McR7w62739a8ZN28S903sZvfn17+6BtjZ9FjB/x9yeNX6qvrpdqW9vXllfnlspL5bWpqcmb07emb0xPlBaXK+Xs37YxvvfxX//nsPZfbBt/t/89sP0R8X6H7f/304fPP3JI/Cufav/zf+eQ+OnvxKezvwPp9vFWfmc3v9d7v/jde4e1f+GA9h/684+IKx22/+rd7/ypw10BgFNQ29pematUyhtdyYx07cwyaaa6diaqIXN2M3ezC/3Yh/e4YwIAAE7cqw/9+7ccY4IHAAAAAAAAAAAAAAAAAAAAeC1d/xKyof//ZoHh3jUVAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOBQ/w0AAP//5w/Stg==") 9m44.633829408s ago: executing program 38 (id=8047): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x7, 0x4, 0x8, 0xd9}, 0x50) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="adffa88800000000140012800b0001006d616373656300002a00028008000500", @ANYRES32=r7, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r7], 0x44}}, 0x8000) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x3014850, &(0x7f0000000140)={[{@acl}, {@barrier_val={'barrier', 0x3d, 0x1003}}, {@errors_remount}, {@noauto_da_alloc}, {@dioread_lock}]}, 0x1, 0x4e4, &(0x7f0000002d40)="$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") 6m2.196422391s ago: executing program 5 (id=8375): r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffed7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000080), &(0x7f00000001c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x1, 0x0) fcntl$setpipe(r3, 0x408, 0x7) bpf$PROG_LOAD(0x5, 0x0, 0x0) timer_create(0x0, 0x0, &(0x7f0000000380)) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000580)='./file1\x00', 0x800040, &(0x7f0000000340), 0x1, 0x5a3, &(0x7f00000005c0)="$eJzs3U9oHPUeAPDvzGZf/+U1ffAevPfooahQoXST9I9WT+1VLBR6KHipYbMNIZtsyG60CTmk9yL2ICq91JsePCoePIgXwYtXL4pnodig0PSgK/svbZPduKlJN81+PjDZ+c1vdr+/38x+J78ZZtgA+tax2p804n8RcSmJGHqkbiCalcca662uLOUfrCzlk6hWL/+SRBIR91eW8q31k+broYhYjoj/RsTX2YgT6ca45YXFqbFisTDXLA9XpmeHywuLJyenxyYKE4WZ0y+/cvbcmbOjp0Y7Nz67tb7e/PHWOze/e+3OrU8+Pbqcf28sifMx2Kx7tB/bqbFNsnF+3fIzOxGsh5JeN4AnkmnmeS2V/hNDkWlmfTvVoafaNGCHVfdFVLciWd7S6sBulmwt/4E9ozUOqJ3/tqbHBgiZDgOHfdsz/rh7oXECUou72pwaNQONaxOxv35ucvDX5LEzk9r55pHtaQJ9bPlGRIwMDGz8/ifN79+TG9mOBrKjvrrQ2FEb93+6dvyJNsefwda107+pdfxb3XD8exg/0+H4d6nLGL+/8dOHHePfiPh/2/jJWvykTfw0It7sMv7tK1+c61RX/SjieLSP35Jsfn14+NpksTDS+Ns2xpfHj766Wf8PdojfuGa7v/5vpt32n+2y/59/89lzy5vEf/H5zfd/u+1/ICLe7TL+v+5//Hqnurs3knu1UcBW939t2Z0u4790/tgPHaoOdPkRAAAAAAAAAABAG2n9XrYkza3Np2ku13iG999xMC2WypUT10rzM+ONe96ORDZt3Wk11CgntfJo837cVvnUuvLp1n3EmQP1ci5fKo73uO8AAAAAAAAAAAAAAAAAAACwWxxa9/z/b5n68//rf64a2Ks6/+Q3sNfJf+hfj+d/sm0/7gvsfo/k/4NetgN46qrG/9C/5D/0L/kP/Uv+Q/+S/9C/5D/0L/kPAAAAAAAAAAAAAAAAAAAAAAAAAAA74tLFi7Wp+mBlKV8rjw8szE+V3jo5XihP5abn87l8aW42N1EqTRQLuXxp+q8+r1gqzY7EzPz14UqhXBkuLyxenS7Nz1SuTk6PTRSuFrJPpVcAAAAAAAAAAAAAAAAAAADwbBmsT0mai4i0Pp+muVzEPyPiSGSTa5PFwkhEHI6I7zPZfbXyaK8bDQAAAAAAAAAAAAAAAAAAAHtMeWFxaqxYLMz1yczAhiXfdl45Ipa3txm1T9zyu7LNfbVbtuGzNnN483Uy0fMW7saZHh+YAAAAAAAAAAAAAAAAAACgDz186Lfbd/yxsw0CAAAAAAAAAAAAAAAAAACAvpT+nEREbTo+9MLg+tp/JKuZ+mtEvH378vvXxyqVudHa8ntryysfNJef6i7ilW3vA9CNVp628hgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4qLywODVWLBbmdnCm130EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeBJ/BgAA//9UNdg0") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000200)={0xffffffffffffffff, 0x8022c37b9b00b63a, 0x4, 0x0, 0x8}, 0xc) preadv(r5, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) clock_gettime(0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) madvise(&(0x7f0000000000/0x600000)=nil, 0x60005f, 0x3) madvise(&(0x7f0000000000/0x2000)=nil, 0x8000000, 0x19) r6 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27ffff7, 0x4012011, r6, 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)={[{@redirect_dir_follow}, {@index_on}, {@nfs_export_off}], [], 0x2c}) bpf$PROG_LOAD(0x5, 0x0, 0x0) 5m57.143511157s ago: executing program 5 (id=8383): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$packet(0x11, 0xa, 0x300) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, r0, 0xf9d0c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) socket$packet(0x11, 0x2, 0x300) socket$netlink(0x10, 0x3, 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ptrace$setregset(0x4205, 0x0, 0x2, &(0x7f0000000040)={&(0x7f0000000340)="e5a82dced95927ba0688e2fcca2134962612c5a932aaf64858297f795280f0e55e166aa168b31d5b3ff0f7ad8035b1b7ea7957c5df0be20ae7168e2807d446aa0ec3d324c5531f602845855d659a54a1691465838152254431ccfb26174ecdd3f52167974d5a5b841afbe7d825b920dc21792b1749bddf4df887d3ca", 0x7c}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x20, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0xd41, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) r6 = add_key$user(&(0x7f0000000080), &(0x7f0000000140)={'syz', 0x0}, &(0x7f00000000c0)='5', 0x1, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r6, 0xfffffffffffffffb, 0xffffffffffffffff, 0x1) syz_clone(0x1000, 0x0, 0x0, 0x0, 0x0, 0x0) add_key(&(0x7f0000000100)='user\x00', 0x0, &(0x7f0000000800)="3080", 0x2, 0xffffffffffffffff) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x800}, 0x94) 5m54.624153645s ago: executing program 5 (id=8391): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0xc) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0x28f43000) syz_open_dev$loop(0x0, 0x4, 0x50000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) shutdown(r2, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="19000000040000000400000008"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f00000004c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001c80)={{r4}, &(0x7f0000001c00), &(0x7f0000001c40)=r5}, 0x20) r7 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r7, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @dev}, 0x2}}, 0x2e) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000040)={0x4, 0x5, 0x7, 0x4, 0x1b, "03f37fe99f4da288"}) r8 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000140)=[{0x6, 0x5, 0xb6, 0x7fff1004}]}) close_range(r8, 0xffffffffffffffff, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000300)='./bus\x00', 0x3000008, 0x0, 0x1, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000780)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file0'}}]}) 5m51.691914856s ago: executing program 5 (id=8396): r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x12, 0xc, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r5, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000000)=[@mss, @sack_perm, @window={0x3, 0x7}, @mss={0x2, 0xfff}, @window={0x3, 0x0, 0x401}, @window], 0x20000000000000e4) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f00000001c0), 0x4) sendto$inet(r5, &(0x7f0000000000), 0xffffffffffffff94, 0xb, 0x0, 0x0) 5m48.989503995s ago: executing program 5 (id=8399): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0xffffffffffffff7c, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$KVM_SET_CPUID2(0xffffffffffffffff, 0x4008ae90, 0x0) mount$binderfs(0x0, &(0x7f00000023c0)='./binderfs\x00', &(0x7f0000002400), 0x4000, 0x0) sendmmsg$unix(r2, &(0x7f0000001a40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, {{&(0x7f0000000a80)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000001940), 0x0, 0x90}}], 0x2, 0x40) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x6) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r4, &(0x7f0000000440), 0x10) listen(r4, 0x0) r5 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r5, &(0x7f0000000100)={0x28, 0x0, 0x0, @local}, 0x10) writev(r5, &(0x7f00000003c0)=[{&(0x7f0000000640)="98", 0x1}], 0x1) r6 = accept4$unix(r4, 0x0, 0x0, 0x0) socket(0xa, 0x2, 0x0) recvfrom$unix(r6, &(0x7f0000000480)=""/252, 0xfc, 0x10002, 0x0, 0x0) 5m47.543363025s ago: executing program 5 (id=8403): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x20}, 0x1, 0x0, 0x0, 0x44801}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x28100, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x2800000, &(0x7f0000000380)={[{@debug}, {@delalloc}, {@journal_ioprio}, {@test_dummy_encryption}, {@nodiscard}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}, {@acl}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x40}}]}, 0x1, 0xbb4, &(0x7f00000017c0)="$eJzs3M1rXOUaAPDnnHy2zb2TXi6X27tpLpdLC+I0raTYIthKxY0LQbdCQzopIdMPkkhNmsVE/wFR14IbQS1KF3bdjYJbN1q3FhdCkdgoiGjkzEeSJjNJ2k5yYvL7wZvzvvOcOe/z5DBzzgszE8CeNZD9SSMORcT5JKJQfzyNiO5qrzeiUttvYX525Jf52ZEkFhdf/jGJJCLuz8+ONI6V1LcH6oPeiPjquST+8ebaeSenZ8aHy+XSRH18bOrS1WOT0zNPjl0avli6WLp8/OTTQyeGTg6eGmpbrb9+d+bWz/994fvKbx/9fuOndz5I4kz01WMr66hX/dgGYmDpf7JSZ0QMt+H4O0FHvZ6VdSadGzwp3eKkAABoKV1xD/evKERHLN+8FeLzr3NNDgAAAGiLxY6IRQAAAGCXS6z/AQAAYJdrfA7g/vzsSKPl+4mE7XXvbET01+pfqLdapDMq1W1vdEXE/vtJrPxaa1J72mMbiIi73576NGvR5HvIW60yFxH/bnb+k2r9/fVvQq+uP42IwTbMP7Bq/Feq/0wb5s+7fgD2pttnaxeytde/dOn+J5pc/zqbXLseRd7Xv8b938Ka+7/l+jta3P+9tMk5rn/43rVWsaz+Z249/0mjZfNn28cq6iHcm4v4T2ez+pOl+pMW9Z/f5ByFP66VWsXyrn/x/Ygj0bz+hmT93yc6NjpWLg3W/jadY+7LoY9bzZ93/dn539+i/o3O/9UHjtT6R31ePXfuZqvYxvWnP3Qnr1R73fVHXh+empo4HtGdvLj28RPr19vYp3GMrP6j/1v/9d+s/uw9oVL/P2SVz9W32fiNVXM+e+P6Z+vVn6398jz/Fx7x/L+1yTn+/8XbR1vFVq5/s5bNfzeprYUBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoCGNiL5I0mJEJNV+mhaLEQci4p+xPy1fmZx6YvTKa5cvZLGI/uhKR8fKpcGIKNTGSTY+Xu0vj0+sGj8VEQcj4t3Cvuq4OHKlfCHv4gEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFhyICL6IkmLEZFGxEIhTYvFvLMCAAAA2q4/7wQAAACALWf9DwAAALuf9T8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABb7ODh23eSiKic3ldtme56rCvXzICtluadAJCbjrwTAHLTmXcCQG4eco3vdgF2oWSDeG/LSE/bcwEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABg5zpy6PadJCIqp/dVW6a7Hutq+ozD25gdsJXSvBMActOxXrBz+/IAtp+XOOxdzdf4wF6SbBDvXd6n8mCkZ8tyAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGDn6au2JC1GRFrtp2mxGPG3iOiPrmR0rFwajIi/R8Q3ha6ebNyTd9IAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC03eT0zPhwuVya0NHRybeT7Iw0ap2835kAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMjD5PTM+HC5XJqYzDsTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIG+T0zPjw+VyaWITnZsPs/OKTt41AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACQnz8DAAD//9b4DfQ=") syz_mount_image$fuse(0x0, &(0x7f00000000c0)='./bus\x00', 0x3000009, 0x0, 0x1, 0x0, 0x0) r5 = socket(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r7) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r8, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=@newtfilter={0x60, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x30, 0x2, [@TCA_BASIC_EMATCHES={0x2c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xffff}}, @TCA_EMATCH_TREE_LIST={0x20, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x10, 0x1, 0x0, 0x0, {{}, {0x0, 0x0, 0x1}}}, @TCF_EM_META={0xc, 0x2, 0x0, 0x0, {{0x0, 0x4, 0x4}}}]}]}]}}]}, 0x60}}, 0x0) 5m31.118820003s ago: executing program 39 (id=8403): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x20}, 0x1, 0x0, 0x0, 0x44801}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x28100, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x2800000, &(0x7f0000000380)={[{@debug}, {@delalloc}, {@journal_ioprio}, {@test_dummy_encryption}, {@nodiscard}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}, {@acl}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x40}}]}, 0x1, 0xbb4, &(0x7f00000017c0)="$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") syz_mount_image$fuse(0x0, &(0x7f00000000c0)='./bus\x00', 0x3000009, 0x0, 0x1, 0x0, 0x0) r5 = socket(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r7) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r8, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=@newtfilter={0x60, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x30, 0x2, [@TCA_BASIC_EMATCHES={0x2c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xffff}}, @TCA_EMATCH_TREE_LIST={0x20, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x10, 0x1, 0x0, 0x0, {{}, {0x0, 0x0, 0x1}}}, @TCF_EM_META={0xc, 0x2, 0x0, 0x0, {{0x0, 0x4, 0x4}}}]}]}]}}]}, 0x60}}, 0x0) 3m49.888478843s ago: executing program 2 (id=8590): r0 = accept$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0x14) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) connect$packet(r0, &(0x7f0000000340)={0x11, 0xef, r1, 0x1, 0x3, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2d}}, 0x14) bpf$MAP_CREATE(0x0, 0x0, 0x48) memfd_create(0x0, 0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x80101, 0x0) r2 = gettid() timer_create(0x1, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r3, &(0x7f0000000100)=@name={0x1e, 0x2, 0x0, {{0x42}}}, 0x10) ptrace$setopts(0x4200, r2, 0x0, 0x0) r4 = socket$tipc(0x1e, 0x2, 0x0) r5 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r5, &(0x7f0000000100)=@name={0x1e, 0x2, 0x0, {{0x42}}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f0000000180)={0x42, 0x0, 0x2}, 0x10) sendmsg$tipc(r4, &(0x7f0000000540)={&(0x7f00000001c0)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0x4}}, 0x10, 0x0}, 0x10) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, 0x0, 0x0) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r6, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, 0x0) socket(0x9, 0x1, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x22) rmdir(&(0x7f0000000080)='./cgroup/../file0\x00') r8 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r8, 0x6, 0x0, 0x0, 0x0) 3m47.908389777s ago: executing program 2 (id=8592): r0 = socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000180)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x16, 0xb, &(0x7f00000000c0)=@framed={{}, [@printk={@ld, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x73}}]}, &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x33, 0x0, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) pipe2(&(0x7f0000000240), 0x84000) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x700000000000000, &(0x7f0000000180)=@base={0x1d, 0x4, 0x2, 0x0, 0x201, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x137b}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x40000, 0x100a8}}}}}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}]}, 0x50}}, 0x40080) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000f00"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x8, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0xf9}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000062c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r5, &(0x7f0000004200)={0x50, 0x0, r6, {0x7, 0x29, 0x0, 0x300d2140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}}, 0x50) syz_fuse_handle_req(r5, &(0x7f00000042c0)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000785700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000160000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000eeffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e1ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010800", 0x2000, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x20, 0x0, 0x3, {0x0, 0x1c}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c0000001e00010000000000000000000200000001000007000000000800010000000000080005"], 0x2c}, 0x1, 0x0, 0x0, 0x2}, 0x0) 3m42.120281378s ago: executing program 2 (id=8599): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x25c, &(0x7f0000000440)=ANY=[@ANYBLOB="180200000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000850000000700000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000000), 0x20442, 0x0) ioctl$TCGETA(r1, 0x5434, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) syz_open_dev$usbmon(&(0x7f0000000300), 0x7, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x44, 0x86}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r5 = socket$inet6(0x10, 0x3, 0x0) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x2d) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000380)='neigh_update\x00', r7}, 0x18) sendto$inet6(r5, &(0x7f00000000c0)="900000001c001f4d154a817393278bff0a80a578020000000104740014000100ac1414bb0542d6401051a2d708f37ac8da1a297e0099c5ac0000c5b068d0bf46d323456536016466fcb78dcaaf6c3efed495a46215be0000760700c0c80cefd28581d158ba86c9d2896c6d3bca2d0000000b0015009e49a6560641263da4de1df32c1739d7fbee9aa241731ae9e0b3", 0x8f, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000180), &(0x7f0000000380)='./cgroup\x00', 0x800, &(0x7f00000003c0)=ANY=[@ANYBLOB="000472160556c49a8f77d21f2a5ddadd0700000000000000b9773e93b10bea54840856fcb2d48332a9bc03c716106c3045d5f3c338b810be692d50a50b8a1c4a287b3eb1bc43e5135e8d", @ANYRESDEC=r2], 0x1, 0x1534, &(0x7f0000002d00)="$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") syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) shutdown(r8, 0x1) connect$inet6(r8, &(0x7f0000000000)={0xa, 0x4e20, 0xfffffff7, @empty, 0x2}, 0x1c) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) 3m36.474097598s ago: executing program 2 (id=8607): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x9, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xd, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket(0x10, 0x3, 0x0) r5 = signalfd4(0xffffffffffffffff, &(0x7f0000000140)={[0xfffffffffffffff5]}, 0x8, 0x0) ppoll(&(0x7f0000000000)=[{r5, 0x4180}, {r5, 0x100}], 0x2, 0x0, 0x0, 0x0) r6 = signalfd4(r5, &(0x7f0000000040)={[0x2]}, 0x8, 0x800) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r6, 0x40505412, &(0x7f0000000240)={0x3, 0x9, 0x3b9, 0x0, 0x12}) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r8) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r9, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{}, 0x3548}}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=@newtfilter={0x7c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x4c, 0x2, [@TCA_BASIC_EMATCHES={0x48, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xffff}}, @TCA_EMATCH_TREE_LIST={0x3c, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x10, 0x1, 0x0, 0x0, {{}, {0x0, 0x0, 0x1}}}, @TCF_EM_META={0x23, 0x2, 0x0, 0x0, {{0x0, 0x4, 0x4}, [@TCA_EM_META_HDR={0xc}, @TCA_EM_META_RVALUE={0x7, 0x3, [@TCF_META_TYPE_VAR="043f51"]}, @TCA_EM_META_LVALUE={0x5, 0x2, [@TCF_META_TYPE_VAR='3', @TCF_META_TYPE_VAR]}]}}]}]}]}}]}, 0x7c}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmmsg(r1, &(0x7f0000005400), 0x0, 0x0, 0x0) r10 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r10, &(0x7f00000001c0)={0xa, 0x1, 0x20000000, @dev={0xfe, 0x80, '\x00', 0x5}, 0x4}, 0x1c) 3m35.049238768s ago: executing program 2 (id=8611): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1008413, &(0x7f0000000000)={[{@noblock_validity}, {@barrier}]}, 0x0, 0x517, &(0x7f00000000c0)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000001000000e27f000001"], 0x48) userfaultfd(0x800) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000005700)={{r3, 0xffffffffffffffff}, &(0x7f0000005680), &(0x7f00000056c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x1b, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000000000000004000000003f8aa3ae8830000018110000dd962365bceca0f367f16488c34d2a330994945aaf9493de66c47ad5915333a78b9e725def26e365cb6609cfabe73e500fdd64cc8181bed5fb58fdc28ac9bdb19da250c545ee1cd3e3abc8f93edf65f959d3eb45ac367f3c91b55b3593e5af12020f98008f6460ce62", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000004}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x1e8629867d7bdaee, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = getpid() r7 = syz_pidfd_open(r6, 0x0) r8 = epoll_create1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r10, &(0x7f00000bd000), 0x318, 0x0) epoll_ctl$EPOLL_CTL_ADD(r8, 0x1, r10, &(0x7f0000000100)={0x20000014}) recvmmsg(r10, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}, 0x7}], 0x1, 0x0, 0x0) close_range(r7, r9, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r11 = add_key$keyring(0x0, &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, r11) keyctl$instantiate_iov(0x14, r11, &(0x7f0000000680), 0x0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)) 3m33.050374573s ago: executing program 2 (id=8615): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/vlan/vlan0\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r4, 0x8982, &(0x7f0000002800)={0x1, 'vlan0\x00'}) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x2000000, 0x10010, r3, 0xb223c000) keyctl$link(0x8, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={0x0, r5}, 0x18) r6 = socket(0x10, 0x80803, 0x0) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000900)=ANY=[@ANYBLOB="1c0000005e000102000000000000000000000000682ce665c9"], 0x1c}, 0x1, 0x0, 0x0, 0x4008001}, 0x0) recvmmsg(r2, &(0x7f0000001bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180500000000c800000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r8 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r8, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) connect$unix(r9, &(0x7f000057eff8)=@abs, 0x6e) 3m15.1260231s ago: executing program 40 (id=8615): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/vlan/vlan0\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r4, 0x8982, &(0x7f0000002800)={0x1, 'vlan0\x00'}) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x2000000, 0x10010, r3, 0xb223c000) keyctl$link(0x8, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={0x0, r5}, 0x18) r6 = socket(0x10, 0x80803, 0x0) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000900)=ANY=[@ANYBLOB="1c0000005e000102000000000000000000000000682ce665c9"], 0x1c}, 0x1, 0x0, 0x0, 0x4008001}, 0x0) recvmmsg(r2, &(0x7f0000001bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180500000000c800000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r8 