last executing test programs: 58m23.298199888s ago: executing program 1 (id=35): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) open_tree(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) 58m22.878973222s ago: executing program 1 (id=36): socket$netlink(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffa000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4000004) r3 = socket(0x28, 0x5, 0x0) sendmmsg(r3, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}}], 0x1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) 58m19.227585559s ago: executing program 1 (id=50): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, {0x0, 0x4e20, 0x9c, 0x0, @wg=@response={0x2, 0x0, 0x0, "82d18160f7d8dda36479a6b179161b4bbff2d0508977b3928ebd2dee05607d17", "0194bd7b1b0303c5ba7f602606a285b3", {"30da2d58da817f8a5f77a23de36a2164", "3b33cfa231a427159c7b9f0eceb155f0"}}}}}}}, 0x0) syz_emit_ethernet(0x2e, &(0x7f0000001140)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x1, 0x4e20, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000280)=""/236, 0xec}], 0x3}, 0x81}], 0x1, 0x10041, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) 58m19.037828514s ago: executing program 1 (id=51): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000c"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 58m18.859479089s ago: executing program 1 (id=53): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="34000000140009050000000000000000020100fe", @ANYRES32=r1, @ANYBLOB="1400060000000000000400ff000000000000000208000200ac"], 0x34}}, 0x0) 58m18.657867215s ago: executing program 1 (id=54): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_timeval(r1, 0x1, 0x43, &(0x7f0000000000)={0x0, 0x2710}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, 0x0, 0x0) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/25], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000440)='ack_update_msk\x00', r6}, 0x18) mkdir(&(0x7f0000000140)='./control\x00', 0x5) inotify_init1(0x800) r7 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f0000000a40)=@raw={'raw\x00', 0x3c1, 0x3, 0x380, 0x1a8, 0x111, 0x4b4, 0x0, 0x700, 0x2b0, 0x278, 0x278, 0x2b0, 0x278, 0x3, 0x0, {[{{@ipv6={@private1={0xfc, 0x1, '\x00', 0x1}, @empty, [0x0, 0x0, 0x0, 0xff0000ff], [0x1fffffffe, 0x0, 0xffffff00, 0xff], 'vlan0\x00', 'veth0_vlan\x00', {}, {0xff}, 0x6}, 0x0, 0x140, 0x1a8, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}}, @common=@unspec=@helper={{0x48}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x3, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private2, [], [], 'geneve1\x00', 'erspan0\x00'}, 0x0, 0xe0, 0x108, 0x0, {}, [@common=@unspec=@statistic={{0x38}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x67, 0x40}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) 57m35.438690215s ago: executing program 0 (id=117): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000001c0)='ceph\x00', 0x0, &(0x7f0000000840)='\x00\x00\x00\x00\x00\x00\x00\x00\x00*\x00\x00', 0xc, r2) 57m35.307954536s ago: executing program 0 (id=118): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000200), 0x800) 57m35.208387934s ago: executing program 0 (id=119): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x3, 0x801, 0x0, &(0x7f0000000040), 0xfffffffc) mlock2(&(0x7f0000ff5000/0x9000)=nil, 0x9000, 0x0) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) mlock2(&(0x7f0000495000/0x2000)=nil, 0x2000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) 57m33.140552022s ago: executing program 32 (id=54): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_timeval(r1, 0x1, 0x43, &(0x7f0000000000)={0x0, 0x2710}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, 0x0, 0x0) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/25], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000440)='ack_update_msk\x00', r6}, 0x18) mkdir(&(0x7f0000000140)='./control\x00', 0x5) inotify_init1(0x800) r7 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f0000000a40)=@raw={'raw\x00', 0x3c1, 0x3, 0x380, 0x1a8, 0x111, 0x4b4, 0x0, 0x700, 0x2b0, 0x278, 0x278, 0x2b0, 0x278, 0x3, 0x0, {[{{@ipv6={@private1={0xfc, 0x1, '\x00', 0x1}, @empty, [0x0, 0x0, 0x0, 0xff0000ff], [0x1fffffffe, 0x0, 0xffffff00, 0xff], 'vlan0\x00', 'veth0_vlan\x00', {}, {0xff}, 0x6}, 0x0, 0x140, 0x1a8, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}}, @common=@unspec=@helper={{0x48}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x3, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private2, [], [], 'geneve1\x00', 'erspan0\x00'}, 0x0, 0xe0, 0x108, 0x0, {}, [@common=@unspec=@statistic={{0x38}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x67, 0x40}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) 57m25.007111502s ago: executing program 0 (id=121): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 57m24.807328208s ago: executing program 0 (id=122): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0, 0x0, 0x100}, 0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000008180)=ANY=[@ANYBLOB="5000000010001bff000000000001000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800b000100697036746e6c00001800028014000300fe80000000000000000000000000000008000a00", @ANYRES32], 0x50}}, 0x4000044) 57m24.563538348s ago: executing program 0 (id=123): sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='\n\x00\x00\x00'], 0x48) sendmsg$nl_route(r3, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001e000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="000024002a0007f11e9c6d327336578d7743c4dbce4bb31f06fa098186c4c1e2"], 0x28}}, 0x0) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x4, 0xfffffffffffffdf5, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r5}, 0x10) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) 56m39.35325013s ago: executing program 33 (id=123): sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='\n\x00\x00\x00'], 0x48) sendmsg$nl_route(r3, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001e000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="000024002a0007f11e9c6d327336578d7743c4dbce4bb31f06fa098186c4c1e2"], 0x28}}, 0x0) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x4, 0xfffffffffffffdf5, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r5}, 0x10) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) 