last executing test programs: 12m4.557208793s ago: executing program 0 (id=1021): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x3000003, 0x4031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000062b000/0x2000)=nil, 0x1d5000, 0x40000000, 0x3, &(0x7f00009f6000/0x3000)=nil) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000180)={0xc, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) r4 = openat$vimc1(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_open_dev$vbi(0x0, 0x1, 0x2) setitimer(0x2, &(0x7f0000000080)={{0x6, 0xfffffffffffffffb}, {0x7, 0x100000001}}, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r4, 0xc0485661, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0) r5 = socket$inet(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f0000002700)=@raw={'raw\x00', 0x8, 0x3, 0x2a0, 0x208, 0x8, 0xfa04, 0x0, 0x6c02, 0x208, 0x194, 0x194, 0x208, 0x194, 0x3, 0x0, {[{{@ip={@empty=0x1e00, @broadcast, 0x0, 0x0, 'veth0_to_hsr\x00', 'veth0_virt_wifi\x00', {}, {}, 0x6}, 0x0, 0xa0, 0xc8, 0x0, {0x0, 0x74020000}, [@common=@inet=@tcp={{0x30}, {[], [], 0x0, 0x0, 0x7a}}]}, @common=@inet=@TCPMSS={0x28}}, {{@ip={@multicast1, @rand_addr, 0x0, 0x0, 'batadv_slave_0\x00', 'pimreg\x00'}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@unspec=@helper={{0x48}, {0x0, 'amanda\x00'}}, @common=@unspec=@connlimit={{0x40}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x300) r6 = io_uring_setup(0x60f7, &(0x7f0000000a40)={0x0, 0x0, 0x40, 0x2, 0x3bd}) r7 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r7, &(0x7f0000000000)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) close_range(r6, r7, 0x0) 12m2.78861302s ago: executing program 0 (id=1025): r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) pread64(r0, 0x0, 0x0, 0x6) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) landlock_create_ruleset(&(0x7f00000002c0)={0x280, 0x3}, 0x10, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$media(0x0, 0x3, 0x80000) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x1) socket(0x28, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000b00)=@raw={'raw\x00', 0x8, 0x3, 0x428, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x358, 0xffffffff, 0xffffffff, 0x358, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00', {}, {}, 0x6c}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00'}, 0x0, 0x258, 0x288, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x3ff, 0x0, 0x78}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x488) r5 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="18000000181401000000000003000000080007"], 0x18}, 0x1, 0xf00, 0x0, 0x40}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)=',', 0x1}], 0x1, 0x0, 0x0, 0x2c}, 0x44004) 12m0.958878239s ago: executing program 0 (id=1032): sendmsg$netlink(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000008c0)}, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x28, 0x0, 0x2, 0xfffff034}]}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000080)=0x80000400000bce) r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000001400), 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000007e00)=[{{&(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3e}}, 0x10, &(0x7f0000000800)=[{&(0x7f00000000c0)="8e", 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0xb, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000300)=0x3) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/wireless\x00') preadv(r3, &(0x7f0000000100)=[{&(0x7f0000000280)=""/254, 0xfe}], 0x1, 0x1fc, 0x0) io_submit(0x0, 0x0, 0x0) r4 = syz_open_dev$vim2m(&(0x7f0000000000), 0x7, 0x2) ioctl$vim2m_VIDIOC_G_FMT(r4, 0xc0285629, &(0x7f0000000080)={0x3, @win={{0x2, 0x0, 0x0, 0x3}, 0x5, 0xfffffffc, &(0x7f0000000040)={{0xfffffffd, 0x8, 0x80, 0xfffffffc}}, 0x0, 0x0}}) futex(&(0x7f0000000000), 0x8c, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xc, &(0x7f0000000080), 0x4) r5 = shmget$private(0x0, 0x3000, 0x54001800, &(0x7f000010d000/0x3000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xf, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000001000100811203000000000095"], &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x400, @void, @value}, 0x94) 11m57.533510013s ago: executing program 0 (id=1041): syz_open_dev$tty1(0xc, 0x4, 0x1) socket(0x1d, 0x2, 0x6) socket$inet6_tcp(0xa, 0x1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0xc0241, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$afs(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='dyn']) chdir(&(0x7f00000000c0)='./file0\x00') unlink(&(0x7f0000000140)='./file0\x00') socket$inet6_tcp(0xa, 0x1, 0x0) memfd_create(&(0x7f0000000bc0)='\xc0\x87:*\x18\xc1k\xa7\x87[\xa0o84I\xaaK\xa5\xd3\v\x86\xca<\x7f\xfd6\x8d}\xd8\xf2G\xb8\xeae)\x90\x86\xe3\x96\b\xe0\xfa\xb1\xd8N\xb2W\xcb\x8d}3lm8\xa57\xc9\x00HO\x00\x00\x00\x00R\xfc\xcb%u3\xec\xde%\x9d\xe4\x1d\rD\x82S\x17?\xd6\xb1\x9aF\xe2\xba[\xc7QR\x9f\x81\x8b\xdc\xc7\xdc\xdem\xbe\x7f2\x11\x17\xd8\xda@4\x9f\xc5*T\x1e^\xf7o\xff\xff\xff\xffwI\x02\xf3\xe3\x8d.\xd1=\xcf\xbf\x81\xb5\x8d%K\x1d\xe7_\xde\x87\xdd\xc1\xf0\x91\x1a!\xa5\xd3\v\xc9\x95d\xe3*\xa9\xfa\x99\xae\xb8\x89>\xc9\xf2/\x13{\x1a\x7f\x00\x00\x00\x00+$\xedX\xb7KV\x90\xc3D-\xf3\x8c\x9a\x15\x9c\xf5\xb4O\x17@d\x81+\xf6\xe6+\xed\r\xd2\xb3\xaa\x9b\x7fC\'\xa2\xf6\x12\xa1\x15Punfo\x7f\x92G\x0e.\xce\xd8h\xb9p2\xccC\xbaH\xc4\xdc\xe2\xa1%)\x85\xc7O]\'9\x92\xad\xfbJ\x02\x1d\x91-\xc99\t&\xbdq\x06`T\xc8\x92\xaf\xad\x06\xdd\xaf\x84\xf4\"\x13\xcf\xe5\x93D\xad~F\xe5\x19\xaa\xaa\xb2\xb1\x03m\x82+\x06\x1bF^\xd3n\xc4F\xc1\xc08\x94\xe6\xe5\x1f\xa7\xf6\xcaA\x90T\xf1\x1b\xe6\xb9\xe7\xff\xc5H\x04\x93\xca\xad\x17UlY\x9a}\r4\xac\x93\xac\v2\xc6\xf9\xbe\xfeI\x8b\xd4/`\xab\x1e\xcf\x7f\b\x94\xfe2.{\xc1\xbe\x9bth~\xcb\xb9E\x10W\xed\xed51[z\xb6>\xd3\xe7Y*\xdb\xa7h\nt\xddP\n\xc5\xeb\xb1ux\x94@\x00\x00g\x02D9\x83\xa7\x97\xf4\xb25wL\x97\xfb\xb9\xccj\xb3\x96\xc1@\xee`{\x87\xa8]\x96\x9cjF^+\xcc1l\xcbmA,5\xc4J\xcab\xa6\x91\xa0\xeaU\x92\x01\x1f,\xfa\x10\"+\x01\x00\x91\xe9\x1cz\xd1f\x901\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00o\"\x85Np\xba\x0e<\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb8V\xe4\xa1C\x90\x17\xcc{\x9d\xf1\xbd\xb0\xca\x03\x96\x85h}\x8f\x1c)X\xc83rA\x90r\xb6\xba!;\x95\xaf\xe0\xcb\xec\xcd$\x02f\x8c4\x1aH\x8fC\xbfr\xd39\x92\x1fShu\x9e\b\xd4m\xa8\x16\xa6\xd5\xae\xcb\x03oFQ\"\xf7F\xb7\vp\xb6\xe5\x92\xe2O}.\x95A\x9bH\x8d\xa1\x80\x1b\x14u\xfdK\xce\xaf\x94i\xf1s\xf7\xb8Jq\xcb3=M\x84\x7f\x181/\x9bQ|4\xaf\xcf\r\xcfz Z\x19\xad_\x13\x99\xf7\xfdOD\xd3\x9d\x9d\xb8d5g\xf1\x84\xbd\xe5\xa2\xb3\xda\x82\x10n1\xed\xba\xe3\x96\x85\"\xb6\xa6n\xe7\xfd\xd4\a\x97\x85\x810/\xc4o\x11\xc8\x1b\xc0\f\xeec\xa4\x7f|P\x00\x00\x00\x000p\xaf\xfdk\xac\xcc\xac`\xc9\a<\xadIt\x9b\xeb\x8a\xfe\x9b\aO\xa5?h\xe1B\xa8C\x8e;/\xa8\x94\x1bs\xf0\xa9>\x9e\xff\xc9\xd2\x00h\xcb\xfb\xb6Y\xbfp\xd8\x90\x96\xec\x83N\x8bNnx\xb6\x16Y\xf8sU\xae\xa0\b\x8cLq\n\x1f\x99t\xb6\xffozu\xa0B(\xe9?\xcdA\xba\xa8\x13Qc\xda\x16?\xe8z\x8f\x862!\xbf\xa4\xb8\x9bC\xe9Od\xe8\xd32m\x06RX\x7f\xf7\xc2\n\x94\xe5P:l\xd9\xd5\xbd\rH6-\x8a\x12m\xff\xe9\xa0\r\tk\xda\xa4q(\xae\\\xb6\x14I\xf7\xe0z\xf10xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$FBIOPUT_CON2FBMAP(0xffffffffffffffff, 0x4610, &(0x7f0000000280)={0x1e, 0x2}) syz_open_dev$usbfs(&(0x7f0000000180), 0x14af, 0x10000) r4 = syz_io_uring_setup(0x117, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x3a6}, 0x0, &(0x7f0000000200)=0x0) syz_io_uring_submit(0x0, r5, 0x0) socket$alg(0x26, 0x5, 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) r6 = inotify_init1(0x0) inotify_add_watch(r6, &(0x7f0000000200)='./bus\x00', 0x6000000b) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000400)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) io_uring_enter(r4, 0x47f6, 0x80ffff, 0x0, 0x0, 0x0) 11m52.46823255s ago: executing program 32 (id=1051): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x400448e4, &(0x7f00000000c0)={0x0, 0x0, "a4cd91"}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0x88, 0x30, 0x1, 0x0, 0x0, {}, [{0x74, 0x1, [@m_ct={0x44, 0x42, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x9d, 0x11641e7a, 0x20000000, 0x2, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_ife={0x2c, 0x20, 0x0, 0x0, {{0x8}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x804}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$FBIOPUT_CON2FBMAP(0xffffffffffffffff, 0x4610, &(0x7f0000000280)={0x1e, 0x2}) syz_open_dev$usbfs(&(0x7f0000000180), 0x14af, 0x10000) r4 = syz_io_uring_setup(0x117, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x3a6}, 0x0, &(0x7f0000000200)=0x0) syz_io_uring_submit(0x0, r5, 0x0) socket$alg(0x26, 0x5, 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) r6 = inotify_init1(0x0) inotify_add_watch(r6, &(0x7f0000000200)='./bus\x00', 0x6000000b) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000400)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) io_uring_enter(r4, 0x47f6, 0x80ffff, 0x0, 0x0, 0x0) 8m9.314013703s ago: executing program 2 (id=1518): socket$inet_mptcp(0x2, 0x1, 0x106) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) r4 = memfd_create(&(0x7f0000000000)='e\xf4E\x88-\x00', 0x0) r5 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_INIT(r5, 0x29, 0xc8, &(0x7f0000000340), 0x4) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x1, 0x6, 0x0, 0x4}, 0xc) setsockopt$MRT6_FLUSH(r5, 0x29, 0xd4, &(0x7f0000000080)=0x6, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f0000000100)={'macvlan1\x00', &(0x7f0000000080)=@ethtool_cmd={0x26, 0x10000180}}) pwritev(r4, &(0x7f0000000040)=[{&(0x7f0000000480)="db", 0x1}], 0x1, 0x4000001, 0x0) sendfile(r3, r4, 0x0, 0x8000fb00) msgsnd(0x0, 0x0, 0x0, 0x0) 8m7.817776839s ago: executing program 1 (id=1520): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000780)={{0x14}, [@NFT_MSG_NEWRULE={0x54, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x28, 0x4, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_DREG={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_EXTHDR_OP={0x8, 0x6, 0x1, 0x0, 0x4}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFT_MSG_NEWRULE={0x34, 0x6, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x4}]}], {0x14}}, 0xb0}}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() r2 = fspick(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x80000, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r5, 0x2285, &(0x7f00000005c0)={0x53, 0xfffffffc, 0x6, 0x0, @buffer={0x0, 0xca, &(0x7f0000000300)=""/202}, &(0x7f00000000c0)="008d7acda0b2", 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB], 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) r6 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r6, &(0x7f0000000740)={&(0x7f0000000040)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@cswp={0x58, 0x114, 0x7, {{}, 0x0, 0x0}}], 0x58}, 0x0) open(0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) ioctl$TIOCSERGETLSR(r7, 0x5459, &(0x7f0000000040)) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x32, &(0x7f0000000080)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x70bd2d, 0x25dfdbff, {}, [@IFLA_MTU={0x8, 0x4, 0x42}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 8m6.250404772s ago: executing program 1 (id=1523): openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000100)=0xcf5) bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xc, 0x8b}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0xc000) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r3, 0x6, 0x1c, 0x0, &(0x7f0000000240)) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x7, 0x1, 0x0, r4}, {}, {}, {0x85, 0x0, 0x0, 0x2f}, {0x4}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x0, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9, 0x0, 0xb}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8, 0x20}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0x7}, {0x18, 0x9, 0x2, 0x0, r4}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8, 0x4}, {0x6, 0x0, 0x5, 0x7}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x6, @local, 0x0, 0x0, 'lc\x00'}, 0x2c) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000680)={0x4, 0x6, 0xf, 0xc, 0x4, "1d451546ed47cd95e7c9744ce42b45e4bada7b", 0x7, 0x234}) syz_open_dev$usbmon(0x0, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) io_uring_setup(0x2edd, &(0x7f0000000480)={0x0, 0x1, 0x2, 0x80003}) 8m4.22469881s ago: executing program 1 (id=1527): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000180)=ANY=[@ANYBLOB="700000001000030500"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x70}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$vicodec0(0xffffff9c, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) ioctl$FBIOPUT_CON2FBMAP(0xffffffffffffffff, 0x4610, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffd000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdir(&(0x7f0000000140)='./control\x00', 0x0) mount$afs(0x0, &(0x7f00000000c0)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="64796e2c00b1"]) mount$afs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='dyn,']) munlockall() socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000001640)=0x4f1d, 0x4) sendmmsg$inet(r4, &(0x7f0000001540)=[{{0x0, 0xfffffffffffffda1, 0x0}}], 0x40001b6, 0x0) close(r5) openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000000)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "120008", 0x18, 0x3a, 0x0, @private2, @loopback, {[], @mld={0x83, 0x0, 0x0, 0x9, 0xc036, @remote}}}}}}, 0x0) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x5, 0xb68, 0x6, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 8m2.916702085s ago: executing program 1 (id=1531): r0 = add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="1d", 0xfe3a, 0xfffffffffffffffe) keyctl$link(0x8, r0, r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xb, &(0x7f0000000300)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0, r1}, 0x18) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x800, 0x3, &(0x7f0000006680)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x19) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='clear_refs\x00') writev(r2, &(0x7f0000000100)=[{&(0x7f00000004c0)='4', 0x1}], 0x9) mremap(&(0x7f00000ae000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0xfffffffffffffffe}, 0x0) r3 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r3, &(0x7f0000019680)=""/102392, 0x18ff8) 8m0.196831002s ago: executing program 2 (id=1535): syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000300)={0x8, 0x20000008c}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) socket$unix(0x1, 0x1, 0x0) fanotify_init(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = syz_io_uring_setup(0x10d, &(0x7f0000000980)={0x0, 0x5885, 0x80, 0x2}, &(0x7f0000000340)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(r6, r7, &(0x7f00000002c0)=@IORING_OP_OPENAT2={0x1c, 0x1, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)={0x400080, 0x100, 0x8}, &(0x7f0000000100)='./file0\x00', 0x18, 0x0, 0x23456, {0x0, r8}}) io_uring_enter(r5, 0x3516, 0x1, 0x0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1, {0x7, 0x29, 0x0, 0xffffffff85000014, 0x4, 0x7}}, 0x50) openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(r0, &(0x7f00000042c0), 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006380)={0x20, 0x0, 0x0, {0x0, 0x8}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 7m58.748682008s ago: executing program 2 (id=1538): r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000d00), r0) sendmsg$NL80211_CMD_SET_MPATH(r0, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000dc0)={&(0x7f0000000d80)=ANY=[@ANYRES16=r1, @ANYBLOB="01002dbd700001dbdf2596000000", @ANYRES32, @ANYBLOB="0a001a0008021100000000000a0006"], 0x34}}, 0x40) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x100008b}, 0x0) sched_setaffinity(0x0, 0x11, &(0x7f0000000180)=0x1400200bce) sched_setscheduler(0x0, 0x1, &(0x7f0000002200)=0x1) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000002700)=""/102392, 0x18ff8) getpid() bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) modify_ldt$write2(0x11, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, 0x0, 0x40) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'wp256-generic\x00'}, 0x58) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000000340)="8224aca5f41b9e0ec5e7a706c919e7c0e343f0cd0a779c17e7f992396b09252009d2d12e9475a57ec39f71417044cf4151af34ac1dfd5d87cdd80bc4c24478821f64d4d971bbc1fc7bdd181a839344917165bb9cd0fa568aac55d8e38ee30fd3a9bc63e2656b6941c812e6ea0692ec276deb2b7b817906cf8c5429a42164e8bb521e216e554d509a0fd0d86729b5f4b9a01fb336bef1be8a68a628452b83a7404087d4bcb64f6ecad05459d12595d5b8b2657f2f29656a15e5a18e3168946dcb5faa", 0xc2}, {&(0x7f00000004c0)="62c99e05d98775ed1beb5d67431ead896f7060f03e5b8671b283168d0df1573bef271f3a22b9cac06e27c7e87b34a19188d3e10e670bc070f0d3eb88d2f891d242747e0deec4a10609b12d4058b0fbff28bb01e6e49b533b03b11288ff4da1ab3226a2e3ba5fc47969142f1a1a0ca9ba4cece2ac9a5fcd89343de7e57dfcbb6216499555bd04f2fcb91c3c6c72868a3797ec63f8138ab74b5034878812df8b0445704cb33f81bffed93c3e645a206db134f626a59f4fac53fbf23489cf2f45d05d735e64033376671da045df97bcb989bda1d17ba14afbfd19e32a8222ebf934c17fed", 0xe3}, {&(0x7f00000005c0)="f2b314c96d500b66f7fd46493862d9eb11d188464208592330ac48243628", 0x1e}], 0x3}}], 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'syzkaller0\x00'}) r6 = syz_init_net_socket$ax25(0x3, 0x5, 0xcb) bind$ax25(r6, &(0x7f0000000000)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) socket(0x10, 0x803, 0x0) 7m57.743254696s ago: executing program 1 (id=1542): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="beef915d564c90c200"/21, 0x15) r1 = syz_open_dev$dri(0x0, 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r1, 0xc01064bd, &(0x7f0000000040)={0x0}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) r2 = landlock_create_ruleset(&(0x7f0000002a80)={0x1a20, 0x2, 0x2}, 0x18, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x2) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r2, 0x1, &(0x7f0000002e40)={0x0, r3}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000400)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r5, &(0x7f0000008b00), 0x0, 0x80, &(0x7f0000008d00)={0x0, 0x989680}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, r7}, 0x38) connect$unix(r5, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) bpf$TOKEN_CREATE(0x24, &(0x7f00000000c0)={0x0, r0}, 0x8) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r8}, 0x10) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWRULE={0x4c, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x20, 0x4, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_OP={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x74}}, 0x0) 7m56.425961079s ago: executing program 2 (id=1545): socket$inet_mptcp(0x2, 0x1, 0x106) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) r4 = memfd_create(&(0x7f0000000000)='e\xf4E\x88-\x00', 0x0) r5 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_INIT(r5, 0x29, 0xc8, &(0x7f0000000340), 0x4) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x1, 0x6, 0x0, 0x4}, 0xc) setsockopt$MRT6_FLUSH(r5, 0x29, 0xd4, &(0x7f0000000080)=0x6, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f0000000100)={'macvlan1\x00', &(0x7f0000000080)=@ethtool_cmd={0x26, 0x10000180}}) pwritev(r4, &(0x7f0000000040)=[{&(0x7f0000000480)="db", 0x1}], 0x1, 0x4000001, 0x0) sendfile(r3, r4, 0x0, 0x8000fb00) msgsnd(0x0, 0x0, 0x0, 0x0) 7m56.408350768s ago: executing program 1 (id=1546): mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) pipe(&(0x7f00000045c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r1) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x42, 0x0) read$FUSE(r4, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r4, &(0x7f0000000040)={0x50, 0x0, r5, {0x7, 0x1f, 0x0, 0x10400}}, 0x50) syz_fuse_handle_req(r4, 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20, 0x0, 0x0, {0x0, 0x11}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x101001, 0x0) writev(r6, &(0x7f0000000000)=[{&(0x7f0000000280)='>', 0x1}], 0x1) r7 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r7, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, r7, 0x0) openat$cgroup_type(r2, &(0x7f0000000080), 0x2, 0x0) vmsplice(r3, &(0x7f0000000140)=[{&(0x7f00000015c0)='5', 0xfe70}], 0x1, 0xb) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r8 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r8, &(0x7f0000019680)=""/102392, 0x18ff8) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x8000, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f0000000500), 0x0, &(0x7f0000000440)={[{@uuid_off}, {@lowerdir={'lowerdir', 0x3d, './bus'}, 0x3a}], [], 0x2f}) 7m54.093808822s ago: executing program 2 (id=1552): bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) r1 = getpid() fcntl$lock(r0, 0x25, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x400000000000, r1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001d40)={0x0, r2}, 0x18) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240), 0x180020, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@version_L}, {@directio}], [{@hash}, {@subj_type={'subj_type', 0x3d, 'sched_switch\x00'}}, {@measure}, {@obj_type}]}}) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r3, 0x800448f0, &(0x7f0000000040)={0x3, 0x3, "98f2b1", 0x54}) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r4 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="ff0000000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/27], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_SET(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000880)={0x34, r9, 0x1, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x20, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe0c}]}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x48c05}, 0x4040140) sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000400)={&(0x7f0000000380), 0xffffffffffffff48, &(0x7f0000000300)={&(0x7f0000001f40)=ANY=[], 0x150}, 0x1, 0x0, 0x0, 0x1}, 0x4044000) r10 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r10, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=ANY=[@ANYBLOB="0203000310000000000000000000000002000900080000000a0000000000000005000600000000000a0000000000000000000000004000000000000000000001000000000000000002000100000000000000060c0000000005000500000000000a0000000000000000000000000000000000000000000001"], 0x80}, 0x1, 0x7}, 0x0) 7m53.065977499s ago: executing program 2 (id=1554): mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) pipe(&(0x7f00000045c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r1) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x42, 0x0) read$FUSE(r4, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r4, &(0x7f0000000040)={0x50, 0x0, r5, {0x7, 0x1f, 0x0, 0x10400}}, 0x50) syz_fuse_handle_req(r4, 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20, 0x0, 0x0, {0x0, 0x11}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x101001, 0x0) writev(r6, &(0x7f0000000000)=[{&(0x7f0000000280)='>', 0x1}], 0x1) r7 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r7, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, r7, 0x0) openat$cgroup_type(r2, &(0x7f0000000080), 0x2, 0x0) vmsplice(r3, &(0x7f0000000140)=[{&(0x7f00000015c0)='5', 0xfe70}], 0x1, 0xb) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r8 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r8, &(0x7f0000019680)=""/102392, 0x18ff8) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x8000, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f0000000500), 0x0, &(0x7f0000000440)={[{@uuid_off}, {@lowerdir={'lowerdir', 0x3d, './bus'}, 0x3a}], [], 0x2f}) 7m40.018378411s ago: executing program 33 (id=1546): mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) pipe(&(0x7f00000045c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r1) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x42, 