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r8, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) connect$unix(r9, &(0x7f000057eff8)=@abs, 0x6e) 10.229271917s ago: executing program 7 (id=9495): r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000280)=0x1, 0x4) setsockopt$inet6_udp_int(r0, 0x11, 0x66, &(0x7f0000000340)=0xc6, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0xe22, 0x5, @empty}, 0x1c) syz_emit_ethernet(0xd2, &(0x7f0000000900)=ANY=[@ANYBLOB="ffffffffbfff20000000000086dd600489f1009c1100fc010000000000000025030000000000ff02000000000000000000000000000100000e22"], 0x0) 10.214678687s ago: executing program 7 (id=9498): syz_clone(0x4100100, &(0x7f0000000000)="505d173068bdbf0db3b2ad3b6b791805eb03e2940faede9d177c7275fcd10d5e462511bd8f1a2807b5e584c0ff58b716fa4e140845b536899f", 0x39, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007fc5f603ff"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0xffffffffffffffbe, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4c}, 0x90) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 7.05169328s ago: executing program 7 (id=9510): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000000018105e04da0700000000000109022400010000000009040000090300000009210000000122220009058103"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x1c000004, 0x0, {[0x2]}}, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00222200000096231306e53f07"], 0x0}, 0x0) 6.269998945s ago: executing program 1 (id=9513): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x80) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x6a855000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x4) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x72, 0x0, 0x7fff0000}]}) 5.005852034s ago: executing program 1 (id=9517): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x7, 0x4, 0x8, 0xd9}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="adffa88800000000140012800b0001006d616373656300002a00028008000500", @ANYRES32=r7, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r7], 0x44}}, 0x8000) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x3014850, &(0x7f0000000140)={[{@acl}, {@barrier_val={'barrier', 0x3d, 0x1003}}, {@errors_remount}, {@noauto_da_alloc}, {@dioread_lock}]}, 0x1, 0x4e4, &(0x7f0000002d40)="$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") 4.333708659s ago: executing program 8 (id=9519): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000040)=0x46c, 0x4) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'tunl0\x00', 0x0}) sendto$packet(r0, &(0x7f0000000080)="33031600d1fd140000007ef52f555f2a3b9fe67025c1d97bfbf719143baa4b1f0f858c6632f47042195e", 0xfdef, 0x40008c1, &(0x7f00000000c0)={0x11, 0x86dd, r2, 0x1, 0x62}, 0x14) 4.303572099s ago: executing program 8 (id=9520): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x101302, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000100)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f0000000480)=@attr_other={0x0, 0x1, 0x1, &(0x7f0000000440)=0x6}) 4.018532971s ago: executing program 8 (id=9521): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0xf) ioctl$TCFLSH(r1, 0x400455c8, 0x0) ioctl$sock_bt_hci(r0, 0x400448e1, &(0x7f00000001c0)) 3.965563132s ago: executing program 6 (id=9522): io_setup(0xb0, &(0x7f00000014c0)=0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='mounts\x00') prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000001700)=0x4) keyctl$setperm(0x5, 0x0, 0x30925) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x6}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000030010850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x50, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000d00000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x14, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000004000000000000000300000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000200850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r10, 0xfca804a0, 0x10, 0x10, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x4, &(0x7f00000002c0), 0x6, 0x5fd, &(0x7f0000000c00)="$eJzs3c9rHFUcAPDvzCYxaaNpRcQWxYCHFqRpUotVL7b1YA8FC/Yg4qGhSWro9gdNCrYWTMGDgoKIV5Fe/Ae8S+/eRFBvnoUqUlFQ6crszrabZDfdttmdNPP5wGTnvZnd9747eZn3dvJ2Aiit8exHGrEj4taJJGKsZdtoNDaO5/vd/OPKyWxJolZ78/ckkjyvuX+SP27NE8MR8f3hiMcrq8tduHT59HS11vBBxN7FM+f3Lly6vGf+zPSp2VOzZ6f2vbT/wOTLU/un1iXOrfnjkaNvPP3ph+++OPdDdU8SB+P44PszsSKO9TIe43ErD7E1fyAiDmQrbd6Xh80mCKHUKvnv42BEPBljUamnGsZi/pNCKwf0VK0SUQNKKtH+oaSa/YDm2L67cfDxHvdK+ufGocYAaHX8A43PRmK4PjbacjNpGRk1PtvYtg7lZ2X8d2Xnl9kSyz6H+Pv20RlYh3I6WboaEU+1iz+p121bPdIs/nTZWD+JiMmIGMrr99oD1CFpWe/F5zBruZf4W49DGhEH88cs//B9lj++It3v+AEop+uH8hP5Upa6c/7L+h7N/k+06f+Mtjl33Y+iz3+d+3/N8/1wvd+TruiHZX2WY+1fcnBlxi8fH/m8U/mt/b9sycpv9gX74cbViJ0r4v8oCzbv/2TxJ22Of7bLiYPdlfH6j78d6bSt6Phr1yJ2tR3/3OmVZmtrXJ/cOzdfnZ1s/GxbxrffvfN1p/KLjj87/ls6xN9y/NOVz8vek/NdlvHNsWtnOm0bvWv86a9DSWO8OZTnvDe9uHhhKmIoOZrv0pK/b+26NPdpvkYW/+7n2rf/Zb//V5e/zkjzT2YXzr91+manbfdz/FsuJt+qdVmHTrL4Z+5+/Fe1/yzvsy7L+Ovti8902rZW/CMPEhgAAAAAAACUUFq/BpukE7fX03RiojFf9onYklbPLSw+P3fu4tmZiN31/4ccTJtXusca6SRLT+X/D9tM71uRfiEitkfEF5WRenri5LnqTNHBAwAAAAAAAAAAAAAAAAAAwAaxNZ//37xP9Z+Vxvx/oCR6eYM5YGPT/qG86u1/1S2egDJw/ofy0v6hvLR/KC/tH8pL+4fy0v6hvLR/KC/tHwAAAAA2pe3PXv85iYilV0bqS2Yo32ZGEGxug0VXAChMpegKAIW5felfZx9Kp6v+/z/5lwP2vjpAAZJ2mfXOQW3txn+97TMBAAAAAAAAAAAAgB7YtaPz/H9zg2FzM+0PyusB5v/76gB4yPnqfygvY3zgbrP4hzttMP8fAAAAAAAAAAAAAPpmtL4k6UQ+F3g00nRiIuLRiNgWg8ncfHV2MiIei4ifKoOPZOmpoisNAAAAAAAAAAAAAAAAAAAAm8zCpcunp6vV2QutK/+uytncK827oPahrFfjHp8VSf/flpGIKPyg9GxloCUniVjKjvyGqNiFhdgY1aivFPyHCQAAAAAAAAAAAAAAAAAASqhl7nF7O7/qc40AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoP/u3P+/dytFxwgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPJz+DwAA///LLUAr") syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) io_submit(r0, 0x1, &(0x7f0000000280)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 3.809692532s ago: executing program 1 (id=9523): sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010005000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r6}, 0x10) sendto$inet6(r5, 0x0, 0x0, 0x20000845, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0a00000004000000fd0f00000700"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6004, 0x1) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000001200)='vfat\x00', 0x10, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, 0x0) 2.969564509s ago: executing program 9 (id=9524): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}, [@printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x800000001ff, 0x2) r2 = dup(r1) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000040)={0x23, 0x1, 0x8, 0x4, 0x0, 0x4, 0x0}) 2.75249653s ago: executing program 9 (id=9525): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000002000000000000000008082295"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100}, 0x94) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x66, 0x0, 0x0, 0x11, 0x0, @remote, @multicast1}, {0x2000, 0x4e20, 0x8}}}}}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0x63, 0x0, &(0x7f0000000000)="ff", 0x0, 0x149d, 0x503, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffff80fe}, 0x50) 2.75189579s ago: executing program 1 (id=9526): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x20140, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000600)=[@text16={0x10, 0x0}], 0x1, 0x74, 0x0, 0xfffffcda) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)=ANY=[@ANYBLOB="0400000000000000850400000000000005"]) 2.75157747s ago: executing program 9 (id=9527): r0 = socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x8000000000002) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x9031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000ed074479000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r4}, 0x18) r5 = socket$igmp(0x2, 0x3, 0x2) bpf$MAP_CREATE(0x0, 0x0, 0x0) connect$inet(r5, &(0x7f0000000080)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x28}}, 0x30) sendmmsg$inet(r5, &(0x7f00000034c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'], 0x30}}], 0xa8000, 0x40000840) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_REG(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x1c, 0x0, 0x1, 0x8070bd27, 0x25dfdbfc, {}, [@NL80211_ATTR_DFS_REGION={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x80) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'veth1_macvtap\x00', 0x0}) syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getchain={0x24, 0x11, 0x839, 0x70bd25, 0x0, {0x0, 0x0, 0x0, r8, {0x1, 0x6}, {0x7}, {0x3}}}, 0x24}}, 0x0) 1.655994498s ago: executing program 7 (id=9528): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x4, 0x28}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0xb, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46}, [@printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, @sched_cls=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x320e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 1.625329728s ago: executing program 8 (id=9529): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000400)='sched_switch\x00', r1}, 0x18) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) socket$key(0xf, 0x3, 0x2) close_range(r2, 0xffffffffffffffff, 0x0) 1.558377398s ago: executing program 6 (id=9530): bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000580)={'veth0\x00', 0x0}) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000000)=0xf3f, 0x4) sendto$packet(r1, &(0x7f00000000c0)="3f03fe7f0302140006001e0089e9aaa911d7c2290f0086dd1327c9167c642b4a1b7880610cc96655b1b141ab059b24d0fbc50df71548a3f6c5609063382a0c153cfdf9435e3ffe46", 0xe90c, 0x0, &(0x7f0000000540)={0xc9, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) 1.549909348s ago: executing program 9 (id=9531): sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xa0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="340000001c00010429bd7000fddbdf2507000000", @ANYRES32=r1, @ANYBLOB="0200ee050a000200aa"], 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x20040040) r2 = socket(0x10, 0x3, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x4000000000001f2, 0x0) 1.498464659s ago: executing program 6 (id=9532): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CAP_EXIT_HYPERCALL(r1, 0x4068aea3, &(0x7f0000000040)={0x79, 0x0, 0xc}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000840)=@x86={0x40, 0x10, 0xa, 0x0, 0x8, 0x0, 0x9, 0xfb, 0xff, 0x9, 0x3, 0x8, 0x0, 0x4, 0xe, 0x4, 0x5, 0x9c, 0xc, '\x00', 0x5, 0x6}) 1.498138649s ago: executing program 8 (id=9533): close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='\v\x00\x00\x00\a\x00'], 0x48) socket$inet6_udp(0xa, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) io_setup(0x8, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f00000700"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r5, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0xa02000000000000, 0x60, &(0x7f0000000480)={'filter\x00', 0xb001, 0x2, 0x3c8, 0x0, 0x1f8, 0x1f8, 0x2e0, 0x2e0, 0x2e0, 0x7fffffe, 0x0, {[{{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x15}, 0x1}}}, {{@uncond, 0xc0, 0xe8}, @unspec=@CLASSIFY={0x28}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE3={0x28}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x418) request_key(&(0x7f0000002740)='asymmetric\x00', &(0x7f0000002780)={'syz', 0x3}, &(0x7f00000027c0)=',*[\\/&)\x00', 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) 1.471625399s ago: executing program 6 (id=9534): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x2400, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x1, 0x3, 0x6000, 0x2000, &(0x7f0000fa3000/0x2000)=nil}) ioctl$KVM_CREATE_DEVICE(r1, 0xc018aec0, &(0x7f00000000c0)={0x1}) 1.46364378s ago: executing program 1 (id=9535): gettid() sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, 0x0, 0x809d) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x200000000000008b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0x28f43000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)={@map, 0xffffffffffffffff, 0x7}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$RTC_PIE_ON(r0, 0x7005) 1.452850489s ago: executing program 7 (id=9536): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000680)='./file0\x00', 0x10e, &(0x7f0000000280)={[{@errors_remount}, {@nodelalloc}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2e}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x4000000}}, {@jqfmt_vfsv0}, {@quota}]}, 0x3, 0x44d, &(0x7f0000000a40)="$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") chdir(&(0x7f0000000100)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000004280)='.\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x40) getdents64(r0, &(0x7f0000000d00)=""/65, 0x41) 1.452540369s ago: executing program 6 (id=9537): sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010005000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r6}, 0x10) sendto$inet6(r5, 0x0, 0x0, 0x20000845, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0a00000004000000fd0f00000700"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6004, 0x1) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000001200)='vfat\x00', 0x10, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, 0x0) 1.447826659s ago: executing program 9 (id=9538): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) write$UHID_CREATE2(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="0b00000073797a31000000dfff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000037b35f0a000089b4c45a10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001"], 0x119) 1.40665641s ago: executing program 7 (id=9539): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x60242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000f40)={'pimreg\x00', 0x3c32}) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000010024bd7000fc0ddf2500000000", @ANYRES32=0x0, @ANYBLOB="1b0b04000300000008001b"], 0x28}, 0x1, 0x0, 0x0, 0x68010}, 0x0) pwritev2(r1, &(0x7f0000000300)=[{&(0x7f00000003c0)="1b9f54a603ff244a000000", 0xb}, {&(0x7f0000000040)="010130a7cd08", 0x6}], 0x2, 0xa74a, 0x80000000, 0x10) 208.323868ms ago: executing program 1 (id=9540): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') preadv(r3, &(0x7f00000000c0)=[{&(0x7f0000000640)=""/4112, 0x1010}], 0x1, 0x4000, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0200000004000000080000"], 0x48) setregid(0xffffffffffffffff, 0x0) read$FUSE(r3, &(0x7f0000001680)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) setgroups(0x2, &(0x7f0000000000)=[0x0, 0x0]) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x275a, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="00032dbd7000fddbdf250100000000000000014100000018006574683a74756e6c30000000000000000000000000a2b9e7115876c55e9045eb1210d2d99beebbb8d84e726eaec20b83a10c050eee5e05bc584a0db3e2879328525675e8c46d4e79d40a02ba6d7a0df28a10931f2460077446a9c9a42396d2c4ef7edf56bf656be777c5010954dcfb668492fa8bd0aac86c20bd1e86afac112796f1c9c831d016687256361b841a60b36dc34e8a3c3de40d1aa7c4f11dc4b102"], 0x34}, 0x1, 0x0, 0x0, 0x20040851}, 0x0) fcntl$lock(r5, 0x26, &(0x7f0000000280)={0x1, 0x0, 0x2f, 0x9}) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x182800, 0x0) ioctl$RTC_AIE_ON(r6, 0x7001) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r4, 0x81, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x41000}, 0x94) 207.262478ms ago: executing program 8 (id=9541): io_setup(0xb0, &(0x7f00000014c0)=0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='mounts\x00') prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000001700)=0x4) keyctl$setperm(0x5, 0x0, 0x30925) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x6}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000030010850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x50, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000d00000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x14, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000004000000000000000300000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000200850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r10, 0xfca804a0, 0x10, 0x10, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x4, &(0x7f00000002c0), 0x6, 0x5fd, &(0x7f0000000c00)="$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") syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) io_submit(r0, 0x1, &(0x7f0000000280)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 11.440929ms ago: executing program 9 (id=9542): syz_mount_image$vfat(&(0x7f0000000300), &(0x7f00000001c0)='./file0\x00', 0x800000, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1, 0x373, &(0x7f00000006c0)="$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") socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x8000000000002) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x9031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x18) r4 = socket$igmp(0x2, 0x3, 0x2) bpf$MAP_CREATE(0x0, 0x0, 0x0) connect$inet(r4, &(0x7f0000000080)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x28}}, 0x30) 0s ago: executing program 6 (id=9543): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0xa2f01, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) write$tun(r0, &(0x7f0000001040)=ANY=[@ANYBLOB="00409000ffffffffffffaaaaaaaaaabb8100000008004b5600f400650000021190"], 0x10a) kernel console output (not intermixed with test programs): [ 2949.400031][T13030] bridge6: port 2(veth5) entered blocking state [ 2949.406280][T13030] bridge6: port 2(veth5) entered forwarding state [ 2949.413007][T13030] IPv6: ADDRCONF(NETDEV_CHANGE): veth4: link becomes ready [ 2949.420779][T29005] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 2949.428423][T29005] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 2949.438050][T29005] ip6_tunnel: ip6tnl2 xmit: Local address not yet configured! [ 2949.445748][T29005] ip6_tunnel: ip6tnl2 xmit: Local address not yet configured! [ 2949.453713][T29005] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 2949.461460][T29005] ip6_tunnel: ip6tnl2 xmit: Local address not yet configured! [ 2949.469173][T29005] ip6_tunnel: syztnl2 xmit: Local address not yet configured! [ 2949.477104][T29005] ip6_tunnel: syztnl2 xmit: Local address not yet configured! [ 2949.493988][T29005] ip6_tunnel: syztnl2 xmit: Local address not yet configured! [ 2950.026145][T29005] ip6_tunnel: ip6tnl2 xmit: Local address not yet configured! [ 2950.210210][T30165] tipc: Enabled bearer , priority 0 [ 2950.240656][T30174] bridge0: port 3(syz_tun) entered blocking state [ 2950.249475][T30174] bridge0: port 3(syz_tun) entered disabled state [ 2950.261868][T30174] device syz_tun entered promiscuous mode [ 2950.285368][T30174] bridge0: port 3(syz_tun) entered blocking state [ 2950.291859][T30174] bridge0: port 3(syz_tun) entered forwarding state [ 2950.425000][T30159] tipc: Resetting bearer [ 2950.669625][T30159] tipc: Disabling bearer [ 2950.756935][ T28] audit: type=1400 audit(2000000469.567:9373): avc: denied { create } for pid=30181 comm="syz.5.8188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 2951.422570][ T28] audit: type=1400 audit(2000000469.631:9374): avc: denied { sys_admin } for pid=30181 comm="syz.5.8188" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 2951.539141][ T28] audit: type=1400 audit(2000000470.268:9375): avc: denied { associate } for pid=30181 comm="syz.5.8188" name="cpuset.effective_cpus" scontext=root:object_r:etc_runtime_t tcontext=system_u:object_r:root_t tclass=filesystem permissive=1 [ 2952.908470][T30198] overlayfs: failed to clone upperpath [ 2954.711683][T30212] netlink: 12 bytes leftover after parsing attributes in process `syz.1.8193'. [ 2954.725399][T30212] device vlan2 entered promiscuous mode [ 2954.731093][T30212] device gretap0 entered promiscuous mode [ 2956.524765][ T28] audit: type=1400 audit(2000000473.240:9376): avc: denied { setopt } for pid=30204 comm="syz.9.8194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2957.543746][ T28] audit: type=1400 audit(2000000473.305:9377): avc: denied { bind } for pid=30204 comm="syz.9.8194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2957.817681][ T28] audit: type=1400 audit(2000000476.083:9378): avc: denied { ioctl } for pid=30234 comm="syz.6.8200" path="/dev/fuse" dev="devtmpfs" ino=93 ioctlcmd=0xe500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 2957.965071][ T28] audit: type=1400 audit(2000000476.203:9379): avc: denied { connect } for pid=30227 comm="syz.9.8208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2958.287492][T30245] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8199'. [ 2958.298329][T30245] device 30猉功D entered promiscuous mode [ 2958.304316][T30245] device macsec1 entered promiscuous mode [ 2958.311117][T30245] device 30猉功D left promiscuous mode [ 2960.010367][T30266] netlink: 12 bytes leftover after parsing attributes in process `syz.5.8204'. [ 2960.066736][T30266] device vlan3 entered promiscuous mode [ 2960.072450][T30266] device gretap0 entered promiscuous mode [ 2961.628174][ C0] ip6_tnl_xmit_ctl: 8 callbacks suppressed [ 2961.628193][ C0] ip6_tunnel: syztnl2 xmit: Local address not yet configured! [ 2962.321879][ C0] ip6_tunnel: ip6tnl2 xmit: Local address not yet configured! [ 2962.681681][ T28] audit: type=1400 audit(2000000479.027:9380): avc: denied { write } for pid=30261 comm="syz.9.8205" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 2963.015163][ C0] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 2963.235189][T30276] tipc: Enabling of bearer rejected, failed to enable media [ 2966.323916][T30297] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8211'. [ 2968.460768][ T28] audit: type=1400 audit(2000000485.682:9381): avc: denied { sqpoll } for pid=30305 comm="syz.1.8214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2969.060468][ T28] audit: type=1400 audit(2000000486.448:9382): avc: denied { ioctl } for pid=30307 comm="syz.8.8215" path="/dev/vhost-vsock" dev="devtmpfs" ino=268 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 2970.891427][T29005] usb 10-1: new high-speed USB device number 6 using dummy_hcd [ 2971.392895][T30338] overlayfs: './file1' not a directory [ 2971.629360][T29005] usb 10-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2971.640527][T29005] usb 10-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2971.650446][T29005] usb 10-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 2971.663589][T29005] usb 10-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 2971.672966][T29005] usb 10-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2971.689053][T29005] usb 10-1: config 0 descriptor?? [ 2971.998209][T30346] netlink: 8 bytes leftover after parsing attributes in process `syz.6.8222'. [ 2972.313682][T30348] netlink: 68 bytes leftover after parsing attributes in process `syz.5.8224'. [ 2972.643478][ T28] audit: type=1400 audit(2000000489.466:9383): avc: denied { setopt } for pid=30343 comm="syz.5.8224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2972.678755][T29005] usbhid 10-1:0.0: can't add hid device: -71 [ 2972.686050][T29005] usbhid: probe of 10-1:0.0 failed with error -71 [ 2972.696175][T29005] usb 10-1: USB disconnect, device number 6 [ 2974.818119][T30366] syz.9.8228[30366] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2974.818216][T30366] syz.9.8228[30366] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2977.576143][ C0] ip6_tunnel: syztnl2 xmit: Local address not yet configured! [ 2979.657779][ C0] ip6_tunnel: ip6tnl2 xmit: Local address not yet configured! [ 2981.737303][ C0] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 2982.178037][T30389] netlink: 'syz.9.8231': attribute type 3 has an invalid length. [ 2982.187866][T30389] netlink: 'syz.9.8231': attribute type 3 has an invalid length. [ 2982.957879][ T28] audit: type=1400 audit(2000000498.632:9384): avc: denied { map } for pid=30380 comm="syz.9.8231" path="/dev/bus/usb/006/001" dev="devtmpfs" ino=179 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 2983.002805][ T28] audit: type=1400 audit(2000000498.632:9385): avc: denied { execute } for pid=30380 comm="syz.9.8231" path="/dev/bus/usb/006/001" dev="devtmpfs" ino=179 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 2984.549048][ T28] audit: type=1400 audit(2000000499.739:9386): avc: denied { accept } for pid=30390 comm="syz.5.8233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 2987.296177][T30428] netlink: 12 bytes leftover after parsing attributes in process `syz.8.8241'. [ 2987.596609][T30437] syz.8.8243[30437] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2987.597039][T30437] syz.8.8243[30437] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2988.676227][T30446] overlayfs: failed to clone upperpath [ 2989.344084][T30453] netlink: 552 bytes leftover after parsing attributes in process `syz.9.8244'. [ 2989.353374][T30453] netlink: 16 bytes leftover after parsing attributes in process `syz.9.8244'. [ 2997.257289][ T28] audit: type=1400 audit(2000000512.006:9387): avc: denied { link } for pid=30489 comm="syz.8.8254" name="#e7" dev="tmpfs" ino=2994 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 2997.539206][ T28] audit: type=1400 audit(2000000512.006:9388): avc: denied { rename } for pid=30489 comm="syz.8.8254" name="#e8" dev="tmpfs" ino=2994 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 3001.279856][ T28] audit: type=1400 audit(2000000514.886:9389): avc: denied { name_bind } for pid=30498 comm="syz.8.8256" src=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=udp_socket permissive=1 [ 3010.017447][T30557] netlink: 32 bytes leftover after parsing attributes in process `syz.5.8266'. [ 3010.026568][T30557] netlink: 32 bytes leftover after parsing attributes in process `syz.5.8266'. [ 3010.038429][ T28] audit: type=1400 audit(2000000524.282:9390): avc: denied { getopt } for pid=30550 comm="syz.5.8266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3010.067112][ T28] audit: type=1400 audit(2000000524.300:9391): avc: denied { shutdown } for pid=30565 comm="syz.1.8272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3010.119751][T30567] netlink: 40 bytes leftover after parsing attributes in process `syz.1.8272'. [ 3010.870083][ C0] ip6_tunnel: syztnl2 xmit: Local address not yet configured! [ 3011.515844][T30585] syz.5.8273[30585] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3011.517333][T30585] syz.5.8273[30585] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3014.325919][ C0] ip6_tunnel: ip6tnl2 xmit: Local address not yet configured! [ 3015.734896][T30599] netlink: 'syz.1.8276': attribute type 3 has an invalid length. [ 3015.742741][T30599] netlink: 'syz.1.8276': attribute type 3 has an invalid length. [ 3015.756439][T30609] netlink: 'syz.8.8281': attribute type 27 has an invalid length. [ 3015.812400][T30609] bridge0: port 2(bridge_slave_1) entered disabled state [ 3015.819670][T30609] bridge0: port 1(bridge_slave_0) entered disabled state [ 3017.099910][ C0] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 3018.053135][ T28] audit: type=1400 audit(2000000530.023:9392): avc: denied { bind } for pid=30591 comm="syz.5.8277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 3019.092006][T30612] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3022.728142][T30663] netlink: 32 bytes leftover after parsing attributes in process `syz.9.8285'. [ 3022.737611][T30663] netlink: 32 bytes leftover after parsing attributes in process `syz.9.8285'. [ 3023.792427][T30673] netlink: 'syz.5.8289': attribute type 3 has an invalid length. [ 3023.800919][T30673] netlink: 'syz.5.8289': attribute type 3 has an invalid length. [ 3024.249335][T30675] syz.1.8291[30675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3024.249743][T30675] syz.1.8291[30675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3024.798265][T30682] overlayfs: failed to clone upperpath [ 3027.653332][T30700] device macsec0 entered promiscuous mode [ 3027.659150][T30700] device bridge0 entered promiscuous mode [ 3027.665486][T30700] bridge0: port 3(macsec0) entered blocking state [ 3027.671991][T30700] bridge0: port 3(macsec0) entered disabled state [ 3027.684606][T30700] device bridge0 left promiscuous mode [ 3028.854831][T30712] block device autoloading is deprecated and will be removed. [ 3029.140053][ T28] audit: type=1400 audit(2000000541.893:9393): avc: denied { name_bind } for pid=30708 comm="syz.8.8300" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 3029.178804][ T28] audit: type=1400 audit(2000000541.902:9394): avc: denied { map } for pid=30708 comm="syz.8.8300" path="socket:[107734]" dev="sockfs" ino=107734 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3029.204773][ T28] audit: type=1400 audit(2000000541.902:9395): avc: denied { read } for pid=30708 comm="syz.8.8300" path="socket:[107734]" dev="sockfs" ino=107734 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3031.097233][ T28] audit: type=1400 audit(2000000543.443:9396): avc: denied { getopt } for pid=30722 comm="syz.9.8303" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3033.625826][T30750] netlink: 'syz.5.8308': attribute type 3 has an invalid length. [ 3033.634166][T30750] netlink: 'syz.5.8308': attribute type 3 has an invalid length. [ 3035.002433][T30760] overlayfs: failed to clone upperpath [ 3035.311173][ T28] audit: type=1400 audit(2000000547.606:9397): avc: denied { validate_trans } for pid=30762 comm="syz.8.8312" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 3037.422959][T30772] netlink: 'syz.6.8313': attribute type 3 has an invalid length. [ 3037.430877][T30772] netlink: 'syz.6.8313': attribute type 3 has an invalid length. [ 3038.704689][T30777] netlink: 32 bytes leftover after parsing attributes in process `syz.8.8315'. [ 3038.713816][T30777] netlink: 32 bytes leftover after parsing attributes in process `syz.8.8315'. [ 3039.199337][T30797] overlayfs: failed to clone upperpath [ 3040.660460][T30795] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8320'. [ 3040.670482][T30795] netlink: 12 bytes leftover after parsing attributes in process `syz.1.8320'. [ 3042.632193][T30816] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3042.866155][ T28] audit: type=1400 audit(2000000554.584:9398): avc: denied { mount } for pid=30822 comm="syz.6.8327" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 3044.644327][T30841] netlink: 28 bytes leftover after parsing attributes in process `syz.5.8339'. [ 3045.218963][T30847] syz.8.8330[30847] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3045.219976][T30847] syz.8.8330[30847] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3047.760708][T30848] netlink: 'syz.6.8329': attribute type 3 has an invalid length. [ 3047.780420][T30848] netlink: 'syz.6.8329': attribute type 3 has an invalid length. [ 3048.507905][T30842] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8330'. [ 3050.884669][T30869] netlink: 'syz.9.8334': attribute type 12 has an invalid length. [ 3053.731707][T30887] netlink: 'syz.9.8337': attribute type 3 has an invalid length. [ 3053.741474][T30887] netlink: 'syz.9.8337': attribute type 3 has an invalid length. [ 3054.523203][T30886] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8338'. [ 3055.381044][T30901] netlink: 148 bytes leftover after parsing attributes in process `syz.5.8343'. [ 3058.713181][T30905] fuse: Bad value for 'rootmode' [ 3060.295610][ T28] audit: type=1400 audit(2000000566.518:9399): avc: denied { audit_write } for pid=30892 comm="syz.9.8342" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3060.392686][ T28] audit: type=1107 audit(2000000566.518:9400): pid=30892 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 3060.406382][ T28] audit: type=1400 audit(2000000569.121:9401): avc: denied { create } for pid=30891 comm="syz.1.8341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 3066.740395][T30941] overlayfs: failed to clone upperpath [ 3066.835773][T30942] overlayfs: failed to clone lowerpath [ 3067.218733][T30947] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3069.293085][T30944] netlink: 4 bytes leftover after parsing attributes in process `syz.6.8350'. [ 3069.303362][T30944] netlink: 'syz.6.8350': attribute type 16 has an invalid length. [ 3069.311236][T30944] netlink: 'syz.6.8350': attribute type 17 has an invalid length. [ 3072.024899][T30944] tipc: Resetting bearer [ 3072.057306][T30944] bridge6: port 2(veth5) entered disabled state [ 3072.063759][T30944] bridge6: port 1(ip6gretap1) entered disabled state [ 3072.092950][T30952] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8352'. [ 3072.102194][T30953] netlink: 12 bytes leftover after parsing attributes in process `syz.1.8352'. [ 3073.192750][T30968] device bridge3 entered promiscuous mode [ 3080.534207][ T28] audit: type=1400 audit(2000000586.954:9402): avc: denied { ioctl } for pid=30995 comm="syz.5.8364" path="socket:[108167]" dev="sockfs" ino=108167 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3080.555876][T29931] ip6_tunnel: syztnl1 xmit: Local address not yet configured! [ 3080.598192][ T28] audit: type=1400 audit(2000000586.972:9403): avc: denied { bind } for pid=30995 comm="syz.5.8364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3082.196948][T29344] ip6_tunnel: syztnl1 xmit: Local address not yet configured! [ 3089.205120][T31068] syz.8.8379[31068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3089.205196][T31068] syz.8.8379[31068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3089.415274][T31069] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8379'. [ 3090.804000][T31076] netlink: 80 bytes leftover after parsing attributes in process `syz.9.8380'. [ 3093.064291][ T28] audit: type=1400 audit(2000000600.273:9404): avc: denied { mount } for pid=31078 comm="syz.8.8382" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 3093.245699][T31092] binder: 31091:31092 ioctl c00c620f 200000000140 returned -22 [ 3093.327429][T31097] netlink: 'syz.9.8384': attribute type 4 has an invalid length. [ 3094.862819][T31116] netlink: 'syz.6.8390': attribute type 3 has an invalid length. [ 3094.870930][T31116] netlink: 'syz.6.8390': attribute type 3 has an invalid length. [ 3097.223594][T31132] overlayfs: failed to clone upperpath [ 3097.470413][T31126] netlink: 12 bytes leftover after parsing attributes in process `syz.6.8393'. [ 3098.828918][T31150] syz.8.8395[31150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3098.829112][T31150] syz.8.8395[31150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3100.215579][T31157] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8395'. [ 3101.262712][ T28] audit: type=1400 audit(2000000608.478:9405): avc: denied { read } for pid=31158 comm="syz.5.8399" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3101.876508][ T28] audit: type=1400 audit(2000000609.041:9406): avc: denied { ioctl } for pid=31174 comm="syz.6.8402" path="socket:[107262]" dev="sockfs" ino=107262 ioctlcmd=0x9417 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3102.390491][T31181] netlink: 'syz.6.8402': attribute type 3 has an invalid length. [ 3102.398550][T31181] netlink: 'syz.6.8402': attribute type 3 has an invalid length. [ 3104.068015][T31178] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8403'. [ 3104.093999][T31178] netlink: 12 bytes leftover after parsing attributes in process `syz.5.8403'. [ 3105.257624][T31215] syz.1.8411[31215] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3105.258617][T31215] syz.1.8411[31215] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3106.077982][T31215] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8411'. [ 3109.848466][T31229] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=31229 comm=syz.6.8415 [ 3110.100080][T31229] netlink: 'syz.6.8415': attribute type 13 has an invalid length. [ 3110.108762][T31229] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 3110.152881][T31229] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 3110.179096][T31229] 0猉功D: refused to change device tx_queue_len [ 3110.186966][T31229] A link change request failed with some changes committed already. Interface 30猉功D may have been left with an inconsistent configuration, please check. [ 3110.790144][ T28] audit: type=1400 audit(2000000614.902:9407): avc: denied { ioctl } for pid=31220 comm="syz.8.8414" path="socket:[107307]" dev="sockfs" ino=107307 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3110.902362][ T28] audit: type=1400 audit(2000000614.902:9408): avc: denied { write } for pid=31220 comm="syz.8.8414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3110.950462][ T28] audit: type=1400 audit(2000000617.413:9409): avc: denied { read } for pid=31234 comm="syz.1.8417" name="usbmon7" dev="devtmpfs" ino=180 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 3111.200172][T31242] overlayfs: failed to clone upperpath [ 3111.298166][ T28] audit: type=1400 audit(2000000617.413:9410): avc: denied { open } for pid=31234 comm="syz.1.8417" path="/dev/usbmon7" dev="devtmpfs" ino=180 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 3112.473347][ T28] audit: type=1400 audit(2000000618.788:9411): avc: denied { map } for pid=31246 comm="syz.6.8419" path="socket:[108625]" dev="sockfs" ino=108625 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 3114.878597][ T28] audit: type=1400 audit(2000000621.040:9412): avc: denied { setopt } for pid=31256 comm="syz.1.8421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3115.170027][T31265] syz.9.8423[31265] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3115.170485][T31265] syz.9.8423[31265] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3115.544191][T31266] netlink: 4 bytes leftover after parsing attributes in process `syz.9.8423'. [ 3120.629491][T31300] overlayfs: overlapping lowerdir path [ 3120.956462][ T28] audit: type=1326 audit(2000000625.350:9413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31288 comm="syz.9.8431" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4dbb8efc9 code=0x7ffc0000 [ 3121.071150][ T28] audit: type=1326 audit(2000000625.350:9414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31288 comm="syz.9.8431" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4dbb8efc9 code=0x7ffc0000 [ 3121.164361][ T28] audit: type=1326 audit(2000000625.350:9415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31288 comm="syz.9.8431" exe="/root/syz-executor" sig=0 arch=c000003e syscall=293 compat=0 ip=0x7fe4dbb8efc9 code=0x7ffc0000 [ 3121.199397][ T28] audit: type=1326 audit(2000000625.350:9416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31288 comm="syz.9.8431" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4dbb8efc9 code=0x7ffc0000 [ 3121.223415][ T28] audit: type=1326 audit(2000000625.350:9417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31288 comm="syz.9.8431" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4dbb8efc9 code=0x7ffc0000 [ 3121.532891][T31308] netlink: 24 bytes leftover after parsing attributes in process `syz.6.8432'. [ 3121.753697][ T28] audit: type=1326 audit(2000000625.350:9418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31288 comm="syz.9.8431" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fe4dbb8efc9 code=0x7ffc0000 [ 3122.352269][ T28] audit: type=1326 audit(2000000625.350:9419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31288 comm="syz.9.8431" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4dbb8efc9 code=0x7ffc0000 [ 3122.400555][T31293] bridge0: port 1(bridge_slave_0) entered blocking state [ 3122.407651][T31293] bridge0: port 1(bridge_slave_0) entered disabled state [ 3122.462632][T31293] device bridge_slave_0 entered promiscuous mode [ 3122.471087][T30628] tipc: Disabling bearer [ 3122.476927][T30628] tipc: Left network mode [ 3122.496860][ T28] audit: type=1326 audit(2000000625.350:9420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31288 comm="syz.9.8431" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4dbb8efc9 code=0x7ffc0000 [ 3122.592461][ T28] audit: type=1326 audit(2000000625.360:9421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31288 comm="syz.9.8431" exe="/root/syz-executor" sig=0 arch=c000003e syscall=188 compat=0 ip=0x7fe4dbb8efc9 code=0x7ffc0000 [ 3122.616300][ T28] audit: type=1326 audit(2000000625.360:9422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31288 comm="syz.9.8431" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4dbb8efc9 code=0x7ffc0000 [ 3122.765027][T31318] netlink: 8 bytes leftover after parsing attributes in process `syz.8.8434'. [ 3122.781995][T31293] bridge0: port 2(bridge_slave_1) entered blocking state [ 3122.843740][T31293] bridge0: port 2(bridge_slave_1) entered disabled state [ 3122.916299][T31293] device bridge_slave_1 entered promiscuous mode [ 3124.288665][T28798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3124.300720][T28798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3124.394243][T30628] device veth0_vlan left promiscuous mode [ 3124.913941][T31348] rtc_cmos 00:00: Alarms can be up to one day in the future [ 3126.417199][T31338] platform regulatory.0: loading /lib/firmware/regulatory.db failed with error -12 [ 3126.427142][T28798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3126.437566][T28798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3126.448050][T31338] platform regulatory.0: Direct firmware load for regulatory.db failed with error -12 [ 3126.458534][T28798] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3126.478182][T28798] bridge0: port 1(bridge_slave_0) entered blocking state [ 3126.485420][T28798] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3126.509835][T28798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3126.519568][T28798] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3126.528140][T28798] bridge0: port 2(bridge_slave_1) entered blocking state [ 3126.535221][T28798] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3126.542946][T28798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3126.551366][T28798] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3126.559471][T28798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3126.567768][T28798] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3127.009067][T28798] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3127.083782][T31354] bridge0: port 3(vlan2) entered blocking state [ 3127.137842][T31354] bridge0: port 3(vlan2) entered disabled state [ 3127.200653][T31365] syz.6.8443[31365] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3127.200739][T31365] syz.6.8443[31365] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3127.917445][T31369] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3128.026741][T31369] device veth0_vlan left promiscuous mode [ 3128.033456][T31369] device veth0_vlan entered promiscuous mode [ 3128.062614][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3128.070467][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3128.078233][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3128.087787][T15816] bridge0: port 1(bridge_slave_0) entered blocking state [ 3128.094925][T15816] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3128.102525][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3128.111159][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3128.123497][T15816] bridge0: port 2(bridge_slave_1) entered blocking state [ 3128.130614][T15816] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3128.147008][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3128.157985][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 3128.166274][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3128.174536][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 3128.182625][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3128.191051][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3128.199825][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3128.699560][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3128.709418][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3128.719335][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3128.728997][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3128.738949][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3128.754760][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3128.764793][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3128.774483][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3128.784068][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3128.793952][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3128.803887][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3128.814368][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3128.825842][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3128.836739][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3128.845941][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan.4094: link becomes ready [ 3128.856159][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3128.992994][T31293] device veth0_vlan entered promiscuous mode [ 3129.054573][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3129.062443][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3129.070528][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3129.079429][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3129.104518][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3129.149859][T31293] device veth1_macvtap entered promiscuous mode [ 3129.158340][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3129.166859][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3129.175514][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3130.562228][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3130.590286][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3131.797875][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3131.806553][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3132.289043][T31400] veth1_to_bridge: Caught tx_queue_len zero misconfig [ 3132.832826][T31412] 9pnet_fd: Insufficient options for proto=fd [ 3133.829222][T31418] loop2: detected capacity change from 0 to 256 [ 3133.877077][T31418] exfat: Deprecated parameter 'namecase' [ 3133.935219][T31418] exfat: Deprecated parameter 'utf8' [ 3133.953491][T31418] exfat: Deprecated parameter 'namecase' [ 3133.969604][T31418] exfat: Deprecated parameter 'utf8' [ 3134.050661][T31424] netlink: 4 bytes leftover after parsing attributes in process `syz.6.8454'. [ 3135.061960][T31418] exFAT-fs (loop2): failed to load upcase table (idx : 0x00012153, chksum : 0x555ffa9e, utbl_chksum : 0xe619d30d) [ 3137.018097][ T28] kauditd_printk_skb: 17 callbacks suppressed [ 3137.018114][ T28] audit: type=1400 audit(2000000641.485:9440): avc: denied { write } for pid=31417 comm="syz.2.8428" name="/" dev="loop2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 3137.389500][ T28] audit: type=1400 audit(2000000641.485:9441): avc: denied { add_name } for pid=31417 comm="syz.2.8428" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 3137.439088][ T28] audit: type=1400 audit(2000000641.485:9442): avc: denied { create } for pid=31417 comm="syz.2.8428" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 3137.516577][ T28] audit: type=1400 audit(2000000641.485:9443): avc: denied { associate } for pid=31417 comm="syz.2.8428" name="file0" scontext=root:object_r:unlabeled_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 3138.769327][T31453] netlink: 4 bytes leftover after parsing attributes in process `syz.6.8463'. [ 3138.780247][T31453] device 30猉功D entered promiscuous mode [ 3138.786102][T31453] device macsec2 entered promiscuous mode [ 3138.793226][T31453] device 30猉功D left promiscuous mode [ 3138.802083][T31454] netlink: 'syz.8.8462': attribute type 3 has an invalid length. [ 3138.810196][T31454] netlink: 'syz.8.8462': attribute type 3 has an invalid length. [ 3143.125698][T31479] loop2: detected capacity change from 0 to 512 [ 3143.132435][T31479] EXT4-fs: Ignoring removed nomblk_io_submit option [ 3143.459510][T31468] overlayfs: failed to clone upperpath [ 3144.544457][T31475] fuse: Bad value for 'rootmode' [ 3144.634285][T31476] block device autoloading is deprecated and will be removed. [ 3144.642185][T31476] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 1 [ 3144.651477][T31476] FAT-fs (loop3): unable to read boot sector [ 3144.801525][T31479] EXT4-fs warning (device loop2): ext4_multi_mount_protect:404: Unable to create kmmpd thread for loop2. [ 3146.664760][T31504] netlink: 4 bytes leftover after parsing attributes in process `syz.9.8470'. [ 3146.674906][T31504] netlink: 12 bytes leftover after parsing attributes in process `syz.9.8470'. [ 3151.556321][T31525] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8478'. [ 3151.572325][T31530] netlink: 12 bytes leftover after parsing attributes in process `syz.8.8478'. [ 3151.683579][T31541] loop2: detected capacity change from 0 to 128 [ 3151.752884][T31541] FAT-fs (loop2): Unrecognized mount option "0xffffffffffffffff01777777777777777777777瑐=ㄋd虨 Y狚S38`糠槒泜" or missing value [ 3153.102783][T31548] loop2: detected capacity change from 0 to 1024 [ 3153.214872][T31548] EXT4-fs: Ignoring removed nobh option [ 3153.220522][T31548] EXT4-fs: Ignoring removed bh option [ 3153.230937][T31548] EXT4-fs: Ignoring removed bh option [ 3153.437911][T31548] EXT4-fs: Mount option(s) incompatible with ext3 [ 3154.915471][T31549] bridge0: port 3(vlan0) entered blocking state [ 3154.954742][ T28] audit: type=1326 audit(2000000658.025:9444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31559 comm="syz.6.8486" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f006178efc9 code=0x7fc00000 [ 3155.055569][T31549] bridge0: port 3(vlan0) entered disabled state [ 3155.071817][ T28] audit: type=1326 audit(2000000658.145:9445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31559 comm="syz.6.8486" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f006178efc9 code=0x7fc00000 [ 3155.419844][T31582] netlink: 48 bytes leftover after parsing attributes in process `syz.9.8487'. [ 3155.647619][ T28] audit: type=1326 audit(2000000658.634:9446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31559 comm="syz.6.8486" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f006178efc9 code=0x7fc00000 [ 3156.448703][T31588] netlink: 4 bytes leftover after parsing attributes in process `syz.6.8489'. [ 3156.470910][T31588] netlink: 12 bytes leftover after parsing attributes in process `syz.6.8489'. [ 3157.853853][T31594] overlayfs: overlapping lowerdir path [ 3158.627908][ T28] audit: type=1400 audit(2000000661.394:9447): avc: denied { nlmsg_read } for pid=31591 comm="syz.1.8491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 3158.803658][ T28] audit: type=1400 audit(2000000661.394:9448): avc: denied { append } for pid=31591 comm="syz.1.8491" name="event1" dev="devtmpfs" ino=261 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 3158.903246][T31607] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8492'. [ 3158.914002][T31607] device gretap0 entered promiscuous mode [ 3158.919843][T31607] device macsec1 entered promiscuous mode [ 3158.927275][T31607] device gretap0 left promiscuous mode [ 3159.422761][T31610] loop2: detected capacity change from 0 to 512 [ 3160.965555][T31610] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 3160.974761][T31610] ext4 filesystem being mounted at /7/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 3161.072036][T31624] netlink: 132 bytes leftover after parsing attributes in process `syz.9.8493'. [ 3162.074074][T31293] EXT4-fs (loop2): unmounting filesystem. [ 3162.368555][T31635] loop2: detected capacity change from 0 to 128 [ 3162.388088][ T28] audit: type=1400 audit(2000000664.901:9449): avc: denied { mount } for pid=31634 comm="syz.2.8499" name="/" dev="loop2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 3164.337714][ T28] audit: type=1400 audit(2000000666.304:9450): avc: denied { unmount } for pid=31293 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 3168.460922][T31679] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8509'. [ 3168.473392][T31679] device gretap0 entered promiscuous mode [ 3168.479269][T31679] device macsec1 entered promiscuous mode [ 3168.826575][T31681] loop2: detected capacity change from 0 to 512 [ 3171.272856][T31679] device gretap0 left promiscuous mode [ 3171.282193][T31685] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8505'. [ 3171.292268][T31685] netlink: 12 bytes leftover after parsing attributes in process `syz.8.8505'. [ 3172.484377][T31681] EXT4-fs warning (device loop2): ext4_multi_mount_protect:404: Unable to create kmmpd thread for loop2. [ 3172.852559][T31692] syz.6.8511[31692] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3172.852653][T31692] syz.6.8511[31692] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3173.904315][T31696] device batadv_slave_0 entered promiscuous mode [ 3174.122670][T31699] loop2: detected capacity change from 0 to 512 [ 3174.129604][T31699] FAT-fs (loop2): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 3174.186796][T31688] device batadv_slave_0 left promiscuous mode [ 3174.789341][T31697] netlink: 4 bytes leftover after parsing attributes in process `syz.6.8511'. [ 3176.040232][T31713] tipc: Started in network mode [ 3176.045238][T31713] tipc: Node identity ac14140f, cluster identity 4711 [ 3176.052378][T31713] tipc: New replicast peer: 255.255.255.255 [ 3176.058651][T31713] tipc: Enabled bearer , priority 1 [ 3179.360710][T29438] tipc: Node number set to 2886997007 [ 3179.372153][T31719] binder: 31714:31719 ioctl c0306201 200000000680 returned -14 [ 3179.606808][T31726] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3179.614419][T31726] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3179.640669][T31726] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3180.181186][T31734] overlayfs: failed to clone upperpath [ 3181.813625][T31743] netlink: 4 bytes leftover after parsing attributes in process `syz.9.8524'. [ 3181.858968][T31743] device gretap0 entered promiscuous mode [ 3181.864770][T31743] device macsec0 entered promiscuous mode [ 3181.933372][T31743] device gretap0 left promiscuous mode [ 3182.210987][T31753] netlink: 'syz.1.8525': attribute type 13 has an invalid length. [ 3182.644615][ T28] audit: type=1400 audit(2000000683.186:9451): avc: denied { mounton } for pid=31745 comm="syz.1.8525" path="/file0" dev="bpf" ino=109518 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=dir permissive=1 [ 3182.705550][ T28] audit: type=1400 audit(2000000683.352:9452): avc: denied { connect } for pid=31748 comm="syz.6.8526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 3182.759071][T31753] bridge0: port 2(bridge_slave_1) entered disabled state [ 3182.766407][T31753] bridge0: port 1(bridge_slave_0) entered disabled state [ 3182.867176][T31758] syz.8.8527[31758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3182.867516][T31758] syz.8.8527[31758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3184.597488][T31759] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8527'. [ 3184.832781][T31774] netlink: 4 bytes leftover after parsing attributes in process `syz.6.8529'. [ 3185.198703][ T28] audit: type=1400 audit(2000000685.604:9453): avc: denied { setopt } for pid=31765 comm="syz.6.8529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3185.444140][T31778] netlink: 4 bytes leftover after parsing attributes in process `syz.9.8531'. [ 3185.466665][T31778] netlink: 'syz.9.8531': attribute type 16 has an invalid length. [ 3185.474673][T31778] netlink: 'syz.9.8531': attribute type 17 has an invalid length. [ 3185.524726][T31778] bridge0: port 3(syz_tun) entered disabled state [ 3185.565066][T31778] bridge0: port 2(bridge_slave_1) entered disabled state [ 3185.572348][T31778] bridge0: port 1(bridge_slave_0) entered disabled state [ 3189.774235][ T28] audit: type=1400 audit(2000000690.173:9454): avc: denied { setopt } for pid=31822 comm="syz.9.8543" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3190.339656][T31828] loop2: detected capacity change from 0 to 512 [ 3190.362887][ T28] audit: type=1400 audit(2000000690.404:9455): avc: denied { mount } for pid=31822 comm="syz.9.8543" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 3190.447134][T31828] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 3190.949064][T31828] EXT4-fs (loop2): orphan cleanup on readonly fs [ 3190.960238][T31828] EXT4-fs error (device loop2): ext4_validate_block_bitmap:438: comm syz.2.8542: bg 0: block 248: padding at end of block bitmap is not set [ 3190.976552][T31828] Quota error (device loop2): write_blk: dquota write failed [ 3190.984269][T31828] Quota error (device loop2): qtree_write_dquot: Error -117 occurred while creating quota [ 3190.994339][T31828] EXT4-fs error (device loop2): ext4_acquire_dquot:6803: comm syz.2.8542: Failed to acquire dquot type 1 [ 3191.012793][T31828] EXT4-fs (loop2): 1 truncate cleaned up [ 3191.019941][T31828] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 3191.051230][T31828] EXT4-fs error (device loop2): ext4_lookup:1862: inode #2: comm syz.2.8542: deleted inode referenced: 12 [ 3191.081537][T31828] EXT4-fs error (device loop2): ext4_lookup:1862: inode #2: comm syz.2.8542: deleted inode referenced: 12 [ 3192.798751][T31840] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8544'. [ 3192.809648][T31840] device 30猉功D entered promiscuous mode [ 3192.815648][T31840] device macsec0 entered promiscuous mode [ 3192.824013][T31840] device 30猉功D left promiscuous mode [ 3192.862426][T31293] EXT4-fs (loop2): unmounting filesystem. [ 3192.869288][T31842] syz.6.8546[31842] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3192.869385][T31842] syz.6.8546[31842] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3196.539917][T31854] loop2: detected capacity change from 0 to 1024 [ 3196.765995][T31854] EXT4-fs error (device loop2): ext4_read_block_bitmap_nowait:477: comm syz.2.8548: Invalid block bitmap block 0 in block_group 0 [ 3196.949650][T31854] Quota error (device loop2): write_blk: dquota write failed [ 3196.957461][T31854] Quota error (device loop2): qtree_write_dquot: Error -117 occurred while creating quota [ 3196.968223][T31854] EXT4-fs error (device loop2): ext4_acquire_dquot:6803: comm syz.2.8548: Failed to acquire dquot type 0 [ 3196.980887][T31854] EXT4-fs error (device loop2): ext4_free_blocks:6205: comm syz.2.8548: Freeing blocks not in datazone - block = 0, count = 4096 [ 3196.995346][T31854] EXT4-fs error (device loop2): ext4_read_inode_bitmap:140: comm syz.2.8548: Invalid inode bitmap blk 0 in block_group 0 [ 3197.008538][T15816] Quota error (device loop2): do_check_range: Getting block 0 out of range 1-8 [ 3197.018199][T31854] EXT4-fs error (device loop2) in ext4_free_inode:362: Corrupt filesystem [ 3197.028374][T31854] EXT4-fs (loop2): 1 orphan inode deleted [ 3197.034257][T31854] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 3197.080355][T15816] EXT4-fs error (device loop2): ext4_release_dquot:6839: comm kworker/u4:150: Failed to release dquot type 0 [ 3197.732237][ T28] audit: type=1400 audit(2000000697.520:9456): avc: denied { block_suspend } for pid=31863 comm="syz.6.8552" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3197.826849][T31869] netlink: 24 bytes leftover after parsing attributes in process `syz.6.8552'. [ 3197.924981][T31872] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 3197.932260][T31872] IPv6: NLM_F_CREATE should be set when creating new route [ 3197.976836][T31870] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 3198.142171][T31876] syz.9.8553[31876] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3198.142254][T31876] syz.9.8553[31876] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3198.154744][ T28] audit: type=1400 audit(2000000697.741:9457): avc: denied { mount } for pid=31863 comm="syz.6.8552" name="/" dev="configfs" ino=13236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 3198.251926][T31293] EXT4-fs (loop2): unmounting filesystem. [ 3198.271263][T31877] netlink: 4 bytes leftover after parsing attributes in process `syz.9.8553'. [ 3200.266833][T31893] loop2: detected capacity change from 0 to 512 [ 3200.328252][T31893] EXT4-fs: Ignoring removed oldalloc option [ 3202.331824][T31916] netlink: 60 bytes leftover after parsing attributes in process `syz.8.8561'. [ 3202.838704][ T28] audit: type=1400 audit(2000000701.784:9458): avc: denied { write } for pid=31905 comm="syz.8.8561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 3203.175862][T31924] netlink: 4 bytes leftover after parsing attributes in process `syz.9.8560'. [ 3203.186615][T31924] device macsec0 entered promiscuous mode [ 3203.192423][T31924] device gretap0 entered promiscuous mode [ 3203.199222][T31924] device gretap0 left promiscuous mode [ 3204.365590][ T28] audit: type=1400 audit(2000000703.649:9459): avc: denied { bind } for pid=31927 comm="syz.1.8566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3211.393241][T31943] loop2: detected capacity change from 0 to 512 [ 3211.643825][T31943] EXT4-fs: failed to create workqueue [ 3211.649312][T31943] EXT4-fs (loop2): mount failed [ 3212.761177][T31965] ip6tnl0: Caught tx_queue_len zero misconfig [ 3212.767979][T31965] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8572'. [ 3213.394098][T31954] 9pnet: Could not find request transport: fd0x0000000000000006 [ 3213.661424][T31954] 9pnet_fd: Insufficient options for proto=fd [ 3213.928794][T31982] overlayfs: failed to clone lowerpath [ 3214.359036][ T28] audit: type=1400 audit(2000000712.860:9460): avc: denied { mount } for pid=31985 comm="syz.1.8580" name="/" dev="pstore" ino=13945 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 3214.424397][T31993] netlink: 'syz.2.8579': attribute type 4 has an invalid length. [ 3214.921052][T31997] cgroup: No subsys list or none specified [ 3215.389179][T32000] xt_hashlimit: max too large, truncated to 1048576 [ 3215.897074][T31987] binder: BINDER_SET_CONTEXT_MGR already set [ 3215.903115][T31987] binder: 31984:31987 ioctl 4018620d 200000004a80 returned -16 [ 3216.011506][T32002] loop2: detected capacity change from 0 to 512 [ 3216.062574][T32002] FAT-fs (loop2): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 3216.078808][ T28] audit: type=1400 audit(2000000714.457:9461): avc: denied { unmount } for pid=29530 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 3216.314304][T32008] syz.2.8582[32008] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3216.314384][T32008] syz.2.8582[32008] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3218.506511][ T28] audit: type=1400 audit(2000000716.691:9462): avc: denied { search } for pid=32011 comm="syz.1.8586" name="/" dev="configfs" ino=13236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 3219.242942][T32015] tty tty22: ldisc open failed (-12), clearing slot 21 [ 3219.339844][ T28] audit: type=1400 audit(2000000716.691:9463): avc: denied { setattr } for pid=32011 comm="syz.1.8586" name="/" dev="configfs" ino=13236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 3219.883892][T32029] overlayfs: failed to resolve './file2': -2 [ 3220.156899][T32030] device bridge_slave_0 left promiscuous mode [ 3220.164646][T32030] bridge0: port 1(bridge_slave_0) entered disabled state [ 3220.191191][T32030] device bridge_slave_1 left promiscuous mode [ 3220.197402][T32030] bridge0: port 2(bridge_slave_1) entered