54m2.90694411s ago: executing program 2 (id=328): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000200)={0x2, 0x3, 0x0, 0x3, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x6c}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x6, 0xb}]}, 0x38}, 0x1, 0x7}, 0x0) 54m2.806894688s ago: executing program 2 (id=329): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000a00)=@generic={0x0, r0}, 0x18) 54m2.726849884s ago: executing program 2 (id=330): openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba9432}) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000001400)=""/227, 0x10}], 0x4) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 54m1.691813515s ago: executing program 2 (id=331): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000200008385000000710000001801000002696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000300)='kmem_cache_free\x00', r0}, 0x18) mmap(&(0x7f0000000000/0x400000)=nil, 0x1400000, 0x0, 0xc3072, 0xffffffffffffffff, 0x0) 54m1.517872598s ago: executing program 2 (id=332): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000900850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kfree\x00', r1}, 0x10) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = fsopen(&(0x7f0000000100)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) r4 = fsmount(r3, 0x0, 0x1) fchdir(r4) openat(0xffffffffffffff9c, &(0x7f0000004280)='.\x00', 0x0, 0x100) close_range(r2, 0xffffffffffffffff, 0x0) 54m1.330328533s ago: executing program 2 (id=333): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x100) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001600), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1f, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) 53m15.976518894s ago: executing program 34 (id=333): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x100) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001600), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1f, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) 51m59.524370356s ago: executing program 4 (id=504): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) pipe(&(0x7f0000005880)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r1, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1e, 0x0) 51m59.163831224s ago: executing program 4 (id=505): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f0000000280)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f00000000c0), 0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x401, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000080)="b9", 0x1, 0x4c845, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback, 0xffffffff}, 0x1c) 51m58.847692658s ago: executing program 4 (id=506): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r0}, 0x18) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[], 0x2000) 51m58.388348454s ago: executing program 4 (id=507): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, 0x0, 0x0, 0x8b101a, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) 51m58.305168651s ago: executing program 4 (id=508): bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x1, &(0x7f0000000340)=@raw=[@jmp={0x5, 0x1, 0x6, 0x8, 0x1, 0xffffffffffffffff}], &(0x7f0000000080)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 51m58.078147578s ago: executing program 4 (id=509): r0 = socket(0x400000000010, 0x3, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'veth0_to_hsr\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@newtfilter={0x90, 0x2c, 0xd27, 0x70bd28, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0xfff1}, {}, {0x7}}, [@filter_kind_options=@f_fw={{0x7}, {0x5c, 0x2, [@TCA_FW_ACT={0x58, 0x4, [@m_nat={0x54, 0x1, 0x0, 0x0, {{0x8}, {0x2c, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0xfffffc00, 0x8, 0x10000000, 0x200000b, 0xff}, @broadcast, @local, 0xff, 0x1}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}]}]}}, @TCA_RATE={0x6, 0x5, {0xd, 0x8}}]}, 0x90}, 0x1, 0x0, 0x0, 0x4}, 0x4000800) 51m58.077823648s ago: executing program 35 (id=509): r0 = socket(0x400000000010, 0x3, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'veth0_to_hsr\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@newtfilter={0x90, 0x2c, 0xd27, 0x70bd28, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0xfff1}, {}, {0x7}}, [@filter_kind_options=@f_fw={{0x7}, {0x5c, 0x2, [@TCA_FW_ACT={0x58, 0x4, [@m_nat={0x54, 0x1, 0x0, 0x0, {{0x8}, {0x2c, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0xfffffc00, 0x8, 0x10000000, 0x200000b, 0xff}, @broadcast, @local, 0xff, 0x1}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}]}]}}, @TCA_RATE={0x6, 0x5, {0xd, 0x8}}]}, 0x90}, 0x1, 0x0, 0x0, 0x4}, 0x4000800) 40m44.201537791s ago: executing program 5 (id=1581): r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) open(0x0, 0x80141, 0x182) fsconfig$FSCONFIG_SET_STRING(0xffffffffffffffff, 0x1, &(0x7f0000000ac0)='gid', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket(0x10, 0x80003, 0x0) socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x2d) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/crypto\x00', 0x0, 0x0) 40m32.288193368s ago: executing program 5 (id=1584): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x200000000000008b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'veth1_to_batadv\x00', 0x0}) setsockopt$packet_int(r4, 0x107, 0x14, 0x0, 0x0) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000040)=0x200, 0x4) sendto$packet(r4, &(0x7f00000000c0)="3f030e03f007120006001e0089e9aaa911d7c2290f0086dd1327c9167c64114a1b7880610cc96655b1b141ab059b24d0fbc50df71548a3f6c5609063382a0c1511fdf9435e3ffe46", 0xb318, 0x0, &(0x7f0000000540)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) 40m22.23852643s ago: executing program 5 (id=1586): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000400)={0x34, r1, 0x1, 0x70bd25, 0x404, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x1c, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}]}]}, @ETHTOOL_A_STRSET_HEADER={0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x4810) 40m22.23806784s ago: executing program 5 (id=1587): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101097, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000440)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f00000001c0)='./file0/../file0\x00', 