0x0) read$FUSE(r4, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r4, &(0x7f0000000040)={0x50, 0x0, r5, {0x7, 0x1f, 0x0, 0x10400}}, 0x50) syz_fuse_handle_req(r4, 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20, 0x0, 0x0, {0x0, 0x11}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x101001, 0x0) writev(r6, &(0x7f0000000000)=[{&(0x7f0000000280)='>', 0x1}], 0x1) r7 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r7, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, r7, 0x0) openat$cgroup_type(r2, &(0x7f0000000080), 0x2, 0x0) vmsplice(r3, &(0x7f0000000140)=[{&(0x7f00000015c0)='5', 0xfe70}], 0x1, 0xb) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r8 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r8, &(0x7f0000019680)=""/102392, 0x18ff8) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x8000, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f0000000500), 0x0, &(0x7f0000000440)={[{@uuid_off}, {@lowerdir={'lowerdir', 0x3d, './bus'}, 0x3a}], [], 0x2f}) 7m35.644508335s ago: executing program 34 (id=1554): mkdir(&(0x7f0000000580)='./bus\x00', 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) pipe(&(0x7f00000045c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r1) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x42, 0x0) read$FUSE(r4, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r4, &(0x7f0000000040)={0x50, 0x0, r5, {0x7, 0x1f, 0x0, 0x10400}}, 0x50) syz_fuse_handle_req(r4, 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20, 0x0, 0x0, {0x0, 0x11}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x101001, 0x0) writev(r6, &(0x7f0000000000)=[{&(0x7f0000000280)='>', 0x1}], 0x1) r7 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r7, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, r7, 0x0) openat$cgroup_type(r2, &(0x7f0000000080), 0x2, 0x0) vmsplice(r3, &(0x7f0000000140)=[{&(0x7f00000015c0)='5', 0xfe70}], 0x1, 0xb) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r8 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r8, &(0x7f0000019680)=""/102392, 0x18ff8) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x8000, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f0000000500), 0x0, &(0x7f0000000440)={[{@uuid_off}, {@lowerdir={'lowerdir', 0x3d, './bus'}, 0x3a}], [], 0x2f}) 3m0.054579314s ago: executing program 5 (id=2156): io_uring_setup(0x5691, &(0x7f0000000040)={0x0, 0xd840, 0x10, 0x0, 0xb}) clock_adjtime(0x1, &(0x7f0000000180)={0x2, 0x9, 0x80, 0xec90, 0x36e, 0xfffffffffffffffc, 0xc2, 0x1, 0x8, 0x8, 0x80000001, 0x4, 0x40, 0x4, 0x1, 0x0, 0xf40, 0x6, 0xffffffffffffffff, 0x9, 0x896, 0x7ffe, 0x100000001, 0x8, 0x7, 0x7}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) sched_setaffinity(0x0, 0xfffffef7, &(0x7f0000000740)=0x410000002) fsopen(&(0x7f0000000280)='ceph\x00', 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x11) ioctl$UI_SET_LEDBIT(r2, 0x40045569, 0x5) ioctl$UI_DEV_SETUP(r2, 0x405c5503, 0x0) prlimit64(0x0, 0xa, &(0x7f0000000040)={0x800, 0xfffffffffffffffa}, 0x0) ioctl$UI_DEV_CREATE(r2, 0x5501) ioctl$UI_DEV_DESTROY(r2, 0x5502) r3 = socket(0x10, 0x3, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000080)=0x474c, 0x4) bind$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r4, &(0x7f0000007fc0), 0x800001d, 0x0) setsockopt$inet_int(r4, 0x0, 0x12, &(0x7f0000000040)=0xe, 0x4) setsockopt$inet_int(r4, 0x0, 0x7, &(0x7f0000000180)=0x40000000, 0x4) recvmmsg(r4, &(0x7f0000000040), 0x291962b, 0x45833af92e4b39ff, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000180)=0xc) 2m59.466050789s ago: executing program 5 (id=2157): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) socket(0x1d, 0x5, 0xe044) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='contention_end\x00', r4}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000003c000900000000000000000002"], 0x24}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000300)={'vcan0\x00'}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='blkio.throttle.io_serviced\x00', 0x275a, 0x0) r7 = add_key$user(&(0x7f0000000440), &(0x7f0000002180)={'syz', 0x1}, &(0x7f0000000240)="8b", 0x1, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000002300), &(0x7f0000002340)={'syz', 0x3}, &(0x7f0000000100)="370c099069effa43de3e1404db09b4ce1ef77bde4b371532dd16447c1b13403656c86711f6e750026f23029a50d44299c7bf5c78dc5efae2d041016160e8bef7b30c05e298aa9572540dd950307987eef2115e1bcf512bea3410ca5a9e9f827e4b13490dbbd4fc5a45e0738b959acafd2c12863045265bcbc2c9426ac3f614746b436fe86a72dc642dd67d970604a69b4f22cd0076beedc18056ab4bea4c825b69a7a77adcd5488684872b1bb9eb84586549e11b080468668e8fd0e52ce0705a", 0xc0, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r7, r8, r7}, &(0x7f0000000480)=""/199, 0xc7, &(0x7f0000000580)={&(0x7f0000000340)={'blake2b-256\x00'}}) fcntl$lock(r6, 0x25, &(0x7f00000004c0)={0x0, 0x0, 0x7ffffffffffd, 0x3}) syz_open_dev$sg(&(0x7f00000003c0), 0x0, 0x802) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001200)={{0x14}, [@NFT_MSG_NEWRULE={0x54, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x28, 0x4, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, @numgen={{0xb}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_NG_DREG={0x8, 0x1, 0x1, 0x0, 0x14}, @NFTA_NG_MODULUS={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x7c}}, 0x0) 2m57.218708145s ago: executing program 5 (id=2163): r0 = memfd_create(0x0, 0x6) ftruncate(r0, 0xffff) fcntl$addseals(r0, 0x409, 0x7) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e00000000000000010000000700000000000000", @ANYRES32=0x1, @ANYBLOB="00f0fdffffff0000000000000000000000000000009f97cb5fbc440a2c6472ab3bc16edc32759ffaf8e3dd30696612d43843901a2174c3ade62db8c8dfaa001481dda1b9eda96425a820b0bb6a4f89d603803352c89e2d1df9dbccc3b9afed20281ece3972234b0d491864ffd6eb5c2c0396ebfc35405510df72", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000300)=ANY=[@ANYRES16=r1, @ANYRES64=r1, @ANYRESHEX=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000040)=ANY=[@ANYRES32=r2, @ANYRES32], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$vim2m_VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000140)={0x2, @pix_mp={0x0, 0x0, 0x34324152, 0x0, 0xa, [{}, {0x10}, {}, {0x0, 0x48000001}, {}, {0x40000000}], 0x0, 0x0, 0x0, 0x2, 0x2}}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r4 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r4, &(0x7f0000019680)=""/102392, 0x18ff8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0500000003000000003800003f"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r3}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) pipe2(&(0x7f0000000040), 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x14) r6 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000100)=0x15) ioctl$TCFLSH(r6, 0xc0384707, 0x20000000) mprotect(&(0x7f00003fd000/0xc00000)=nil, 0xc00000, 0x5) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x60000000}, 0x4c) r7 = dup(r0) write$6lowpan_enable(r7, &(0x7f0000000000)='1', 0x1) 2m52.659082516s ago: executing program 5 (id=2174): bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="150000011000ff00a90de6ab5edfbf28f7f3aa00", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=@newqdisc={0x40, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x8}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x8}]}, 0x40}}, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000040)={0x84, @remote, 0x15, 0x3, 'wrr\x00', 0x0, 0x4, 0x75}, 0x2c) r5 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) bind$ax25(r5, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null]}, 0x48) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r6, 0x0, 0x487, &(0x7f0000000000)={{0x84, @broadcast, 0x4e21, 0x3, 'lc\x00', 0xb, 0x323b, 0x3a}, {@rand_addr=0x64010102, 0x4e23, 0x0, 0xc3, 0x12d5c, 0x12d5c}}, 0x44) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x400000, 0x3, &(0x7f0000000000/0x400000)=nil) 2m49.761994429s ago: executing program 5 (id=2179): r0 = io_uring_setup(0x178e, &(0x7f00000000c0)={0x0, 0x52c1}) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = creat(&(0x7f0000000240)='./file0\x00', 0x148) pipe2$9p(&(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="1500000065ffff048000000800395032303030"], 0x15) r6 = dup(r5) write$FUSE_BMAP(r6, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r6, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000004c0), 0x10400, &(0x7f0000000700)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r6, @ANYBLOB=',cache=mmap']) chmod(&(0x7f0000000340)='./file0\x00', 0x0) r7 = open$dir(&(0x7f0000000180)='./file0\x00', 0x1, 0x0) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif\x00'}, 0x58) r9 = accept4(r8, 0x0, 0x0, 0x0) sendmsg$kcm(r9, &(0x7f00000009c0)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)='W', 0x1}, {&(0x7f00000002c0)="592eb75b3ad6fbbf04a8cdb64a61fce6", 0x10}], 0x2}, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_wait_time\x00', 0x275a, 0x0) r11 = syz_open_dev$loop(&(0x7f0000000000), 0x5, 0x80000) ioctl$BLKREPORTZONE(r11, 0xc0101282, &(0x7f00000001c0)={0x1}) ftruncate(r10, 0x57) r12 = socket$nl_generic(0x10, 0x3, 0x10) r13 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r12) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r12, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x14, r13, 0x9c3fa077fa966179, 0x0, 0x0, {{0x7e}, {@void, @void}}}, 0x14}}, 0x4000054) sendmsg$NL80211_CMD_SET_CHANNEL(r3, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0x40, r13, 0x400, 0x70bd2b, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x4, 0xa}}}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x359}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x80000000}]}, 0x40}, 0x1, 0x0, 0x0, 0x80010}, 0x24004040) sendfile(r7, r10, 0x0, 0x7ffff000) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f00000000c0)=0x0) bind$nfc_llcp(r1, &(0x7f0000000240)={0x27, r14, 0x0, 0x0, 0x0, 0x0, "d9298498abdba7f061bd1ca44c226af5160e961711a07760760beeab11e88509de7f1939e8abfe0055acc8ef039a5be42200000000000000000100", 0x38}, 0x60) ppoll(&(0x7f0000000040)=[{r1, 0x4528}], 0x1, 0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 2m45.891298946s ago: executing program 5 (id=2188): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x4, &(0x7f0000000140)={0xa, 0x4e20, 0x3, @remote, 0x7}, 0x1c) sendmsg$OSF_MSG_REMOVE(0xffffffffffffffff, 0x0, 0x8000) connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, 0x0) r4 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$user(0x0, &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000900)="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", 0x146, r4) r6 = add_key$user(&(0x7f0000000380), &(0x7f0000000000), &(0x7f00000003c0)='X', 0x1, 0xfffffffffffffffe) r7 = add_key$user(&(0x7f0000000200), &(0x7f00000005c0), &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r6, r7, r5}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\xcc\xff%\xd2cTH,\x00'}}) 2m29.388427367s ago: executing program 35 (id=2188): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x4, &(0x7f0000000140)={0xa, 0x4e20, 0x3, @remote, 0x7}, 0x1c) sendmsg$OSF_MSG_REMOVE(0xffffffffffffffff, 0x0, 0x8000) connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, 0x0) r4 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$user(0x0, &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000900)="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", 0x146, r4) r6 = add_key$user(&(0x7f0000000380), &(0x7f0000000000), &(0x7f00000003c0)='X', 0x1, 0xfffffffffffffffe) r7 = add_key$user(&(0x7f0000000200), &(0x7f00000005c0), &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r6, r7, r5}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\xcc\xff%\xd2cTH,\x00'}}) 16.760967379s ago: executing program 4 (id=2411): bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x8, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) syz_open_dev$usbfs(&(0x7f0000000080), 0x75, 0x109301) ioctl$vim2m_VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000100)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) r1 = openat$sndtimer(0xffffffffffffff9c, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs/binder0\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, '\x00', 0x25}, 0x9}, 0x1c) pipe(0x0) r5 = dup3(r4, r3, 0x0) ioctl$BINDER_THREAD_EXIT(r5, 0x40046208, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r6 = accept4(r0, 0x0, 0x0, 0x0) r7 = accept4(r6, 0x0, 0x0, 0x0) sendmmsg$inet6(r7, 0x0, 0x0, 0x8000) recvmmsg$unix(r7, &(0x7f0000006400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40010000, 0x0) close(0x3) 14.884380098s ago: executing program 4 (id=2413): r0 = socket(0x26, 0x3, 0x6) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000140)=@req3={0x7816, 0x2, 0x0, 0x81, 0x801ff, 0x1, 0x1}, 0x1c) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x6) r2 = getpid() sched_setscheduler(r2, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0xfffffffffffffc33, &(0x7f0000000280)=0x2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) mkdir(0x0, 0x0) mount$overlay(0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000400)={[], [{@seclabel}, {@seclabel}, {@dont_appraise}]}) r5 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mknodat(r5, &(0x7f00000003c0)='./file0\x00', 0x200, 0x0) r6 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r6, 0x0, 0x810) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, 0x0, &(0x7f0000000080)) recvmmsg$unix(r0, 0x0, 0x0, 0x10041, 0x0) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r8, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r8, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @remote}]}, &(0x7f00000001c0)=0x10) r9 = dup3(r8, r7, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r9, 0x84, 0x71, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x17) write$P9_RSETATTR(r9, &(0x7f0000000000)={0x7, 0x1b, 0x1}, 0x7) 14.270423814s ago: executing program 8 (id=2414): socket$kcm(0x2, 0x200000000000001, 0x106) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xfb84e000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3, 0x0, 0x7fffffffffffffff}, 0x18) syz_open_dev$tty20(0xc, 0x4, 0x1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r4, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) r5 = socket$inet6(0xa, 0x3, 0x7) r6 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'sit0\x00'}) sendmsg$nl_route(r6, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="500000006800010000000000000000000a00000000000000280008802400010000000000000000000000040000000000fe8000000000000000000000000000aa060007000500000008000500", @ANYRES32=r2], 0x50}}, 0x0) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x8100) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000340)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x4}, {0x0, 0x4, 0x0, 0xa78a}, 0xfffffffe, 0x0, 0x1}, {{@in=@private, 0x0, 0x33}, 0x0, @in=@rand_addr=0x64010101, 0x0, 0x3, 0x1, 0x7}}, 0xe8) sendmmsg(r5, &(0x7f0000000480), 0x2e9, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r4, 0x6, 0x25, &(0x7f0000000040)=r3, 0xffffffffffffff15) connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r7 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xf, 0x11012, r7, 0x0) 14.269478061s ago: executing program 3 (id=2415): add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x19) syz_open_procfs(0x0, &(0x7f0000000240)='clear_refs\x00') mremap(&(0x7f00000ae000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) socket$packet(0x11, 0x3, 0x300) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/partitions\x00', 0x0, 0x0) r1 = openat$sysctl(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r1, r0, &(0x7f0000002080)=0x64, 0x23b) 14.093343107s ago: executing program 6 (id=2416): openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) io_uring_setup(0x4053, &(0x7f0000000040)={0x0, 0xeee5, 0x0, 0x2, 0x1c5}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x1}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x2, &(0x7f0000000b80)=@gcm_128={{0x303}, "cfc85eb51b0ace6a", "4617a9f6040839230fb7fead776dd8dc", "3f4051c4", "a44a889722b66244"}, 0x28) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r5, 0xc0045005, &(0x7f0000001180)=0x2000000) recvmmsg(r4, &(0x7f00000000c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b00)=""/81, 0x51}], 0x1}}], 0x1, 0x0, 0x0) recvfrom$inet6(r4, 0x0, 0x1000000, 0x0, 0x0, 0x0) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000140)={0x80, 0x6, 0x103, 0x0, 0x0, 0x0, 0x0}) r6 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080), 0x22242, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r6, &(0x7f0000000500)={0x2, 0x5}, 0x2) 13.526100137s ago: executing program 3 (id=2417): mkdir(0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) pipe(&(0x7f00000045c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r1) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x42, 0x0) read$FUSE(r4, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r4, &(0x7f0000000040)={0x50, 0x0, r5, {0x7, 0x1f, 0x0, 0x10400}}, 0x50) syz_fuse_handle_req(r4, 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20, 0x0, 0x0, {0x0, 0x11}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000280)='>', 0x1}], 0x1) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r6, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, r6, 0x0) openat$cgroup_type(r2, &(0x7f0000000080), 0x2, 0x0) vmsplice(r3, &(0x7f0000000140)=[{&(0x7f00000015c0)='5', 0xfe70}], 0x1, 0xb) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r7 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r7, &(0x7f0000019680)=""/102392, 0x18ff8) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x8000, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f0000000500), 0x0, &(0x7f0000000440)={[{@uuid_off}, {@lowerdir={'lowerdir', 0x3d, './bus'}, 0x3a}], [], 0x2f}) 13.038417138s ago: executing program 6 (id=2419): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x4, 0x3, &(0x7f0000000000)=@framed={{0xffffffb4, 0x8, 0x0, 0x0, 0x0, 0x73, 0x11, 0x3b}, [], {0x95, 0x0, 0x1200}}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) creat(&(0x7f0000000380)='./file0\x00', 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) setsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f0000001580), 0x4) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x2) ptrace$cont(0x9, r1, 0x34d, 0xd) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xf, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r7, &(0x7f0000000300), 0x20000000}, 0x20) recvmsg$unix(r5, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/28, 0x1c}], 0x1}, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001cc0)={r7, &(0x7f0000001c80)}, 0x20) memfd_create(0x0, 0x1e) close(r6) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)=@gettfilter={0x24, 0x2e, 0x301}, 0x24}}, 0x0) getrandom(&(0x7f0000000240)=""/286, 0xffffff9a, 0x0) 11.925603884s ago: executing program 4 (id=2420): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) socket(0x1d, 0x5, 0xe044) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='contention_end\x00', r4}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000003c000900000000000000000002"], 0x24}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000300)={'vcan0\x00'}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='blkio.throttle.io_serviced\x00', 0x275a, 0x0) r7 = add_key$user(&(0x7f0000000440), &(0x7f0000002180)={'syz', 0x1}, &(0x7f0000000240)="8b", 0x1, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000002300), &(0x7f0000002340)={'syz', 0x3}, &(0x7f0000000100)="370c099069effa43de3e1404db09b4ce1ef77bde4b371532dd16447c1b13403656c86711f6e750026f23029a50d44299c7bf5c78dc5efae2d041016160e8bef7b30c05e298aa9572540dd950307987eef2115e1bcf512bea3410ca5a9e9f827e4b13490dbbd4fc5a45e0738b959acafd2c12863045265bcbc2c9426ac3f614746b436fe86a72dc642dd67d970604a69b4f22cd0076beedc18056ab4bea4c825b69a7a77adcd5488684872b1bb9eb84586549e11b080468668e8fd0e52ce0705a", 0xc0, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r7, r8, r7}, &(0x7f0000000480)=""/199, 0xc7, &(0x7f0000000580)={&(0x7f0000000340)={'blake2b-256\x00'}}) fcntl$lock(r6, 0x25, &(0x7f00000004c0)={0x0, 0x0, 0x7ffffffffffd, 0x3}) syz_open_dev$sg(&(0x7f00000003c0), 0x0, 0x802) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001200)={{0x14}, [@NFT_MSG_NEWRULE={0x54, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x28, 0x4, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, @numgen={{0xb}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_NG_DREG={0x8, 0x1, 0x1, 0x0, 0x14}, @NFTA_NG_MODULUS={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x7c}}, 0x0) 10.853279639s ago: executing program 7 (id=2421): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000004c0)=@multiplanar_userptr={0x4, 0x9, 0x4, 0x70000, 0x6, {}, {0x3, 0xc, 0x6, 0x6, 0x34, 0x10, "3129d16b"}, 0x101, 0x2, {&(0x7f0000000440)=[{0x1, 0x8, {0x0}, 0x7fffffff}, {0x3, 0xfffff463, {0x0}, 0x3}]}, 0x2}) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r2}, 0x8) r3 = syz_open_procfs$userns(0x0, &(0x7f0000000040)) ioctl$NS_GET_OWNER_UID(r3, 0xb704, &(0x7f0000000080)) r4 = semget(0x3, 0x3, 0x40) semctl$SETVAL(r4, 0x0, 0x10, 0x0) r5 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r5, &(0x7f0000019680)=""/102392, 0x18ff8) sched_setaffinity(0x0, 0xfffffef7, &(0x7f0000000740)=0x410000002) r6 = openat$sysctl(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/tcp_sack\x00', 0x1, 0x0) write$sysctl(r6, &(0x7f0000000100)='5\x00', 0x2) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$inet6_mptcp(0xa, 0x1, 0x106) r9 = socket$inet_udp(0x2, 0x2, 0x0) r10 = getpgid(r1) prlimit64(r10, 0x7, &(0x7f0000000180)={0x200, 0x100000001}, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r9, 0x0, 0x48b, &(0x7f0000000200)={0x2, 'lo\x00'}, 0x18) getsockopt$inet6_mptcp_buf(r8, 0x11c, 0x4, 0x0, 0x0) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="340000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000000c002b8008000100", @ANYRES32, @ANYBLOB="08001b00000000002992b09662bde852e86a6d9de59275539d6ea0475c0dd85b9ddec464716575c24702fdbf5aa2ba84bcc3c8903fa5ecc464d3750f1a1239278a7acc8f76dc10e00d0588dd63210ed6f59dcaba2e25284323733c87ffe73a64855939c16fceb5a2868b72aa7c3c71171d13fa2796c4d212e782dae1bf0bed8a9f3a30f02245e183a206b75516a972e6814c1846bc30d58c"], 0x34}}, 0x0) 9.683890386s ago: executing program 4 (id=2422): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) socket(0x1d, 0x5, 0xe044) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='contention_end\x00', r4}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000003c000900000000000000000002"], 0x24}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000300)={'vcan0\x00'}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='blkio.throttle.io_serviced\x00', 0x275a, 0x0) r7 = add_key$user(&(0x7f0000000440), &(0x7f0000002180)={'syz', 0x1}, &(0x7f0000000240)="8b", 0x1, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000002300), &(0x7f0000002340)={'syz', 0x3}, &(0x7f0000000100)="370c099069effa43de3e1404db09b4ce1ef77bde4b371532dd16447c1b13403656c86711f6e750026f23029a50d44299c7bf5c78dc5efae2d041016160e8bef7b30c05e298aa9572540dd950307987eef2115e1bcf512bea3410ca5a9e9f827e4b13490dbbd4fc5a45e0738b959acafd2c12863045265bcbc2c9426ac3f614746b436fe86a72dc642dd67d970604a69b4f22cd0076beedc18056ab4bea4c825b69a7a77adcd5488684872b1bb9eb84586549e11b080468668e8fd0e52ce0705a", 0xc0, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000400)={r7, r8, r7}, &(0x7f0000000480)=""/199, 0xc7, &(0x7f0000000580)={&(0x7f0000000340)={'blake2b-256\x00'}}) fcntl$lock(r6, 0x25, &(0x7f00000004c0)={0x0, 0x0, 0x7ffffffffffd, 0x3}) syz_open_dev$sg(&(0x7f00000003c0), 0x0, 0x802) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001200)={{0x14}, [@NFT_MSG_NEWRULE={0x54, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x28, 0x4, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, @numgen={{0xb}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_NG_DREG={0x8, 