disabled state [ 3220.241257][T32028] netlink: 212 bytes leftover after parsing attributes in process `syz.1.8587'. [ 3220.466337][ T28] audit: type=1400 audit(2000000718.500:9464): avc: denied { create } for pid=32025 comm="syz.2.8590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 3221.407194][T32044] netlink: 4 bytes leftover after parsing attributes in process `syz.9.8588'. [ 3221.418243][T32044] device macsec0 entered promiscuous mode [ 3221.424126][T32044] device gretap0 entered promiscuous mode [ 3221.431528][T32044] device gretap0 left promiscuous mode [ 3223.716188][T32060] syz.1.8595[32060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3223.716274][T32060] syz.1.8595[32060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3226.696599][T32049] netlink: 'syz.2.8592': attribute type 5 has an invalid length. [ 3230.512946][T32079] loop2: detected capacity change from 0 to 256 [ 3230.520686][ T28] audit: type=1400 audit(2000000727.785:9465): avc: denied { mounton } for pid=32073 comm="syz.2.8599" path="/syzcgroup/unified/syz2" dev="cgroup2" ino=93 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 3230.945079][T32094] netlink: 8 bytes leftover after parsing attributes in process `syz.9.8603'. [ 3231.545967][T32079] exFAT-fs (loop2): failed to load upcase table (idx : 0x00010000, chksum : 0xf6dff195, utbl_chksum : 0xe619d30d) [ 3231.637750][ T28] audit: type=1400 audit(2000000728.348:9466): avc: denied { create } for pid=32085 comm="syz.9.8603" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3232.971511][ T28] audit: type=1326 audit(2000000730.009:9467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32087 comm="syz.6.8602" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f006178efc9 code=0x7ffc0000 [ 3233.196802][ T28] audit: type=1326 audit(2000000730.009:9468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32087 comm="syz.6.8602" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f006178efc9 code=0x7ffc0000 [ 3233.220956][ T28] audit: type=1326 audit(2000000730.009:9469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32087 comm="syz.6.8602" exe="/root/syz-executor" sig=0 arch=c000003e syscall=229 compat=0 ip=0x7f006178efc9 code=0x7ffc0000 [ 3233.384701][T32118] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8607'. [ 3233.412875][T32118] netlink: 12 bytes leftover after parsing attributes in process `syz.2.8607'. [ 3233.607538][T32118] netlink: 3 bytes leftover after parsing attributes in process `syz.2.8607'. [ 3234.143527][ T28] audit: type=1326 audit(2000000730.009:9470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32087 comm="syz.6.8602" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f006178efc9 code=0x7ffc0000 [ 3234.262912][T32124] tipc: Enabling of bearer rejected, already enabled [ 3234.524508][T32121] netlink: 180 bytes leftover after parsing attributes in process `syz.6.8610'. [ 3234.535592][T32121] netlink: 180 bytes leftover after parsing attributes in process `syz.6.8610'. [ 3234.542393][ T28] audit: type=1326 audit(2000000730.009:9471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32087 comm="syz.6.8602" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f006178efc9 code=0x7ffc0000 [ 3234.657728][ T28] audit: type=1326 audit(2000000730.009:9472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32087 comm="syz.6.8602" exe="/root/syz-executor" sig=0 arch=c000003e syscall=53 compat=0 ip=0x7f006178efc9 code=0x7ffc0000 [ 3236.071828][ T28] audit: type=1326 audit(2000000730.009:9473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32087 comm="syz.6.8602" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f006178efc9 code=0x7ffc0000 [ 3237.013063][ T28] audit: type=1326 audit(2000000730.009:9474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32087 comm="syz.6.8602" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f006178efc9 code=0x7ffc0000 [ 3237.037170][ T28] audit: type=1326 audit(2000000730.009:9475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32087 comm="syz.6.8602" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f006178efc9 code=0x7ffc0000 [ 3237.489181][ T28] audit: type=1326 audit(2000000730.009:9476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32087 comm="syz.6.8602" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f006178efc9 code=0x7ffc0000 [ 3237.707205][ T28] audit: type=1326 audit(2000000730.009:9477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32087 comm="syz.6.8602" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f006178efc9 code=0x7ffc0000 [ 3237.731939][ T28] audit: type=1326 audit(2000000730.028:9478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32087 comm="syz.6.8602" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f006178efc9 code=0x7ffc0000 [ 3237.792754][ T28] audit: type=1400 audit(2000000732.585:9479): avc: denied { getopt } for pid=32111 comm="syz.9.8609" lport=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3239.450300][ T28] audit: type=1400 audit(2000000733.046:9480): avc: denied { bind } for pid=32128 comm="syz.8.8612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3239.519202][ T28] audit: type=1400 audit(2000000734.412:9481): avc: denied { map } for pid=32143 comm="syz.2.8615" path="/proc/131/net/vlan/vlan0" dev="proc" ino=4026532660 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 3239.990599][ T28] audit: type=1400 audit(2000000736.526:9482): avc: denied { map } for pid=32167 comm="syz.1.8618" path="/dev/ashmem" dev="devtmpfs" ino=269 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3248.902638][T32206] fuse: Bad value for 'fd' [ 3250.193992][T32218] xt_policy: input policy not valid in POSTROUTING and OUTPUT [ 3250.304165][ T28] audit: type=1400 audit(2000000746.033:9483): avc: denied { listen } for pid=32212 comm="syz.8.8629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3250.920758][ T28] audit: type=1400 audit(2000000746.042:9484): avc: denied { getopt } for pid=32212 comm="syz.8.8629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 3251.307754][T32229] netlink: 4 bytes leftover after parsing attributes in process `syz.9.8631'. [ 3254.073130][T32229] device macsec0 entered promiscuous mode [ 3254.195686][T32229] device gretap0 entered promiscuous mode [ 3254.206741][T32229] device gretap0 left promiscuous mode [ 3254.231544][T32234] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8632'. [ 3254.244429][T32237] netlink: 'syz.8.8632': attribute type 16 has an invalid length. [ 3254.252341][T32237] netlink: 'syz.8.8632': attribute type 17 has an invalid length. [ 3254.292670][T32237] bridge0: port 2(bridge_slave_1) entered disabled state [ 3254.299981][T32237] bridge0: port 1(bridge_slave_0) entered disabled state [ 3258.401298][T32251] bridge0: port 1(bridge_slave_0) entered blocking state [ 3258.419356][T32251] bridge0: port 1(bridge_slave_0) entered disabled state [ 3258.433939][T32251] device bridge_slave_0 entered promiscuous mode [ 3258.441082][T32251] bridge0: port 2(bridge_slave_1) entered blocking state [ 3258.464422][T32251] bridge0: port 2(bridge_slave_1) entered disabled state [ 3258.520047][T32251] device bridge_slave_1 entered promiscuous mode [ 3258.527250][T28798] device bridge_slave_1 left promiscuous mode [ 3258.534064][T28798] bridge0: port 2(bridge_slave_1) entered disabled state [ 3258.541890][T28798] device bridge_slave_0 left promiscuous mode [ 3258.548114][T28798] bridge0: port 1(bridge_slave_0) entered disabled state [ 3258.556527][T28798] device veth1_macvtap left promiscuous mode [ 3258.562832][T28798] device veth0_vlan left promiscuous mode [ 3260.490774][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3260.498682][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3260.515069][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3262.825110][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3262.845129][T15816] bridge0: port 1(bridge_slave_0) entered blocking state [ 3262.852272][T15816] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3262.874219][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3262.882783][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3262.896167][T15816] bridge0: port 2(bridge_slave_1) entered blocking state [ 3262.903297][T15816] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3262.911199][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3262.924444][T32300] netlink: 'syz.8.8641': attribute type 13 has an invalid length. [ 3262.973549][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3262.986168][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3263.005097][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3263.029066][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3263.074499][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3263.131831][ T28] audit: type=1326 audit(2000000757.884:9485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32282 comm="syz.1.8640" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff6eef8efc9 code=0x7fc00000 [ 3263.157045][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3263.944460][T32315] fuse: Bad value for 'fd' [ 3264.304633][ T28] audit: type=1326 audit(2000000758.964:9486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32282 comm="syz.1.8640" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff6eef8efc9 code=0x7fc00000 [ 3264.333626][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3264.345526][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3264.704291][T32319] team_slave_1: Caught tx_queue_len zero misconfig [ 3264.741437][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3264.768153][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3264.785968][T32251] device veth0_vlan entered promiscuous mode [ 3269.482630][T32251] device veth1_macvtap entered promiscuous mode [ 3272.817377][T32333] platform regulatory.0: loading /lib/firmware/regulatory.db failed with error -12 [ 3272.818333][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3272.826799][T32333] platform regulatory.0: Direct firmware load for regulatory.db failed with error -12 [ 3272.904859][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3272.923546][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3272.931519][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3272.940171][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3272.949112][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3272.960843][T15816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3276.824048][T32352] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8652'. [ 3276.845201][T32357] platform regulatory.0: loading /lib/firmware/regulatory.db failed with error -12 [ 3276.854621][T32357] platform regulatory.0: Direct firmware load for regulatory.db failed with error -12 [ 3278.095005][T32388] netlink: 'syz.6.8660': attribute type 4 has an invalid length. [ 3280.722488][T32413] syz.1.8668[32413] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3280.722570][T32413] syz.1.8668[32413] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3280.830303][T32418] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8668'. [ 3288.592156][ T28] audit: type=1400 audit(2000000781.384:9487): avc: denied { search } for pid=32423 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3288.641905][ T28] audit: type=1400 audit(2000000781.384:9488): avc: denied { getattr } for pid=32423 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf/eth0.dhcp" dev="tmpfs" ino=502 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3288.714220][ T28] audit: type=1400 audit(2000000781.384:9489): avc: denied { write } for pid=32432 comm="rm" name="resolv.conf" dev="tmpfs" ino=493 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3288.820897][ T28] audit: type=1400 audit(2000000781.384:9490): avc: denied { remove_name } for pid=32432 comm="rm" name="eth0.dhcp" dev="tmpfs" ino=502 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3289.203543][T32457] rtc_cmos 00:00: Alarms can be up to one day in the future [ 3289.240628][ T28] audit: type=1400 audit(2000000781.384:9491): avc: denied { unlink } for pid=32432 comm="rm" name="eth0.dhcp" dev="tmpfs" ino=502 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3289.335192][ T28] audit: type=1400 audit(2000000781.384:9492): avc: denied { getattr } for pid=32423 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=493 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3289.709953][ T28] audit: type=1400 audit(2000000781.384:9493): avc: denied { add_name } for pid=32423 comm="dhcpcd-run-hook" name="eth0.dhcp" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3289.924722][ T28] audit: type=1400 audit(2000000781.384:9494): avc: denied { create } for pid=32423 comm="dhcpcd-run-hook" name="eth0.dhcp" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3290.038936][ T28] audit: type=1400 audit(2000000781.384:9495): avc: denied { write open } for pid=32423 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf/eth0.dhcp" dev="tmpfs" ino=18218 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3290.149215][ T28] audit: type=1400 audit(2000000781.384:9496): avc: denied { read } for pid=32433 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=493 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3293.145349][T32485] syz.8.8682[32485] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3293.145435][T32485] syz.8.8682[32485] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3293.214146][T32486] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8682'. [ 3295.725260][T32518] netlink: 72 bytes leftover after parsing attributes in process `syz.7.8689'. [ 3296.044419][T32532] syz.1.8698[32532] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3296.045073][T32532] syz.1.8698[32532] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3296.592839][T32532] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8698'. [ 3297.548566][T32551] I/O error, dev loop15, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 1 [ 3297.558083][T32551] FAT-fs (loop15): unable to read boot sector [ 3299.705123][T32582] rtc_cmos 00:00: Alarms can be up to one day in the future [ 3302.527759][T32610] I/O error, dev loop19, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 1 [ 3302.537141][T32610] FAT-fs (loop19): unable to read boot sector [ 3303.229087][T32612] rtc_cmos 00:00: Alarms can be up to one day in the future [ 3303.612763][T32620] I/O error, dev loop19, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 1 [ 3303.622071][T32620] FAT-fs (loop19): unable to read boot sector [ 3304.054815][T30994] usb 8-1: new high-speed USB device number 18 using dummy_hcd [ 3305.486887][T30994] usb 8-1: unable to get BOS descriptor or descriptor too short [ 3305.495938][T30994] usb 8-1: config 16 has an invalid interface number: 168 but max is 0 [ 3305.504352][T30994] usb 8-1: config 16 has no interface number 0 [ 3305.510826][T30994] usb 8-1: config 16 interface 168 has no altsetting 0 [ 3305.519754][T30994] usb 8-1: New USB device found, idVendor=0403, idProduct=da72, bcdDevice=d8.b8 [ 3305.529053][T30994] usb 8-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3305.537246][T30994] usb 8-1: Product: syz [ 3305.542073][T30994] usb 8-1: Manufacturer: syz [ 3305.546939][T30994] usb 8-1: SerialNumber: syz [ 3306.822416][T30994] usb 8-1: NDI device with a latency value of 1 [ 3306.873479][T30994] ftdi_sio 8-1:16.168: FTDI USB Serial Device converter detected [ 3306.904730][T30994] ftdi_sio ttyUSB0: unknown device type: 0xd8b8 [ 3306.920230][T30994] usb 8-1: USB disconnect, device number 18 [ 3306.922466][T30994] ftdi_sio 8-1:16.168: device disconnected [ 3307.184741][T32661] rtc_cmos 00:00: Alarms can be up to one day in the future [ 3307.883003][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 3307.883186][ T28] audit: type=1400 audit(2000000799.133:9500): avc: denied { write } for pid=32663 comm="syz.1.8736" name="usbmon8" dev="devtmpfs" ino=183 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 3308.625497][T32685] I/O error, dev loop17, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 1 [ 3308.635182][T32685] FAT-fs (loop17): unable to read boot sector [ 3309.368976][T32688] netlink: 4 bytes leftover after parsing attributes in process `syz.9.8740'. [ 3310.678468][T32703] syz.6.8745[32703] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3310.678556][T32703] syz.6.8745[32703] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3310.794762][T32706] netlink: 4 bytes leftover after parsing attributes in process `syz.6.8745'. [ 3310.820835][T32706] tipc: Disabling bearer [ 3312.598217][T32729] I/O error, dev loop19, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 1 [ 3312.607560][T32729] FAT-fs (loop19): unable to read boot sector [ 3314.060725][T32748] syz.6.8759[32748] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3314.060813][T32748] syz.6.8759[32748] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3314.129764][T32750] netlink: 4 bytes leftover after parsing attributes in process `syz.6.8759'. [ 3314.858034][T32757] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8772'. [ 3314.903241][T32757] device macsec0 entered promiscuous mode [ 3314.909088][T32757] device 30猉功D entered promiscuous mode [ 3315.496714][T32757] device 30猉功D left promiscuous mode [ 3316.133644][ T303] I/O error, dev loop17, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 1 [ 3316.143398][ T303] FAT-fs (loop17): unable to read boot sector [ 3317.159331][ T311] netlink: 68 bytes leftover after parsing attributes in process `syz.6.8767'. [ 3317.169158][ T310] netlink: 16 bytes leftover after parsing attributes in process `syz.9.8769'. [ 3317.686412][ T322] syz.6.8771[322] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3317.686890][ T322] syz.6.8771[322] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3317.773850][ T323] netlink: 4 bytes leftover after parsing attributes in process `syz.6.8771'. [ 3320.406606][ T28] audit: type=1400 audit(2000000810.753:9501): avc: denied { ioctl } for pid=338 comm="syz.8.8778" path="/dev/input/event2" dev="devtmpfs" ino=275 ioctlcmd=0x4501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 3320.515607][ T337] syz.9.8777[337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3320.516020][ T337] syz.9.8777[337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3320.684938][ T341] netlink: 4 bytes leftover after parsing attributes in process `syz.9.8777'. [ 3323.944898][ T387] syz.7.8791[387] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3323.944986][ T387] syz.7.8791[387] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3324.060940][ T388] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8791'. [ 3324.345457][ T394] netlink: 4 bytes leftover after parsing attributes in process `syz.9.8793'. [ 3324.412536][ T394] device macsec0 entered promiscuous mode [ 3324.436664][ T394] device gretap0 entered promiscuous mode [ 3324.457267][ T394] device gretap0 left promiscuous mode [ 3326.974432][ T28] audit: type=1400 audit(2000000816.818:9502): avc: denied { write } for pid=424 comm="syz.8.8804" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 3327.521788][ T28] audit: type=1400 audit(2000000816.845:9503): avc: denied { open } for pid=424 comm="syz.8.8804" path="/dev/vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 3332.996623][ T469] rtc_cmos 00:00: Alarms can be up to one day in the future [ 3337.289791][ T500] netlink: 180 bytes leftover after parsing attributes in process `syz.7.8825'. [ 3337.301257][ T500] netlink: 180 bytes leftover after parsing attributes in process `syz.7.8825'. [ 3338.481254][ T514] rtc_cmos 00:00: Alarms can be up to one day in the future [ 3340.628738][ T519] random: crng reseeded on system resumption [ 3340.728757][ T519] Unrecognized hibernate image header format! [ 3340.751868][ T523] netlink: 4 bytes leftover after parsing attributes in process `syz.9.8833'. [ 3340.756931][ T519] PM: hibernation: Image mismatch: architecture specific data [ 3340.762953][ T523] device macsec0 entered promiscuous mode [ 3340.774018][ T523] device gretap0 entered promiscuous mode [ 3340.780389][ T523] device gretap0 left promiscuous mode [ 3343.112031][ T28] audit: type=1400 audit(2000000831.706:9504): avc: denied { append } for pid=559 comm="syz.8.8845" name="snapshot" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 3343.135416][ T562] random: crng reseeded on system resumption [ 3343.887006][ T570] netlink: 4 bytes leftover after parsing attributes in process `syz.6.8847'. [ 3343.898593][ T570] device 30猉功D entered promiscuous mode [ 3343.904525][ T570] device macsec0 entered promiscuous mode [ 3343.944608][ T573] rtc_cmos 00:00: Alarms can be up to one day in the future [ 3343.956704][ T570] device 30猉功D left promiscuous mode [ 3345.132425][T22818] kworker/dying (22818) used greatest stack depth: 19488 bytes left [ 3345.808353][ T606] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8860'. [ 3345.819164][ T606] device macsec0 entered promiscuous mode [ 3345.825042][ T606] device 30猉功D entered promiscuous mode [ 3345.843218][ T606] device 30猉功D left promiscuous mode [ 3346.563740][ T618] I/O