0x0, 0x101091, 0x0) 40m22.148607858s ago: executing program 5 (id=1588): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd600a843500540600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB='P'], 0x0) 40m21.961677732s ago: executing program 5 (id=1589): r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='kfree\x00', r2}, 0x18) creat(&(0x7f0000000040)='./file0\x00', 0x102) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f00000021c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000040)={0x50, 0x0, r3, {0x7, 0x1f, 0x0, 0x490420, 0x2}}, 0x50) chown(&(0x7f0000000280)='./file0\x00', r4, r5) sched_setscheduler(r6, 0x5, &(0x7f0000000240)) openat(r0, &(0x7f0000000000)='./file0\x00', 0x8c01, 0x1) io_setup(0x2, &(0x7f0000000200)) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) r8 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r8, 0x65, 0x2, &(0x7f0000000000)=0x929, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r9}, 0x10) r10 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) preadv(r10, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) bind$can_raw(r8, &(0x7f0000000040)={0x1d, r11}, 0x10) close_range(r7, 0xffffffffffffffff, 0x0) 40m21.961263722s ago: executing program 36 (id=1589): r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='kfree\x00', r2}, 0x18) creat(&(0x7f0000000040)='./file0\x00', 0x102) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f00000021c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000040)={0x50, 0x0, r3, {0x7, 0x1f, 0x0, 0x490420, 0x2}}, 0x50) chown(&(0x7f0000000280)='./file0\x00', r4, r5) sched_setscheduler(r6, 0x5, &(0x7f0000000240)) openat(r0, &(0x7f0000000000)='./file0\x00', 0x8c01, 0x1) io_setup(0x2, &(0x7f0000000200)) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) r8 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r8, 0x65, 0x2, &(0x7f0000000000)=0x929, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r9}, 0x10) r10 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) preadv(r10, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) bind$can_raw(r8, &(0x7f0000000040)={0x1d, r11}, 0x10) close_range(r7, 0xffffffffffffffff, 0x0) 39m44.326002033s ago: executing program 3 (id=1603): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000280)='./binderfs/binder0\x00', 0x2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f00000000c0)={0x73622a85, 0x110b, 0x8000000000002}) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000200)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000400)=[@increfs], 0x0, 0x0, 0x0}) r2 = dup3(r1, r0, 0x0) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x802, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r3, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r3, 0x4018620d, &(0x7f0000000040)={0x73622a85, 0x10a}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000003c0)={0x8, 0x0, &(0x7f0000000340)=[@acquire], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x4c, 0x0, &(0x7f0000000680)=[@transaction_sg={0x40486311, {0x1, 0x0, 0x0, 0x0, 0x30, 0x0, 0x0, 0x8, 0x18, &(0x7f0000000580)={@ptr={0x70742a85, 0x0, 0x0, 0x0, 0x2, 0x26}, @fda={0x66646185, 0x9, 0x0, 0x20}, @fd={0x66642a85, 0x0, r1}}, &(0x7f00000002c0)={0x0, 0x28, 0x50}}, 0x1000}], 0x0, 0x0, 0x0}) 39m44.197848802s ago: executing program 3 (id=1604): socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) fsopen(0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x18) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0xc2) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) io_setup(0x8a, &(0x7f0000000680)=0x0) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x180a, 0x3000, 0x3, 0x1, 0x80, r3, 0x0, 0x3000}]) 39m37.276619061s ago: executing program 3 (id=1607): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='sys_enter\x00', r2}, 0x10) fdatasync(r0) 39m37.115908864s ago: executing program 3 (id=1608): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@ipv6_newnexthop={0x20, 0x68, 0x5fb9a818fb7378e9, 0x0, 0x25dfdbff, {}, [@NHA_OIF={0x8, 0x5, r4}]}, 0x20}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000004380)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x24}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=@newnexthop={0x30, 0x68, 0x1, 0x100003, 0x7ffffffd, {}, [@NHA_GROUP={0xc, 0x2, [{0x1, 0x15}]}, @NHA_RES_GROUP={0x4}, @NHA_GROUP_TYPE={0x6, 0x3, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x4008018}, 0x4000080) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x437, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x192}}, 0x20}}, 0x0) 39m36.829523366s ago: executing program 3 (id=1609): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5412, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000f9ab383d000000000000000071f4416de4aa90f8949ea1c4e0121237ef2100000000003a47e5c7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r4, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000001900)={0x18, 0x3, 0x1, 0x3, 0x0, 0x0, {0x3, 0x0, 0x5}, [@CTA_TUPLE_ORIG={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x10}, 0x8000) 39m26.038056856s ago: executing program 3 (id=1611): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0x0, r0}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r5, 0xe0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000780)=[0x0], &(0x7f00000007c0)=[0x0], 0x0, 0xe8, &(0x7f0000000800)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000880), 0x8, 0x33, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r7}, 0x10) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) bpf$MAP_CREATE(0x300000000000000, 0x0, 0x0) setreuid(0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d0000008500000008"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newsa={0x148, 0x10, 0x413, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@rand_addr=' \x01\x00', 0x0, 0x0, 0x4e24, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in=@dev, {0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x20000000008}, {0x0, 0x8, 0xcc}, {0xf6}, 0x0, 0x0, 0xa, 0x1, 0x1}, [@algo_aead={0x55, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x48, 0x80, "25cac5216d1c8af0a9"}}]}, 0x148}}, 0x0) 39m11.407535276s ago: executing program 6 (id=1612): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000c5000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000fbb703000000e31f008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x18) fstatfs(0xffffffffffffffff, 0x0) 39m11.358059799s ago: executing program 6 (id=1613): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffc4, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000880)=""/166}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) r2 = syz_open_dev$usbfs(&(0x7f0000000340), 0x206, 0x8401) ioctl$USBDEVFS_ALLOW_SUSPEND(r2, 0x5522) ioctl$USBDEVFS_BULK(r2, 0x5523, 0x0) ioctl$USBDEVFS_FORBID_SUSPEND(r2, 0x5521) 39m11.278062645s ago: executing program 6 (id=1614): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x6, 0x0, 0x0, &(0x7f0000000bc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x102}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e25}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x7a, &(0x7f0000000340)={r4, @in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, &(0x7f0000000040)=0x84) 39m1.417765123s ago: executing program 6 (id=1615): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xf0667000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) sendmsg$nl_route_sched(r3, 0x0, 0x20004804) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 38m48.847714491s ago: executing program 6 (id=1616): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000640)='mmap_lock_acquire_returned\x00', r0}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) 38m48.648122867s ago: executing program 6 (id=1617): prlimit64(0x0, 0xe, &(0x7f0000000780)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000240)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) fstat(0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sched_setaffinity(0x0, 0xfffffef7, &(0x7f0000000740)=0x410000002) unshare(0x42000000) 38m40.552205817s ago: executing program 37 (id=1611): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0x0, r0}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r5, 0xe0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000780)=[0x0], &(0x7f00000007c0)=[0x0], 0x0, 0xe8, &(0x7f0000000800)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000880), 0x8, 0x33, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r7}, 0x10) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) bpf$MAP_CREATE(0x300000000000000, 0x0, 0x0) setreuid(0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d0000008500000008"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newsa={0x148, 0x10, 0x413, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@rand_addr=' \x01\x00', 0x0, 0x0, 0x4e24, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in=@dev, {0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x20000000008}, {0x0, 0x8, 0xcc}, {0xf6}, 0x0, 0x0, 0xa, 0x1, 0x1}, [@algo_aead={0x55, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x48, 0x80, "25cac5216d1c8af0a9"}}]}, 0x148}}, 0x0) 38m3.365713772s ago: executing program 38 (id=1617): prlimit64(0x0, 0xe, &(0x7f0000000780)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000240)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) fstat(0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sched_setaffinity(0x0, 0xfffffef7, &(0x7f0000000740)=0x410000002) unshare(0x42000000) 36m56.273355432s ago: executing program 8 (id=1644): r0 = syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000240)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x458, 0x138, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x40, 0x0, [{{0x9, 0x4, 0x0, 0xa, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0xc4, 0x0, 0x1, {0x22, 0x2}}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0x0, 0x0, 0x3}}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000540)={0x2c, &(0x7f0000000100)={0x20, 0x1f, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) 36m56.194527298s ago: executing program 8 (id=1645): r0 = socket$inet6(0xa, 0x3, 0x8000000003c) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@raw={'raw\x00', 0x8, 0x3, 0x528, 0x0, 0xffffffff, 0xffffffff, 0xd0, 0xffffffff, 0x458, 0xffffffff, 0xffffffff, 0x458, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@empty, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00', {}, {}, 0x62}, 0x0, 0x358, 0x388, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'veth0_to_hsr\x00', {0x4, 0x8, 0x20, 0x5e1b2d47, 0xf91, 0x5, 0x4, 0x9f7, 0x18}, {0x8}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x588) syz_emit_ethernet(0x4c, &(0x7f00000002c0)=ANY=[@ANYBLOB="99177fa54f29ece65fbcee5586dd60000000001611fffe8000000000000000000000000000bbfe8000000000000000000000000000aa00000e22001690"], 0x0) 36m56.123887194s ago: executing program 8 (id=1646): r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)=0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) timer_settime(r1, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) read$FUSE(r2, &(0x7f00000081c0)={0x2020}, 0x2020) 36m53.548195873s ago: executing program 8 (id=1647): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x6, 0x0, 0x0, &(0x7f0000000bc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x102}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e25}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) prlimit64(0x0, 0x7, &(0x7f0000000140), 0x0) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x7a, &(0x7f0000000340)={r4, @in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, &(0x7f0000000040)=0x84) 36m40.047560907s ago: executing program 8 (id=1654): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0xa, 0x2e, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x401}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@generic={0x3, 0x2, 0x5, 0x7, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf270}}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x2d}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @exit, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000180)='GPL\x00', 0x9, 0x0, 0x0, 0x41100, 0x4e, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x4}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x5, &(0x7f0000000400)=[r1, r1, r0, r1, r1, r1, r1, r1, r1], &(0x7f0000000700)=[{0x5, 0x1, 0x1}, {0x4, 0x1, 0x5}, {0x0, 0x3, 0x3, 0x6}, {0x0, 0x1, 0x4, 0xb}, {0x0, 0x1, 