0x1, 0x1, 0x0, 0x14}, @NFTA_NG_MODULUS={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x7c}}, 0x0) 9.582290582s ago: executing program 6 (id=2423): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r1, 0x4b47, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0x0, 0x0) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@dev={0xfe, 0x80, '\x00', 0xfd}, @in6=@dev={0xfe, 0x80, '\x00', 0x2}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x6}, {0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x4d2, 0x33}, 0x0, @in=@private=0xa010100, 0x0, 0x0, 0x0, 0xb7, 0xffffffff}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x800001d, 0x0) socket$tipc(0x1e, 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000100000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = syz_open_dev$sndctrl(&(0x7f0000000100), 0xb, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r5, 0xc4c85513, &(0x7f0000000740)={{0x1, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xadb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffffffffffd, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x800, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) r6 = getuid() quotactl_fd$Q_GETFMT(r0, 0xffffffff80000400, r6, &(0x7f00000000c0)) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000000)='0', 0xfffffd2c) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000002, 0x200000005c831, r1, 0x0) 9.135556072s ago: executing program 7 (id=2424): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000004c0)=@multiplanar_userptr={0x4, 0x9, 0x4, 0x70000, 0x6, {}, {0x3, 0xc, 0x6, 0x6, 0x34, 0x10, "3129d16b"}, 0x101, 0x2, {&(0x7f0000000440)=[{0x1, 0x8, {0x0}, 0x7fffffff}, {0x3, 0xfffff463, {0x0}, 0x3}]}, 0x2}) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r2}, 0x8) r3 = syz_open_procfs$userns(0x0, &(0x7f0000000040)) ioctl$NS_GET_OWNER_UID(r3, 0xb704, &(0x7f0000000080)) r4 = semget(0x3, 0x3, 0x40) semctl$SETVAL(r4, 0x0, 0x10, 0x0) r5 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r5, &(0x7f0000019680)=""/102392, 0x18ff8) sched_setaffinity(0x0, 0xfffffef7, &(0x7f0000000740)=0x410000002) r6 = openat$sysctl(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/tcp_sack\x00', 0x1, 0x0) write$sysctl(r6, &(0x7f0000000100)='5\x00', 0x2) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$inet6_mptcp(0xa, 0x1, 0x106) r9 = socket$inet_udp(0x2, 0x2, 0x0) r10 = getpgid(r1) prlimit64(r10, 0x7, &(0x7f0000000180)={0x200, 0x100000001}, &(0x7f0000000240)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r9, 0x0, 0x48b, &(0x7f0000000200)={0x2, 'lo\x00'}, 0x18) getsockopt$inet6_mptcp_buf(r8, 0x11c, 0x4, 0x0, 0x0) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 8.944894887s ago: executing program 8 (id=2425): bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x8, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) syz_open_dev$usbfs(&(0x7f0000000080), 0x75, 0x109301) ioctl$vim2m_VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000100)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x100) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x1fffffffffffe) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) pipe(0x0) dup3(0xffffffffffffffff, r2, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$inet6(r4, 0x0, 0x0, 0x8000) close(0x3) 8.782105436s ago: executing program 3 (id=2426): r0 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'veth1_virt_wifi\x00', 0x0}) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='veth1_virt_wifi\x00', 0x10) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000680)={@multicast1, @empty, r1}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() r4 = socket$vsock_stream(0x28, 0x1, 0x0) shutdown(r4, 0x2000000) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) socket$nl_route(0x10, 0x3, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="640000000001010400000000141a000002000000240001801400018008000100e000000108000200e00000010c00028005000100000000002400028014000180080001000000000008000200ac1e00010c00028005000100000000000800074000000001"], 0x64}}, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={0x3c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2, 0x0, 0x8}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x4}]}, 0x3c}}, 0x0) 7.117483038s ago: executing program 7 (id=2427): add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x19) syz_open_procfs(0x0, &(0x7f0000000240)='clear_refs\x00') mremap(&(0x7f00000ae000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) socket$packet(0x11, 0x3, 0x300) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/partitions\x00', 0x0, 0x0) r1 = openat$sysctl(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(r1, r0, &(0x7f0000002080)=0x64, 0x23b) 7.075484703s ago: executing program 4 (id=2428): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000240)) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) capset(&(0x7f0000000340)={0x19980330}, &(0x7f0000000380)={0x6, 0x6, 0xf45, 0x4, 0xe0b, 0x1}) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x8, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x4}, {0xac}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r5, 0x12e, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000036c0), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36, 0x0, 0x8, 0x0, 0x0}}, 0x10) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=0x0]) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000040)='autofs\x00', 0x0, &(0x7f0000000400)) chdir(&(0x7f0000000080)='./file1\x00') open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000000)='./file0\x00') mkdir(&(0x7f0000000300)='./bus\x00', 0x0) syz_emit_ethernet(0xd0, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000008e25900ee8d386dd601646b085a2009a2f00ff020000000000000000000000000001fc010000000000000000000000000000000000000000000005020000000000000420880b00460000670c12d7"], 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000100), 0x0, 0x0) chdir(0x0) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000280)=ANY=[@ANYBLOB="200000001e005db7000000000000000007", @ANYRES32=r7, @ANYRESOCT=r7, @ANYRES8=r0, @ANYRESHEX=r6], 0x20}}, 0x0) 7.020651014s ago: executing program 3 (id=2429): openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) io_uring_setup(0x4053, &(0x7f0000000040)={0x0, 0xeee5, 0x0, 0x2, 0x1c5}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x1}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x2, &(0x7f0000000b80)=@gcm_128={{0x303}, "cfc85eb51b0ace6a", "4617a9f6040839230fb7fead776dd8dc", "3f4051c4", "a44a889722b66244"}, 0x28) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r5, 0xc0045005, &(0x7f0000001180)=0x2000000) recvmmsg(r4, &(0x7f00000000c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b00)=""/81, 0x51}], 0x1}}], 0x1, 0x0, 0x0) recvfrom$inet6(r4, 0x0, 0x1000000, 0x0, 0x0, 0x0) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000140)={0x80, 0x6, 0x103, 0x0, 0x0, 0x0, 0x0}) r6 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080), 0x22242, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r6, &(0x7f0000000500)={0x2, 0x5}, 0x2) 6.42208838s ago: executing program 8 (id=2430): openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) io_uring_setup(0x4053, &(0x7f0000000040)={0x0, 0xeee5, 0x0, 0x2, 0x1c5}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x1}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x2, &(0x7f0000000b80)=@gcm_128={{0x303}, "cfc85eb51b0ace6a", "4617a9f6040839230fb7fead776dd8dc", "3f4051c4", "a44a889722b66244"}, 0x28) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r4, 0xc0045005, &(0x7f0000001180)=0x2000000) recvmmsg(r3, &(0x7f00000000c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b00)=""/81, 0x51}], 0x1}}], 0x1, 0x0, 0x0) recvfrom$inet6(r3, 0x0, 0x1000000, 0x0, 0x0, 0x0) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000140)={0x80, 0x6, 0x103, 0x0, 0x0, 0x0, 0x0}) r5 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080), 0x22242, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r5, &(0x7f0000000500)={0x2, 0x5}, 0x2) 6.348494055s ago: executing program 6 (id=2431): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[], 0x7c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000780)={{0x14}, [@NFT_MSG_NEWRULE={0x54, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x28, 0x4, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_DREG={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_EXTHDR_OP={0x8, 0x6, 0x1, 0x0, 0x4}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFT_MSG_NEWRULE={0x34, 0x6, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x4}]}], {0x14}}, 0xb0}}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() r2 = fspick(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x80000, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r5 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r5, 0x2285, &(0x7f00000005c0)={0x53, 0xfffffffc, 0x6, 0x0, @buffer={0x0, 0xca, &(0x7f0000000300)=""/202}, &(0x7f00000000c0)="008d7acda0b2", 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB], 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) r6 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r6, &(0x7f0000000740)={&(0x7f0000000040)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@cswp={0x58, 0x114, 0x7, {{}, 0x0, 0x0}}], 0x58}, 0x0) open(0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) ioctl$TIOCSERGETLSR(r7, 0x5459, &(0x7f0000000040)) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x32, &(0x7f0000000080)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x70bd2d, 0x25dfdbff, {}, [@IFLA_MTU={0x8, 0x4, 0x42}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 5.782028815s ago: executing program 7 (id=2432): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x7c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000780)={{0x14}, [@NFT_MSG_NEWRULE={0x54, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x28, 0x4, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_DREG={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_EXTHDR_OP={0x8, 0x6, 0x1, 0x0, 0x4}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFT_MSG_NEWRULE={0x34, 0x6, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x4}]}], {0x14}}, 0xb0}}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() r2 = fspick(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x80000, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r5 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r5, 0x2285, &(0x7f00000005c0)={0x53, 0xfffffffc, 0x6, 0x0, @buffer={0x0, 0xca, &(0x7f0000000300)=""/202}, &(0x7f00000000c0)="008d7acda0b2", 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB], 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) r6 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r6, &(0x7f0000000740)={&(0x7f0000000040)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@cswp={0x58, 0x114, 0x7, {{}, 0x0, 0x0}}], 0x58}, 0x0) open(0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) ioctl$TIOCSERGETLSR(r7, 0x5459, &(0x7f0000000040)) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x32, &(0x7f0000000080)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x70bd2d, 0x25dfdbff, {}, [@IFLA_MTU={0x8, 0x4, 0x42}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 3.887414363s ago: executing program 4 (id=2433): syz_open_dev$vbi(0x0, 0x0, 0x2) shutdown(0xffffffffffffffff, 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket$kcm(0x29, 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r6 = socket$kcm(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) munlock(&(0x7f0000e4a000/0x1000)=nil, 0x1000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000040)={r6, r5}) r7 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) close_range(r7, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x2c, 0x7ff) ioctl$sock_SIOCETHTOOL(r3, 0x8946, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x0, 0x0}) 3.49232882s ago: executing program 8 (id=2434): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000004c0)=@multiplanar_userptr={0x4, 0x9, 0x4, 0x70000, 0x6, {}, {0x3, 0xc, 0x6, 0x6, 0x34, 0x10, "3129d16b"}, 0x101, 0x2, {&(0x7f0000000440)=[{0x1, 0x8, {0x0}, 0x7fffffff}, {0x3, 0xfffff463, {0x0}, 0x3}]}, 0x2}) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r2}, 0x8) r3 = syz_open_procfs$userns(0x0, &(0x7f0000000040)) ioctl$NS_GET_OWNER_UID(r3, 0xb704, &(0x7f0000000080)) r4 = semget(0x3, 0x3, 0x40) semctl$SETVAL(r4, 0x0, 0x10, 0x0) r5 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r5, &(0x7f0000019680)=""/102392, 0x18ff8) sched_setaffinity(0x0, 0xfffffef7, &(0x7f0000000740)=0x410000002) r6 = openat$sysctl(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/tcp_sack\x00', 0x1, 0x0) write$sysctl(r6, &(0x7f0000000100)='5\x00', 0x2) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$inet6_mptcp(0xa, 0x1, 0x106) r9 = socket$inet_udp(0x2, 0x2, 0x0) r10 = getpgid(r1) prlimit64(r10, 0x7, &(0x7f0000000180)={0x200, 0x100000001}, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r9, 0x0, 0x48b, &(0x7f0000000200)={0x2, 'lo\x00'}, 0x18) getsockopt$inet6_mptcp_buf(r8, 0x11c, 0x4, 0x0, 0x0) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="340000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000000c002b8008000100", @ANYRES32, @ANYBLOB="08001b00000000002992b09662bde852e86a6d9de59275539d6ea0475c0dd85b9ddec464716575c24702fdbf5aa2ba84bcc3c8903fa5ecc464d3750f1a1239278a7acc8f76dc10e00d0588dd63210ed6f59dcaba2e25284323733c87ffe73a64855939c16fceb5a2868b72aa7c3c71171d13fa2796c4d212e782dae1bf0bed8a9f3a30f02245e183a206b75516a972e6814c1846bc30d58c"], 0x34}}, 0x0) 3.353417367s ago: executing program 6 (id=2435): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x11, 0x0, 0x0) close(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x80065c9}, 0xc) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r6 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_int(r6, 0x0, 0x18, &(0x7f0000000040)=0x519c16d5, 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getrlimit(0x7, 0x0) r7 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x500, 0x0) close(r7) memfd_create(&(0x7f0000000540)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x06\x00\x00\x00\x97A\xc2\xd8\xf0Uq!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\x16\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xf1k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9k\x83\xfc\xa4\xad4\x03\xa2X\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xdfY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96?\x00\x00\x00\x00\x00\x00\x00\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcb\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93>m\xd7q\'\xdf\xfajo\xd8n\xa7\xecJi\xde\xdf\x7f\xe3\xc4*Z 4\xe8S$\xa1H=\xdf\x05\xf3\xe3T\xd1\xdd\xc6f\xa4\xb4\x96\\\xa0\xf9\x0f\x17\x11{\xb6\x9d\xd21\xc1\x90Vj\x13r\x00\x00\xde\x03\xab\xff\x8as0\xc6E\xca\"\xd9*\x9a\x15\xb95r\x8f\xaaj\x82\xd6\xd2%\xed\xa2WQ\xec2\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xccX\xfdRB\xffU\xe9\xfa\x1f\xf6\xce\b\xde@\x061\xc6z\xe4\xe0\xc9?\xa7\x94>\x9c\xd1\xa5o\x04\xaaim\xae\xfe\xc7f\xa3\x96\xd7\xb4c)r{\r#\xddI&\n\xf2\xec\xd4\xff\x9f\x136zZ-2\x80\xfbH+\x9b8\xf3\xed\xdf\xa2my\xb28c[\xc3\xfe\xb5M\x84\x97\xa5\'s\xe9\xdc=)I\xabLt2\x9c\v\xd9S', 0x6) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010200000000000000020000000900010073797a300000000040000000030a01010000000000000000020000000900010073797a30000000000900030073797a320000000014000480080001400000000008000240000000002c000000030a03000000000000000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0xb4}, 0x1, 0x0, 0x0, 0x400c0d1}, 0x0) fcntl$dupfd(r0, 0x0, r0) 3.161150518s ago: executing program 3 (id=2436): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x7c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000780)={{0x14}, [@NFT_MSG_NEWRULE={0x54, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x28, 0x4, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_DREG={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_EXTHDR_OP={0x8, 0x6, 0x1, 0x0, 0x4}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFT_MSG_NEWRULE={0x34, 0x6, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x4}]}], {0x14}}, 0xb0}}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() r2 = fspick(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x80000, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r5 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r5, 0x2285, &(0x7f00000005c0)={0x53, 0xfffffffc, 0x6, 0x0, @buffer={0x0, 0xca, &(0x7f0000000300)=""/202}, &(0x7f00000000c0)="008d7acda0b2", 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB], 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) r6 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r6, &(0x7f0000000740)={&(0x7f0000000040)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@cswp={0x58, 0x114, 0x7, {{}, 0x0, 0x0}}], 0x58}, 0x0) open(0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) ioctl$TIOCSERGETLSR(r7, 0x5459, &(0x7f0000000040)) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x32, &(0x7f0000000080)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x70bd2d, 0x25dfdbff, {}, [@IFLA_MTU={0x8, 0x4, 0x42}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 2.214584761s ago: executing program 7 (id=2437): openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) io_uring_setup(0x4053, &(0x7f0000000040)={0x0, 0xeee5, 0x0, 0x2, 0x1c5}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x1}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x2, &(0x7f0000000b80)=@gcm_128={{0x303}, "cfc85eb51b0ace6a", "4617a9f6040839230fb7fead776dd8dc", "3f4051c4", "a44a889722b66244"}, 0x28) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r5, 0xc0045005, &(0x7f0000001180)=0x2000000) recvmmsg(r4, &(0x7f00000000c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b00)=""/81, 0x51}], 0x1}}], 0x1, 0x0, 0x0) recvfrom$inet6(r4, 0x0, 0x1000000, 0x0, 0x0, 0x0) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000140)={0x80, 0x6, 0x103, 0x0, 0x0, 0x0, 0x0}) r6 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080), 0x22242, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r6, &(0x7f0000000500)={0x2, 0x5}, 0x2) 1.710964444s ago: executing program 8 (id=2438): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000004c0)=@multiplanar_userptr={0x4, 0x9, 0x4, 0x70000, 0x6, {}, {0x3, 0xc, 0x6, 0x6, 0x34, 0x10, "3129d16b"}, 0x101, 0x2, {&(0x7f0000000440)=[{0x1, 0x8, {0x0}, 0x7fffffff}, {0x3, 0xfffff463, {0x0}, 0x3}]}, 0x2}) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r2}, 0x8) r3 = syz_open_procfs$userns(0x0, &(0x7f0000000040)) ioctl$NS_GET_OWNER_UID(r3, 0xb704, &(0x7f0000000080)) r4 = semget(0x3, 0x3, 0x40) semctl$SETVAL(r4, 0x0, 0x10, 0x0) r5 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r5, &(0x7f0000019680)=""/102392, 0x18ff8) sched_setaffinity(0x0, 0xfffffef7, &(0x7f0000000740)=0x410000002) r6 = openat$sysctl(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/tcp_sack\x00', 0x1, 0x0) write$sysctl(r6, &(0x7f0000000100)='5\x00', 0x2) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$inet6_mptcp(0xa, 0x1, 0x106) r9 = socket$inet_udp(0x2, 0x2, 0x0) r10 = getpgid(r1) prlimit64(r10, 0x7, &(0x7f0000000180)={0x200, 0x100000001}, &(0x7f0000000240)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r9, 0x0, 0x48b, &(0x7f0000000200)={0x2, 'lo\x00'}, 0x18) getsockopt$inet6_mptcp_buf(r8, 0x11c, 0x4, 0x0, 0x0) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 676.105623ms ago: executing program 7 (id=2439): openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) io_uring_setup(0x4053, &(0x7f0000000040)={0x0, 0xeee5, 0x0, 0x2, 0x1c5}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x1}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x2, &(0x7f0000000b80)=@gcm_128={{0x303}, "cfc85eb51b0ace6a", "4617a9f6040839230fb7fead776dd8dc", "3f4051c4", "a44a889722b66244"}, 0x28) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r5, 0xc0045005, &(0x7f0000001180)=0x2000000) recvmmsg(r4, &(0x7f00000000c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b00)=""/81, 0x51}], 0x1}}], 0x1, 0x0, 0x0) recvfrom$inet6(r4, 0x0, 0x1000000, 0x0, 0x0, 0x0) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000140)={0x80, 0x6, 0x103, 0x0, 0x0, 0x0, 0x0}) r6 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080), 0x22242, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r6, &(0x7f0000000500)={0x2, 0x5}, 0x2) 352.90247ms ago: executing program 3 (id=2440): r0 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'veth1_virt_wifi\x00', 0x0}) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='veth1_virt_wifi\x00', 0x10) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000680)={@multicast1, @empty, r1}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() r4 = socket$vsock_stream(0x28, 0x1, 0x0) shutdown(r4, 0x2000000) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a5050000000077d8f3b423cdac8d80000000000000002be16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f7535f7866907dc6751dfb265a0e3ccae669e17fd6587d452d6453559c3421eed73d56615fe6c54c3b3ffe1b4ce25d7c983c044c03bf3a48dfe47ec9dd6c091c30b93bfae76d9ebacd3ed3e26e7a23129d6606fd28a69989d552af6bda9df2c3af36effff9af2551ce896165127cb3f011a7d06602e2fd52347125907000000000000003ed38ae89d24e1cebfba2f87925bfacba83109751fe6c05405d027edd68149ee99eef6a6992308a4fc0b7c70bc677d6dd4aed4af7500d7900a820b6347184e9a217b5614cd50cbe43a1ed2526814bc0000e9e086ce48e90defb6670c3df262ad0a97aec7291c25447c106a99893e10db21901eb397b2f5fd71d20fa7a050fbbef9e326ea27e513e96068fd1e8a43e89f9c85c822a961546ed5363c17ff1432d08806bc376e3e49ee52b59d13182e1f24ed200ada12f7a1001500a710eb1affb87ba55b2d72078e9f40b4ae7d01000000d11cd22c35d32940000088dde499000000fdffffff000000000000000000000000000000000000000000000c52f4ebd2c893bb97a068bd10734a83584898eccb26f7b789cfc4cd995fa3e11a5c74c85404e2df3ad37b729ac83b0dcb4f48f3c3356b9997fc455a17690b6f7f9ccbe4b1701941b18a904c0e585a66c3b84b138efc20a546d3d5227e23b03f2a834391ad24fe7d9b20cf92cb151763d41f5c76e2ff3e93ee296c4082ee73e7e197253a2b66c353312c9d75711ce1623e9c54bdff59d2a69dcb7d84c235b23a4480c2461b405cfd1a38992f295ad3adc94cd07c850d1ce6d0b2fea02c24e9280333152fb794e4ddea02017a6c139b50101caecaf2abc0842b99a96fc4275ad107274e2934a87a4ddcdb112754ca5bdec0ead14b6c0f19a43a2f04c7f0be31491eb8c9ff68236c8600000000000000000000000066e034c81c3cab4e33fc8dc55ce0ada18dcbf31c6e82893add3bee3e10fc873d1d922b0877cbcd95b839d3059d5140a1f742f6e75741e39e5cb6a193e06a1043375b0f61b5d4e17c81baa31b924d84f2243471221c15fa12313ffbfa7c2730302b66a99f66705b71e6205e7cbf3643561eabb9a63fcd604d5cc27e1317ad94cf438d71873e540be16b6ca20508011132153c528f7bca92980a3223c5b9cdddedb0a14adddf9a6e70a26b5c0ee0879c349814bee9d96d8bd23db4e801d49201ae84090455682794098afa42b34196b1d849020eeeb1ef48d003d71524683d7cdfa841bca708414fb8ff49742420d1ab7fa678aa4806d5247616e8bc0b02887f8efe9310ccf9bec1c9b7f6671c9d59ac6b09b4436cafdd1887c8e884c930d21ace088ccc99a94d4b33da2fc1b1310bb607a9ad65844655de1ac9fd36d12e07a821fb950368a970c58fb4f3f403fdaf68902874"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) socket$nl_route(0x10, 0x3, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="640000000001010400000000141a000002000000240001801400018008000100e000000108000200e00000010c00028005000100000000002400028014000180080001000000000008000200ac1e00010c00028005000100000000000800074000000001"], 0x64}}, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={0x3c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2, 0x0, 0x8}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x4}]}, 0x3c}}, 0x0) 13.346034ms ago: executing program 8 (id=2441): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a3000"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000780)={{0x14}, [@NFT_MSG_NEWRULE={0x54, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x28, 