error, dev loop19, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 1 [ 3346.573145][ T618] FAT-fs (loop19): unable to read boot sector [ 3346.796879][ T28] audit: type=1400 audit(2000000835.111:9505): avc: denied { read } for pid=614 comm="syz.6.8864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3346.821347][ T28] audit: type=1400 audit(2000000835.130:9506): avc: denied { connect } for pid=620 comm="syz.1.8867" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 3346.985565][ T633] rtc_cmos 00:00: Alarms can be up to one day in the future [ 3348.045854][ T28] audit: type=1400 audit(2000000836.265:9507): avc: denied { read write } for pid=639 comm="syz.7.8873" name="uhid" dev="devtmpfs" ino=267 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 3348.072856][ T3140] hid-generic 0006:0004:0800.000D: item fetching failed at offset 3/4 [ 3348.105916][ T3140] hid-generic: probe of 0006:0004:0800.000D failed with error -22 [ 3348.296648][ T28] audit: type=1400 audit(2000000836.284:9508): avc: denied { open } for pid=639 comm="syz.7.8873" path="/dev/uhid" dev="devtmpfs" ino=267 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 3348.332281][ T652] netlink: 56 bytes leftover after parsing attributes in process `syz.7.8877'. [ 3348.971085][ T664] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8878'. [ 3348.981914][ T664] device macsec1 entered promiscuous mode [ 3349.918640][ T678] I/O error, dev loop13, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 3 [ 3349.928053][ T678] FAT-fs (loop13): unable to read boot sector [ 3350.186704][ T28] audit: type=1400 audit(2000000838.231:9509): avc: denied { write } for pid=682 comm="syz.7.8887" name="rtc0" dev="devtmpfs" ino=263 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 3350.244804][ T28] audit: type=1400 audit(2000000838.287:9510): avc: denied { ioctl } for pid=685 comm="syz.7.8889" path="net:[4026532428]" dev="nsfs" ino=4026532428 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3350.319874][ T28] audit: type=1400 audit(2000000838.360:9511): avc: denied { setopt } for pid=693 comm="syz.1.8893" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 3350.342497][ T28] audit: type=1400 audit(2000000838.360:9512): avc: denied { read } for pid=696 comm="syz.9.8894" name="file0" dev="tmpfs" ino=1426 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 3350.487303][ T28] audit: type=1400 audit(2000000838.517:9513): avc: denied { connect } for pid=718 comm="syz.1.8903" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 3350.948723][T29931] usb 8-1: new full-speed USB device number 19 using dummy_hcd [ 3351.174950][T29931] usb 8-1: config 0 interface 0 altsetting 66 endpoint 0x81 has invalid wMaxPacketSize 0 [ 3351.191828][T29931] usb 8-1: config 0 interface 0 has no altsetting 0 [ 3351.201071][T29931] usb 8-1: New USB device found, idVendor=04b4, idProduct=0001, bcdDevice= 0.00 [ 3351.210710][T29931] usb 8-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3351.223062][T29931] usb 8-1: config 0 descriptor?? [ 3351.625241][ T746] rtc_cmos 00:00: Alarms can be up to one day in the future [ 3351.684926][T29931] cypress 0003:04B4:0001.000E: hidraw0: USB HID v0.01 Device [HID 04b4:0001] on usb-dummy_hcd.7-1/input0 [ 3351.884831][ T3140] usb 8-1: USB disconnect, device number 19 [ 3351.996128][ T28] audit: type=1400 audit(2000000839.902:9514): avc: denied { mount } for pid=748 comm="syz.9.8913" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 3352.027884][ T751] syz.9.8914[751] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3352.027941][ T751] syz.9.8914[751] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3352.096192][ T752] netlink: 4 bytes leftover after parsing attributes in process `syz.9.8914'. [ 3352.360587][ T758] I/O error, dev loop13, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 3 [ 3352.370009][ T758] FAT-fs (loop13): unable to read boot sector [ 3353.652392][ T793] rtc_cmos 00:00: Alarms can be up to one day in the future [ 3354.032070][ T798] syz.7.8930[798] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3354.032137][ T798] syz.7.8930[798] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3354.148158][ T801] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8930'. [ 3357.220983][ T28] audit: type=1400 audit(2000000844.738:9515): avc: denied { nlmsg_write } for pid=830 comm="syz.9.8943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 3357.259501][ T835] syz.8.8944[835] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3357.259577][ T835] syz.8.8944[835] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3357.372349][ T838] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8944'. [ 3359.044471][ T28] audit: type=1400 audit(2000000846.418:9516): avc: denied { load_policy } for pid=854 comm="syz.8.8951" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 3359.044524][ T857] SELinux: failed to load policy [ 3360.230851][ T894] netlink: 16 bytes leftover after parsing attributes in process `syz.6.8967'. [ 3360.498004][ T909] syz.7.8964[909] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3360.498098][ T909] syz.7.8964[909] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3360.572276][ T909] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8964'. [ 3360.733953][ T915] usb usb8: usbfs: process 915 (syz.1.8974) did not claim interface 1 before use [ 3361.944573][ T965] netlink: 16 bytes leftover after parsing attributes in process `syz.7.8998'. [ 3361.973161][ T28] audit: type=1400 audit(2000000849.113:9517): avc: denied { getopt } for pid=968 comm="syz.9.9000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3361.998301][ T28] audit: type=1400 audit(2000000849.132:9518): avc: denied { create } for pid=971 comm="syz.9.9001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 3362.019496][ T28] audit: type=1400 audit(2000000849.141:9519): avc: denied { getopt } for pid=971 comm="syz.9.9001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 3362.409194][ T990] netlink: 4 bytes leftover after parsing attributes in process `syz.9.9008'. [ 3363.404498][ T996] I/O error, dev loop13, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 3 [ 3363.413889][ T996] FAT-fs (loop13): unable to read boot sector [ 3363.794794][T29479] usb 8-1: new high-speed USB device number 20 using dummy_hcd [ 3363.976296][ T1029] syz.6.9024[1029] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3363.976466][ T1029] syz.6.9024[1029] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3364.002401][T29479] usb 8-1: config 220 has an invalid interface number: 76 but max is 2 [ 3364.022742][T29479] usb 8-1: config 220 contains an unexpected descriptor of type 0x2, skipping [ 3364.031788][T29479] usb 8-1: config 220 has an invalid descriptor of length 0, skipping remainder of the config [ 3364.046414][ T1032] netlink: 4 bytes leftover after parsing attributes in process `syz.6.9024'. [ 3364.056870][T29479] usb 8-1: config 220 has no interface number 2 [ 3364.063330][T29479] usb 8-1: config 220 interface 1 altsetting 5 has 0 endpoint descriptors, different from the interface descriptor's value: 12 [ 3364.082905][T29479] usb 8-1: config 220 interface 0 has no altsetting 0 [ 3364.102142][T29479] usb 8-1: config 220 interface 76 has no altsetting 0 [ 3364.125158][T29479] usb 8-1: config 220 interface 1 has no altsetting 0 [ 3364.135037][T29479] usb 8-1: New USB device found, idVendor=8086, idProduct=0b07, bcdDevice=6c.b9 [ 3364.150290][T29479] usb 8-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3364.166759][T29479] usb 8-1: Product: syz [ 3364.204817][T29479] usb 8-1: Manufacturer: syz [ 3364.216986][T29479] usb 8-1: SerialNumber: syz [ 3364.495326][T29479] usb 8-1: Found UVC 7.01 device syz (8086:0b07) [ 3364.509864][T29479] usb 8-1: No valid video chain found. [ 3364.515591][T29479] usb 8-1: selecting invalid altsetting 0 [ 3364.530270][T29479] usb 8-1: USB disconnect, device number 20 [ 3366.245444][ T1080] syz.9.9045[1080] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3366.245606][ T1080] syz.9.9045[1080] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3367.132021][ T1084] netlink: 8 bytes leftover after parsing attributes in process `syz.7.9046'. [ 3367.555183][ T1083] netlink: 4 bytes leftover after parsing attributes in process `syz.9.9045'. [ 3368.598455][ T28] audit: type=1400 audit(2000000855.233:9520): avc: denied { write } for pid=1113 comm="syz.8.9060" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 3369.041389][ T1126] syz.9.9062[1126] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3369.041882][ T1126] syz.9.9062[1126] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3370.913624][ T1131] netlink: 4 bytes leftover after parsing attributes in process `syz.9.9062'. [ 3372.254296][ T1144] rtc_cmos 00:00: Alarms can be up to one day in the future [ 3372.404763][ T1146] netlink: 8 bytes leftover after parsing attributes in process `syz.1.9070'. [ 3372.879311][ T28] audit: type=1400 audit(2000000859.183:9521): avc: denied { append } for pid=1151 comm="syz.1.9073" name="ptp0" dev="devtmpfs" ino=264 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 3373.731162][ T1172] I/O error, dev loop17, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 1 [ 3373.740625][ T1172] FAT-fs (loop17): unable to read boot sector [ 3374.101447][ T1177] syz.9.9080[1177] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3374.101806][ T1177] syz.9.9080[1177] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3374.185522][ T1184] netlink: 4 bytes leftover after parsing attributes in process `syz.9.9080'. [ 3374.366310][ T1186] rtc_cmos 00:00: Alarms can be up to one day in the future [ 3374.539807][ T1188] netlink: 8 bytes leftover after parsing attributes in process `syz.6.9085'. [ 3375.527133][ T1198] netlink: 12 bytes leftover after parsing attributes in process `syz.7.9089'. [ 3375.547178][ T1198] netlink: 16 bytes leftover after parsing attributes in process `syz.7.9089'. [ 3375.558104][ T1198] netlink: 16 bytes leftover after parsing attributes in process `syz.7.9089'. [ 3376.027473][ T1223] netlink: 4 bytes leftover after parsing attributes in process `syz.8.9099'. [ 3376.048877][ T1223] device macsec0 entered promiscuous mode [ 3376.054699][ T1223] device 30猉功D entered promiscuous mode [ 3376.387614][ T1223] device 30猉功D left promiscuous mode [ 3377.169772][ T1228] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9101'. [ 3377.180557][ T1228] device macsec1 entered promiscuous mode [ 3377.371638][ T1248] SELinux: Context system_u:object_r:fsadm_ex is not valid (left unmapped). [ 3377.383298][ T28] audit: type=1400 audit(2000000863.346:9522): avc: denied { relabelto } for pid=1247 comm="syz.6.9110" name="1786" dev="tmpfs" ino=9701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_ex" [ 3377.409691][ T28] audit: type=1400 audit(2000000863.374:9523): avc: denied { associate } for pid=1247 comm="syz.6.9110" name="1786" dev="tmpfs" ino=9701 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:fsadm_ex" [ 3377.467575][ T28] audit: type=1400 audit(2000000863.392:9524): avc: denied { write } for pid=2135 comm="syz-executor" name="1786" dev="tmpfs" ino=9701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_ex" [ 3377.507028][ T28] audit: type=1400 audit(2000000863.392:9525): avc: denied { remove_name } for pid=2135 comm="syz-executor" name="binderfs" dev="tmpfs" ino=9705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_ex" [ 3377.539361][ T28] audit: type=1400 audit(2000000863.392:9526): avc: denied { rmdir } for pid=2135 comm="syz-executor" name="1786" dev="tmpfs" ino=9701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_ex" [ 3378.368664][ T1265] netlink: 4 bytes leftover after parsing attributes in process `syz.8.9115'. [ 3378.382332][ T1265] device macsec0 entered promiscuous mode [ 3378.388165][ T1265] device 30猉功D entered promiscuous mode [ 3379.158655][ T1278] rtc_cmos 00:00: Alarms can be up to one day in the future [ 3379.172199][ T1265] device 30猉功D left promiscuous mode [ 3379.182469][ T1275] platform regulatory.0: loading /lib/firmware/regulatory.db failed with error -12 [ 3379.192443][ T1275] platform regulatory.0: Direct firmware load for regulatory.db failed with error -12 [ 3379.686596][ T1303] syz.9.9121[1303] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3379.686678][ T1303] syz.9.9121[1303] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3379.974114][ T1305] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9128'. [ 3380.034757][ T1305] device macsec1 entered promiscuous mode [ 3380.279095][ T1308] netlink: 4 bytes leftover after parsing attributes in process `syz.9.9121'. [ 3382.171938][ T1320] netlink: 4 bytes leftover after parsing attributes in process `syz.8.9134'. [ 3382.212677][ T1320] device macsec0 entered promiscuous mode [ 3382.218544][ T1320] device 30猉功D entered promiscuous mode [ 3382.417667][ T1320] device 30猉功D left promiscuous mode [ 3382.518447][T29005] kernel write not supported for file /rfkill (pid: 29005 comm: kworker/0:0) [ 3382.600951][ T1337] syz.1.9141[1337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3382.601035][ T1337] syz.1.9141[1337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3382.800229][ T1342] rtc_cmos 00:00: Alarms can be up to one day in the future [ 3382.974796][ T1346] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3384.489759][ T1371] netlink: 4 bytes leftover after parsing attributes in process `syz.8.9154'. [ 3386.188656][ T1390] I/O error, dev loop17, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 1 [ 3386.197963][ T1390] FAT-fs (loop17): unable to read boot sector [ 3387.622134][ T1422] syz.8.9170[1422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3387.622952][ T1422] syz.8.9170[1422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3388.050886][ T1422] netlink: 4 bytes leftover after parsing attributes in process `syz.8.9170'. [ 3388.971555][ T1437] netlink: 24 bytes leftover after parsing attributes in process `syz.9.9176'. [ 3389.912915][ T1450] I/O error, dev loop13, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 3 [ 3389.922595][ T1450] FAT-fs (loop13): unable to read boot sector [ 3391.543339][ T28] audit: type=1400 audit(2000000876.416:9527): avc: denied { bind } for pid=1474 comm="syz.1.9190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3391.870042][ T28] audit: type=1400 audit(2000000876.434:9528): avc: denied { name_bind } for pid=1474 comm="syz.1.9190" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 3392.215333][ T1480] I/O error, dev loop19, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 1 [ 3392.224888][ T1480] FAT-fs (loop19): unable to read boot sector [ 3392.427442][ T28] audit: type=1400 audit(2000000876.434:9529): avc: denied { node_bind } for pid=1474 comm="syz.1.9190" saddr=fe80::aa src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 3393.345020][ T1512] netlink: 4 bytes leftover after parsing attributes in process `syz.7.9201'. [ 3393.355793][ T1512] device gretap0 entered promiscuous mode [ 3393.361605][ T1512] device macsec0 entered promiscuous mode [ 3393.368350][ T1512] device gretap0 left promiscuous mode [ 3394.065724][ T28] audit: type=1400 audit(2000000878.723:9530): avc: denied { read } for pid=1534 comm="syz.7.9213" path="socket:[116896]" dev="sockfs" ino=116896 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3394.744269][ T1549] rtc_cmos 00:00: Alarms can be up to one day in the future [ 3395.036572][ T1552] I/O error, dev loop19, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 1 [ 3395.046330][ T1552] FAT-fs (loop19): unable to read boot sector [ 3396.025794][ T1564] I/O error, dev loop15, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 1 [ 3396.035402][ T1564] FAT-fs (loop15): unable to read boot sector [ 3396.136882][ T1566] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9223'. [ 3396.157636][ T1566] device macsec1 entered promiscuous mode [ 3397.345515][ T1589] I/O error, dev loop15, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 1 [ 3397.354816][ T1589] FAT-fs (loop15): unable to read boot sector [ 3397.371591][ T1598] binder: 1597:1598 ioctl c018620c 2000000001c0 returned -22 [ 3397.758303][ T1603] netlink: 4 bytes leftover after parsing attributes in process `syz.6.9228'. [ 3397.776725][ T1587] syz.6.9228[1587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3397.776809][ T1587] syz.6.9228[1587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3397.849768][ T1608] netlink: 12 bytes leftover after parsing attributes in process `syz.9.9238'. [ 3400.759077][ T1644] I/O error, dev loop15, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 1 [ 3400.768650][ T1644] FAT-fs (loop15): unable to read boot sector [ 3401.326963][ T28] audit: type=1400 audit(2000000885.443:9531): avc: denied { bind } for pid=1653 comm="syz.9.9253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3402.410951][ T1669] binder: 1668:1669 ioctl c0306201 200000000240 returned -14 [ 3402.478874][ T1673] netlink: 'syz.8.9260': attribute type 7 has an invalid length. [ 3402.486759][ T1673] netlink: 'syz.8.9260': attribute type 5 has an invalid length. [ 3402.494914][ T1673] netlink: 17 bytes leftover after parsing attributes in process `syz.8.9260'. [ 3402.959406][ T1687] I/O error, dev loop13, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 3 [ 3402.969072][ T1687] FAT-fs (loop13): unable to read boot sector [ 3403.227608][ T1689] I/O error, dev loop17, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 1 [ 3403.237009][ T1689] FAT-fs (loop17): unable to read boot sector [ 3403.670317][ T1690] syz.7.9261[1690] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3403.670400][ T1690] syz.7.9261[1690] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3403.809686][ T1690] netlink: 4 bytes leftover after parsing attributes in process `syz.7.9261'. [ 3403.905502][ T1702] rtc_cmos 00:00: Alarms can be up to one day in the future [ 3404.244745][ T28] audit: type=1400 audit(2000000888.138:9532): avc: denied { read } for pid=1709 comm="syz.1.9273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3404.329225][ T28] audit: type=1400 audit(2000000888.212:9533): avc: denied { name_bind } for pid=1716 comm="syz.7.9276" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 3404.351357][ T28] audit: type=1400 audit(2000000888.212:9534): avc: denied { node_bind } for pid=1716 comm="syz.7.9276" saddr=255.255.255.255 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 3404.379052][ T28] audit: type=1400 audit(2000000888.258:9535): avc: denied { execmem } for pid=1718 comm="syz.9.9277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3404.549108][ T28] audit: type=1400 audit(2000000888.415:9536): avc: denied { bpf } for pid=1718 comm="syz.9.9277" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3404.569978][ T28] audit: type=1400 audit(2000000888.415:9537): avc: denied { prog_load } for pid=1718 comm="syz.9.9277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3404.589555][ T28] audit: type=1400 audit(2000000888.415:9538): avc: denied { perfmon } for pid=1718 comm="syz.9.9277" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3404.681215][ T28] audit: type=1400 audit(2000000888.535:9539): avc: denied { read write } for pid=1723 comm="syz.8.9278" name="ashmem" dev="devtmpfs" ino=269 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3404.714577][ T28] audit: type=1400 audit(2000000888.553:9540): avc: denied { open } for pid=1723 comm="syz.8.9278" path="/dev/ashmem" dev="devtmpfs" ino=269 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3404.737641][ T1728] input: syz1 as /devices/virtual/input/input120 [ 3404.931919][ T1732] I/O error, dev loop13, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 3 [ 3404.941347][ T1732] FAT-fs (loop13): unable to read boot sector [ 3405.487444][ T1757] syz.8.9285[1757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3405.487528][ T1757] syz.8.9285[1757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3405.581808][ T1758] netlink: 4 bytes leftover after parsing attributes in process `syz.8.9285'. [ 3405.658365][T29438] usb 8-1: new high-speed USB device number 21 using dummy_hcd [ 3406.104544][T29438] usb 8-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 3406.116050][T29438] usb 8-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 3406.149355][T29438] usb 8-1: New USB device found, idVendor=1e7d, idProduct=2cf6, bcdDevice= 0.00 [ 3406.222837][T29438] usb 8-1: New USB device strings: Mfr=4, Product=0, SerialNumber=0 [ 3406.286753][T29438] usb 8-1: Manufacturer: syz [ 3406.338869][T29438] usb 8-1: config 0 descriptor?? [ 3406.685101][ T1772] netlink: 'syz.9.9296': attribute type 4 has an invalid length. [ 3406.789420][T29438] pyra 0003:1E7D:2CF6.000F: unknown main item tag 0x0 [ 3406.789911][ T28] kauditd_printk_skb: 28 callbacks suppressed [ 3406.789930][ T28] audit: type=1400 audit(2000000890.482:9569): avc: denied { create } for pid=1773 comm="syz.6.9297" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3406.803302][T29438] pyra 0003:1E7D:2CF6.000F: unknown main item tag 0x0 [ 3406.833991][ T28] audit: type=1400 audit(2000000890.482:9570): avc: denied { map } for pid=1773 comm="syz.6.9297" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=117341 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3406.858463][T29438] pyra 0003:1E7D:2CF6.000F: unknown main item tag 0x0 [ 3406.866827][T29438] pyra 0003:1E7D:2CF6.000F: unknown main item tag 0x0 [ 3406.874776][T29438] pyra 0003:1E7D:2CF6.000F: unknown main item tag 0x0 [ 3406.902866][T29438] pyra 0003:1E7D:2CF6.000F: unknown main item tag 0x0 [ 3406.909953][ T28] audit: type=1400 audit(2000000890.482:9571): avc: denied { read write } for pid=1773 comm="syz.6.9297" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=117341 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3406.936920][T29438] pyra 0003:1E7D:2CF6.000F: unknown main item tag 0x0 [ 3406.944576][T29438] pyra 0003:1E7D:2CF6.000F: hidraw0: USB HID v0.00 Device [syz] on usb-dummy_hcd.7-1/input0 [ 3407.134846][ T1787] rtc_cmos 00:00: Alarms can be up to one day in the future [ 3407.147692][ T28] audit: type=1400 audit(2000000890.796:9572): avc: denied { read } for pid=1782 comm="syz.8.9301" name="rtc0" dev="devtmpfs" ino=263 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 3407.172857][ T28] audit: type=1400 audit(2000000890.805:9573): avc: denied { open } for pid=1782 comm="syz.8.9301" path="/dev/rtc0" dev="devtmpfs" ino=263 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 3407.198055][ T28] audit: type=1400 audit(2000000890.805:9574): avc: denied { ioctl } for pid=1782 comm="syz.8.9301" path="/dev/rtc0" dev="devtmpfs" ino=263 ioctlcmd=0x7001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 3407.235962][T29438] pyra 0003:1E7D:2CF6.000F: couldn't init struct pyra_device [ 3407.261027][T29438] pyra 0003:1E7D:2CF6.000F: couldn't install mouse [ 3407.271994][T29438] pyra: probe of 0003:1E7D:2CF6.000F failed with error -71 [ 3407.292908][T29438] usb 8-1: USB disconnect, device number 21 [ 3407.312077][ T1789] fido_id[1789]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.7/usb8/report_descriptor': No such file or directory [ 3407.511285][ T1794] I/O error, dev loop13, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 3 [ 3407.520640][ T1794] FAT-fs (loop13): unable to read boot sector [ 3407.901531][ T1806] netlink: 4 bytes leftover after parsing attributes in process `syz.9.9306'. [ 3407.922488][ T1806] device macsec0 entered promiscuous mode [ 3407.928361][ T1806] device gretap0 entered promiscuous mode [ 3407.938077][ T1806] device gretap0 left promiscuous mode [ 3409.046574][ T1812] rtc_cmos 00:00: Alarms can be up to one day in the future [ 3409.336828][ T28] audit: type=1326 audit(2000000892.836:9575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1819 comm="syz.7.9314" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f625658efc9 code=0x0 [ 3409.373360][ T28] audit: type=1400 audit(2000000892.864:9576): avc: denied { validate_trans } for pid=1818 comm="syz.8.9313" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 3409.577456][ T1836] rtc_cmos 00:00: Alarms can be up to one day in the future [ 3409.590490][ T1837] syz.6.9311[1837] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3409.590591][ T1837] syz.6.9311[1837] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3409.659533][ T1838] netlink: 4 bytes leftover after parsing attributes in process `syz.6.9311'. [ 3411.748355][ T1852] I/O error, dev loop17, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 1 [ 3411.757743][ T1852] FAT-fs (loop17): unable to read boot sector [ 3411.764486][ T1853] netlink: 4 bytes leftover after parsing attributes in process `syz.9.9322'. [ 3411.778712][ T1853] device macsec0 entered promiscuous mode [ 3411.784617][ T1853] device gretap0 entered promiscuous mode [ 3412.461124][ T1853] device gretap0 left promiscuous mode [ 3412.484960][ T1849] block device autoloading is deprecated and will be removed. [ 3412.492679][ T1849] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 1 [ 3412.502385][ T1849] FAT-fs (loop3): unable to read boot sector [ 3413.480552][ T28] audit: type=1400 audit(2000000895.826:9577): avc: denied { setopt } for pid=1847 comm="syz.7.9323" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3413.508739][ T28] audit: type=1400 audit(2000000895.826:9578): avc: denied { create } for pid=1847 comm="syz.7.9323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3413.528657][ T28] audit: type=1400 audit(2000000895.836:9579): avc: denied { setopt } for pid=1847 comm="syz.7.9323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3413.823402][ T1867] rtc_cmos 00:00: Alarms can be up to one day in the future [ 3414.182440][ T1865] netlink: 52 bytes leftover after parsing attributes in process `syz.6.9327'. [ 3414.273630][ T28] audit: type=1400 audit(2000000897.395:9580): avc: denied { read write } for pid=1876 comm="syz.7.9332" name="kvm" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 3414.305048][ T28] audit: type=1400 audit(2000000897.414:9581): avc: denied { open } for pid=1876 comm="syz.7.9332" path="/dev/kvm" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 3414.334883][ T28] audit: type=1400 audit(2000000897.414:9582): avc: denied { ioctl } for pid=1876 comm="syz.7.9332" path="/dev/kvm" dev="devtmpfs" ino=83 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 3414.711953][ T1890] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 1 [ 3414.721387][ T1890] FAT-fs (loop3): unable to read boot sector [ 3414.950059][ T1896] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING [ 3415.073398][ T28] audit: type=1326 audit(2000000898.134:9583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1900 comm="syz.7.9340" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f625658efc9 code=0x0 [ 3415.327316][ T1915] netlink: 4 bytes leftover after parsing attributes in process `syz.6.9342'. [ 3415.348111][ T1915] device 30猉功D entered promiscuous mode [ 3415.354159][ T1915] device macsec0 entered promiscuous mode [ 3415.902489][ T1915] device 30猉功D left promiscuous mode [ 3416.270785][ T28] audit: type=1400 audit(2000000899.232:9584): avc: denied { create } for pid=1925 comm="syz.9.9349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 3416.309029][ T28] audit: type=1400 audit(2000000899.260:9585): avc: denied { getopt } for pid=1922 comm="syz.7.9348" laddr=172.20.20.10 lport=256 faddr=172.20.20.187 fport=20002 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3417.142577][T29005] usb 8-1: new high-speed USB device number 22 using dummy_hcd [ 3417.340640][T29005] usb 8-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 3417.350821][T29005] usb 8-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 3417.361865][T29005] usb 8-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid maxpacket 58368, setting to 1024 [ 3417.373661][T29005] usb 8-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 3417.386646][T29005] usb 8-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.00 [ 3417.395718][T29005] usb 8-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3417.404458][T29005] usb 8-1: config 0 descriptor?? [ 3417.871179][T29005] keytouch 0003:0926:3333.0010: fixing up Keytouch IEC report descriptor [ 3417.949420][T29005] input: HID 0926:3333 as /devices/platform/dummy_hcd.7/usb8/8-1/8-1:0.0/0003:0926:3333.0010/input/input121 [ 3418.168096][T29005] keytouch 0003:0926:3333.0010: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.7-1/input0 [ 3418.282990][T29005] usb 8-1: USB disconnect, device number 22 [ 3418.594475][ T1965] fido_id[1965]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.7/usb8/report_descriptor': No such file or directory [ 3418.774377][ T1966] syz.6.9363[1966] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3418.774460][ T1966] syz.6.9363[1966] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3418.843873][ T1972] netlink: 4 bytes leftover after parsing attributes in process `syz.6.9363'. [ 3418.942930][ T1973] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 1 [ 3418.952290][ T1973] FAT-fs (loop3): unable to read boot sector [ 3419.256243][ T28] audit: type=1400 audit(2000000901.992:9586): avc: denied { watch watch_reads } for pid=1978 comm="syz.7.9367" path="/133" dev="tmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 3419.400324][ T28] audit: type=1400 audit(2000000902.121:9587): avc: denied { name_bind } for pid=1982 comm="syz.7.9368" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 3419.926589][ T28] audit: type=1400 audit(2000000902.601:9588): avc: denied { read } for pid=2000 comm="syz.6.9374" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3420.008653][ T28] audit: type=1400 audit(2000000902.620:9589): avc: denied { bind } for pid=1998 comm="syz.9.9376" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3420.134417][ T28] audit: type=1400 audit(2000000902.638:9590): avc: denied { name_bind } for pid=1998 comm="syz.9.9376" src=1024 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 3420.155502][ T28] audit: type=1400 audit(2000000902.638:9591): avc: denied { node_bind } for pid=1998 comm="syz.9.9376" saddr=224.0.0.2 src=1024 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 3420.226463][ T2014] syz.8.9379[2014] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3420.226574][ T2014] syz.8.9379[2014] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3420.907382][ T2024] I/O error, dev loop19, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 1 [ 3420.928471][ T2024] FAT-fs (loop19): unable to read boot sector [ 3421.404064][ T2028] netlink: 104 bytes leftover after parsing attributes in process `syz.8.9385'. [ 3421.537515][ T2042] can0: slcan on ttynull. [ 3421.595554][ T28] audit: type=1400 audit(2000000904.143:9592): avc: denied { read } for pid=141 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 3421.623711][ T2041] binfmt_misc: register: failed to install interpreter file ./file2 [ 3421.660418][ T28] audit: type=1400 audit(2000000904.180:9593): avc: denied { search } for pid=141 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3421.709638][ T28] audit: type=1400 audit(2000000904.180:9594): avc: denied { read } for pid=141 comm="dhcpcd" name="n16" dev="tmpfs" ino=18370 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3421.734125][ T28] audit: type=1400 audit(2000000904.180:9595): avc: denied { open } for pid=141 comm="dhcpcd" path="/run/udev/data/n16" dev="tmpfs" ino=18370 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3422.794688][ T2062] syz.9.9396[2062] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3422.794773][ T2062] syz.9.9396[2062] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3423.007396][T30628] IPv6: ADDRCONF(NETDEV_CHANGE): can0: link becomes ready [ 3423.360957][ T2099] rtc_cmos 00:00: Alarms can be up to one day in the future [ 3426.189591][ T2057] can0 (unregistered): slcan off ttynull. [ 3427.252528][ T28] kauditd_printk_skb: 13 callbacks suppressed [ 3427.252546][ T28] audit: type=1400 audit(2000000909.376:9609): avc: denied { unmount } for pid=2169 comm="syz.8.9431" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 3427.888036][T30628] tipc: Disabling bearer [ 3427.894778][T30628] tipc: Disabling bearer [ 3427.913294][T30628] tipc: Left network mode [ 3428.083621][ T28] audit: type=1400 audit(2000000910.133:9610): avc: denied { mounton } for pid=2224 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 3428.153059][ T2224] bridge0: port 1(bridge_slave_0) entered blocking state [ 3428.160191][ T2224] bridge0: port 1(bridge_slave_0) entered disabled state [ 3428.167909][ T2224] device bridge_slave_0 entered promiscuous mode [ 3428.175027][ T2224] bridge0: port 2(bridge_slave_1) entered blocking state [ 3428.182185][ T2224] bridge0: port 2(bridge_slave_1) entered disabled state [ 3428.192048][ T2224] device bridge_slave_1 entered promiscuous mode [ 3428.312743][T29344] usb 8-1: new high-speed USB device number 23 using dummy_hcd [ 3428.523455][T29344] usb 8-1: config 27 has an invalid descriptor of length 0, skipping remainder of the config [ 3428.543843][T29344] usb 8-1: New USB device found, idVendor=0582, idProduct=0000, bcdDevice= 0.00 [ 3428.556000][T29344] usb 8-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3428.627088][T29344] snd-usb-audio: probe of 8-1:27.0 failed with error -22 [ 3428.640805][ T2106] udevd[2106]: error opening ATTR{/sys/devices/platform/dummy_hcd.7/usb8/8-1/8-1:27.0/sound/card0/controlC0/../uevent} for writing: No such file or directory [ 3428.670767][ T2224] bridge0: port 2(bridge_slave_1) entered blocking state [ 3428.678029][ T2224] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3428.685343][ T2224] bridge0: port 1(bridge_slave_0) entered blocking state [ 3428.692391][ T2224] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3428.700516][ T2243] syz.9.9446[2243] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3428.700591][ T2243] syz.9.9446[2243] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3428.728910][T30630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3428.748464][T30630] bridge0: port 1(bridge_slave_0) entered disabled state [ 3428.755798][T30630] bridge0: port 2(bridge_slave_1) entered disabled state [ 3428.765447][T30630] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3428.773740][T30630] bridge0: port 1(bridge_slave_0) entered blocking state [ 3428.780820][T30630] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3428.792552][T30630] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3428.800860][T30630] bridge0: port 2(bridge_slave_1) entered blocking state [ 3428.807912][T30630] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3428.821208][T30630] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3428.830745][T30630] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3428.845798][T29005] usb 8-1: USB disconnect, device number 23 [ 3428.851326][T30630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3428.867740][T30628] device bridge_slave_1 left promiscuous mode [ 3428.874036][T30628] bridge0: port 2(bridge_slave_1) entered disabled state [ 3428.881666][T30628] device bridge_slave_0 left promiscuous mode [ 3428.888013][T30628] bridge0: port 1(bridge_slave_0) entered disabled state [ 3429.150555][T30630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3429.158862][T30630] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3429.166333][T30630] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3429.174836][ T2224] device veth0_vlan entered promiscuous mode [ 3429.185922][T30630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3429.194346][T30630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3429.204659][ T2224] device veth1_macvtap entered promiscuous mode [ 3429.214886][T30630] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3429.222729][T30630] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3429.231147][T30630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3429.247706][T30630] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3429.256109][T30630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3429.272248][ T28] audit: type=1400 audit(2000000911.231:9611): avc: denied { mounton } for pid=2224 comm="syz-executor" path="/root/syzkaller.VhMpBl/syz-tmp" dev="sda1" ino=2065 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 3429.298040][ T28] audit: type=1400 audit(2000000911.231:9612): avc: denied { mount } for pid=2224 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 3429.320861][ T28] audit: type=1400 audit(2000000911.231:9613): avc: denied { mounton } for pid=2224 comm="syz-executor" path="/root/syzkaller.VhMpBl/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 3429.346731][ T28] audit: type=1400 audit(2000000911.231:9614): avc: denied { mount } for pid=2224 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 3429.369071][ T28] audit: type=1400 audit(2000000911.231:9615): avc: denied { mounton } for pid=2224 comm="syz-executor" path="/root/syzkaller.VhMpBl/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 3429.396429][ T28] audit: type=1400 audit(2000000911.231:9616): avc: denied { mounton } for pid=2224 comm="syz-executor" path="/root/syzkaller.VhMpBl/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=119184 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 3429.424975][ T28] audit: type=1400 audit(2000000911.231:9617): avc: denied { unmount } for pid=2224 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 3429.454628][ T28] audit: type=1400 audit(2000000911.250:9618): avc: denied { mounton } for pid=2224 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=570 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 3429.807775][T29931] usb 8-1: new high-speed USB device number 24 using dummy_hcd [ 3430.070236][T29931] usb 8-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 3430.081807][T29931] usb 8-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 3430.093890][T29931] usb 8-1: New USB device found, idVendor=256c, idProduct=006d, bcdDevice= 0.00 [ 3430.104626][T29931] usb 8-1: New USB device strings: Mfr=2, Product=0, SerialNumber=0 [ 3430.113260][T29931] usb 8-1: Manufacturer: syz [ 3430.151441][T29931] usb 8-1: config 0 descriptor?? [ 3430.664416][ T2276] netlink: 4 bytes leftover after parsing attributes in process `syz.8.9457'. [ 3430.729859][ T2276] device gretap0 entered promiscuous mode [ 3430.736276][ T2276] device macsec1 entered promiscuous mode [ 3430.928245][ T2276] device gretap0 left promiscuous mode [ 3431.780193][T29931] uclogic 0003:256C:006D.0011: failed retrieving string descriptor #100: -71 [ 3431.789112][T29931] uclogic 0003:256C:006D.0011: failed retrieving pen parameters: -71 [ 3431.817917][T29931] uclogic 0003:256C:006D.0011: failed probing pen v1 parameters: -71 [ 3431.842402][ T2286] syz.8.9459[2286] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3431.843372][ T2286] syz.8.9459[2286] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3431.904522][T29931] uclogic 0003:256C:006D.0011: failed probing parameters: -71 [ 3431.978336][T29931] uclogic: probe of 0003:256C:006D.0011 failed with error -71 [ 3432.014660][T29931] usb 8-1: USB disconnect, device number 24 [ 3432.935990][ T2309] netlink: 4 bytes leftover after parsing attributes in process `syz.7.9469'. [ 3432.982557][ T2309] device gretap0 entered promiscuous mode [ 3432.988890][ T2309] device macsec0 entered promiscuous mode [ 3433.365571][ T2309] device gretap0 left promiscuous mode [ 3434.760905][ T2327] bridge0: the hash_elasticity option has been deprecated and is always 16 [ 3434.795042][ T2327] device bridge0 entered promiscuous mode [ 3434.861741][ T2335] 9pnet_fd: Insufficient options for proto=fd [ 3435.081797][ T2345] syz.7.9479[2345] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3435.082188][ T2345] syz.7.9479[2345] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3436.821018][ T2356] netlink: 4 bytes leftover after parsing attributes in process `syz.7.9483'. [ 3436.852958][ T2356] device gretap0 entered promiscuous mode [ 3436.858940][ T2356] device macsec0 entered promiscuous mode [ 3437.023953][ T2356] device gretap0 left promiscuous mode [ 3437.597332][ T28] kauditd_printk_skb: 8 callbacks suppressed [ 3437.597348][ T28] audit: type=1400 audit(2000000918.911:9627): avc: denied { mac_admin } for pid=2376 comm="syz.8.9491" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3437.633524][ T2377] SELinux: Context system_u:object_r:inetd_exec_t:s0 is not valid (left unmapped). [ 3437.656892][ T28] audit: type=1400 audit(2000000918.966:9628): avc: denied { relabelto } for pid=2376 comm="syz.8.9491" name="file1" dev="tmpfs" ino=75 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:inetd_exec_t:s0" [ 3437.684607][ T28] audit: type=1400 audit(2000000918.966:9629): avc: denied { associate } for pid=2376 comm="syz.8.9491" name="file1" dev="tmpfs" ino=75 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:inetd_exec_t:s0" [ 3438.364181][ T2383] I/O error, dev loop15, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 1 [ 3438.373613][ T2383] FAT-fs (loop15): unable to read boot sector [ 3439.180583][ T2401] syz.8.9493[2401] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3439.181014][ T2401] syz.8.9493[2401] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3439.532671][ T2402] netlink: 4 bytes leftover after parsing attributes in process `syz.8.9493'. [ 3442.129804][ T2434] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 1 [ 3442.139130][ T2434] FAT-fs (loop3): unable to read boot sector [ 3443.164991][ T2445] syz.6.9511[2445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3443.166383][ T2445] syz.6.9511[2445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3443.338940][ T2446] netlink: 4 bytes leftover after parsing attributes in process `syz.6.9511'. [ 3443.522147][T29344] usb 8-1: new high-speed USB device number 25 using dummy_hcd [ 3443.784115][T29344] usb 8-1: Using ep0 maxpacket: 16 [ 3443.793501][T29344] usb 8-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 3444.012241][T29344] usb 8-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 3444.044153][T29344] usb 8-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 3444.332368][T29344] usb 