0x2, 0xb}], 0x10, 0x8, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r1}, &(0x7f0000000800), &(0x7f0000000840)=r3}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() sched_setaffinity(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r6, 0x0, 0x0, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) r7 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r7, &(0x7f00000000c0), 0x10) sendmsg$can_bcm(r7, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x5, 0x0, 0x1, {0x0, 0xea60}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "3fae8a9ad451a727"}}, 0x48}}, 0x0) sendmsg$can_bcm(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x80}}, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 36m35.837557483s ago: executing program 8 (id=1655): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040), 0x55af) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) process_mrelease(0xffffffffffffffff, 0x1000000) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) 35m50.74813424s ago: executing program 39 (id=1655): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040), 0x55af) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) process_mrelease(0xffffffffffffffff, 0x1000000) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) 11.831552129s ago: executing program 9 (id=7315): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002d40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB="1c0000000000000001"], 0xa0}, 0x4004881) 11.796628182s ago: executing program 9 (id=7316): socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="640000000206030004000000000000000000000005000100070000000900020073797a30000000001400078005001500040000000800124000000000050005000a000000050004000000000015000300686173683a69702c706f72742c6e6574"], 0x64}}, 0x10000) 11.657521553s ago: executing program 9 (id=7317): r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0xa, 0x0, 0x0, @multicast}, 0x10) listen(r0, 0x6) 11.382338353s ago: executing program 7 (id=7318): r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000003c0)={'wlan0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000002c0)={0x68, r3, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_FRAME={0x40, 0x33, @assoc_resp={{{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1}, {0xe}, @device_b, @device_a, @random="f3527d40ace1", {0x8}}, 0x20, 0x4b, @random=0x3, @val, @val={0x2d, 0x1a, {0x10, 0x2, 0x0, 0x0, {0x1000, 0x3, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x1, 0xff, 0x2}}}}, @NL80211_ATTR_CSA_C_OFFSETS_TX={0xa, 0xcd, [0x0, 0x4, 0xc4b]}]}, 0x68}, 0x1, 0x0, 0x0, 0x6a845ecb4f20be71}, 0x24008080) 11.066721098s ago: executing program 7 (id=7319): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000004c0)='dctcp\x00', 0x6) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x3, @loopback, 0x7}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000240)=':', 0x1, 0x24008844, &(0x7f00000001c0)={0xa, 0x2, 0x398, @empty}, 0x1c) shutdown(r0, 0x1) 10.980667115s ago: executing program 7 (id=7320): r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000980)=ANY=[@ANYBLOB="120100009080e140fc044a500243010203010902120001000000000904"], 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000b80)={0x84, &(0x7f0000000180)={0x40, 0xe, 0x1, "01"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f00000003c0)={0x34, &(0x7f0000000000)={0x20, 0x15}, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$printer(r0, 0x0, &(0x7f00000014c0)={0x34, &(0x7f0000001240)={0x20, 0x6, 0x1, "9e"}, 0x0, 0x0, 0x0, 0x0, 0x0}) 10.90852146s ago: executing program 7 (id=7321): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x10000008, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0}) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x800000000, 0xf, &(0x7f0000006680)) r4 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000c00)={'ip6gre0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000300)=@newqdisc={0x45c, 0x24, 0xd0f, 0x0, 0x0, {0x60, 0x0, 0x0, r5, {0x0, 0xffe0}, {0xffff, 0xffff}, {0x4}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_RTAB={0x404, 0x2, [0x9, 0x45, 0x3ff, 0x10000, 0x3, 0x8, 0x4, 0xa0000, 0x5, 0xa0000001, 0x59bc9fd6, 0x2, 0x2, 0x8000, 0x8, 0x4, 0x8, 0x9, 0x114b6000, 0xfffffffe, 0x2a70, 0xffff73cc, 0x81, 0x5, 0x0, 0x100a, 0x400046, 0x20, 0x8, 0x5, 0x9, 0x3, 0xe, 0xa, 0x2, 0x4, 0x5, 0x3, 0xffff, 0x3, 0xffffdff8, 0x4, 0x8, 0x1a0055ee, 0x401, 0x1, 0xffff4226, 0x200000, 0x0, 0x22cc, 0x101, 0x4, 0x1, 0x1, 0x800, 0xf9, 0x9, 0x8, 0x2, 0x8, 0x2f, 0x4000006, 0x0, 0x101, 0x9, 0x7, 0xc5, 0x4, 0x2, 0xffffffff, 0x6, 0x5, 0x5, 0x5, 0x2, 0x9b58, 0x0, 0xb, 0x4be, 0x4, 0x100, 0xa, 0xca6, 0x9fa7, 0x7, 0x38, 0x4, 0xb, 0x7, 0x4d, 0x7, 0x200, 0x8, 0x401, 0x7, 0x45, 0x3, 0x9, 0x0, 0x7, 0x46, 0x9, 0x3, 0x7, 0x4, 0xc, 0x7, 0x8001, 0x7, 0x7, 0x1902, 0xc3c, 0x3, 0x28000000, 0x4000000, 0x30c7, 0xfad, 0x7, 0x8, 0x0, 0x5, 0x10, 0x400, 0xd58, 0x5, 0x2, 0x4, 0x2, 0x2, 0x8, 0x8, 0xea, 0x0, 0x45ba, 0x409, 0x864b, 0xfffffffa, 0x7, 0x9, 0x8001, 0x7, 0x81, 0xe, 0x9, 0x7, 0xffffff80, 0x43, 0x8, 0x200, 0x6, 0x5, 0x9, 0x7fffffff, 0x4, 0x324f035, 0x6, 0x0, 0x7c1, 0x136, 0x2, 0x5, 0x1, 0x3ff, 0x4, 0x0, 0x2, 0x10001, 0xfffffffd, 0x5, 0x4, 0x400, 0x101, 0x4, 0x1b, 0xd589, 0xffffff81, 0x0, 0x4, 0x0, 0x300, 0x8, 0x60000000, 0xd3d, 0x0, 0xfffffffe, 0x1, 0x81, 0x2, 0x55, 0x4000004, 0xbc6, 0xffff, 0x8, 0x28a6a52, 0x1ff, 0xb, 0x7fff, 0x9, 0x2e4c20b6, 0x1, 0x4, 0x9, 0x7, 0x4, 0x8, 0x0, 0x6, 0x8, 0x3, 0x7, 0x4, 0x9, 0x4, 0xfffffffa, 0x76e8e800, 0x800, 0x400, 0x6, 0x0, 0xcc6, 0xfffffffb, 0x8000, 0xffffff00, 0x894, 0x7, 0x7, 0x6, 0x6, 0x2, 0x9, 0x40010001, 0x9, 0x4, 0x8, 0x5d, 0x1000003, 0x7, 0x656, 0x8008, 0x80000001, 0x384, 0x9, 0x58b, 0x80000000, 0xe08, 0x0, 0x1, 0x2c821159, 0x0, 0x9, 0xfff, 0x0, 0x7, 0x0, 0x7f]}, @TCA_TBF_PARMS={0x28, 0x1, {{0x6, 0x0, 0x2, 0x8, 0x0, 0xc}, {0xff, 0x1, 0x0, 0x5, 0x5e1d, 0x8}, 0x9, 0x8, 0x99}}]}}]}, 0x45c}}, 0x8840) 9.09430591s ago: executing program 9 (id=7322): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000540)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x80800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = syz_io_uring_setup(0x10d, &(0x7f0000000980)={0x0, 0x5885, 0x80, 0x10000000}, &(0x7f0000000340)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r5, r6, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x4004, @fd_index=0x3, 