0x4, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_DREG={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_EXTHDR_OP={0x8, 0x6, 0x1, 0x0, 0x4}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFT_MSG_NEWRULE={0x34, 0x6, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x4}]}], {0x14}}, 0xb0}}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() r2 = fspick(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x80000, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r5 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r5, 0x2285, &(0x7f00000005c0)={0x53, 0xfffffffc, 0x6, 0x0, @buffer={0x0, 0xca, &(0x7f0000000300)=""/202}, &(0x7f00000000c0)="008d7acda0b2", 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB], 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) r6 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r6, &(0x7f0000000740)={&(0x7f0000000040)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@cswp={0x58, 0x114, 0x7, {{}, 0x0, 0x0}}], 0x58}, 0x0) open(0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) ioctl$TIOCSERGETLSR(r7, 0x5459, &(0x7f0000000040)) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x32, &(0x7f0000000080)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x70bd2d, 0x25dfdbff, {}, [@IFLA_MTU={0x8, 0x4, 0x42}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 0s ago: executing program 6 (id=2442): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)}, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r0, 0xf504, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x3, 0xc, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r1}, {}, {0x3, 0x3, 0x3, 0xa, 0x5}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x14}}]}, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0xcc03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000f40)={r2, 0x609, 0xe, 0x2a, &(0x7f0000000b40)="dd80000000000002000400000000", 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x7c) syz_io_uring_setup(0x4174, &(0x7f0000000300)={0x0, 0x7e05, 0x10100}, &(0x7f0000000100), 0x0) io_uring_setup(0x67bb, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000010}, 0x0) syz_open_pts(0xffffffffffffffff, 0x22000) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x5) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000bce) r6 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r6, &(0x7f0000032680)=""/102392, 0x18ff8) sched_setaffinity(0x0, 0xfffffef7, &(0x7f0000000740)=0x410000002) clock_adjtime(0x0, &(0x7f0000000000)={0x66b7, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x77, 0x0, 0x0, 0x0, 0x3, 0x248a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00') read$FUSE(r7, &(0x7f0000000380)={0x2020}, 0x2020) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r8, 0x890b, &(0x7f0000000380)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e24, @remote}, {0x2, 0x4e21, @empty}, 0x107, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000}) ioctl$sock_inet_SIOCADDRT(r9, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x4e24, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x4e23, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) kernel console output (not intermixed with test programs): 15064] misc userio: The device must be registered before sending interrupts [ 971.565518][T15066] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 971.578158][T15066] netlink: 20 bytes leftover after parsing attributes in process `syz.7.1998'. [ 971.589184][T15066] overlayfs: option "workdir=./bus" is useless in a non-upper mount, ignore [ 971.597928][T15066] overlayfs: missing 'lowerdir' [ 975.006777][T15089] pim6reg: entered allmulticast mode [ 975.100993][T15076] pim6reg: left allmulticast mode [ 975.186357][T15097] openvswitch: netlink: Unexpected mask (mask=240, allowed=10048) [ 976.308231][T15106] EXT4-fs: Value of option "test_dummy_encryption" is unrecognized [ 976.756009][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 976.756019][ T29] audit: type=1400 audit(1736503857.408:1212): avc: denied { map } for pid=15100 comm="syz.3.2006" path="socket:[37420]" dev="sockfs" ino=37420 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 976.785819][ C1] vkms_vblank_simulate: vblank timer overrun [ 976.805501][ T29] audit: type=1400 audit(1736503857.408:1213): avc: denied { read write } for pid=15100 comm="syz.3.2006" path="socket:[37420]" dev="sockfs" ino=37420 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 977.297317][T15101] overlayfs: The uuid=off requires a single fs for lower and upper, falling back to uuid=null. [ 977.308150][T15101] overlayfs: overlapping lowerdir path [ 978.647186][ T29] audit: type=1400 audit(1736503859.176:1214): avc: denied { create } for pid=15121 comm="syz.4.2012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 980.310748][ T1287] ieee802154 phy1 wpan1: encryption failed: -22 [ 980.909240][T15143] netlink: 252 bytes leftover after parsing attributes in process `syz.3.2016'. [ 981.294495][ T29] audit: type=1326 audit(1736503860.794:1215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15129 comm="syz.5.2015" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f681ed85d29 code=0x7ffc0000 [ 981.428183][ T29] audit: type=1326 audit(1736503860.794:1216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15129 comm="syz.5.2015" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f681ed85d29 code=0x7ffc0000 [ 981.609253][ T29] audit: type=1326 audit(1736503860.794:1217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15129 comm="syz.5.2015" exe="/root/syz-executor" sig=0 arch=c000003e syscall=241 compat=0 ip=0x7f681ed85d29 code=0x7ffc0000 [ 981.839113][ T29] audit: type=1326 audit(1736503860.794:1218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15129 comm="syz.5.2015" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f681ed85d29 code=0x7ffc0000 [ 981.862603][ C0] vkms_vblank_simulate: vblank timer overrun [ 982.716181][ T29] audit: type=1326 audit(1736503860.794:1219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15129 comm="syz.5.2015" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f681ed85d29 code=0x7ffc0000 [ 982.918921][ T29] audit: type=1326 audit(1736503860.794:1220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15129 comm="syz.5.2015" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f681ed85d29 code=0x7ffc0000 [ 983.059212][T15156] ALSA: mixer_oss: invalid index 80000 [ 983.466422][ T29] audit: type=1326 audit(1736503860.794:1221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15129 comm="syz.5.2015" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f681ed85d29 code=0x7ffc0000 [ 983.548694][ T29] audit: type=1326 audit(1736503860.794:1222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15129 comm="syz.5.2015" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f681ed85d29 code=0x7ffc0000 [ 983.592776][ T5829] Bluetooth: hci5: command 0x0406 tx timeout [ 983.607057][ T29] audit: type=1326 audit(1736503860.794:1223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15129 comm="syz.5.2015" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f681ed85d29 code=0x7ffc0000 [ 983.630550][ C0] vkms_vblank_simulate: vblank timer overrun [ 983.637226][ T29] audit: type=1326 audit(1736503860.794:1224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15129 comm="syz.5.2015" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f681ed85d29 code=0x7ffc0000 [ 983.661055][ T29] audit: type=1326 audit(1736503860.794:1225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15129 comm="syz.5.2015" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f681ed85d29 code=0x7ffc0000 [ 983.684499][ C0] vkms_vblank_simulate: vblank timer overrun [ 983.692084][ T29] audit: type=1400 audit(1736503861.271:1226): avc: denied { shutdown } for pid=15138 comm="syz.3.2016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 983.712700][ T29] audit: type=1400 audit(1736503861.309:1227): avc: denied { create } for pid=15138 comm="syz.3.2016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 983.732951][ T29] audit: type=1400 audit(1736503861.636:1228): avc: denied { create } for pid=15114 comm="syz.7.2010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 983.997914][T15161] misc userio: The device must be registered before sending interrupts [ 983.999491][T15164] veth0_to_team: entered promiscuous mode [ 984.250014][T15164] veth0_to_team: entered allmulticast mode [ 984.591869][T15169] netdevsim netdevsim5: Direct firmware load for ./file0 failed with error -2 [ 984.601746][T15169] netdevsim netdevsim5: Falling back to sysfs fallback for: ./file0 [ 988.062445][ T5863] usb 6-1: new high-speed USB device number 8 using dummy_hcd [ 988.079119][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 988.079134][ T29] audit: type=1400 audit(1736503867.997:1242): avc: denied { mount } for pid=15206 comm="syz.6.2031" name="/" dev="ramfs" ino=37565 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 988.483038][ T5863] usb 6-1: config 129 has an invalid interface number: 249 but max is 0 [ 988.521099][ T5863] usb 6-1: config 129 has no interface number 0 [ 988.527441][ T5863] usb 6-1: config 129 interface 249 has no altsetting 0 [ 988.553473][ T5863] usb 6-1: New USB device found, idVendor=112a, idProduct=0001, bcdDevice=99.21 [ 988.573578][ T5863] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 988.598132][ T29] audit: type=1400 audit(1736503868.474:1243): avc: denied { mount } for pid=15208 comm="syz.3.2030" name="/" dev="hugetlbfs" ino=37636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 988.632552][T15214] hugetlbfs: Bad value 'g' for mount option 'nr_inodes' [ 988.632552][T15214] [ 988.651176][ T29] audit: type=1400 audit(1736503868.511:1244): avc: denied { remount } for pid=15208 comm="syz.3.2030" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 988.948405][ T5863] usb 6-1: string descriptor 0 read error: -71 [ 988.956557][ T5863] redrat3 6-1:129.249: Couldn't find all endpoints [ 988.975894][ T5863] usb 6-1: USB disconnect, device number 8 [ 989.189762][T15224] overlayfs: "xino" feature enabled using 2 upper inode bits. [ 989.211439][T15224] overlayfs: failed to resolve './bus': -2 [ 989.762671][ T29] audit: type=1400 audit(1736503869.035:1245): avc: denied { mount } for pid=15219 comm="syz.7.2033" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 989.947909][ T29] audit: type=1400 audit(1736503869.737:1246): avc: denied { unmount } for pid=12805 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 990.195558][ T29] audit: type=1400 audit(1736503869.980:1247): avc: denied { unmount } for pid=12765 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 990.841045][T14818] usb 4-1: new high-speed USB device number 27 using dummy_hcd [ 990.857523][ T29] audit: type=1400 audit(1736503870.597:1248): avc: denied { mount } for pid=15237 comm="syz.6.2036" name="/" dev="configfs" ino=71 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 990.884942][ T29] audit: type=1400 audit(1736503870.625:1249): avc: denied { search } for pid=15237 comm="syz.6.2036" name="/" dev="configfs" ino=71 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 991.099624][ T29] audit: type=1400 audit(1736503870.625:1250): avc: denied { read } for pid=15237 comm="syz.6.2036" name="/" dev="configfs" ino=71 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 991.614429][T15245] 9pnet_fd: Insufficient options for proto=fd [ 991.707296][ T29] audit: type=1400 audit(1736503870.644:1251): avc: denied { open } for pid=15237 comm="syz.6.2036" path="/" dev="configfs" ino=71 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 992.182347][T15236] netlink: 80 bytes leftover after parsing attributes in process `syz.7.2034'. [ 992.203815][T14818] usb 4-1: device descriptor read/all, error -71 [ 993.441388][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 993.441403][ T29] audit: type=1400 audit(1736503873.020:1254): avc: denied { read write } for pid=15262 comm="syz.5.2042" name="uhid" dev="devtmpfs" ino=1273 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 993.464894][ T5863] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 993.472355][ T29] audit: type=1400 audit(1736503873.020:1255): avc: denied { open } for pid=15262 comm="syz.5.2042" path="/dev/uhid" dev="devtmpfs" ino=1273 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 993.497853][ T5863] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz0 [ 995.195601][T15277] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 995.214680][ T29] audit: type=1400 audit(1736503873.815:1256): avc: denied { relabelfrom } for pid=15268 comm="syz.3.2043" name="" dev="pipefs" ino=38482 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 995.480389][ T29] audit: type=1400 audit(1736503874.311:1257): avc: denied { ioctl } for pid=15268 comm="syz.3.2043" path="socket:[38481]" dev="sockfs" ino=38481 ioctlcmd=0x48d5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 995.621965][ T29] audit: type=1400 audit(1736503874.825:1258): avc: denied { sqpoll } for pid=15267 comm="syz.4.2044" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 997.650174][T13841] Bluetooth: hci1: Opcode 0x1003 failed: -110 [ 998.160498][ T12] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 998.947697][ T29] audit: type=1400 audit(1736503878.155:1259): avc: denied { connect } for pid=15292 comm="syz.7.2049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 998.970425][ T29] audit: type=1400 audit(1736503878.155:1260): avc: denied { name_connect } for pid=15292 comm="syz.7.2049" dest=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=dccp_socket permissive=1 [ 998.992842][ T29] audit: type=1400 audit(1736503878.155:1261): avc: denied { accept } for pid=15292 comm="syz.7.2049" lport=33001 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 999.839922][ T29] audit: type=1400 audit(1736503878.997:1262): avc: denied { bind } for pid=15305 comm="syz.3.2051" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 999.915984][T15315] wlan1 speed is unknown, defaulting to 1000 [ 999.936916][ T29] audit: type=1400 audit(1736503878.997:1263): avc: denied { node_bind } for pid=15305 comm="syz.3.2051" saddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1000.243665][T15322] syz.7.2053: attempt to access beyond end of device [ 1000.243665][T15322] nbd7: rw=0, sector=2, nr_sectors = 1 limit=0 [ 1000.448526][T15323] netlink: 12 bytes leftover after parsing attributes in process `syz.7.2053'. [ 1000.458281][T15323] netlink: 12 bytes leftover after parsing attributes in process `syz.7.2053'. [ 1000.729725][ T29] audit: type=1400 audit(1736503879.362:1264): avc: denied { mounton } for pid=15314 comm="syz.7.2053" path="/syzcgroup/unified/syz7" dev="cgroup2" ino=366 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 1003.781733][T15315] lo speed is unknown, defaulting to 1000 [ 1003.810821][T15315] lo speed is unknown, defaulting to 1000 [ 1004.518377][T15360] can-isotp: isotp_sendmsg: can_send_ret -ENETDOWN [ 1005.113789][ T29] audit: type=1400 audit(1736503883.936:1265): avc: denied { getopt } for pid=15366 comm="syz.6.2065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1005.133273][ C1] vkms_vblank_simulate: vblank timer overrun [ 1006.131989][T15377] xt_connbytes: Forcing CT accounting to be enabled [ 1006.139062][T15377] xt_time: invalid argument - start or stop time greater than 23:59:59 [ 1006.171161][T15377] usb usb1: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 1006.461856][T15368] Bluetooth: hci5: Opcode 0x0c1a failed: -4 [ 1007.394419][ T5829] Bluetooth: hci5: command 0x0406 tx timeout [ 1007.457792][T15383] overlayfs: The uuid=off requires a single fs for lower and upper, falling back to uuid=null. [ 1007.468421][T15383] overlayfs: overlapping lowerdir path [ 1007.978246][ T29] audit: type=1400 audit(1736503886.527:1266): avc: denied { read } for pid=15387 comm="syz.7.2069" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1008.216246][ T29] audit: type=1400 audit(1736503886.836:1267): avc: denied { create } for pid=15395 comm="syz.6.2070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 1008.283709][ T29] audit: type=1400 audit(1736503886.836:1268): avc: denied { ioctl } for pid=15395 comm="syz.6.2070" path="socket:[38637]" dev="sockfs" ino=38637 ioctlcmd=0x4943 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 1009.032318][ T29] audit: type=1400 audit(1736503887.275:1269): avc: denied { bind } for pid=15395 comm="syz.6.2070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1009.053608][ T29] audit: type=1400 audit(1736503887.575:1270): avc: denied { accept } for pid=15395 comm="syz.6.2070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 1009.479518][T15417] misc userio: The device must be registered before sending interrupts [ 1010.577716][T15420] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15420 comm=syz.4.2078 [ 1012.291133][ T29] audit: type=1400 audit(1736503890.474:1271): avc: denied { name_bind } for pid=15428 comm="syz.3.2081" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 1013.016027][T15435] misc userio: The device must be registered before sending interrupts [ 1013.844108][T15454] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1014.405796][T15464] netlink: 12 bytes leftover after parsing attributes in process `syz.6.2088'. [ 1015.340662][ T29] audit: type=1400 audit(1736503892.242:1272): avc: denied { bind } for pid=15441 comm="syz.5.2083" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 1015.340705][ T29] audit: type=1400 audit(1736503892.298:1273): avc: denied { setcheckreqprot } for pid=15441 comm="syz.5.2083" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1015.340735][ T29] audit: type=1400 audit(1736503892.448:1274): avc: denied { sys_module } for pid=15441 comm="syz.5.2083" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1015.340766][ T29] audit: type=1400 audit(1736503893.159:1275): avc: denied { create } for pid=15460 comm="syz.5.2089" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 1016.252170][ T29] audit: type=1400 audit(1736503894.347:1276): avc: denied { read write } for pid=15478 comm="syz.5.2091" name="nullb0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1016.353913][ T29] audit: type=1400 audit(1736503894.403:1277): avc: denied { open } for pid=15478 comm="syz.5.2091" path="/dev/nullb0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1016.669575][ T29] audit: type=1400 audit(1736503894.609:1278): avc: denied { map } for pid=15478 comm="syz.5.2091" path="/dev/nullb0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1016.692658][ C0] vkms_vblank_simulate: vblank timer overrun [ 1016.699209][ T29] audit: type=1400 audit(1736503894.609:1279): avc: denied { execute } for pid=15478 comm="syz.5.2091" path="/dev/nullb0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1017.017191][T15487] /dev/nullb0: Can't open blockdev [ 1017.185180][T15487] tmpfs: Bad value for 'mpol' [ 1017.264093][T15491] tmpfs: Bad value for 'mpol' [ 1017.726383][ T29] audit: type=1400 audit(1736503895.722:1280): avc: denied { listen } for pid=15486 comm="syz.3.2094" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 1019.847648][ T29] audit: type=1400 audit(1736503897.705:1281): avc: denied { listen } for pid=15508 comm="syz.3.2098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 1020.072053][T15517] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2100'. [ 1020.133495][ T29] audit: type=1400 audit(1736503897.986:1282): avc: denied { ioctl } for pid=15508 comm="syz.3.2098" path="socket:[39083]" dev="sockfs" ino=39083 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 1020.231920][T15527] netlink: 12 bytes leftover after parsing attributes in process `syz.6.2102'. [ 1022.031147][T15545] misc userio: The device must be registered before sending interrupts [ 1022.838887][T15550] IPVS: Error joining to the multicast group [ 1022.845416][T15550] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2108'. [ 1023.248817][T15557] misc userio: The device must be registered before sending interrupts [ 1024.860133][T15576] Mount JFS Failure: -22 [ 1024.864762][T15576] jfs_mount failed w/return code = -22 [ 1024.865962][ T29] audit: type=1400 audit(1736503902.326:1283): avc: denied { audit_write } for pid=15561 comm="syz.5.2109" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1025.403809][ T29] audit: type=1400 audit(1736503902.532:1284): avc: denied { write } for pid=15562 comm="syz.6.2111" name="card1" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1025.473263][T15580] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1025.911794][T15580] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 1026.277772][T15593] netlink: 56 bytes leftover after parsing attributes in process `syz.3.2114'. [ 1026.446207][ T29] audit: type=1400 audit(1736503902.962:1285): avc: denied { mount } for pid=15571 comm="syz.7.2112" name="/" dev="9p" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1026.485301][ T29] audit: type=1400 audit(1736503903.916:1286): avc: denied { bind } for pid=15571 comm="syz.7.2112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1026.751984][T15591] IPVS: sync thread started: state = MASTER, mcast_ifn = veth1_virt_wifi, syncid = 2, id = 0 [ 1027.115598][ T29] audit: type=1400 audit(1736503904.515:1287): avc: denied { unmount } for pid=12805 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1027.121414][T15587] syz.5.2115 (15587): drop_caches: 2 [ 1027.151580][T15587] syz.5.2115 (15587): drop_caches: 2 [ 1028.443948][T15609] No buffer was provided with the request [ 1028.726665][T15615] netlink: 12 bytes leftover after parsing attributes in process `syz.5.2121'. [ 1029.181187][ T29] audit: type=1400 audit(1736503906.208:1288): avc: denied { connect } for pid=15604 comm="syz.7.2120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 1029.283008][ T29] audit: type=1400 audit(1736503906.208:1289): avc: denied { write } for pid=15604 comm="syz.7.2120" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1030.442425][ T29] audit: type=1400 audit(1736503907.630:1290): avc: denied { read } for pid=15627 comm="syz.7.2125" name="mouse0" dev="devtmpfs" ino=1026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1030.571845][ T29] audit: type=1400 audit(1736503907.630:1291): avc: denied { open } for pid=15627 comm="syz.7.2125" path="/dev/input/mouse0" dev="devtmpfs" ino=1026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1032.789951][ T29] audit: type=1400 audit(1736503909.547:1292): avc: denied { connect } for pid=15627 comm="syz.7.2125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1034.137541][T15645] misc userio: The device must be registered before sending interrupts [ 1034.765441][T15648] IPVS: sync thread started: state = MASTER, mcast_ifn = veth1_virt_wifi, syncid = 2, id = 0 [ 1035.159928][T10846] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 1035.210339][T15655] netlink: 'syz.3.2130': attribute type 10 has an invalid length. [ 1035.296762][T15655] netlink: 55 bytes leftover after parsing attributes in process `syz.3.2130'. [ 1035.470921][ T29] audit: type=1400 audit(1736503912.166:1293): avc: denied { read } for pid=15656 comm="syz.6.2132" name="vhost-net" dev="devtmpfs" ino=1274 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1036.059262][ T29] audit: type=1400 audit(1736503912.166:1294): avc: denied { open } for pid=15656 comm="syz.6.2132" path="/dev/vhost-net" dev="devtmpfs" ino=1274 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1036.086088][ T29] audit: type=1400 audit(1736503912.166:1295): avc: denied { ioctl } for pid=15656 comm="syz.6.2132" path="/dev/vhost-net" dev="devtmpfs" ino=1274 ioctlcmd=0xaf00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1036.122990][T15658] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2131'. [ 1036.132239][T15658] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2131'. [ 