8-1: New USB device found, idVendor=045e, idProduct=07da, bcdDevice= 0.00 [ 3444.597108][T29344] usb 8-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3444.613282][T29344] usb 8-1: config 0 descriptor?? [ 3444.740764][ T2462] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9517'. [ 3444.773576][ T2462] device macsec1 entered promiscuous mode [ 3444.935788][ T28] audit: type=1400 audit(2000000925.695:9630): avc: denied { write } for pid=2466 comm="syz.8.9519" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3445.163411][T29344] microsoft 0003:045E:07DA.0012: unknown main item tag 0xe [ 3445.171541][T29344] microsoft 0003:045E:07DA.0012: collection stack underflow [ 3445.179500][T29344] microsoft 0003:045E:07DA.0012: item 0 1 0 12 parsing failed [ 3445.195197][T29344] microsoft 0003:045E:07DA.0012: parse failed [ 3445.202437][T29344] microsoft: probe of 0003:045E:07DA.0012 failed with error -22 [ 3445.308866][ T28] audit: type=1400 audit(2000000926.036:9631): avc: denied { ioctl } for pid=2473 comm="syz.8.9521" path="socket:[118743]" dev="sockfs" ino=118743 ioctlcmd=0x48e1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 3445.311676][T30630] Bluetooth: hci0: Frame reassembly failed (-84) [ 3445.658118][T29344] usb 8-1: USB disconnect, device number 25 [ 3445.956924][ T2483] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 1 [ 3445.966643][ T2483] FAT-fs (loop3): unable to read boot sector [ 3446.740566][ T2495] syz.9.9527[2495] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3446.741041][ T2495] syz.9.9527[2495] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3446.835583][ T2496] netlink: 4 bytes leftover after parsing attributes in process `syz.9.9527'. [ 3447.627591][ T45] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 3447.634217][ T2477] Bluetooth: hci0: command 0x1003 tx timeout [ 3447.664238][ T2474] Bluetooth: hci0: Opcode 0x080f failed: -22 [ 3447.698933][ T28] audit: type=1400 audit(2000000928.242:9632): avc: denied { create } for pid=2499 comm="syz.8.9529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3447.798040][ T2507] netlink: 12 bytes leftover after parsing attributes in process `syz.9.9531'. [ 3447.814715][ T2507] netlink: 12 bytes leftover after parsing attributes in process `syz.9.9531'. [ 3447.889363][ T2521] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3448.812394][ T2527] I/O error, dev loop13, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 3 [ 3448.821732][ T2527] FAT-fs (loop13): unable to read boot sector [ 3449.298828][T30630] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 3449.310165][T30630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3449.324264][T30630] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 3449.472210][ T2539] rtc_cmos 00:00: Alarms can be up to one day in the future [ 3449.861894][ C1] ================================================================== [ 3449.870013][ C1] BUG: KASAN: use-after-free in __run_timers+0x32b/0x9a0 [ 3449.877080][ C1] Write of size 8 at addr ffff88811f698a00 by task syz.9.9542/2536 [ 3449.885071][ C1] [ 3449.887404][ C1] CPU: 1 PID: 2536 Comm: syz.9.9542 Not tainted syzkaller #0 [ 3449.894793][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 3449.904955][ C1] Call Trace: [ 3449.908266][ C1] [ 3449.911138][ C1] __dump_stack+0x21/0x24 [ 3449.915509][ C1] dump_stack_lvl+0xee/0x150 [ 3449.920122][ C1] ? __cfi_dump_stack_lvl+0x8/0x8 [ 3449.925184][ C1] ? __run_timers+0x32b/0x9a0 [ 3449.929890][ C1] print_address_description+0x71/0x200 [ 3449.935484][ C1] print_report+0x4a/0x60 [ 3449.939832][ C1] kasan_report+0x122/0x150 [ 3449.944358][ C1] ? __run_timers+0x32b/0x9a0 [ 3449.949059][ C1] __asan_report_store8_noabort+0x17/0x20 [ 3449.954794][ C1] __run_timers+0x32b/0x9a0 [ 3449.959330][ C1] ? sched_clock+0x9/0x10 [ 3449.963679][ C1] ? sched_clock_cpu+0x6e/0x250 [ 3449.968549][ C1] ? calc_index+0x200/0x200 [ 3449.973076][ C1] ? kvm_sched_clock_read+0x18/0x40 [ 3449.978306][ C1] run_timer_softirq+0x6a/0xf0 [ 3449.983092][ C1] handle_softirqs+0x1d7/0x600 [ 3449.987879][ C1] ? irqtime_account_irq+0xc4/0x240 [ 3449.993101][ C1] __irq_exit_rcu+0x52/0xf0 [ 3449.997626][ C1] irq_exit_rcu+0x9/0x10 [ 3450.001882][ C1] sysvec_call_function_single+0xa6/0xc0 [ 3450.007537][ C1] [ 3450.010483][ C1] [ 3450.013434][ C1] asm_sysvec_call_function_single+0x1b/0x20 [ 3450.019453][ C1] RIP: 0010:finish_task_switch+0x173/0x7b0 [ 3450.025284][ C1] Code: 80 3c 2b 00 74 08 4c 89 f7 e8 99 11 68 00 4d 8b 2e 4d 85 ed 0f 85 cd 00 00 00 4c 89 e7 e8 25 ca a7 03 fb 49 8d 9f 48 0b 00 00 <48> 89 d8 48 c1 e8 03 49 bd 00 00 00 00 00 fc ff df 42 0f b6 04 28 [ 3450.044913][ C1] RSP: 0018:ffffc900017f73c0 EFLAGS: 00000282 [ 3450.051015][ C1] RAX: 0000000080000001 RBX: ffff888167a71f88 RCX: 0000000000000000 [ 3450.059011][ C1] RDX: 0000000000000001 RSI: 0000000000000004 RDI: 00000000ffffffff [ 3450.066998][ C1] RBP: ffffc900017f7410 R08: dffffc0000000000 R09: ffffed1022fc128e [ 3450.074988][ C1] R10: ffffed1022fc128e R11: 1ffff11022fc128d R12: ffff8881f7137d80 [ 3450.082979][ C1] R13: 0000000000000000 R14: 0000000000000000 R15: ffff888167a71440 [ 3450.090978][ C1] ? __switch_to_asm+0x3a/0x60 [ 3450.095783][ C1] __schedule+0xb8f/0x14e0 [ 3450.100225][ C1] ? __sched_text_start+0x8/0x8 [ 3450.105092][ C1] ? avc_has_perm+0x158/0x240 [ 3450.109797][ C1] schedule+0xbd/0x170 [ 3450.113886][ C1] schedule_timeout+0xa6/0x2e0 [ 3450.118662][ C1] ? __cfi_schedule_timeout+0x10/0x10 [ 3450.124051][ C1] ? _raw_spin_unlock_irqrestore+0x5a/0x80 [ 3450.129876][ C1] ? prepare_to_wait_exclusive+0x191/0x1d0 [ 3450.135709][ C1] unix_wait_for_peer+0x1e5/0x2e0 [ 3450.140758][ C1] ? unix_find_other+0x880/0x880 [ 3450.145720][ C1] ? __cfi_autoremove_wake_function+0x10/0x10 [ 3450.151809][ C1] ? __cfi__raw_spin_lock+0x10/0x10 [ 3450.157028][ C1] ? security_unix_may_send+0x8c/0xb0 [ 3450.162416][ C1] unix_dgram_sendmsg+0xed4/0x16d0 [ 3450.167560][ C1] ? __cfi_unix_dgram_sendmsg+0x10/0x10 [ 3450.173218][ C1] ? security_socket_sendmsg+0x93/0xb0 [ 3450.178709][ C1] ? __cfi_unix_dgram_sendmsg+0x10/0x10 [ 3450.184276][ C1] ____sys_sendmsg+0x5a9/0x990 [ 3450.189044][ C1] ? _raw_spin_unlock+0x4c/0x70 [ 3450.193989][ C1] ? __sys_sendmsg_sock+0x40/0x40 [ 3450.199015][ C1] ? __schedule+0xb8f/0x14e0 [ 3450.203615][ C1] ? import_iovec+0x7c/0xb0 [ 3450.208148][ C1] ___sys_sendmsg+0x21c/0x290 [ 3450.212830][ C1] ? __sys_sendmsg+0x270/0x270 [ 3450.217605][ C1] ? futex_unqueue+0x132/0x160 [ 3450.222381][ C1] ? __cfi_futex_wait+0x10/0x10 [ 3450.227257][ C1] ? __fdget+0x19c/0x220 [ 3450.231590][ C1] __sys_sendmmsg+0x274/0x460 [ 3450.236290][ C1] ? __cfi___sys_sendmmsg+0x10/0x10 [ 3450.241499][ C1] ? fpregs_restore_userregs+0x128/0x260 [ 3450.247137][ C1] __x64_sys_sendmmsg+0xa0/0xb0 [ 3450.251995][ C1] x64_sys_call+0x3f5/0x9a0 [ 3450.256513][ C1] do_syscall_64+0x4c/0xa0 [ 3450.260931][ C1] ? clear_bhb_loop+0x30/0x80 [ 3450.265710][ C1] ? clear_bhb_loop+0x30/0x80 [ 3450.270397][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3450.276302][ C1] RIP: 0033:0x7fe4dbb8efc9 [ 3450.280728][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3450.300341][ C1] RSP: 002b:00007fe4dc9a6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 3450.308761][ C1] RAX: ffffffffffffffda RBX: 00007fe4dbde5fa0 RCX: 00007fe4dbb8efc9 [ 3450.316737][ C1] RDX: 0000000000000651 RSI: 0000200000000000 RDI: 0000000000000005 [ 3450.324713][ C1] RBP: 00007fe4dbc11f91 R08: 0000000000000000 R09: 0000000000000000 [ 3450.332708][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3450.340679][ C1] R13: 00007fe4dbde6038 R14: 00007fe4dbde5fa0 R15: 00007ffe7afa4a58 [ 3450.348656][ C1] [ 3450.351682][ C1] [ 3450.354024][ C1] Allocated by task 2474: [ 3450.358343][ C1] kasan_set_track+0x4b/0x70 [ 3450.362946][ C1] kasan_save_alloc_info+0x25/0x30 [ 3450.368076][ C1] __kasan_kmalloc+0x95/0xb0 [ 3450.372687][ C1] __kmalloc+0xb1/0x1e0 [ 3450.376850][ C1] hci_alloc_dev_priv+0x27/0x1bd0 [ 3450.381877][ C1] hci_uart_tty_ioctl+0x3d6/0xa20 [ 3450.386916][ C1] tty_ioctl+0x8ef/0xc60 [ 3450.391254][ C1] __se_sys_ioctl+0x12f/0x1b0 [ 3450.395931][ C1] __x64_sys_ioctl+0x7b/0x90 [ 3450.400520][ C1] x64_sys_call+0x58b/0x9a0 [ 3450.405039][ C1] do_syscall_64+0x4c/0xa0 [ 3450.409458][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3450.415355][ C1] [ 3450.417704][ C1] Freed by task 2474: [ 3450.421856][ C1] kasan_set_track+0x4b/0x70 [ 3450.426449][ C1] kasan_save_free_info+0x31/0x50 [ 3450.431481][ C1] ____kasan_slab_free+0x132/0x180 [ 3450.436609][ C1] __kasan_slab_free+0x11/0x20 [ 3450.441381][ C1] slab_free_freelist_hook+0xc2/0x190 [ 3450.446758][ C1] __kmem_cache_free+0xb7/0x1b0 [ 3450.451782][ C1] kfree+0x6f/0xf0 [ 3450.455517][ C1] hci_release_dev+0x12a3/0x13b0 [ 3450.460468][ C1] bt_host_release+0x82/0x90 [ 3450.465072][ C1] device_release+0xa4/0x1d0 [ 3450.469668][ C1] kobject_put+0x19d/0x280 [ 3450.474120][ C1] put_device+0x1f/0x30 [ 3450.478283][ C1] hci_dev_cmd+0x265/0x720 [ 3450.482737][ C1] hci_sock_ioctl+0x41e/0x7f0 [ 3450.487419][ C1] sock_do_ioctl+0x101/0x310 [ 3450.492015][ C1] sock_ioctl+0x4d8/0x6e0 [ 3450.496352][ C1] __se_sys_ioctl+0x12f/0x1b0 [ 3450.501038][ C1] __x64_sys_ioctl+0x7b/0x90 [ 3450.505630][ C1] x64_sys_call+0x58b/0x9a0 [ 3450.510225][ C1] do_syscall_64+0x4c/0xa0 [ 3450.514650][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3450.520547][ C1] [ 3450.522870][ C1] Last potentially related work creation: [ 3450.528583][ C1] kasan_save_stack+0x3a/0x60 [ 3450.533267][ C1] __kasan_record_aux_stack+0xb6/0xc0 [ 3450.538705][ C1] kasan_record_aux_stack_noalloc+0xb/0x10 [ 3450.544518][ C1] insert_work+0x51/0x300 [ 3450.548853][ C1] __queue_work+0x9b1/0xd30 [ 3450.553359][ C1] queue_work_on+0xd2/0x140 [ 3450.557872][ C1] __hci_cmd_sync_sk+0xa3e/0xcf0 [ 3450.562812][ C1] hci_cmd_sync_status+0x53/0x120 [ 3450.567838][ C1] hci_dev_cmd+0x628/0x720 [ 3450.572260][ C1] hci_sock_ioctl+0x41e/0x7f0 [ 3450.576942][ C1] sock_do_ioctl+0x101/0x310 [ 3450.581539][ C1] sock_ioctl+0x4d8/0x6e0 [ 3450.585871][ C1] __se_sys_ioctl+0x12f/0x1b0 [ 3450.590548][ C1] __x64_sys_ioctl+0x7b/0x90 [ 3450.595139][ C1] x64_sys_call+0x58b/0x9a0 [ 3450.599645][ C1] do_syscall_64+0x4c/0xa0 [ 3450.604060][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3450.609960][ C1] [ 3450.612283][ C1] Second to last potentially related work creation: [ 3450.618858][ C1] kasan_save_stack+0x3a/0x60 [ 3450.623541][ C1] __kasan_record_aux_stack+0xb6/0xc0 [ 3450.628922][ C1] kasan_record_aux_stack_noalloc+0xb/0x10 [ 3450.634738][ C1] insert_work+0x51/0x300 [ 3450.639090][ C1] __queue_work+0x9b1/0xd30 [ 3450.643599][ C1] queue_work_on+0xd2/0x140 [ 3450.648104][ C1] hci_cmd_timeout+0x191/0x200 [ 3450.652875][ C1] process_one_work+0x71f/0xc40 [ 3450.657722][ C1] worker_thread+0xa29/0x11f0 [ 3450.662398][ C1] kthread+0x281/0x320 [ 3450.666482][ C1] ret_from_fork+0x1f/0x30 [ 3450.670900][ C1] [ 3450.673225][ C1] The buggy address belongs to the object at ffff88811f698000 [ 3450.673225][ C1] which belongs to the cache kmalloc-8k of size 8192 [ 3450.687276][ C1] The buggy address is located 2560 bytes inside of [ 3450.687276][ C1] 8192-byte region [ffff88811f698000, ffff88811f69a000) [ 3450.700723][ C1] [ 3450.703047][ C1] The buggy address belongs to the physical page: [ 3450.709454][ C1] page:ffffea00047da600 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11f698 [ 3450.719691][ C1] head:ffffea00047da600 order:3 compound_mapcount:0 compound_pincount:0 [ 3450.728012][ C1] flags: 0x4000000000010200(slab|head|zone=1) [ 3450.734115][ C1] raw: 4000000000010200 ffffea0004615a00 dead000000000004 ffff888100043500 [ 3450.742701][ C1] raw: 0000000000000000 0000000000020002 00000001ffffffff 0000000000000000 [ 3450.751281][ C1] page dumped because: kasan: bad access detected [ 3450.757699][ C1] page_owner tracks the page as allocated [ 3450.763420][ C1] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 3061, tgid 3056 (syz.6.563), ts 400978985167, free_ts 396585409061 [ 3450.786101][ C1] post_alloc_hook+0x1f5/0x210 [ 3450.790874][ C1] prep_new_page+0x1c/0x110 [ 3450.795383][ C1] get_page_from_freelist+0x2c7b/0x2cf0 [ 3450.800934][ C1] __alloc_pages+0x1c3/0x450 [ 3450.805531][ C1] alloc_slab_page+0x6e/0xf0 [ 3450.810145][ C1] new_slab+0x98/0x3d0 [ 3450.814237][ C1] ___slab_alloc+0x6bd/0xb20 [ 3450.818826][ C1] __slab_alloc+0x5e/0xa0 [ 3450.823251][ C1] __kmem_cache_alloc_node+0x203/0x2c0 [ 3450.828710][ C1] kmalloc_trace+0x29/0xb0 [ 3450.833127][ C1] audit_log_d_path+0xc6/0x240 [ 3450.837901][ C1] audit_log_d_path_exe+0x42/0x70 [ 3450.842940][ C1] audit_log_task+0x205/0x2e0 [ 3450.847617][ C1] audit_seccomp+0x7f/0x160 [ 3450.852120][ C1] __seccomp_filter+0xacd/0x19d0 [ 3450.857067][ C1] __secure_computing+0xea/0x290 [ 3450.862028][ C1] page last free stack trace: [ 3450.866703][ C1] free_unref_page_prepare+0x742/0x750 [ 3450.872170][ C1] free_unref_page+0x8f/0x530 [ 3450.876846][ C1] __free_pages+0x67/0x100 [ 3450.881263][ C1] __free_slab+0xca/0x1a0 [ 3450.885597][ C1] __unfreeze_partials+0x160/0x190 [ 3450.890712][ C1] put_cpu_partial+0xa9/0x100 [ 3450.895394][ C1] __slab_free+0x1c4/0x280 [ 3450.899814][ C1] ___cache_free+0xbf/0xd0 [ 3450.904235][ C1] qlist_free_all+0xc6/0x140 [ 3450.908823][ C1] kasan_quarantine_reduce+0x14a/0x170 [ 3450.914296][ C1] __kasan_slab_alloc+0x24/0x80 [ 3450.919152][ C1] slab_post_alloc_hook+0x4f/0x2d0 [ 3450.924264][ C1] kmem_cache_alloc+0x16e/0x330 [ 3450.929138][ C1] getname_flags+0xb9/0x500 [ 3450.933649][ C1] __se_sys_newfstatat+0xdf/0x380 [ 3450.938777][ C1] __x64_sys_newfstatat+0x9b/0xb0 [ 3450.943814][ C1] [ 3450.946140][ C1] Memory state around the buggy address: [ 3450.951765][ C1] ffff88811f698900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3450.959863][ C1] ffff88811f698980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3450.967922][ C1] >ffff88811f698a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3450.975975][ C1] ^ [ 3450.980046][ C1] ffff88811f698a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3450.988173][ C1] ffff88811f698b00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3450.996230][ C1] ================================================================== [ 3451.004351][ C1] Disabling lock debugging due to kernel taint [ 3451.010552][ C1] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 3451.022354][ C1] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 3451.030760][ C1] CPU: 1 PID: 2536 Comm: syz.9.9542 Tainted: G B syzkaller #0 [ 3451.039606][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 3451.049663][ C1] RIP: 0010:__queue_work+0x575/0xd30 [ 3451.054958][ C1] Code: 39 2b 0f 84 b9 00 00 00 e8 a8 dc 28 00 4c 89 ff e8 b0 09 ad 03 49 bc 00 00 00 00 00 fc ff df 4c 8b 6d d0 4c 89 e8 48 c1 e8 03 <42> 80 3c 20 00 74 08 4c 89 ef e8 ec 50 6d 00 49 8b 7d 00 e8 93 05 [ 3451.074656][ C1] RSP: 0018:ffffc900001b0c70 EFLAGS: 00010046 [ 3451.080728][ C1] RAX: 0000000000000000 RBX: 000000007fffffff RCX: ffff888167a71440 [ 3451.088705][ C1] RDX: 0000000000000100 RSI: 000000007fffffff RDI: 000000007fffffff [ 3451.096677][ C1] RBP: ffffc900001b0d08 R08: fffffffffffffffb R09: 0000000000000007 [ 3451.104651][ C1] R10: ffffed1023ed3139 R11: 1ffff11023ed3139 R12: dffffc0000000000 [ 3451.112623][ C1] R13: 0000000000000000 R14: ffff88811f6989c8 R15: 0000000000000008 [ 3451.120594][ C1] FS: 00007fe4dc9a66c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 3451.129525][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3451.136111][ C1] CR2: 00002000000f8030 CR3: 00000001281f5000 CR4: 00000000003506a0 [ 3451.144087][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 3451.152075][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 3451.160047][ C1] Call Trace: [ 3451.163336][ C1] [ 3451.166188][ C1] delayed_work_timer_fn+0x61/0x80 [ 3451.171308][ C1] ? __cfi_delayed_work_timer_fn+0x10/0x10 [ 3451.177125][ C1] call_timer_fn+0x46/0x2a0 [ 3451.181635][ C1] ? __cfi_delayed_work_timer_fn+0x10/0x10 [ 3451.187449][ C1] __run_timers+0x667/0x9a0 [ 3451.191960][ C1] ? calc_index+0x200/0x200 [ 3451.196466][ C1] ? kvm_sched_clock_read+0x18/0x40 [ 3451.201673][ C1] run_timer_softirq+0x6a/0xf0 [ 3451.206440][ C1] handle_softirqs+0x1d7/0x600 [ 3451.211207][ C1] ? irqtime_account_irq+0xc4/0x240 [ 3451.216414][ C1] __irq_exit_rcu+0x52/0xf0 [ 3451.220918][ C1] irq_exit_rcu+0x9/0x10 [ 3451.225157][ C1] sysvec_call_function_single+0xa6/0xc0 [ 3451.230797][ C1] [ 3451.233729][ C1] [ 3451.236690][ C1] asm_sysvec_call_function_single+0x1b/0x20 [ 3451.242765][ C1] RIP: 0010:finish_task_switch+0x173/0x7b0 [ 3451.248585][ C1] Code: 80 3c 2b 00 74 08 4c 89 f7 e8 99 11 68 00 4d 8b 2e 4d 85 ed 0f 85 cd 00 00 00 4c 89 e7 e8 25 ca a7 03 fb 49 8d 9f 48 0b 00 00 <48> 89 d8 48 c1 e8 03 49 bd 00 00 00 00 00 fc ff df 42 0f b6 04 28 [ 3451.268214][ C1] RSP: 0018:ffffc900017f73c0 EFLAGS: 00000282 [ 3451.274289][ C1] RAX: 0000000080000001 RBX: ffff888167a71f88 RCX: 0000000000000000 [ 3451.282264][ C1] RDX: 0000000000000001 RSI: 0000000000000004 RDI: 00000000ffffffff [ 3451.290669][ C1] RBP: ffffc900017f7410 R08: dffffc0000000000 R09: ffffed1022fc128e [ 3451.298731][ C1] R10: ffffed1022fc128e R11: 1ffff11022fc128d R12: ffff8881f7137d80 [ 3451.306812][ C1] R13: 0000000000000000 R14: 0000000000000000 R15: ffff888167a71440 [ 3451.314794][ C1] ? __switch_to_asm+0x3a/0x60 [ 3451.319577][ C1] __schedule+0xb8f/0x14e0 [ 3451.324006][ C1] ? __sched_text_start+0x8/0x8 [ 3451.328863][ C1] ? avc_has_perm+0x158/0x240 [ 3451.333547][ C1] schedule+0xbd/0x170 [ 3451.337616][ C1] schedule_timeout+0xa6/0x2e0 [ 3451.342380][ C1] ? __cfi_schedule_timeout+0x10/0x10 [ 3451.347751][ C1] ? _raw_spin_unlock_irqrestore+0x5a/0x80 [ 3451.353731][ C1] ? prepare_to_wait_exclusive+0x191/0x1d0 [ 3451.359561][ C1] unix_wait_for_peer+0x1e5/0x2e0 [ 3451.364592][ C1] ? unix_find_other+0x880/0x880 [ 3451.369533][ C1] ? __cfi_autoremove_wake_function+0x10/0x10 [ 3451.375610][ C1] ? __cfi__raw_spin_lock+0x10/0x10 [ 3451.380838][ C1] ? security_unix_may_send+0x8c/0xb0 [ 3451.386212][ C1] unix_dgram_sendmsg+0xed4/0x16d0 [ 3451.391343][ C1] ? __cfi_unix_dgram_sendmsg+0x10/0x10 [ 3451.396895][ C1] ? security_socket_sendmsg+0x93/0xb0 [ 3451.402355][ C1] ? __cfi_unix_dgram_sendmsg+0x10/0x10 [ 3451.407909][ C1] ____sys_sendmsg+0x5a9/0x990 [ 3451.412675][ C1] ? _raw_spin_unlock+0x4c/0x70 [ 3451.417536][ C1] ? __sys_sendmsg_sock+0x40/0x40 [ 3451.422659][ C1] ? __schedule+0xb8f/0x14e0 [ 3451.427253][ C1] ? import_iovec+0x7c/0xb0 [ 3451.431765][ C1] ___sys_sendmsg+0x21c/0x290 [ 3451.436448][ C1] ? __sys_sendmsg+0x270/0x270 [ 3451.441219][ C1] ? futex_unqueue+0x132/0x160 [ 3451.445994][ C1] ? __cfi_futex_wait+0x10/0x10 [ 3451.450863][ C1] ? __fdget+0x19c/0x220 [ 3451.455108][ C1] __sys_sendmmsg+0x274/0x460 [ 3451.459819][ C1] ? __cfi___sys_sendmmsg+0x10/0x10 [ 3451.465034][ C1] ? fpregs_restore_userregs+0x128/0x260 [ 3451.470673][ C1] __x64_sys_sendmmsg+0xa0/0xb0 [ 3451.475560][ C1] x64_sys_call+0x3f5/0x9a0 [ 3451.480071][ C1] do_syscall_64+0x4c/0xa0 [ 3451.484488][ C1] ? clear_bhb_loop+0x30/0x80 [ 3451.489208][ C1] ? clear_bhb_loop+0x30/0x80 [ 3451.493919][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3451.499824][ C1] RIP: 0033:0x7fe4dbb8efc9 [ 3451.504246][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3451.523858][ C1] RSP: 002b:00007fe4dc9a6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 3451.532617][ C1] RAX: ffffffffffffffda RBX: 00007fe4dbde5fa0 RCX: 00007fe4dbb8efc9 [ 3451.540594][ C1] RDX: 0000000000000651 RSI: 0000200000000000 RDI: 0000000000000005 [ 3451.548574][ C1] RBP: 00007fe4dbc11f91 R08: 0000000000000000 R09: 0000000000000000 [ 3451.556544][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3451.564601][ C1] R13: 00007fe4dbde6038 R14: 00007fe4dbde5fa0 R15: 00007ffe7afa4a58 [ 3451.572577][ C1] [ 3451.575605][ C1] Modules linked in: [ 3451.579509][ C1] ---[ end trace 0000000000000000 ]--- [ 3451.584971][ C1] RIP: 0010:__queue_work+0x575/0xd30 [ 3451.590382][ C1] Code: 39 2b 0f 84 b9 00 00 00 e8 a8 dc 28 00 4c 89 ff e8 b0 09 ad 03 49 bc 00 00 00 00 00 fc ff df 4c 8b 6d d0 4c 89 e8 48 c1 e8 03 <42> 80 3c 20 00 74 08 4c 89 ef e8 ec 50 6d 00 49 8b 7d 00 e8 93 05 [ 3451.610008][ C1] RSP: 0018:ffffc900001b0c70 EFLAGS: 00010046 [ 3451.616082][ C1] RAX: 0000000000000000 RBX: 000000007fffffff RCX: ffff888167a71440 [ 3451.624056][ C1] RDX: 0000000000000100 RSI: 000000007fffffff RDI: 000000007fffffff [ 3451.632113][ C1] RBP: ffffc900001b0d08 R08: fffffffffffffffb R09: 0000000000000007 [ 3451.640088][ C1] R10: ffffed1023ed3139 R11: 1ffff11023ed3139 R12: dffffc0000000000 [ 3451.648061][ C1] R13: 0000000000000000 R14: ffff88811f6989c8 R15: 0000000000000008 [ 3451.656119][ C1] FS: 00007fe4dc9a66c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 3451.665049][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3451.671636][ C1] CR2: 00002000000f8030 CR3: 00000001281f5000 CR4: 00000000003506a0 [ 3451.679607][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 3451.687578][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 3451.695637][ C1] Kernel panic - not syncing: Fatal exception in interrupt [ 3451.703123][ C1] Kernel Offset: disabled [ 3451.707446][ C1] Rebooting in 86400 seconds..