0x0, 0x0}) io_uring_enter(r4, 0x3516, 0x0, 0x0, 0x0, 0x0) 1.891707054s ago: executing program 7 (id=7323): bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000140)={@map, 0xffffffffffffffff, 0x11, 0x0, 0xffffffffffffffff, @void, @value}, 0x14) 1.794901762s ago: executing program 7 (id=7324): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = openat$iommufd(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key(&(0x7f0000000040)='ceph\x00', 0x0, &(0x7f00000000c0)="010001000000000000001000015b097ead858478", 0x14, 0xfffffffffffffffd) ioctl$IOMMU_TEST_OP_CREATE_ACCESS(r3, 0x3ba0, 0x0) ioctl$IOMMU_TEST_OP_ACCESS_PAGES$syz(r3, 0x3ba0, &(0x7f0000000480)={0x48, 0x7, 0xffffffffffffffff, 0x0, 0x10000, 0x0, 0x5, 0x3abc50, 0x2c8240}) ioctl$IOMMU_TEST_OP_ACCESS_PAGES$syz(r3, 0x3ba0, &(0x7f00000002c0)={0x48, 0x6, 0xffffffffffffffff, 0x0, 0x2c8, 0x0, 0x2, 0x4096b, 0x200000000000, 0xffffffffffffff7b}) ioctl$IOMMU_IOAS_ALLOW_IOVAS(r3, 0x3b82, &(0x7f0000000180)={0x18, 0x0, 0x0, 0x0, &(0x7f0000000100)}) landlock_create_ruleset(0x0, 0x0, 0x0) r4 = socket(0x2a, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x14b6deac033214c2) bpf$PROG_LOAD(0x5, 0x0, 0x0) 295.557267ms ago: executing program 9 (id=7325): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), r0) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001200)={&(0x7f00000004c0)={0x20, r1, 0x607, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x20}}, 0x0) 0s ago: executing program 9 (id=7326): socket$nl_generic(0x10, 0x3, 0x10) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff}) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x4c) setgroups(0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)}, 0x80) syz_open_dev$tty1(0xc, 0x4, 0x1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910000000000000c3000018000100009500740000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) kernel console output (not intermixed with test programs): obability 0, space 0, times 0 [ 3280.141802][T31793] CPU: 1 UID: 0 PID: 31793 Comm: syz.7.6466 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 3280.141870][T31793] Hardware name: ARM-Versatile Express [ 3280.141895][T31793] Call trace: [ 3280.141934][T31793] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 3280.142093][T31793] r7:00000c40 r6:00000000 r5:60000013 r4:82257e84 [ 3280.142151][T31793] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 3280.142374][T31793] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 3280.142513][T31793] r5:85272400 r4:8291bcc0 [ 3280.142590][T31793] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 3280.142747][T31793] [<8095f614>] (should_fail_ex) from [<805256c4>] (should_failslab+0x6c/0x94) [ 3280.142872][T31793] r8:85272400 r7:00000c40 r6:85c8f6e8 r5:00001000 r4:830016c0 [ 3280.142923][T31793] [<80525658>] (should_failslab) from [<8050a4b8>] (__kmalloc_noprof+0x9c/0x458) [ 3280.143005][T31793] [<8050a41c>] (__kmalloc_noprof) from [<807bc33c>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 3280.143144][T31793] r10:85272400 r9:8309fc00 r8:00000000 r7:849dc220 r6:85c8f6e8 r5:00001000 [ 3280.143222][T31793] r4:00000000 [ 3280.143325][T31793] [<807bc300>] (tomoyo_realpath_from_path) from [<807b8480>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3280.143429][T31793] r10:85272400 r9:00000000 r8:85c8f6c0 r7:00005450 r6:00000004 r5:81cd56c4 [ 3280.143615][T31793] r4:85c8f6e8 r3:826c0240 [ 3280.143691][T31793] [<807b83b4>] (tomoyo_path_number_perm) from [<807bcd60>] (tomoyo_file_ioctl+0x1c/0x20) [ 3280.143766][T31793] r9:0000000d r8:85c8f6c0 r7:00000000 r6:00000000 r5:00005450 r4:85c8f6c0 [ 3280.143852][T31793] [<807bcd44>] (tomoyo_file_ioctl) from [<8076a79c>] (security_file_ioctl+0x64/0x1e4) [ 3280.144008][T31793] [<8076a738>] (security_file_ioctl) from [<8056b33c>] (sys_ioctl+0x4c/0xd84) [ 3280.144130][T31793] r7:00000000 r6:85c8f6c1 r5:00000000 r4:00005450 [ 3280.144151][T31793] [<8056b2f0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3280.144205][T31793] Exception stack(0xee985fa8 to 0xee985ff0) [ 3280.144517][T31793] 5fa0: 00000000 00000000 0000000d 00005450 00000000 00000000 [ 3280.144558][T31793] 5fc0: 00000000 00000000 0012fee0 00000036 002d0000 00000000 00006364 76bbc0bc [ 3280.144610][T31793] 5fe0: 76bbbec0 76bbbeb0 0001939c 00131f30 [ 3280.144644][T31793] r10:00000036 r9:85272400 r8:8020029c r7:00000036 r6:0012fee0 r5:00000000 [ 3280.144665][T31793] r4:00000000 [ 3280.149539][T31793] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3282.120296][T31798] fuse: Bad value for 'fd' [ 3282.185600][T31800] fuse: Invalid rootmode [ 3282.272694][T31802] fuse: Unknown parameter 'user_i00000000000000000000' [ 3283.441164][T31811] fuse: Bad value for 'fd' [ 3283.514962][T31813] fuse: Bad value for 'rootmode' [ 3283.999276][T31818] fuse: Unknown parameter 'user_i00000000000000000000' [ 3284.037265][T31820] FAULT_INJECTION: forcing a failure. [ 3284.037265][T31820] name failslab, interval 1, probability 0, space 0, times 0 [ 3284.038349][T31820] CPU: 0 UID: 0 PID: 31820 Comm: syz.7.6477 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 3284.038453][T31820] Hardware name: ARM-Versatile Express [ 3284.038476][T31820] Call trace: [ 3284.038497][T31820] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 3284.038620][T31820] r7:83b06c00 r6:00000000 r5:60000013 r4:82257e84 [ 3284.038636][T31820] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 3284.038664][T31820] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 3284.038718][T31820] r5:83b06c00 r4:8291bcc0 [ 3284.038727][T31820] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 3284.038756][T31820] [<8095f614>] (should_fail_ex) from [<805256c4>] (should_failslab+0x6c/0x94) [ 3284.038790][T31820] r8:00000000 r7:83b06c00 r6:00000cc0 r5:00003000 r4:830026c0 [ 3284.038799][T31820] [<80525658>] (should_failslab) from [<80509ac8>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 3284.038826][T31820] [<80509a78>] (kmem_cache_alloc_node_noprof) from [<804e7f24>] (alloc_vmap_area+0x368/0xda4) [ 3284.038856][T31820] r10:00003fff r9:00000dc0 r8:ff800000 r7:00002000 r6:ff800000 r5:00003000 [ 3284.038866][T31820] r4:00000000 [ 3284.038873][T31820] [<804e7bbc>] (alloc_vmap_area) from [<804eafc4>] (__get_vm_area_node+0xcc/0x120) [ 3284.038901][T31820] r10:857efc80 r9:00000dc0 r8:ffffffff r7:00002000 r6:00000022 r5:00004000 [ 3284.038911][T31820] r4:00003000 [ 3284.038918][T31820] [<804eaef8>] (__get_vm_area_node) from [<804eb848>] (__vmalloc_node_range_noprof+0x8c/0x554) [ 3284.038946][T31820] r10:00000000 r9:ffffffff r8:82272e78 r7:00000dc0 r6:df800000 r5:ff800000 [ 3284.038956][T31820] r4:00002000 [ 3284.038963][T31820] [<804eb7bc>] (__vmalloc_node_range_noprof) from [<804ec17c>] (__vmalloc_node_noprof+0x6c/0x74) [ 3284.038993][T31820] r10:eeb3df30 r9:802608f4 r8:ffffffff r7:eeb3dea4 r6:83b06c00 r5:20000e80 [ 3284.039003][T31820] r4:ffffffff [ 3284.039011][T31820] [<804ec110>] (__vmalloc_node_noprof) from [<8025f250>] (copy_process+0xc14/0x2178) [ 3284.039036][T31820] r4:00000000 [ 3284.039044][T31820] [<8025e63c>] (copy_process) from [<802608f4>] (kernel_clone+0xac/0x3e4) [ 3284.039072][T31820] r10:83b06c00 r9:83b06c00 r8:00000000 r7:00000000 r6:eeb3df30 r5:20000e80 [ 3284.039081][T31820] r4:00201400 [ 3284.039089][T31820] [<80260848>] (kernel_clone) from [<80260fe0>] (sys_clone+0x78/0x9c) [ 3284.039116][T31820] r10:00000078 r9:83b06c00 r8:8020029c r7:20000e00 r6:00000000 r5:20000e80 [ 3284.039125][T31820] r4:00000000 [ 3284.039132][T31820] [<80260f68>] (sys_clone) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3284.039154][T31820] Exception stack(0xeeb3dfa8 to 0xeeb3dff0) [ 3284.039172][T31820] dfa0: 00000000 20000e80 00201400 20000e00 20000e80 00000000 [ 3284.039187][T31820] dfc0: 00000000 20000e80 00000000 00000078 002d0000 00000000 00006364 76bbc0bc [ 3284.039200][T31820] dfe0: 76bbbe98 76bbbe88 00019404 00131f30 [ 3284.039213][T31820] r7:00000078 r6:00000000 r5:20000e80 r4:00000000 [ 3284.044465][T31820] syz.7.6477: vmalloc error: size 8192, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 3284.044775][T31820] CPU: 1 UID: 0 PID: 31820 Comm: syz.7.6477 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 3284.044831][T31820] Hardware name: ARM-Versatile Express [ 3284.044851][T31820] Call trace: [ 3284.044873][T31820] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 3284.044947][T31820] r7:00000dc0 r6:82272e40 r5:60000013 r4:82257e84 [ 3284.044962][T31820] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 3284.045074][T31820] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 3284.045127][T31820] r5:83b06c00 r4:00000000 [ 3284.045142][T31820] [<8021ffa4>] (dump_stack) from [<804fc280>] (warn_alloc+0xd8/0x178) [ 3284.045192][T31820] [<804fc1a8>] (warn_alloc) from [<804eb87c>] (__vmalloc_node_range_noprof+0xc0/0x554) [ 3284.045330][T31820] r3:00002000 r2:82272e40 [ 3284.045359][T31820] r6:df800000 r5:ff800000 r4:00002000 [ 3284.045471][T31820] [<804eb7bc>] (__vmalloc_node_range_noprof) from [<804ec17c>] (__vmalloc_node_noprof+0x6c/0x74) [ 3284.045530][T31820] r10:eeb3df30 r9:802608f4 r8:ffffffff r7:eeb3dea4 r6:83b06c00 r5:20000e80 [ 3284.045545][T31820] r4:ffffffff [ 3284.045560][T31820] [<804ec110>] (__vmalloc_node_noprof) from [<8025f250>] (copy_process+0xc14/0x2178) [ 3284.045617][T31820] r4:00000000 [ 3284.045630][T31820] [<8025e63c>] (copy_process) from [<802608f4>] (kernel_clone+0xac/0x3e4) [ 3284.045675][T31820] r10:83b06c00 r9:83b06c00 r8:00000000 r7:00000000 r6:eeb3df30 r5:20000e80 [ 3284.045791][T31820] r4:00201400 [ 3284.045812][T31820] [<80260848>] (kernel_clone) from [<80260fe0>] (sys_clone+0x78/0x9c) [ 3284.045884][T31820] r10:00000078 r9:83b06c00 r8:8020029c r7:20000e00 r6:00000000 r5:20000e80 [ 3284.045906][T31820] r4:00000000 [ 3284.045920][T31820] [<80260f68>] (sys_clone) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3284.045957][T31820] Exception stack(0xeeb3dfa8 to 0xeeb3dff0) [ 3284.046089][T31820] dfa0: 00000000 20000e80 00201400 20000e00 20000e80 00000000 [ 3284.046123][T31820] dfc0: 00000000 20000e80 00000000 00000078 002d0000 00000000 00006364 76bbc0bc [ 3284.046144][T31820] dfe0: 76bbbe98 76bbbe88 00019404 00131f30 [ 3284.046190][T31820] r7:00000078 r6:00000000 r5:20000e80 r4:00000000 [ 3284.046216][T31820] Mem-Info: [ 3284.051469][T31820] active_anon:3268 inactive_anon:0 isolated_anon:0 [ 3284.051469][T31820] active_file:113 inactive_file:40936 isolated_file:0 [ 3284.051469][T31820] unevictable:768 dirty:23 writeback:0 [ 3284.051469][T31820] slab_reclaimable:1431 slab_unreclaimable:8606 [ 3284.051469][T31820] mapped:2494 shmem:780 pagetables:685 [ 3284.051469][T31820] sec_pagetables:0 bounce:0 [ 3284.051469][T31820] kernel_misc_reclaimable:0 [ 3284.051469][T31820] free:428682 free_pcp:1045 free_cma:4032 [ 3284.051639][T31820] Node 0 active_anon:13072kB inactive_anon:0kB active_file:452kB inactive_file:163744kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:9976kB dirty:92kB writeback:0kB shmem:3120kB writeback_tmp:0kB kernel_stack:1976kB pagetables:2740kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 3284.051735][T31820] Normal free:1368912kB boost:0kB min:4772kB low:6196kB high:7620kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:5220kB unevictable:0kB writepending:24kB present:1556480kB managed:1426956kB mlocked:0kB bounce:0kB free_pcp:4180kB local_pcp:2060kB free_cma:0kB [ 3284.051829][T31820] lowmem_reserve[]: 0 4224 4224 [ 3284.051967][T31820] Normal: 2*4kB (UM) 1*8kB (U) 2*16kB (UM) 1*32kB (M) 2*64kB (ME) 1*128kB (M) 2*256kB (UM) 4*512kB (UM) 10*1024kB (UME) 6*2048kB (UM) 328*4096kB (UM) = 1368912kB [ 3284.052676][T31820] 41829 total pagecache pages [ 3284.052716][T31820] 0 pages in swap cache [ 3284.052762][T31820] Free swap = 124996kB [ 3284.052800][T31820] Total swap = 124996kB [ 3284.052849][T31820] 524288 pages RAM [ 3284.052884][T31820] 135168 pages HighMem/MovableOnly [ 3284.052925][T31820] 32381 pages reserved [ 3284.053025][T31820] 4096 pages cma reserved [ 3284.132749][T31822] fuse: Invalid rootmode [ 3284.183029][T31824] fuse: Bad value for 'rootmode' [ 3284.805626][T31832] FAULT_INJECTION: forcing a failure. [ 3284.805626][T31832] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3284.805872][T31832] CPU: 1 UID: 0 PID: 31832 Comm: syz.7.6481 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 3284.805917][T31832] Hardware name: ARM-Versatile Express [ 3284.805931][T31832] Call trace: [ 3284.805952][T31832] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 