1036.142794][T15658] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2131'. [ 1036.776432][ T29] audit: type=1400 audit(1736503913.541:1296): avc: denied { name_bind } for pid=15652 comm="syz.4.2131" src=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 1037.401690][T15673] IPVS: Error joining to the multicast group [ 1037.635549][T15683] netlink: 12 bytes leftover after parsing attributes in process `syz.7.2138'. [ 1038.287139][ T29] audit: type=1400 audit(1736503914.935:1297): avc: denied { getopt } for pid=15675 comm="syz.4.2136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1038.350010][ T29] audit: type=1400 audit(1736503915.029:1298): avc: denied { getopt } for pid=15681 comm="syz.6.2137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1038.480287][ T29] audit: type=1400 audit(1736503915.094:1299): avc: denied { bind } for pid=15681 comm="syz.6.2137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1041.146970][T15698] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2140'. [ 1041.765697][ T29] audit: type=1400 audit(1736503917.826:1300): avc: denied { execute } for pid=15686 comm="syz.6.2139" dev="tmpfs" ino=1656 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1041.789656][ T29] audit: type=1400 audit(1736503917.826:1301): avc: denied { execute_no_trans } for pid=15686 comm="syz.6.2139" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=1656 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1043.956815][T13841] Bluetooth: hci5: command 0x0406 tx timeout [ 1044.080391][ T51] usb 4-1: new full-speed USB device number 29 using dummy_hcd [ 1044.244757][T14818] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 1044.360304][T14818] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz1] on syz0 [ 1044.449638][ T29] audit: type=1800 audit(1736503920.669:1302): pid=15746 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed comm="syz.6.2150" name="SYSV00000000" dev="hugetlbfs" ino=2 res=0 errno=0 [ 1044.487509][ T51] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 1044.520582][ T51] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1044.539959][ T51] usb 4-1: New USB device found, idVendor=056a, idProduct=7a26, bcdDevice=ad.13 [ 1044.549125][ T51] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1044.566737][ T51] usb 4-1: config 0 descriptor?? [ 1044.578795][ T29] audit: type=1400 audit(1736503920.763:1303): avc: denied { module_load } for pid=15740 comm="syz.6.2150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 1046.016328][T15754] netlink: 24 bytes leftover after parsing attributes in process `syz.5.2154'. [ 1046.025419][T15754] netlink: 24 bytes leftover after parsing attributes in process `syz.5.2154'. [ 1046.045892][ T1287] ieee802154 phy1 wpan1: encryption failed: -22 [ 1046.094350][T15756] trusted_key: encrypted_key: insufficient parameters specified [ 1046.708848][ T51] wacom 0003:056A:7A26.0004: item fetching failed at offset 0/11 [ 1046.717768][ T51] wacom 0003:056A:7A26.0004: parse failed [ 1046.726921][ T51] wacom 0003:056A:7A26.0004: probe with driver wacom failed with error -22 [ 1047.581280][T14818] usb 4-1: USB disconnect, device number 29 [ 1047.656998][T15771] netlink: 12 bytes leftover after parsing attributes in process `syz.5.2157'. [ 1047.944878][ T29] audit: type=1400 audit(1736503923.999:1304): avc: denied { append } for pid=15776 comm="syz.7.2158" name="ppp" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 1048.173665][ T29] audit: type=1400 audit(1736503924.168:1305): avc: denied { read } for pid=15776 comm="syz.7.2158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1048.332634][ T29] audit: type=1400 audit(1736503924.355:1306): avc: denied { setattr } for pid=15788 comm="syz.6.2162" path="/dev/sg0" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:gpg_agent_exec_t:s0" [ 1050.126513][T15789] @ÿ: renamed from bond_slave_0 (while UP) [ 1051.626271][ T29] audit: type=1400 audit(1736503927.432:1307): avc: denied { read } for pid=15815 comm="syz.6.2168" name="rtc0" dev="devtmpfs" ino=921 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1051.843415][ T29] audit: type=1400 audit(1736503927.647:1308): avc: denied { open } for pid=15815 comm="syz.6.2168" path="/dev/rtc0" dev="devtmpfs" ino=921 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1051.911245][T15821] netlink: 56 bytes leftover after parsing attributes in process `syz.3.2167'. [ 1052.921369][ T29] audit: type=1400 audit(1736503927.647:1309): avc: denied { ioctl } for pid=15815 comm="syz.6.2168" path="/dev/rtc0" dev="devtmpfs" ino=921 ioctlcmd=0x7001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1053.249713][T15837] loop7: detected capacity change from 0 to 16384 [ 1053.538474][T15835] usb usb8: usbfs: process 15835 (syz.3.2169) did not claim interface 0 before use [ 1053.567416][T15833] blk_print_req_error: 41 callbacks suppressed [ 1053.567436][T15833] I/O error, dev loop7, sector 2048 op 0x0:(READ) flags 0x80700 phys_seg 17 prio class 0 [ 1053.598822][T15833] I/O error, dev loop7, sector 2304 op 0x0:(READ) flags 0x80700 phys_seg 16 prio class 0 [ 1053.608964][T15833] I/O error, dev loop7, sector 2048 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1053.619065][T15833] buffer_io_error: 41 callbacks suppressed [ 1053.619078][T15833] Buffer I/O error on dev loop7, logical block 256, async page read [ 1053.697566][T15832] I/O error, dev loop7, sector 0 op 0x1:(WRITE) flags 0x4800 phys_seg 128 prio class 0 [ 1053.708262][T15832] Buffer I/O error on dev loop7, logical block 0, lost async page write [ 1053.717837][T15832] Buffer I/O error on dev loop7, logical block 1, lost async page write [ 1053.727044][T15832] Buffer I/O error on dev loop7, logical block 2, lost async page write [ 1053.736117][T15832] Buffer I/O error on dev loop7, logical block 3, lost async page write [ 1053.744879][T15832] Buffer I/O error on dev loop7, logical block 4, lost async page write [ 1053.753299][T15832] Buffer I/O error on dev loop7, logical block 5, lost async page write [ 1053.762945][T15832] Buffer I/O error on dev loop7, logical block 6, lost async page write [ 1053.772520][T15832] Buffer I/O error on dev loop7, logical block 7, lost async page write [ 1053.781332][T15832] Buffer I/O error on dev loop7, logical block 8, lost async page write [ 1053.793176][T15832] I/O error, dev loop7, sector 1024 op 0x1:(WRITE) flags 0x800 phys_seg 128 prio class 0 [ 1054.069009][ T29] audit: type=1400 audit(1736503929.714:1310): avc: denied { write } for pid=5171 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1054.611637][ T29] audit: type=1400 audit(1736503929.714:1311): avc: denied { remove_name } for pid=5171 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1054.783045][T15852] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2173'. [ 1055.059408][ T29] audit: type=1400 audit(1736503929.714:1312): avc: denied { rename } for pid=5171 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1055.229695][ T29] audit: type=1400 audit(1736503929.724:1313): avc: denied { add_name } for pid=5171 comm="syslogd" name="messages.0" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1055.328137][ T29] audit: type=1400 audit(1736503929.724:1314): avc: denied { unlink } for pid=5171 comm="syslogd" name="messages.0" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1055.775803][ T29] audit: type=1400 audit(1736503929.724:1315): avc: denied { create } for pid=5171 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1055.983551][ T29] audit: type=1400 audit(1736503929.817:1316): avc: denied { write } for pid=15840 comm="syz.7.2171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1056.007951][ T29] audit: type=1400 audit(1736503930.725:1317): avc: denied { append } for pid=15853 comm="syz.3.2175" name="iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1056.014083][ T5863] IPVS: starting estimator thread 0... [ 1056.035086][ T29] audit: type=1400 audit(1736503930.846:1318): avc: denied { bind } for pid=15815 comm="syz.6.2168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 1057.258661][ T29] audit: type=1400 audit(1736503932.698:1319): avc: granted { setsecparam } for pid=15865 comm="syz.7.2178" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 1057.305704][T15863] IPVS: using max 32 ests per chain, 76800 per kthread [ 1058.021465][T15885] program syz.6.2180 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1058.641077][T15889] .: renamed from bond0 (while UP) [ 1059.410214][T15898] Cannot find map_set index 0 as target [ 1059.775196][T15870] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1059.810924][ T29] kauditd_printk_skb: 49 callbacks suppressed [ 1059.810936][ T29] audit: type=1400 audit(1736503934.485:1369): avc: denied { prog_load } for pid=15891 comm="syz.7.2184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1059.837392][T15870] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 1059.891671][ T29] audit: type=1400 audit(1736503934.485:1370): avc: denied { bpf } for pid=15891 comm="syz.7.2184" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1059.934472][ T29] audit: type=1400 audit(1736503934.494:1371): avc: denied { perfmon } for pid=15891 comm="syz.7.2184" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1059.987941][ T29] audit: type=1400 audit(1736503934.494:1372): avc: denied { perfmon } for pid=15891 comm="syz.7.2184" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1060.018607][ T29] audit: type=1400 audit(1736503934.504:1373): avc: denied { perfmon } for pid=15891 comm="syz.7.2184" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1060.040450][ T29] audit: type=1400 audit(1736503934.504:1374): avc: denied { perfmon } for pid=15891 comm="syz.7.2184" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1060.062264][ T29] audit: type=1400 audit(1736503934.513:1375): avc: denied { perfmon } for pid=15891 comm="syz.7.2184" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1060.084155][ T29] audit: type=1400 audit(1736503934.513:1376): avc: denied { bpf } for pid=15891 comm="syz.7.2184" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1060.105551][ T29] audit: type=1400 audit(1736503934.522:1377): avc: denied { bpf } for pid=15891 comm="syz.7.2184" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1060.126659][ T29] audit: type=1400 audit(1736503934.522:1378): avc: denied { prog_run } for pid=15891 comm="syz.7.2184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1060.486812][T15908] netlink: 12 bytes leftover after parsing attributes in process `syz.7.2187'. [ 1060.801094][T15909] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1065.553938][ T29] kauditd_printk_skb: 146 callbacks suppressed [ 1065.553955][ T29] audit: type=1400 audit(1736503940.462:1525): avc: denied { create } for pid=15933 comm="syz.6.2192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1065.908395][ T29] audit: type=1400 audit(1736503940.762:1526): avc: denied { create } for pid=15933 comm="syz.6.2192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1065.929412][ T29] audit: type=1400 audit(1736503940.771:1527): avc: denied { shutdown } for pid=15933 comm="syz.6.2192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1065.951328][ T29] audit: type=1400 audit(1736503940.771:1528): avc: denied { execmem } for pid=15933 comm="syz.6.2192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1066.151128][ T29] audit: type=1400 audit(1736503940.930:1529): avc: denied { prog_load } for pid=15933 comm="syz.6.2192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1066.200166][ T29] audit: type=1400 audit(1736503940.930:1530): avc: denied { bpf } for pid=15933 comm="syz.6.2192" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1066.265513][ T29] audit: type=1400 audit(1736503940.930:1531): avc: denied { perfmon } for pid=15933 comm="syz.6.2192" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1066.312554][ T29] audit: type=1400 audit(1736503940.930:1532): avc: denied { perfmon } for pid=15933 comm="syz.6.2192" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1066.430909][ T29] audit: type=1400 audit(1736503940.930:1533): avc: denied { perfmon } for pid=15933 comm="syz.6.2192" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1066.513639][ T29] audit: type=1400 audit(1736503940.930:1534): avc: denied { perfmon } for pid=15933 comm="syz.6.2192" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1070.034519][T10846] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 1070.391564][T15980] netlink: 24 bytes leftover after parsing attributes in process `syz.6.2197'. [ 1070.820211][T15983] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2199'. [ 1070.924230][ T29] kauditd_printk_skb: 159 callbacks suppressed [ 1070.924247][ T29] audit: type=1400 audit(1736503944.971:1694): avc: denied { create } for pid=15973 comm="syz.6.2197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1070.924281][ T29] audit: type=1400 audit(1736503944.990:1695): avc: denied { write } for pid=15973 comm="syz.6.2197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1070.924309][ T29] audit: type=1400 audit(1736503944.990:1696): avc: denied { nlmsg_write } for pid=15973 comm="syz.6.2197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1070.924338][ T29] audit: type=1400 audit(1736503945.317:1697): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1070.924368][ T29] audit: type=1400 audit(1736503945.364:1698): avc: denied { prog_load } for pid=15981 comm="syz.3.2199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1070.924398][ T29] audit: type=1400 audit(1736503945.364:1699): avc: denied { bpf } for pid=15981 comm="syz.3.2199" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1070.924428][ T29] audit: type=1400 audit(1736503945.364:1700): avc: denied { perfmon } for pid=15981 comm="syz.3.2199" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1070.924457][ T29] audit: type=1400 audit(1736503945.364:1701): avc: denied { perfmon } for pid=15981 comm="syz.3.2199" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1070.924494][ T29] audit: type=1400 audit(1736503945.373:1702): avc: denied { perfmon } for pid=15981 comm="syz.3.2199" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1070.924524][ T29] audit: type=1400 audit(1736503945.373:1703): avc: denied { perfmon } for pid=15981 comm="syz.3.2199" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1072.117689][T15991] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1072.367117][ C1] vkms_vblank_simulate: vblank timer overrun [ 1073.375476][T15984] tty tty35: ldisc open failed (-12), clearing slot 34 [ 1073.801650][ T5829] Bluetooth: hci5: ACL packet for unknown connection handle 201 [ 1074.173341][T16003] workqueue: Failed to create a rescuer kthread for wq "ceph-watch-notify": -EINTR [ 1074.539990][T15997] netdevsim netdevsim4: Direct firmware load for 1GB.usage_in_bytes failed with error -2 [ 1074.559219][T15997] netdevsim netdevsim4: Falling back to sysfs fallback for: 1GB.usage_in_bytes [ 1074.702083][T16010] xt_connbytes: Forcing CT accounting to be enabled [ 1074.709159][T16010] xt_bpf: check failed: parse error [ 1076.111843][T16020] misc userio: The device must be registered before sending interrupts [ 1077.292249][ T29] kauditd_printk_skb: 172 callbacks suppressed [ 1077.299318][ T29] audit: type=1400 audit(1736503950.349:1876): avc: denied { read write } for pid=16015 comm="syz.7.2204" name="userio" dev="devtmpfs" ino=914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1077.371681][T16024] wlan1 speed is unknown, defaulting to 1000 [ 1077.449011][T16024] lo speed is unknown, defaulting to 1000 [ 1077.455568][T16024] lo speed is unknown, defaulting to 1000 [ 1077.563408][ T29] audit: type=1400 audit(1736503950.349:1877): avc: denied { read write open } for pid=16015 comm="syz.7.2204" path="/dev/userio" dev="devtmpfs" ino=914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1077.782451][ T29] audit: type=1400 audit(1736503950.761:1878): avc: denied { read write } for pid=16012 comm="syz.6.2207" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1077.806062][ T29] audit: type=1400 audit(1736503950.761:1879): avc: denied { read write open } for pid=16012 comm="syz.6.2207" path="/dev/fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1077.830715][ T29] audit: type=1400 audit(1736503950.761:1880): avc: denied { mounton } for pid=16012 comm="syz.6.2207" path="/127/file0" dev="tmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1077.853918][ T29] audit: type=1400 audit(1736503950.780:1881): avc: denied { mount } for pid=16012 comm="syz.6.2207" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1077.876293][ T29] audit: type=1400 audit(1736503950.780:1882): avc: denied { create } for pid=16012 comm="syz.6.2207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1077.897148][ T29] audit: type=1400 audit(1736503950.789:1883): avc: denied { execmem } for pid=16013 comm="syz.3.2208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1077.916574][ T29] audit: type=1400 audit(1736503951.088:1884): avc: denied { map_create } for pid=16013 comm="syz.3.2208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1077.936038][ T29] audit: type=1400 audit(1736503951.107:1885): avc: denied { map_read map_write } for pid=16013 comm="syz.3.2208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1078.004053][T13841] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 1078.019490][T13841] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 1078.040006][T13841] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 1078.049653][T13841] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 1078.061822][T13841] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 1078.069905][T13841] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 1078.836894][T16030] wlan1 speed is unknown, defaulting to 1000 [ 1078.953917][T16036] IPVS: Error joining to the multicast group [ 1080.472900][ T5829] Bluetooth: hci1: command tx timeout [ 1081.492591][T16030] lo speed is unknown, defaulting to 1000 [ 1081.500023][T16030] lo speed is unknown, defaulting to 1000 [ 1082.686338][ T5829] Bluetooth: hci1: command tx timeout [ 1082.707410][ T29] kauditd_printk_skb: 143 callbacks suppressed [ 1082.707424][ T29] audit: type=1400 audit(1736503955.934:2029): avc: denied { read } for pid=16047 comm="syz.3.2216" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 1082.801721][ T29] audit: type=1400 audit(1736503955.943:2030): avc: denied { read open } for pid=16047 comm="syz.3.2216" path="/dev/cpu/0/msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 1082.865370][ T29] audit: type=1400 audit(1736503956.093:2031): avc: denied { create } for pid=16059 comm="syz.7.2217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1083.035693][ T29] audit: type=1400 audit(1736503956.093:2032): avc: denied { bind } for pid=16057 comm="syz.6.2213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1083.056064][ T29] audit: type=1400 audit(1736503956.093:2033): avc: denied { prog_load } for pid=16059 comm="syz.7.2217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1083.075251][ T29] audit: type=1400 audit(1736503956.093:2034): avc: denied { bpf } for pid=16059 comm="syz.7.2217" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1083.095984][ T29] audit: type=1400 audit(1736503956.121:2035): avc: denied { write } for pid=16057 comm="syz.6.2213" name="001" dev="devtmpfs" ino=744 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1083.121929][ T29] audit: type=1400 audit(1736503956.121:2036): avc: denied { write } for pid=16057 comm="syz.6.2213" path="/dev/bus/usb/007/001" dev="devtmpfs" ino=744 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1083.146477][ T29] audit: type=1400 audit(1736503956.140:2037): avc: denied { read } for pid=16057 comm="syz.6.2213" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 1083.170034][ T29] audit: type=1400 audit(1736503956.140:2038): avc: denied { read open } for pid=16057 comm="syz.6.2213" path="/dev/cpu/0/msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 1083.707369][T16074] netlink: 24 bytes leftover after parsing attributes in process `syz.7.2217'. [ 1083.717087][T16074] netlink: 24 bytes leftover after parsing attributes in process `syz.7.2217'. [ 1083.778138][T16070] trusted_key: encrypted_key: insufficient parameters specified [ 1084.981291][T16071] netlink: 36 bytes leftover after parsing attributes in process `syz.4.2219'. [ 1084.989059][ T5829] Bluetooth: hci1: command tx timeout [ 1085.034073][T16030] chnl_net:caif_netlink_parms(): no params data found [ 1085.681715][T16030] bridge0: port 1(bridge_slave_0) entered blocking state [ 1085.709393][T16030] bridge0: port 1(bridge_slave_0) entered disabled state [ 1085.716844][T16030] bridge_slave_0: entered allmulticast mode [ 1085.768908][T16030] bridge_slave_0: entered promiscuous mode [ 1085.820657][T16030] bridge0: port 2(bridge_slave_1) entered blocking state [ 1085.861149][T16030] bridge0: port 2(bridge_slave_1) entered disabled state [ 1086.919763][T16030] bridge_slave_1: entered allmulticast mode [ 1086.966112][T16030] bridge_slave_1: entered promiscuous mode [ 1087.216577][ T5829] Bluetooth: hci1: command tx timeout [ 1087.446035][T16030] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1087.460840][T16030] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1088.199364][ T29] kauditd_printk_skb: 166 callbacks suppressed [ 1088.199381][ T29] audit: type=1400 audit(1736503961.088:2205): avc: denied { prog_load } for pid=16104 comm="syz.3.2226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1088.251808][ T29] audit: type=1400 audit(1736503961.088:2206): avc: denied { bpf } for pid=16104 comm="syz.3.2226" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1088.310234][ T29] audit: type=1400 audit(1736503961.097:2207): avc: denied { perfmon } for pid=16104 comm="syz.3.2226" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1088.360212][ T29] audit: type=1400 audit(1736503961.097:2208): avc: denied { perfmon } for pid=16104 comm="syz.3.2226" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1088.392143][ T29] audit: type=1400 audit(1736503961.106:2209): avc: denied { perfmon } for pid=16104 comm="syz.3.2226" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1088.413388][ T29] audit: type=1400 audit(1736503961.106:2210): avc: denied { perfmon } for pid=16104 comm="syz.3.2226" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1088.434577][ T29] audit: type=1400 audit(1736503961.116:2211): avc: denied { perfmon } for pid=16104 comm="syz.3.2226" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1088.719839][ T29] audit: type=1400 audit(1736503961.116:2212): avc: denied { bpf } for pid=16104 comm="syz.3.2226" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1088.951399][ T29] audit: type=1400 audit(1736503961.181:2213): avc: denied { create } for pid=16104 comm="syz.3.2226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1088.991012][ T29] audit: type=1400 audit(1736503961.415:2214): avc: denied { read write } for pid=16104 comm="syz.3.2226" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1089.097237][T16030] team0: Port device team_slave_0 added [ 1089.122915][T16030] team0: Port device team_slave_1 added [ 1090.514645][T16030] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1090.527547][T16030] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1090.767621][T16030] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1090.788266][T16030] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1090.795492][T16030] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1090.868100][T16030] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1093.546468][ T29] kauditd_printk_skb: 138 callbacks suppressed [ 1093.546502][ T29] audit: type=1400 audit(1736503966.635:2353): avc: denied { read } for pid=16147 comm="syz.3.2234" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 1093.778783][ T29] audit: type=1400 audit(1736503966.635:2354): avc: denied { read open } for pid=16147 comm="syz.3.2234" path="/dev/cpu/0/msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 1093.803304][ T29] audit: type=1400 audit(1736503966.766:2355): avc: denied { read write } for pid=12765 comm="syz-executor" name="loop6" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1093.829132][ T29] audit: type=1400 audit(1736503966.775:2356): avc: denied { read write open } for pid=12765 comm="syz-executor" path="/dev/loop6" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1093.854541][ T29] audit: type=1400 audit(1736503966.775:2357): avc: denied { ioctl } for pid=12765 comm="syz-executor" path="/dev/loop6" dev="devtmpfs" ino=653 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1093.880442][ T29] audit: type=1400 audit(1736503966.794:2358): avc: denied { read write } for pid=12805 comm="syz-executor" name="loop7" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1093.904869][ T29] audit: type=1400 audit(1736503966.794:2359): avc: denied { read write open } for pid=12805 comm="syz-executor" path="/dev/loop7" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1093.930158][ T29] audit: type=1400 audit(1736503966.794:2360): avc: denied { ioctl } for pid=12805 comm="syz-executor" path="/dev/loop7" dev="devtmpfs" ino=654 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1093.957596][ T29] audit: type=1400 audit(1736503966.897:2361): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1093.979925][ T29] audit: type=1400 audit(1736503966.897:2362): avc: denied { search } for pid=5171 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1094.285998][T16030] hsr_slave_0: entered promiscuous mode [ 1094.380244][T16153] ceph: No mds server is up or the cluster is laggy [ 1094.429298][T16030] hsr_slave_1: entered promiscuous mode [ 1095.248227][T16030] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1095.266584][T16030] Cannot create hsr debugfs directory [ 1095.492290][T16163] netlink: 12 bytes leftover after parsing attributes in process `syz.7.2237'. [ 1095.943069][T16030] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 1095.998828][T16030] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 1097.099572][T16030] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 1097.253070][T16173] netlink: 220 bytes leftover after parsing attributes in process `syz.3.2238'. [ 1097.264102][T16180] trusted_key: syz.4.2240 sent an empty control message without MSG_MORE. [ 1097.365610][T16030] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 1097.787997][T16179] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 1098.100707][T16030] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1098.207891][T16030] 8021q: adding VLAN 0 to HW filter on device team0 [ 1098.616144][ T6993] bridge0: port 1(bridge_slave_0) entered blocking state [ 1098.623320][ T6993] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1098.711131][ T2975] bridge0: port 2(bridge_slave_1) entered blocking state [ 1098.718308][ T2975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1098.911980][ T29] kauditd_printk_skb: 259 callbacks suppressed [ 1098.912001][ T29] audit: type=1400 audit(1736503971.667:2622): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1099.063100][ T29] audit: type=1400 audit(1736503971.667:2623): avc: denied { read write open } for pid=5818 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1099.158377][ T29] audit: type=1400 audit(1736503971.779:2624): avc: denied { ioctl } for pid=5818 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1099.222469][ T29] audit: type=1400 audit(1736503971.845:2625): avc: denied { read } for pid=16192 comm="syz.7.2246" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1099.246076][ T29] audit: type=1400 audit(1736503971.845:2626): avc: denied { read open } for pid=16192 comm="syz.7.2246" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1099.271737][ T29] audit: type=1400 audit(1736503971.845:2627): avc: denied { execmem } for pid=16192 comm="syz.7.2246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1099.798072][ T29] audit: type=1400 audit(1736503971.957:2628): avc: denied { create } for pid=16194 comm="syz.3.2245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1099.819048][ T29] audit: type=1400 audit(1736503971.957:2629): avc: denied { create } for pid=16194 comm="syz.3.2245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1099.839966][ T29] audit: type=1400 audit(1736503971.966:2630): avc: denied { write } for pid=16194 comm="syz.3.2245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1099.860868][ T29] audit: type=1400 audit(1736503971.966:2631): avc: denied { read } for pid=16194 comm="syz.3.2245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1100.313596][T16195] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1793 sclass=netlink_route_socket pid=16195 comm=syz.3.2245 [ 1101.743604][T16208] IPVS: Error joining to the multicast group [ 1104.750350][ T29] kauditd_printk_skb: 125 callbacks suppressed [ 1104.750369][ T29] audit: type=1400 audit(1736503976.606:2757): avc: denied { read write } for pid=16226 comm="syz.3.2253" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=41659 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1104.877352][ T29] audit: type=1400 audit(1736503976.606:2758): avc: denied { map } for pid=16226 comm="syz.3.2253" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=41659 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1104.919291][T16030] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1104.977175][ T29] audit: type=1400 audit(1736503976.606:2759): avc: denied { read write } for pid=16226 comm="syz.3.2253" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=41659 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1105.155602][ T29] audit: type=1400 audit(1736503976.700:2760): avc: denied { prog_load } for pid=16223 comm="syz.7.2250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1105.854998][ T29] audit: type=1400 audit(1736503976.700:2761): avc: denied { bpf } for pid=16223 comm="syz.7.2250" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1105.879702][ T29] audit: type=1400 audit(1736503976.709:2762): avc: denied { perfmon } for pid=16223 comm="syz.7.2250" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1105.901559][ T29] audit: type=1400 audit(1736503976.718:2763): avc: denied { perfmon } for pid=16223 comm="syz.7.2250" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1105.923497][ T29] audit: type=1400 audit(1736503976.718:2764): avc: denied { perfmon } for pid=16223 comm="syz.7.2250" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1105.945378][ T29] audit: type=1400 audit(1736503976.728:2765): avc: denied { perfmon } for pid=16223 comm="syz.7.2250" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1105.967199][ T29] audit: type=1400 audit(1736503976.728:2766): avc: denied { perfmon } for pid=16223 comm="syz.7.2250" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1106.048793][ T7008] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 1109.598999][T16262] netlink: 'syz.7.2260': attribute type 10 has an invalid length. [ 1109.607694][T16262] netlink: 40 bytes leftover after parsing attributes in process `syz.7.2260'. [ 1109.630771][T16262] ipvlan1: entered promiscuous mode [ 1109.636716][T16262] ipvlan1: entered allmulticast mode [ 1109.642100][T16262] veth0_vlan: entered allmulticast mode [ 1109.653356][T16262] A link change request failed with some changes committed already. Interface ipvlan1 may have been left with an inconsistent configuration, please check. [ 1110.274137][ T29] kauditd_printk_skb: 133 callbacks suppressed [ 1110.274154][ T29] audit: type=1400 audit(1736503982.134:2900): avc: denied { read write } for pid=12765 comm="syz-executor" name="loop6" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1110.323681][T16255] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2258'. [ 1110.479574][ T29] audit: type=1400 audit(1736503982.134:2901): avc: denied { read write open } for pid=12765 comm="syz-executor" path="/dev/loop6" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1110.532683][ T29] audit: type=1400 audit(1736503982.134:2902): avc: denied { ioctl } for pid=12765 comm="syz-executor" path="/dev/loop6" dev="devtmpfs" ino=653 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1110.608147][ T29] audit: type=1400 audit(1736503982.181:2903): avc: denied { prog_load } for pid=16251 comm="syz.3.2258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1110.767272][ T29] audit: type=1400 audit(1736503982.181:2904): avc: denied { bpf } for pid=16251 comm="syz.3.2258" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1110.788933][ T29] audit: type=1400 audit(1736503982.181:2905): avc: denied { perfmon } for pid=16251 comm="syz.3.2258" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1110.810985][ T29] audit: type=1400 audit(1736503982.181:2906): avc: denied { perfmon } for pid=16251 comm="syz.3.2258" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1110.833802][ T29] audit: type=1400 audit(1736503982.200:2907): avc: denied { perfmon } for pid=16251 comm="syz.3.2258" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1110.855696][ T29] audit: type=1400 audit(1736503982.200:2908): avc: denied { perfmon } for pid=16251 comm="syz.3.2258" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1110.877477][ T29] audit: type=1400 audit(1736503982.200:2909): avc: denied { perfmon } for pid=16251 comm="syz.3.2258" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1111.100874][ T1287] ieee802154 phy1 wpan1: encryption failed: -22 [ 1114.076413][T16288] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'syz0' [ 1115.534961][T16297] netlink: 56 bytes leftover after parsing attributes in process `syz.4.2269'. [ 1115.634623][ T29] kauditd_printk_skb: 124 callbacks suppressed [ 1115.634642][ T29] audit: type=1400 audit(1736503987.185:3034): avc: denied { prog_load } for pid=16296 comm="syz.4.2269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1115.827182][ T29] audit: type=1400 audit(1736503987.185:3035): avc: denied { bpf } for pid=16296 comm="syz.4.2269" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1116.019182][ T29] audit: type=1400 audit(1736503987.185:3036): avc: denied { perfmon } for pid=16296 comm="syz.4.2269" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1116.343981][T16307] x_tables: ip_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 1116.474669][ T29] audit: type=1400 audit(1736503987.185:3037): avc: denied { perfmon } for pid=16296 comm="syz.4.2269" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1116.579909][ T29] audit: type=1400 audit(1736503987.195:3038): avc: denied { perfmon } for pid=16296 comm="syz.4.2269" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1116.642881][T16030] veth0_vlan: entered promiscuous mode [ 1116.693883][ T29] audit: type=1400 audit(1736503987.195:3039): avc: denied { perfmon } for pid=16296 comm="syz.4.2269" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1116.755131][T16030] veth1_vlan: entered promiscuous mode [ 1116.795666][ T29] audit: type=1400 audit(1736503987.195:3040): avc: denied { perfmon } for pid=16296 comm="syz.4.2269" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1116.828290][ T29] audit: type=1400 audit(1736503987.195:3041): avc: denied { bpf } for pid=16296 comm="syz.4.2269" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1116.851529][ T29] audit: type=1400 audit(1736503987.344:3042): avc: denied { execmem } for pid=16303 comm="syz.4.2271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1116.871644][ T29] audit: type=1400 audit(1736503987.354:3043): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1117.328743][T16030] veth0_macvtap: entered promiscuous mode [ 1117.362064][T16030] veth1_macvtap: entered promiscuous mode [ 1117.782612][T16030] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1117.806545][T16030] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1117.848696][T16030] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1117.881209][T16030] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1117.924596][T16030] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1117.960036][T16030] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1117.994592][T16030] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1118.005054][T16030] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1118.112169][T16030] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1118.122633][T16030] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1118.188154][T16030] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1118.283564][T16030] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1118.303814][T16030] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1118.314446][T16030] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1118.334654][T16030] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1118.355573][T16030] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1118.432938][T16030] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1118.465017][T16030] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1118.585294][T16030] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1118.604660][T12662] usb 4-1: new high-speed USB device number 30 using dummy_hcd [ 1118.652563][T16030] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1118.744874][T16030] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1118.765257][T16030] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1118.773971][T16030] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1118.859572][T12662] usb 4-1: New USB device found, idVendor=09e1, idProduct=5121, bcdDevice=40.c1 [ 1118.869816][T12662] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1118.885046][T12662] usb 4-1: Product: syz [ 1118.894075][T12662] usb 4-1: Manufacturer: syz [ 1118.939633][T16030] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1118.953013][T12662] usb 4-1: SerialNumber: syz [ 1119.045048][T12662] usb 4-1: config 0 descriptor?? [ 1119.376191][T16331] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2276'. [ 1119.816507][ T6996] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1119.824601][ T6996] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1119.854429][ T7008] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1119.862537][ T7008] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1119.950230][T16324] input: syz0 as /devices/virtual/input/input16 [ 1120.424969][T16336] pim6reg: entered allmulticast mode [ 1120.441976][T16336] pim6reg: left allmulticast mode [ 1121.085013][ T29] kauditd_printk_skb: 254 callbacks suppressed [ 1121.085041][ T29] audit: type=1400 audit(1736503992.386:3298): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1121.233595][ T29] audit: type=1400 audit(1736503992.386:3299): avc: denied { read write } for pid=12765 comm="syz-executor" name="loop6" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1121.339534][ T29] audit: type=1400 audit(1736503992.396:3300): avc: denied { read write open } for pid=12765 comm="syz-executor" path="/dev/loop6" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1121.525743][T12662] int51x1 4-1:0.0: probe with driver int51x1 failed with error -71 [ 1121.528786][ T29] audit: type=1400 audit(1736503992.396:3301): avc: denied { ioctl } for pid=12765 comm="syz-executor" path="/dev/loop6" dev="devtmpfs" ino=653 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1121.597354][ T29] audit: type=1400 audit(1736503992.480:3302): avc: denied { search } for pid=5171 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1121.634978][ T29] audit: type=1400 audit(1736503992.480:3303): avc: denied { append } for pid=5171 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1121.657441][ T29] audit: type=1400 audit(1736503992.480:3304): avc: denied { append open } for pid=5171 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1121.680638][ T29] audit: type=1400 audit(1736503992.480:3305): avc: denied { getattr } for pid=5171 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1121.703517][ T29] audit: type=1400 audit(1736503992.498:3306): avc: denied { map_create } for pid=16339 comm="syz.4.2278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1121.722806][ T29] audit: type=1400 audit(1736503992.498:3307): avc: denied { map_read map_write } for pid=16339 comm="syz.4.2278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1121.899958][T14818] usb 7-1: new high-speed USB device number 2 using dummy_hcd [ 1122.098347][T14818] usb 7-1: config 27 interface 0 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7 [ 1122.109689][T14818] usb 7-1: config 27 interface 0 altsetting 0 bulk endpoint 0xB has invalid maxpacket 47 [ 1122.111006][T12662] usb 4-1: USB disconnect, device number 30 [ 1122.649165][T14818] usb 7-1: New USB device found, idVendor=0582, idProduct=0014, bcdDevice=bb.9d [ 1122.658287][T14818] usb 7-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1122.817970][T16342] raw-gadget.1 gadget.6: fail, usb_ep_enable returned -22 [ 1122.875174][T14818] usb 7-1: Quirk or no altset; falling back to MIDI 1.0 [ 1123.522212][T16359] netlink: 8 bytes leftover after parsing attributes in process `syz.6.2279'. [ 1126.479220][T16365] lo speed is unknown, defaulting to 1000 [ 1126.487450][T16365] lo speed is unknown, defaulting to 1000 [ 1126.494465][T16365] lo speed is unknown, defaulting to 1000 [ 1126.595101][T16365] infiniband sz1: set down [ 1126.599751][T16365] infiniband sz1: added lo [ 1126.663350][ T29] kauditd_printk_skb: 256 callbacks suppressed [ 1126.663367][ T29] audit: type=1400 audit(1736503997.316:3507): avc: denied { perfmon } for pid=16355 comm="syz.4.2283" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1126.692029][T14818] usb 7-1: USB disconnect, device number 2 [ 1126.728453][T12662] lo speed is unknown, defaulting to 1000 [ 1126.848461][T16365] workqueue: Failed to create a rescuer kthread for wq "ib_mad1": -EINTR [ 1126.854031][T16365] infiniband sz1: Couldn't open port 1 [ 1127.128110][ T29] audit: type=1400 audit(1736503997.325:3508): avc: denied { perfmon } for pid=16355 comm="syz.4.2283" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1127.530432][ T29] audit: type=1400 audit(1736503997.344:3509): avc: denied { bpf } for pid=16355 comm="syz.4.2283" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1127.643242][T16365] RDS/IB: sz1: added [ 1127.647296][T16365] smc: adding ib device sz1 with port count 1 [ 1127.655703][T16365] smc: ib device sz1 port 1 has pnetid [ 1127.663420][T16365] lo speed is unknown, defaulting to 1000 [ 1127.851880][ T29] audit: type=1400 audit(1736503997.456:3510): avc: denied { execmem } for pid=16363 comm="syz.8.2284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1127.931793][ T5893] lo speed is unknown, defaulting to 1000 [ 1127.934604][ T29] audit: type=1400 audit(1736503997.456:3511): avc: denied { create } for pid=16355 comm="syz.4.2283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1128.062894][ T29] audit: type=1400 audit(1736503997.456:3512): avc: denied { write } for pid=16355 comm="syz.4.2283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1128.127386][T16365] lo speed is unknown, defaulting to 1000 [ 1128.227435][T16365] lo speed is unknown, defaulting to 1000 [ 1128.585820][T16378] syz.8.2287: attempt to access beyond end of device [ 1128.585820][T16378] nbd8: rw=0, sector=1, nr_sectors = 1 limit=0 [ 1128.599219][T16378] qnx4: unable to read the superblock [ 1128.871627][ T29] audit: type=1400 audit(1736503997.587:3513): avc: denied { prog_load } for pid=16355 comm="syz.4.2283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1128.891233][ T29] audit: type=1400 audit(1736503997.587:3514): avc: denied { bpf } for pid=16355 comm="syz.4.2283" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1128.911907][ T29] audit: type=1400 audit(1736503997.737:3515): avc: denied { create } for pid=16363 comm="syz.8.2284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1128.931673][ T29] audit: type=1400 audit(1736503997.765:3516): avc: denied { setopt } for pid=16363 comm="syz.8.2284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1129.107110][T16365] lo speed is unknown, defaulting to 1000 [ 1129.201838][T16365] lo speed is unknown, defaulting to 1000 [ 1130.064084][T16384] 9pnet: Could not find request transport: fd0x0000000000000004 [ 1130.734953][T16365] lo speed is unknown, defaulting to 1000 [ 1130.806045][T16365] lo speed is unknown, defaulting to 1000 [ 1130.859691][T16365] lo speed is unknown, defaulting to 1000 [ 1131.561885][T16399] pim6reg: entered allmulticast mode [ 1131.597951][T16399] pim6reg: left allmulticast mode [ 1132.209340][ T29] kauditd_printk_skb: 160 callbacks suppressed [ 1132.209357][ T29] audit: type=1400 audit(1736504001.862:3653): avc: denied { execmem } for pid=16394 comm="syz.6.2290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1132.271986][ T29] audit: type=1400 audit(1736504001.862:3654): avc: denied { execmem } for pid=16395 comm="syz.7.2291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1132.686697][ T29] audit: type=1400 audit(1736504002.012:3655): avc: denied { create } for pid=16394 comm="syz.6.2290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1132.727466][ T29] audit: type=1400 audit(1736504002.142:3656): avc: denied { create } for pid=16394 comm="syz.6.2290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1132.825540][T15733] udevd[15733]: error opening ATTR{/sys/devices/platform/dummy_hcd.6/usb7/7-1/7-1:27.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 1132.833013][ T29] audit: type=1400 audit(1736504002.161:3657): avc: denied { create } for pid=16394 comm="syz.6.2290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1132.954856][ T29] audit: type=1400 audit(1736504002.189:3658): avc: denied { setopt } for pid=16394 comm="syz.6.2290" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1133.111772][ T29] audit: type=1400 audit(1736504002.199:3659): avc: denied { setopt } for pid=16394 comm="syz.6.2290" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1133.196546][ T29] audit: type=1400 audit(1736504002.245:3660): avc: denied { setopt } for pid=16394 comm="syz.6.2290" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1133.217740][ T29] audit: type=1400 audit(1736504002.685:3661): avc: denied { write } for pid=16394 comm="syz.6.2290" path="socket:[43099]" dev="sockfs" ino=43099 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1133.241605][ T29] audit: type=1400 audit(1736504002.807:3662): avc: denied { create } for pid=16395 comm="syz.7.2291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1134.086682][T16415] infiniband syz1: set active [ 1134.091458][T16415] infiniband syz1: added syz_tun [ 1134.218426][T16415] RDS/IB: syz1: added [ 1134.222574][T16415] smc: adding ib device syz1 with port count 1 [ 1134.229895][T16415] smc: ib device syz1 port 1 has pnetid SYZ2 (user defined) [ 1135.769227][T16413] netlink: 'syz.4.2294': attribute type 1 has an invalid length. [ 1136.304812][T16430] netlink: 'syz.7.2295': attribute type 4 has an invalid length. [ 1136.364688][ T5829] Bluetooth: hci1: link tx timeout [ 1136.370485][ T5829] Bluetooth: hci1: killing stalled connection 11:aa:aa:aa:aa:aa [ 1137.240928][T16435] syzkaller1: entered promiscuous mode [ 1137.249117][T16435] syzkaller1: entered allmulticast mode [ 1137.349485][T16435] netlink: 36 bytes leftover after parsing attributes in process `syz.8.2298'. [ 1137.708391][ T29] kauditd_printk_skb: 787 callbacks suppressed [ 1137.708410][ T29] audit: type=1400 audit(1736504007.399:3880): avc: denied { create } for pid=16426 comm="syz.6.2297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1137.758688][T13841] Bluetooth: hci1: link tx timeout [ 1137.765613][T13841] Bluetooth: hci1: killing stalled connection 11:aa:aa:aa:aa:aa [ 1138.050297][ T29] audit: type=1400 audit(1736504007.409:3881): avc: denied { setopt } for pid=16426 comm="syz.6.2297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1138.160737][ T29] audit: type=1400 audit(1736504007.427:3882): avc: denied { read write } for pid=16428 comm="syz.8.2298" name="video3" dev="devtmpfs" ino=934 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 1138.435565][ T29] audit: type=1400 audit(1736504007.427:3883): avc: denied { read write open } for pid=16428 comm="syz.8.2298" path="/dev/video3" dev="devtmpfs" ino=934 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 1138.483103][ T29] audit: type=1400 audit(1736504007.493:3884): avc: denied { create } for pid=16428 comm="syz.8.2298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1138.505101][ T29] audit: type=1400 audit(1736504007.521:3885): avc: denied { ioctl } for pid=16428 comm="syz.8.2298" path="socket:[42519]" dev="sockfs" ino=42519 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1138.532991][ T29] audit: type=1400 audit(1736504007.568:3886): avc: denied { read } for pid=16428 comm="syz.8.2298" name="v4l-subdev5" dev="devtmpfs" ino=945 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1138.535342][ T5129] Bluetooth: hci1: command 0x0406 tx timeout [ 1138.557557][ T29] audit: type=1400 audit(1736504007.577:3887): avc: denied { read open } for pid=16428 comm="syz.8.2298" path="/dev/v4l-subdev5" dev="devtmpfs" ino=945 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1138.587065][ T29] audit: type=1400 audit(1736504007.923:3888): avc: denied { write } for pid=16431 comm="syz.3.2299" name="fib_trie" dev="proc" ino=4026532966 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1138.612299][ T29] audit: type=1400 audit(1736504007.923:3889): avc: denied { write } for pid=16431 comm="syz.3.2299" path="/proc/1814/net/fib_trie" dev="proc" ino=4026532966 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1138.937968][T16443] netlink: 156 bytes leftover after parsing attributes in process `syz.4.2300'. [ 1140.547576][T10846] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 1140.908704][T16455] netlink: 56 bytes leftover after parsing attributes in process `syz.8.2303'. [ 1141.388963][T16471] IPVS: Error joining to the multicast group [ 1142.119742][T16472] usb usb7: usbfs: process 16472 (syz.3.2306) did not claim interface 0 before use [ 1143.124283][T16488] netlink: 'syz.8.2308': attribute type 2 has an invalid length. [ 1143.137233][T16488] Tq€: entered promiscuous mode [ 1143.157488][ T29] kauditd_printk_skb: 207 callbacks suppressed [ 1143.157523][ T29] audit: type=1400 audit(1736504012.815:4097): avc: denied { bpf } for pid=16476 comm="syz.8.2308" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1143.781017][ T29] audit: type=1400 audit(1736504012.815:4098): avc: denied { perfmon } for pid=16476 comm="syz.8.2308" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1144.004050][ T29] audit: type=1400 audit(1736504012.815:4099): avc: denied { perfmon } for pid=16476 comm="syz.8.2308" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1144.160260][ T29] audit: type=1400 audit(1736504012.815:4100): avc: denied { perfmon } for pid=16476 comm="syz.8.2308" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1144.925051][ T29] audit: type=1400 audit(1736504012.815:4101): avc: denied { read } for pid=16479 comm="syz.3.2311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1145.031216][ T29] audit: type=1400 audit(1736504012.815:4102): avc: denied { perfmon } for pid=16476 comm="syz.8.2308" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1145.133244][ T29] audit: type=1400 audit(1736504012.815:4103): avc: denied { perfmon } for pid=16476 comm="syz.8.2308" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1145.154224][ C0] vkms_vblank_simulate: vblank timer overrun [ 1145.261155][ T29] audit: type=1400 audit(1736504012.825:4104): avc: denied { bpf } for pid=16476 comm="syz.8.2308" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1145.362558][ T29] audit: type=1400 audit(1736504012.834:4105): avc: denied { name_bind } for pid=16476 comm="syz.8.2308" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1145.469650][ T29] audit: type=1400 audit(1736504012.834:4106): avc: denied { node_bind } for pid=16476 comm="syz.8.2308" saddr=172.20.20.170 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1145.492225][ C0] vkms_vblank_simulate: vblank timer overrun [ 1147.142322][T16507] workqueue: Failed to create a rescuer kthread for wq "ceph-watch-notify": -EINTR [ 1147.294051][T16500] syz.3.2314 (16500): drop_caches: 2 [ 1148.759924][T16524] netdevsim netdevsim3: Direct firmware load for ./file0 failed with error -2 [ 1148.769380][T16524] netdevsim netdevsim3: Falling back to sysfs fallback for: ./file0 [ 1148.773725][ T29] kauditd_printk_skb: 127 callbacks suppressed [ 1148.773738][ T29] audit: type=1400 audit(1736504017.895:4234): avc: denied { prog_load } for pid=16518 comm="syz.3.2319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1148.891100][ T29] audit: type=1400 audit(1736504017.904:4235): avc: denied { bpf } for pid=16518 comm="syz.3.2319" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1148.978717][ T29] audit: type=1400 audit(1736504017.932:4236): avc: denied { read } for pid=16518 comm="syz.3.2319" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1149.009476][ T29] audit: type=1400 audit(1736504017.941:4237): avc: denied { read open } for pid=16518 comm="syz.3.2319" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1149.065284][T16530] infiniband syz1: set active [ 1149.098707][T16530] bridge_slave_0: left allmulticast mode [ 1149.158696][T16530] bridge_slave_0: left promiscuous mode [ 1149.220007][T16530] bridge0: port 1(bridge_slave_0) entered disabled state [ 1149.247942][ T29] audit: type=1400 audit(1736504017.979:4238): avc: denied { ioctl } for pid=16518 comm="syz.3.2319" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1149.272665][ T29] audit: type=1400 audit(1736504018.072:4239): avc: denied { create } for pid=16518 comm="syz.3.2319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1149.292557][ T29] audit: type=1400 audit(1736504018.110:4240): avc: denied { connect } for pid=16518 comm="syz.3.2319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1149.312631][ T29] audit: type=1400 audit(1736504018.203:4241): avc: denied { read } for pid=16518 comm="syz.3.2319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1149.333600][ T29] audit: type=1400 audit(1736504018.213:4242): avc: denied { shutdown } for pid=16518 comm="syz.3.2319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1149.353609][ T29] audit: type=1400 audit(1736504018.231:4243): avc: denied { prog_load } for pid=16518 comm="syz.3.2319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1151.450249][T16543] SELinux: syz.6.2322 (16543) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 1151.902778][T16530] bridge_slave_1: left allmulticast mode [ 1151.909113][T16530] bridge_slave_1: left promiscuous mode [ 1151.914898][T16530] bridge0: port 2(bridge_slave_1) entered disabled state [ 1151.932729][T16530] bond0: (slave 2@ÿ): Releasing backup interface [ 1152.425536][T16530] bond0: (slave bond_slave_1): Releasing backup interface [ 1152.697318][T16530] team0: Port device team_slave_0 removed [ 1153.954341][T16530] team0: Port device team_slave_1 removed [ 1154.035512][T16530] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1154.054392][T16530] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1154.198092][ T29] kauditd_printk_skb: 139 callbacks suppressed [ 1154.198120][ T29] audit: type=1400 audit(1736504023.348:4383): avc: denied { read write } for pid=16030 comm="syz-executor" name="loop8" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1154.299108][T16530] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1154.310629][ T29] audit: type=1400 audit(1736504023.348:4384): avc: denied { read write open } for pid=16030 comm="syz-executor" path="/dev/loop8" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1154.315442][T16530] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1154.364053][ T29] audit: type=1400 audit(1736504023.348:4385): avc: denied { ioctl } for pid=16030 comm="syz-executor" path="/dev/loop8" dev="devtmpfs" ino=655 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1154.417505][ T29] audit: type=1400 audit(1736504023.357:4386): avc: denied { ioctl } for pid=16548 comm="syz.3.2326" path="/dev/video7" dev="devtmpfs" ino=949 ioctlcmd=0x561c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 1154.470968][ T29] audit: type=1400 audit(1736504023.423:4387): avc: denied { getattr } for pid=5171 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1154.513723][ T29] audit: type=1400 audit(1736504023.470:4388): avc: denied { read write } for pid=16562 comm="syz.8.2328" name="video2" dev="devtmpfs" ino=932 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 1154.578057][ T29] audit: type=1400 audit(1736504023.479:4389): avc: denied { read write open } for pid=16562 comm="syz.8.2328" path="/dev/video2" dev="devtmpfs" ino=932 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 1154.974184][ T29] audit: type=1400 audit(1736504023.535:4390): avc: denied { create } for pid=16562 comm="syz.8.2328" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1155.138077][ T29] audit: type=1400 audit(1736504023.563:4391): avc: denied { execmem } for pid=16562 comm="syz.8.2328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1155.286126][ T29] audit: type=1400 audit(1736504024.096:4392): avc: denied { read write } for pid=16562 comm="syz.8.2328" name="userio" dev="devtmpfs" ino=914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1156.332345][T16578] pim6reg: entered allmulticast mode [ 1156.358588][T16578] pim6reg: left allmulticast mode [ 1158.042166][T16594] misc userio: The device must be registered before sending interrupts [ 1160.127525][ T29] kauditd_printk_skb: 97 callbacks suppressed [ 1160.129218][ T29] audit: type=1400 audit(1736504028.072:4490): avc: denied { create } for pid=16598 comm="syz.8.2335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1160.203445][T16608] xt_NFQUEUE: number of total queues is 0 [ 1161.257111][T16609] 9pnet: Unknown protocol version 9p200 [ 1161.285731][T16609] siw: device registration error -23 [ 1161.794130][T16608] vhci_hcd vhci_hcd.0: pdev(7) rhport(0) sockfd(11) [ 1161.801312][T16608] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 1161.812701][T16608] vhci_hcd vhci_hcd.0: Device attached [ 1161.832200][ T29] audit: type=1400 audit(1736504028.455:4491): avc: denied { setopt } for pid=16598 comm="syz.8.2335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1161.991671][ T29] audit: type=1400 audit(1736504028.493:4492): avc: denied { execmem } for pid=16602 comm="syz.7.2336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1162.147150][ T5863] usb 47-1: new low-speed USB device number 2 using vhci_hcd [ 1162.194408][ T29] audit: type=1400 audit(1736504028.773:4493): avc: denied { execmem } for pid=16599 comm="syz.6.2334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1163.426033][T16626] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1163.433252][T16626] audit: audit_lost=218 audit_rate_limit=0 audit_backlog_limit=64 [ 1163.437153][ T29] audit: type=1400 audit(1736504029.017:4494): avc: denied { prog_load } for pid=16602 comm="syz.7.2336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1163.441941][T16626] audit: backlog limit exceeded [ 1163.551597][ T5171] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1163.945838][T16625] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1164.471252][T16614] vhci_hcd: connection reset by peer [ 1164.559693][ T7008] vhci_hcd: stop threads [ 1164.783172][ T7008] vhci_hcd: release socket [ 1164.980772][ T7008] vhci_hcd: disconnect device [ 1165.483101][ T29] kauditd_printk_skb: 184 callbacks suppressed [ 1165.483151][ T29] audit: type=1400 audit(1736504033.946:4594): avc: denied { read } for pid=16634 comm="syz.6.2343" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1165.793150][ T29] audit: type=1400 audit(1736504033.974:4595): avc: denied { read open } for pid=16634 comm="syz.6.2343" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1165.845762][ T29] audit: type=1400 audit(1736504034.040:4596): avc: denied { read } for pid=16634 comm="syz.6.2343" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1165.899853][ T29] audit: type=1400 audit(1736504034.049:4597): avc: denied { read open } for pid=16634 comm="syz.6.2343" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1165.946621][ T29] audit: type=1400 audit(1736504034.086:4598): avc: denied { setopt } for pid=16634 comm="syz.6.2343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1165.995942][ T29] audit: type=1400 audit(1736504034.152:4599): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1166.450844][ T29] audit: type=1400 audit(1736504034.161:4600): avc: denied { search } for pid=5171 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1166.798363][ T29] audit: type=1400 audit(1736504034.180:4601): avc: denied { append } for pid=5171 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1166.915472][ T29] audit: type=1400 audit(1736504034.189:4602): avc: denied { append open } for pid=5171 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1167.212932][ T29] audit: type=1400 audit(1736504034.199:4603): avc: denied { getattr } for pid=5171 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1167.609873][ T5863] vhci_hcd: vhci_device speed not set [ 1168.173089][T16655] IPVS: sync thread started: state = BACKUP, mcast_ifn = lo, syncid = 0, id = 0 [ 1169.354358][T16660] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=16660 comm=syz.7.2347 [ 1170.884661][ T29] kauditd_printk_skb: 1432 callbacks suppressed [ 1170.884675][ T29] audit: type=1400 audit(1736504038.997:4806): avc: denied { write } for pid=16657 comm="syz.7.2347" name="001" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1171.496459][ T29] audit: type=1400 audit(1736504039.063:4807): avc: denied { read } for pid=16673 comm="syz.6.2351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1171.564541][T16660] netlink: 4 bytes leftover after parsing attributes in process `syz.7.2347'. [ 1171.613170][ T29] audit: type=1400 audit(1736504039.119:4808): avc: denied { create } for pid=16673 comm="syz.6.2351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1171.750082][ T29] audit: type=1400 audit(1736504039.156:4809): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1171.950668][ T29] audit: type=1400 audit(1736504039.493:4810): avc: denied { map_create } for pid=16673 comm="syz.6.2351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1172.016179][ T29] audit: type=1400 audit(1736504039.493:4811): avc: denied { create } for pid=16673 comm="syz.6.2351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1172.154352][ T29] audit: type=1400 audit(1736504039.502:4812): avc: denied { ioctl } for pid=16673 comm="syz.6.2351" path="socket:[42948]" dev="sockfs" ino=42948 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1172.357931][ T29] audit: type=1400 audit(1736504039.568:4813): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1172.646158][T16687] syzkaller1: entered promiscuous mode [ 1172.652201][T16687] syzkaller1: entered allmulticast mode [ 1172.830262][T16687] netlink: 36 bytes leftover after parsing attributes in process `syz.6.2353'. [ 1173.083931][ T29] audit: type=1400 audit(1736504039.568:4814): avc: denied { search } for pid=5171 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1173.106503][ T29] audit: type=1400 audit(1736504039.577:4815): avc: denied { append } for pid=5171 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1175.253997][T16697] tipc: Started in network mode [ 1175.258972][T16697] tipc: Node identity 129352a0d133, cluster identity 4711 [ 1175.266468][T16697] tipc: Enabled bearer , priority 0 [ 1175.673565][T16704] misc userio: The device must be registered before sending interrupts [ 1175.918002][T16688] tipc: Disabling bearer [ 1176.488249][ T29] kauditd_printk_skb: 136 callbacks suppressed [ 1176.488273][ T29] audit: type=1400 audit(1736504043.805:4952): avc: denied { create } for pid=16705 comm="syz.6.2360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1176.531328][ T29] audit: type=1400 audit(1736504043.815:4953): avc: denied { prog_load } for pid=16705 comm="syz.6.2360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1176.577370][ T29] audit: type=1400 audit(1736504043.824:4954): avc: denied { bpf } for pid=16705 comm="syz.6.2360" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1176.676613][ T7008] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 1176.793059][ T29] audit: type=1400 audit(1736504043.833:4955): avc: denied { perfmon } for pid=16705 comm="syz.6.2360" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1176.827848][T16711] IPVS: Error joining to the multicast group [ 1176.892897][ T1287] ieee802154 phy1 wpan1: encryption failed: -22 [ 1177.221163][ T29] audit: type=1400 audit(1736504043.833:4956): avc: denied { perfmon } for pid=16705 comm="syz.6.2360" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1177.296016][ T29] audit: type=1400 audit(1736504043.843:4957): avc: denied { perfmon } for pid=16705 comm="syz.6.2360" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1177.598563][ T29] audit: type=1400 audit(1736504043.852:4958): avc: denied { perfmon } for pid=16705 comm="syz.6.2360" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1177.754165][ T29] audit: type=1400 audit(1736504043.852:4959): avc: denied { bpf } for pid=16705 comm="syz.6.2360" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1177.873290][ T29] audit: type=1400 audit(1736504043.861:4960): avc: denied { bpf } for pid=16705 comm="syz.6.2360" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1178.193450][ T29] audit: type=1400 audit(1736504043.871:4961): avc: denied { prog_run } for pid=16705 comm="syz.6.2360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1178.693385][T16729] infiniband syz1: set active [ 1182.002620][ T29] kauditd_printk_skb: 155 callbacks suppressed [ 1182.002637][ T29] audit: type=1400 audit(1736504049.109:5117): avc: denied { module_request } for pid=16753 comm="syz.4.2369" kmod="nls_io#harseton#" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1182.061851][T16765] hfs: unable to load iocharset "io#harseton#" [ 1182.170421][ T29] audit: type=1400 audit(1736504049.399:5118): avc: denied { read write } for pid=16030 comm="syz-executor" name="loop8" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1182.921468][ T29] audit: type=1400 audit(1736504049.399:5119): avc: denied { read write open } for pid=16030 comm="syz-executor" path="/dev/loop8" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1183.003043][ T29] audit: type=1400 audit(1736504049.399:5120): avc: denied { ioctl } for pid=16030 comm="syz-executor" path="/dev/loop8" dev="devtmpfs" ino=655 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1183.909781][ T29] audit: type=1400 audit(1736504049.558:5121): avc: denied { create } for pid=16767 comm="syz.8.2370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1184.105310][ T29] audit: type=1400 audit(1736504049.558:5122): avc: denied { shutdown } for pid=16767 comm="syz.8.2370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1184.501289][ T29] audit: type=1400 audit(1736504049.577:5123): avc: denied { execmem } for pid=16767 comm="syz.8.2370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1184.621344][ T29] audit: type=1400 audit(1736504049.680:5124): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1184.644510][ T29] audit: type=1400 audit(1736504049.680:5125): avc: denied { search } for pid=5171 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1184.667311][ T29] audit: type=1400 audit(1736504049.680:5126): avc: denied { append } for pid=5171 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1187.790377][ T29] kauditd_printk_skb: 102 callbacks suppressed [ 1187.790392][ T29] audit: type=1400 audit(1736504054.347:5229): avc: denied { create } for pid=16791 comm="syz.8.2372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1188.189714][ T29] audit: type=1400 audit(1736504054.357:5230): avc: denied { prog_load } for pid=16791 comm="syz.8.2372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1188.300010][ T29] audit: type=1400 audit(1736504054.366:5231): avc: denied { bpf } for pid=16791 comm="syz.8.2372" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1188.744157][T16806] netlink: 'syz.6.2374': attribute type 10 has an invalid length. [ 1188.978728][T16801] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1189.028964][ T29] audit: type=1400 audit(1736504054.375:5232): avc: denied { perfmon } for pid=16791 comm="syz.8.2372" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1189.141994][ T29] audit: type=1400 audit(1736504054.375:5233): avc: denied { perfmon } for pid=16791 comm="syz.8.2372" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1189.253728][ T5171] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1189.289151][T16809] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1189.303465][T16813] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1189.310913][ T5171] audit: audit_lost=658 audit_rate_limit=0 audit_backlog_limit=64 [ 1189.310925][ T29] audit: type=1400 audit(1736504054.385:5234): avc: denied { perfmon } for pid=16791 comm="syz.8.2372" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1189.371121][T16806] bond0: (slave wlan1): Enslaving as an active interface with an up link [ 1190.064626][T16821] syz_tun: entered allmulticast mode [ 1190.100200][T16821] syz_tun: left allmulticast mode [ 1194.059473][ T29] kauditd_printk_skb: 220 callbacks suppressed [ 1194.059491][ T29] audit: type=1400 audit(1736504059.866:5405): avc: denied { map_create } for pid=16845 comm="syz.4.2384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1194.091011][ T29] audit: type=1400 audit(1736504059.885:5406): avc: denied { prog_load } for pid=16845 comm="syz.4.2384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1194.110591][ T29] audit: type=1400 audit(1736504059.885:5407): avc: denied { bpf } for pid=16845 comm="syz.4.2384" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1194.131495][ T29] audit: type=1400 audit(1736504059.894:5408): avc: denied { perfmon } for pid=16845 comm="syz.4.2384" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1194.152709][ T29] audit: type=1400 audit(1736504059.894:5409): avc: denied { perfmon } for pid=16845 comm="syz.4.2384" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1194.173786][ T29] audit: type=1400 audit(1736504059.903:5410): avc: denied { perfmon } for pid=16845 comm="syz.4.2384" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1194.194912][ T29] audit: type=1400 audit(1736504059.903:5411): avc: denied { perfmon } for pid=16845 comm="syz.4.2384" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1194.216244][ T29] audit: type=1400 audit(1736504059.913:5412): avc: denied { perfmon } for pid=16845 comm="syz.4.2384" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1194.237619][ T29] audit: type=1400 audit(1736504059.913:5413): avc: denied { bpf } for pid=16845 comm="syz.4.2384" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1194.259178][ T29] audit: type=1400 audit(1736504059.988:5414): avc: denied { sys_module } for pid=16845 comm="syz.4.2384" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1199.375460][ T7008] Bluetooth: hci6: Frame reassembly failed (-84) [ 1199.736857][T16875] Bluetooth: hci6: Frame reassembly failed (-84) [ 1199.799386][ T29] kauditd_printk_skb: 143 callbacks suppressed [ 1199.799405][ T29] audit: type=1400 audit(1736504065.843:5558): avc: denied { create } for pid=16892 comm="syz.8.2392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1199.863837][ T29] audit: type=1400 audit(1736504066.021:5559): avc: denied { read } for pid=16892 comm="syz.8.2392" dev="nsfs" ino=4026533601 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1199.952010][ T29] audit: type=1400 audit(1736504066.021:5560): avc: denied { read open } for pid=16892 comm="syz.8.2392" path="net:[4026533601]" dev="nsfs" ino=4026533601 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1200.084515][ T29] audit: type=1400 audit(1736504066.021:5561): avc: denied { create } for pid=16892 comm="syz.8.2392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1200.816397][ T29] audit: type=1400 audit(1736504066.105:5562): avc: denied { setopt } for pid=16892 comm="syz.8.2392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1200.863443][T16898] ipt_REJECT: TCP_RESET invalid for non-tcp [ 1201.113025][ T29] audit: type=1400 audit(1736504066.152:5563): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1201.136137][ T29] audit: type=1400 audit(1736504066.161:5564): avc: denied { search } for pid=5171 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1201.162282][ T29] audit: type=1400 audit(1736504066.161:5565): avc: denied { append } for pid=5171 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1201.189212][ T29] audit: type=1400 audit(1736504066.161:5566): avc: denied { append open } for pid=5171 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1201.214266][ T29] audit: type=1400 audit(1736504066.161:5567): avc: denied { getattr } for pid=5171 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1201.574303][ T5829] Bluetooth: hci6: Opcode 0x1003 failed: -110 [ 1205.671734][ T29] kauditd_printk_skb: 219 callbacks suppressed [ 1205.671748][ T29] audit: type=1400 audit(1736504071.540:5787): avc: denied { read write } for pid=16030 comm="syz-executor" name="loop8" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1206.021949][ T29] audit: type=1400 audit(1736504071.577:5788): avc: denied { read write open } for pid=16030 comm="syz-executor" path="/dev/loop8" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1207.122216][ T29] audit: type=1400 audit(1736504071.605:5789): avc: denied { ioctl } for pid=16030 comm="syz-executor" path="/dev/loop8" dev="devtmpfs" ino=655 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1207.148701][ T29] audit: type=1400 audit(1736504072.064:5790): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1207.171666][ T29] audit: type=1400 audit(1736504072.064:5791): avc: denied { search } for pid=5171 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1207.193445][ T29] audit: type=1400 audit(1736504072.064:5792): avc: denied { append } for pid=5171 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1207.215911][ T29] audit: type=1400 audit(1736504072.064:5793): avc: denied { append open } for pid=5171 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1207.740893][ T29] audit: type=1400 audit(1736504072.064:5794): avc: denied { getattr } for pid=5171 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1207.763765][ T29] audit: type=1400 audit(1736504072.176:5795): avc: denied { execmem } for pid=16962 comm="syz.8.2406" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1207.783357][ T29] audit: type=1400 audit(1736504072.354:5796): avc: denied { prog_load } for pid=16964 comm="syz.4.2407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1207.806001][T16969] syzkaller1: entered promiscuous mode [ 1207.811628][T16969] syzkaller1: entered allmulticast mode [ 1207.851054][T16969] batman_adv: Cannot find parent device. Skipping batadv-on-batadv check for gretap1 [ 1207.861583][T16969] batman_adv: batadv0: Adding interface: gretap1 [ 1207.868237][T16969] batman_adv: batadv0: The MTU of interface gretap1 is too small (1462) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1207.893914][T16969] batman_adv: batadv0: Not using interface gretap1 (retrying later): interface not active [ 1210.068540][T16977] IPVS: Error joining to the multicast group [ 1211.413989][ T29] kauditd_printk_skb: 99 callbacks suppressed [ 1211.414030][ T29] audit: type=1400 audit(1736504076.441:5896): avc: denied { create } for pid=16986 comm="syz.6.2410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1211.427572][ T6996] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 1211.616237][ T29] audit: type=1400 audit(1736504076.451:5897): avc: denied { prog_load } for pid=16986 comm="syz.6.2410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1212.125927][ T29] audit: type=1400 audit(1736504076.451:5898): avc: denied { bpf } for pid=16986 comm="syz.6.2410" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1212.528693][ T29] audit: type=1400 audit(1736504076.451:5899): avc: denied { perfmon } for pid=16986 comm="syz.6.2410" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1212.620976][ T29] audit: type=1400 audit(1736504076.451:5900): avc: denied { perfmon } for pid=16986 comm="syz.6.2410" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1212.648471][ T5171] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1212.657554][ T5171] audit: audit_lost=676 audit_rate_limit=0 audit_backlog_limit=64 [ 1212.680916][ T5818] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1212.709371][T16985] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1212.716924][T16985] audit: audit_lost=677 audit_rate_limit=0 audit_backlog_limit=64 [ 1213.430533][T17013] misc userio: The device must be registered before sending interrupts [ 1215.960930][T17033] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2420'. [ 1217.082658][ T29] kauditd_printk_skb: 194 callbacks suppressed [ 1217.082677][ T29] audit: type=1400 audit(1736504081.623:6064): avc: denied { create } for pid=17027 comm="syz.6.2419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1217.139983][ T29] audit: type=1400 audit(1736504081.651:6065): avc: denied { map_create } for pid=17027 comm="syz.6.2419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1217.372030][T17042] IPVS: Error joining to the multicast group [ 1217.556810][ T29] audit: type=1400 audit(1736504081.680:6066): avc: denied { map_read map_write } for pid=17027 comm="syz.6.2419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1217.667181][ T29] audit: type=1400 audit(1736504081.717:6067): avc: denied { read write } for pid=12805 comm="syz-executor" name="loop7" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1217.878495][ T29] audit: type=1400 audit(1736504081.726:6068): avc: denied { read write open } for pid=12805 comm="syz-executor" path="/dev/loop7" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1217.984078][ T29] audit: type=1400 audit(1736504081.736:6069): avc: denied { ioctl } for pid=12805 comm="syz-executor" path="/dev/loop7" dev="devtmpfs" ino=654 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1218.119414][ T29] audit: type=1400 audit(1736504082.316:6070): avc: denied { read write } for pid=17040 comm="syz.7.2421" name="video1" dev="devtmpfs" ino=931 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 1218.287781][T17050] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2422'. [ 1219.138946][T17052] IPVS: Error joining to the multicast group [ 1219.283145][ T29] audit: type=1400 audit(1736504082.316:6071): avc: denied { read write open } for pid=17040 comm="syz.7.2421" path="/dev/video1" dev="devtmpfs" ino=931 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 1219.341623][ T29] audit: type=1400 audit(1736504082.316:6072): avc: denied { ioctl } for pid=17040 comm="syz.7.2421" path="/dev/video1" dev="devtmpfs" ino=931 ioctlcmd=0x5609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 1219.405790][ T29] audit: type=1400 audit(1736504082.325:6073): avc: denied { read } for pid=17040 comm="syz.7.2421" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1222.490168][ T29] kauditd_printk_skb: 147 callbacks suppressed [ 1222.490186][ T29] audit: type=1400 audit(1736504087.264:6221): avc: denied { read write } for pid=17077 comm="syz.3.2429" name="userio" dev="devtmpfs" ino=914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1222.972802][T17093] misc userio: The device must be registered before sending interrupts [ 1223.628636][ T29] audit: type=1400 audit(1736504087.339:6222): avc: denied { read write open } for pid=17077 comm="syz.3.2429" path="/dev/userio" dev="devtmpfs" ino=914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1223.767572][ T29] audit: type=1400 audit(1736504087.348:6223): avc: denied { read write } for pid=17081 comm="syz.8.2430" name="video2" dev="devtmpfs" ino=932 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 1223.874499][ T29] audit: type=1400 audit(1736504087.348:6224): avc: denied { read write open } for pid=17081 comm="syz.8.2430" path="/dev/video2" dev="devtmpfs" ino=932 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 1223.969228][ T29] audit: type=1400 audit(1736504087.357:6225): avc: denied { create } for pid=17081 comm="syz.8.2430" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1224.057848][ T29] audit: type=1400 audit(1736504087.367:6226): avc: denied { execmem } for pid=17081 comm="syz.8.2430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1224.141776][ T29] audit: type=1400 audit(1736504087.544:6227): avc: denied { read } for pid=17082 comm="syz.6.2431" name="sg0" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:gpg_agent_exec_t:s0" [ 1224.243875][ T29] audit: type=1400 audit(1736504087.544:6228): avc: denied { read open } for pid=17082 comm="syz.6.2431" path="/dev/sg0" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:gpg_agent_exec_t:s0" [ 1224.327361][ T29] audit: type=1400 audit(1736504087.554:6229): avc: denied { ioctl } for pid=17082 comm="syz.6.2431" path="/dev/sg0" dev="devtmpfs" ino=717 ioctlcmd=0x2285 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:gpg_agent_exec_t:s0" [ 1224.361461][ T29] audit: type=1400 audit(1736504087.573:6230): avc: denied { bpf } for pid=17082 comm="syz.6.2431" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1225.239779][T17108] misc userio: The device must be registered before sending interrupts [ 1227.413229][ T30] INFO: task syz-executor:10411 blocked for more than 144 seconds. [ 1227.421340][ T30] Not tainted 6.13.0-rc6-syzkaller-00130-g2144da25584e #0 [ 1227.561937][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1227.574394][ T30] task:syz-executor state:D stack:23616 pid:10411 tgid:10411 ppid:1 flags:0x00004004 [ 1227.601070][ T30] Call Trace: [ 1227.605060][ T30] [ 1227.662286][ T30] __schedule+0xe58/0x5ad0 [ 1227.693157][ T30] ? __pfx___lock_acquire+0x10/0x10 [ 1227.725375][ T30] ? __pfx___schedule+0x10/0x10 [ 1227.753481][ T30] ? schedule+0x298/0x350 [ 1227.783771][ T30] ? __pfx_lock_release+0x10/0x10 [ 1227.819529][ T30] ? lock_acquire+0x2f/0xb0 [ 1227.845374][ T29] kauditd_printk_skb: 179 callbacks suppressed [ 1227.845463][ T29] audit: type=1400 audit(1736504092.278:6410): avc: denied { read } for pid=17129 comm="syz.8.2441" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1227.897792][ T30] ? schedule+0x1fd/0x350 [ 1227.902322][ T30] schedule+0xe7/0x350 [ 1227.915950][ T30] v9fs_evict_inode+0x271/0x310 [ 1227.920922][ T30] ? __pfx_v9fs_evict_inode+0x10/0x10 [ 1227.971837][ T30] ? evict+0x3c8/0x960 [ 1227.976096][ T30] ? __pfx_var_wake_function+0x10/0x10 [ 1227.987456][ T29] audit: type=1400 audit(1736504092.278:6411): avc: denied { read open } for pid=17129 comm="syz.8.2441" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1228.037866][T17131] misc userio: The device must be registered before sending interrupts [ 1228.065096][ T30] ? lock_acquire+0x2f/0xb0 [ 1228.069666][ T30] ? __pfx_v9fs_evict_inode+0x10/0x10 [ 1228.075075][ T30] evict+0x409/0x960 [ 1228.306746][ T29] audit: type=1400 audit(1736504092.306:6412): avc: denied { execmem } for pid=17129 comm="syz.8.2441" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1228.333068][ T30] ? __pfx_evict+0x10/0x10 [ 1228.337821][ T30] iput+0x52a/0x890 [ 1228.342144][ T30] ? __pfx_v9fs_drop_inode+0x10/0x10 [ 1228.440011][ T30] dentry_unlink_inode+0x29c/0x480 [ 1228.510420][ T29] audit: type=1400 audit(1736504092.324:6413): avc: denied { perfmon } for pid=17123 comm="syz.6.2442" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1228.535489][ T30] __dentry_kill+0x1d0/0x600 [ 1228.540133][ T30] dput.part.0+0x4b1/0x9b0 [ 1228.544574][ T30] shrink_dcache_for_umount+0x159/0x3e0 [ 1228.557647][ T29] audit: type=1400 audit(1736504092.324:6414): avc: denied { bpf } for pid=17123 comm="syz.6.2442" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1228.569059][ T30] ? __call_rcu_common.constprop.0+0x36e/0x7a0 [ 1228.595264][ T30] generic_shutdown_super+0x76/0x3d0 [ 1228.604872][ T29] audit: type=1400 audit(1736504092.409:6415): avc: denied { read write } for pid=17118 comm="syz.7.2439" name="userio" dev="devtmpfs" ino=914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1228.608263][ T30] kill_anon_super+0x3a/0x60 [ 1228.635564][ T30] v9fs_kill_super+0x3d/0xa0 [ 1228.642842][ T30] deactivate_locked_super+0xbe/0x1a0 [ 1228.648387][ T30] deactivate_super+0xde/0x100 [ 1228.656803][ T30] cleanup_mnt+0x222/0x450 [ 1228.661383][ T30] task_work_run+0x14e/0x250 [ 1228.669882][ T30] ? __pfx_task_work_run+0x10/0x10 [ 1228.677551][ T30] syscall_exit_to_user_mode+0x27b/0x2a0 [ 1228.941998][ T30] do_syscall_64+0xda/0x250 [ 1228.942347][ T29] audit: type=1400 audit(1736504092.409:6416): avc: denied { read write open } for pid=17118 comm="syz.7.2439" path="/dev/userio" dev="devtmpfs" ino=914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1228.946555][ T30] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1228.946587][ T30] RIP: 0033:0x7f681ed87057 [ 1229.080778][ T29] audit: type=1400 audit(1736504092.474:6417): avc: denied { create } for pid=17123 comm="syz.6.2442" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1229.113796][ T29] audit: type=1400 audit(1736504092.474:6418): avc: denied { map } for pid=17123 comm="syz.6.2442" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=44664 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1229.135784][ T30] RSP: 002b:00007fff53b8deb8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 1229.175497][ T30] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f681ed87057 [ 1229.197158][ T29] audit: type=1400 audit(1736504092.483:6419): avc: denied { read write } for pid=17123 comm="syz.6.2442" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=44664 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1229.209491][ T30] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007fff53b8df70 [ 1229.263818][ T30] RBP: 00007fff53b8df70 R08: 0000000000000000 R09: 0000000000000000 [ 1229.271908][ T30] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007fff53b8eff0 [ 1229.315991][ T30] R13: 00007f681ee018f4 R14: 00007fff53b8f030 R15: 00000000000000cf [ 1229.324094][ T30] [ 1229.370053][ T30] [ 1229.370053][ T30] Showing all locks held in the system: [ 1229.399830][ T30] 2 locks held by kworker/u8:0/11: [ 1229.437444][ T30] 3 locks held by kworker/u8:1/12: [ 1229.442671][ T30] #0: ffff88801b081148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x1293/0x1ba0 [ 1229.476265][ T30] #1: ffffc90000117d80 ((work_completion)(&map->work)){+.+.}-{0:0}, at: process_one_work+0x921/0x1ba0 [ 1229.558611][ T30] #2: ffffffff8e1c7238 (rcu_state.exp_mutex){+.+.}-{4:4}, at: exp_funnel_lock+0x1a4/0x3b0 [ 1229.604775][ T30] 1 lock held by khungtaskd/30: [ 1229.609724][ T30] #0: ffffffff8e1bb900 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x7f/0x390 [ 1229.669251][ T30] 2 locks held by kworker/u8:2/35: [ 1229.674473][ T30] #0: ffff88801b081148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x1293/0x1ba0 [ 1229.729115][ T30] #1: ffffc90000ab7d80 ((work_completion)(&rreq->work)){+.+.}-{0:0}, at: process_one_work+0x921/0x1ba0 [ 1229.741172][ T30] 1 lock held by udevd/5189: [ 1229.746556][ T30] 2 locks held by getty/5575: [ 1229.751305][ T30] #0: ffff88803671a0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 [ 1229.771790][ T30] #1: ffffc90002fde2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0xfba/0x1480 [ 1229.782735][ T30] 1 lock held by syz-executor/10411: [ 1229.795889][ T30] #0: ffff8880555f00e0 (&type->s_umount_key#76){+.+.}-{4:4}, at: deactivate_super+0xd6/0x100 [ 1229.807091][ T30] [ 1229.817678][ T30] ============================================= [ 1229.817678][ T30] [ 1229.827580][ T30] NMI backtrace for cpu 1 [ 1229.831920][ T30] CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Not tainted 6.13.0-rc6-syzkaller-00130-g2144da25584e #0 [ 1229.842425][ T30] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1229.852494][ T30] Call Trace: [ 1229.855775][ T30] [ 1229.858709][ T30] dump_stack_lvl+0x116/0x1f0 [ 1229.863402][ T30] nmi_cpu_backtrace+0x27b/0x390 [ 1229.868357][ T30] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 1229.874341][ T30] nmi_trigger_cpumask_backtrace+0x29c/0x300 [ 1229.880334][ T30] watchdog+0xf14/0x1240 [ 1229.884590][ T30] ? __pfx_watchdog+0x10/0x10 [ 1229.889260][ T30] ? lockdep_hardirqs_on+0x7c/0x110 [ 1229.894449][ T30] ? __kthread_parkme+0x148/0x220 [ 1229.899462][ T30] ? __pfx_watchdog+0x10/0x10 [ 1229.904127][ T30] kthread+0x2c1/0x3a0 [ 1229.908186][ T30] ? _raw_spin_unlock_irq+0x23/0x50 [ 1229.913370][ T30] ? __pfx_kthread+0x10/0x10 [ 1229.917948][ T30] ret_from_fork+0x45/0x80 [ 1229.922350][ T30] ? __pfx_kthread+0x10/0x10 [ 1229.926928][ T30] ret_from_fork_asm+0x1a/0x30 [ 1229.931690][ T30] [ 1229.936745][ T30] Sending NMI from CPU 1 to CPUs 0: [ 1229.942375][ C0] NMI backtrace for cpu 0 [ 1229.942386][ C0] CPU: 0 UID: 0 PID: 16353 Comm: udevd Not tainted 6.13.0-rc6-syzkaller-00130-g2144da25584e #0 [ 1229.942402][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1229.942410][ C0] RIP: 0010:__kasan_check_read+0xa/0x20 [ 1229.942429][ C0] Code: c7 c7 b0 83 7c 8d 5b 5d 41 5c e9 f1 88 7c ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 48 8b 0c 24 89 f6 <31> d2 e9 1f f1 ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 [ 1229.942442][ C0] RSP: 0018:ffffc9000d3df618 EFLAGS: 00000007 [ 1229.942454][ C0] RAX: 0000000000000017 RBX: 00000000000005ee RCX: ffffffff8175d18e [ 1229.942462][ C0] RDX: 1ffff1100d41ca75 RSI: 0000000000000008 RDI: ffffffff96e53d78 [ 1229.942471][ C0] RBP: ffffc9000d3df768 R08: 0000000000000000 R09: fffffbfff2dca7af [ 1229.942480][ C0] R10: ffffffff96e53d7f R11: 0000000000000003 R12: ffff88806a0e4880 [ 1229.942489][ C0] R13: 0000000000000040 R14: 0000000000000006 R15: 1ffff92001a7becc [ 1229.942497][ C0] FS: 00007f3fa793f280(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 [ 1229.942512][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1229.942521][ C0] CR2: 00007f482a148178 CR3: 000000002582e000 CR4: 00000000003526f0 [ 1229.942529][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1229.942537][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1229.942545][ C0] Call Trace: [ 1229.942550][ C0] [ 1229.942554][ C0] ? nmi_cpu_backtrace+0x1d8/0x390 [ 1229.942570][ C0] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 1229.942583][ C0] ? nmi_handle+0x1ac/0x5d0 [ 1229.942597][ C0] ? __kasan_check_read+0xa/0x20 [ 1229.942613][ C0] ? default_do_nmi+0x6a/0x160 [ 1229.942626][ C0] ? exc_nmi+0x170/0x1e0 [ 1229.942639][ C0] ? end_repeat_nmi+0xf/0x53 [ 1229.942660][ C0] ? hlock_class+0x4e/0x130 [ 1229.942683][ C0] ? __kasan_check_read+0xa/0x20 [ 1229.942695][ C0] ? __kasan_check_read+0xa/0x20 [ 1229.942708][ C0] ? __kasan_check_read+0xa/0x20 [ 1229.942721][ C0] [ 1229.942725][ C0] [ 1229.942729][ C0] hlock_class+0x4e/0x130 [ 1229.942745][ C0] mark_lock+0xb5/0xc60 [ 1229.942758][ C0] ? __pfx___lock_acquire+0x10/0x10 [ 1229.942771][ C0] ? __pfx___lock_acquire+0x10/0x10 [ 1229.942785][ C0] ? __pfx_mark_lock+0x10/0x10 [ 1229.942799][ C0] ? find_held_lock+0x2d/0x110 [ 1229.942817][ C0] ? avc_alloc_node+0x365/0x5a0 [ 1229.942835][ C0] ? __pfx_lock_release+0x10/0x10 [ 1229.942850][ C0] mark_held_locks+0x9f/0xe0 [ 1229.942864][ C0] lockdep_hardirqs_on_prepare+0x27a/0x420 [ 1229.942878][ C0] trace_hardirqs_on+0x36/0x40 [ 1229.942893][ C0] _raw_spin_unlock_irqrestore+0x52/0x80 [ 1229.942908][ C0] avc_alloc_node+0x365/0x5a0 [ 1229.942926][ C0] avc_compute_av+0xfd/0x5c0 [ 1229.942945][ C0] avc_perm_nonode+0xaa/0x180 [ 1229.942962][ C0] ? __pfx_avc_perm_nonode+0x10/0x10 [ 1229.942978][ C0] ? avc_has_perm_noaudit+0x2b1/0x3a0 [ 1229.942997][ C0] ? lock_acquire+0x2f/0xb0 [ 1229.943010][ C0] ? avc_has_perm_noaudit+0x61/0x3a0 [ 1229.943029][ C0] avc_has_perm_noaudit+0x2d2/0x3a0 [ 1229.943048][ C0] avc_has_perm+0xc1/0x1c0 [ 1229.943065][ C0] ? __pfx_avc_has_perm+0x10/0x10 [ 1229.943083][ C0] ? selinux_inode_permission+0x3c8/0x590 [ 1229.943102][ C0] selinux_inode_rename+0x2b3/0x600 [ 1229.943120][ C0] ? __pfx_selinux_inode_rename+0x10/0x10 [ 1229.943140][ C0] security_inode_rename+0x1cc/0x5f0 [ 1229.943156][ C0] vfs_rename+0x4ad/0x21f0 [ 1229.943178][ C0] ? __pfx_vfs_rename+0x10/0x10 [ 1229.943198][ C0] ? bpf_lsm_path_rename+0x9/0x10 [ 1229.943214][ C0] do_renameat2+0xc5f/0xdd0 [ 1229.943234][ C0] ? __pfx_do_renameat2+0x10/0x10 [ 1229.943252][ C0] ? lock_acquire+0x2f/0xb0 [ 1229.943270][ C0] ? __virt_addr_valid+0x5e/0x590 [ 1229.943289][ C0] ? __phys_addr_symbol+0x30/0x80 [ 1229.943312][ C0] ? getname_flags.part.0+0x1c5/0x550 [ 1229.943335][ C0] __x64_sys_rename+0x7d/0xa0 [ 1229.943352][ C0] do_syscall_64+0xcd/0x250 [ 1229.943369][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1229.943386][ C0] RIP: 0033:0x7f3fa749a93b [ 1229.943397][ C0] Code: 48 8b 15 f0 64 15 00 83 c8 ff 64 83 3a 15 75 0e 48 8b 7c 24 08 e8 d5 d4 07 00 f7 d8 19 c0 48 83 c4 18 c3 b8 52 00 00 00 0f 05 <48> 3d 00 f0 ff ff 76 10 48 8b 15 be 64 15 00 f7 d8 64 89 02 48 83 [ 1229.943409][ C0] RSP: 002b:00007fffa18e19d8 EFLAGS: 00000202 ORIG_RAX: 0000000000000052 [ 1229.943421][ C0] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3fa749a93b [ 1229.943430][ C0] RDX: 000055de3bba5b83 RSI: 00007fffa18e19f8 RDI: 00007fffa18e1df8 [ 1229.943439][ C0] RBP: 000055db660a7220 R08: 0000000000000006 R09: 74f192643c70f6c3 [ 1229.943447][ C0] R10: 00000000000001b6 R11: 0000000000000202 R12: 000055db660b3ec0 [ 1229.943455][ C0] R13: 00007fffa18e19f8 R14: 00007fffa18e1df8 R15: 000055db4cdd6160 [ 1229.943468][ C0] [ 1230.415054][ T30] Kernel panic - not syncing: hung_task: blocked tasks [ 1230.421928][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted 6.13.0-rc6-syzkaller-00130-g2144da25584e #0 [ 1230.432435][ T30] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1230.442500][ T30] Call Trace: [ 1230.445780][ T30] [ 1230.448712][ T30] dump_stack_lvl+0x3d/0x1f0 [ 1230.453315][ T30] panic+0x71d/0x800 [ 1230.457205][ T30] ? __pfx_panic+0x10/0x10 [ 1230.461616][ T30] ? preempt_schedule_thunk+0x1a/0x30 [ 1230.466975][ T30] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 1230.472939][ T30] ? preempt_schedule_thunk+0x1a/0x30 [ 1230.478297][ T30] ? watchdog+0xd7e/0x1240 [ 1230.482700][ T30] ? watchdog+0xd71/0x1240 [ 1230.487107][ T30] watchdog+0xd8f/0x1240 [ 1230.491340][ T30] ? __pfx_watchdog+0x10/0x10 [ 1230.496008][ T30] ? lockdep_hardirqs_on+0x7c/0x110 [ 1230.501196][ T30] ? __kthread_parkme+0x148/0x220 [ 1230.506218][ T30] ? __pfx_watchdog+0x10/0x10 [ 1230.510882][ T30] kthread+0x2c1/0x3a0 [ 1230.514939][ T30] ? _raw_spin_unlock_irq+0x23/0x50 [ 1230.520122][ T30] ? __pfx_kthread+0x10/0x10 [ 1230.524702][ T30] ret_from_fork+0x45/0x80 [ 1230.529115][ T30] ? __pfx_kthread+0x10/0x10 [ 1230.533699][ T30] ret_from_fork_asm+0x1a/0x30 [ 1230.538461][ T30] [ 1230.541671][ T30] Kernel Offset: disabled [ 1230.545976][ T30] Rebooting in 86400 seconds..