3284.806037][T31832] r7:00000000 r6:00000000 r5:60000013 r4:82257e84 [ 3284.806062][T31832] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 3284.806090][T31832] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 3284.806117][T31832] r5:85273c00 r4:82951710 [ 3284.806125][T31832] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 3284.806152][T31832] [<8095f614>] (should_fail_ex) from [<8095f850>] (should_fail+0x14/0x18) [ 3284.806180][T31832] r8:76bbbf30 r7:00000000 r6:00000000 r5:dfb19f68 r4:00000002 [ 3284.806188][T31832] [<8095f83c>] (should_fail) from [<8095f870>] (should_fail_usercopy+0x1c/0x20) [ 3284.806211][T31832] [<8095f854>] (should_fail_usercopy) from [<8058ccf4>] (simple_read_from_buffer+0x80/0x13c) [ 3284.806239][T31832] [<8058cc74>] (simple_read_from_buffer) from [<80604280>] (proc_fail_nth_read+0xb8/0x100) [ 3284.806272][T31832] r10:00000001 r9:806041c8 r8:00000002 r7:dfb19f68 r6:0000000f r5:76bbbf30 [ 3284.806283][T31832] r4:85273c00 r3:dfb19e9f [ 3284.806290][T31832] [<806041c8>] (proc_fail_nth_read) from [<805517b0>] (vfs_read+0x98/0x320) [ 3284.806321][T31832] r8:76bbbf30 r7:dfb19f68 r6:85273c00 r5:0000000f r4:85c8f480 [ 3284.806331][T31832] [<80551718>] (vfs_read) from [<80552450>] (ksys_read+0x74/0xe4) [ 3284.806359][T31832] r10:00000003 r9:85273c00 r8:8020029c r7:00000000 r6:00000000 r5:85c8f480 [ 3284.806369][T31832] r4:85c8f483 [ 3284.806376][T31832] [<805523dc>] (ksys_read) from [<805524d0>] (sys_read+0x10/0x14) [ 3284.806402][T31832] r7:00000003 r6:00000005 r5:76bbbf30 r4:0000000f [ 3284.806410][T31832] [<805524c0>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3284.806432][T31832] Exception stack(0xdfb19fa8 to 0xdfb19ff0) [ 3284.806450][T31832] 9fa0: 0000000f 76bbbf30 00000005 76bbbf30 0000000f 00000000 [ 3284.806466][T31832] 9fc0: 0000000f 76bbbf30 00000005 00000003 002d0000 00000000 00006364 76bbc0bc [ 3284.806479][T31832] 9fe0: 00000158 76bbbed0 000d7d68 0012fe04 [ 3284.896422][T31836] fuse: Invalid rootmode [ 3286.341835][T31854] fuse: Invalid rootmode [ 3286.457228][T31860] FAULT_INJECTION: forcing a failure. [ 3286.457228][T31860] name failslab, interval 1, probability 0, space 0, times 0 [ 3286.457657][T31860] CPU: 0 UID: 0 PID: 31860 Comm: syz.9.6490 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 3286.457714][T31860] Hardware name: ARM-Versatile Express [ 3286.457764][T31860] Call trace: [ 3286.457819][T31860] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 3286.457902][T31860] r7:83b01800 r6:00000000 r5:60000013 r4:82257e84 [ 3286.457918][T31860] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 3286.457960][T31860] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 3286.458017][T31860] r5:83b01800 r4:8291bcc0 [ 3286.458031][T31860] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 3286.458077][T31860] [<8095f614>] (should_fail_ex) from [<805256c4>] (should_failslab+0x6c/0x94) [ 3286.458130][T31860] r8:00000000 r7:83b01800 r6:00000cc0 r5:8291e994 r4:830a8cc0 [ 3286.458144][T31860] [<80525658>] (should_failslab) from [<8050a134>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 3286.458185][T31860] [<8050a0e8>] (kmem_cache_alloc_noprof) from [<80553f34>] (alloc_empty_file+0x54/0x13c) [ 3286.458250][T31860] r10:00000142 r9:8659b000 r8:82805c40 r7:83cec780 r6:00000002 r5:8291e994 [ 3286.458267][T31860] r4:8245e828 [ 3286.458326][T31860] [<80553ee0>] (alloc_empty_file) from [<805667a8>] (path_openat+0x40/0x11a0) [ 3286.458468][T31860] r8:ee7fde58 r7:ee7fde58 r6:ee7fdf20 r5:83b01800 r4:00000000 [ 3286.458489][T31860] [<80566768>] (path_openat) from [<805679b4>] (do_filp_open+0xac/0x148) [ 3286.458579][T31860] r10:00000142 r9:8659b000 r8:00000001 r7:ee7fde58 r6:ee7fdf20 r5:83b01800 [ 3286.458596][T31860] r4:00000000 [ 3286.458609][T31860] [<80567908>] (do_filp_open) from [<8054e774>] (do_sys_openat2+0x90/0xe0) [ 3286.458659][T31860] r9:83b01800 r8:8020029c r7:00000000 r6:ee7fdf58 r5:8659b000 r4:00000006 [ 3286.458674][T31860] [<8054e6e4>] (do_sys_openat2) from [<8054eb9c>] (sys_openat+0x98/0xd4) [ 3286.458758][T31860] r7:00000142 r6:0012fee0 r5:20000cc0 r4:00000000 [ 3286.458811][T31860] [<8054eb04>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3286.458850][T31860] Exception stack(0xee7fdfa8 to 0xee7fdff0) [ 3286.458882][T31860] dfa0: 00000000 00000000 00000000 20000cc0 00000002 00000000 [ 3286.458917][T31860] dfc0: 00000000 00000000 0012fee0 00000142 002d0000 00000000 00006364 76b420bc [ 3286.458945][T31860] dfe0: 76b41ec0 76b41eb0 0001939c 00131f30 [ 3286.458970][T31860] r5:00000000 r4:00000000 [ 3286.519268][T31862] fuse: Bad value for 'fd' [ 3287.109471][T31866] fuse: Bad value for 'rootmode' [ 3287.479049][T31868] fuse: Unknown parameter '' [ 3287.736248][T31871] fuse: Unknown parameter 'user_i00000000000000000000' [ 3287.826301][T31873] fuse: Unknown parameter '0x0000000000000003' [ 3287.951066][T31878] fuse: Bad value for 'rootmode' [ 3290.808024][T31891] fuse: Unknown parameter '0x0000000000000003' [ 3290.896414][T31893] fuse: Bad value for 'rootmode' [ 3293.663874][T31910] fuse: Unknown parameter '0x0000000000000003' [ 3293.724496][T31912] fuse: Unknown parameter 'use00000000000000000000' [ 3293.781551][T31914] fuse: Unknown parameter '0x0000000000000003' [ 3295.079148][T31929] fuse: Unknown parameter '0x0000000000000003' [ 3295.190850][T31933] fuse: Unknown parameter '0x0000000000000003' [ 3297.052928][T31947] fuse: Unknown parameter '0x0000000000000003' [ 3297.144888][T31951] fuse: Unknown parameter '0x0000000000000003' [ 3297.259837][T31954] fuse: Unknown parameter '0x0000000000000003' [ 3337.369262][T31979] fuse: Bad value for 'fd' [ 3337.893055][T31976] fuse: root generation should be zero [ 3345.072124][T32023] fuse: Unknown parameter 'user_i00000000000000000000' [ 3347.462603][T32037] fuse: Unknown parameter 'user_i00000000000000000000' [ 3347.940665][T32046] fuse: Unknown parameter 'fd0x0000000000000003' [ 3348.028176][T32048] fuse: Unknown parameter 'user_i00000000000000000000' [ 3351.782357][T32069] fuse: Unknown parameter 'user_id00000000000000000000' [ 3356.049710][T32088] fuse: Unknown parameter 'user_id00000000000000000000' [ 3356.663791][T32100] fuse: Unknown parameter 'user_id00000000000000000000' [ 3358.938998][T32115] fuse: Bad value for 'fd' [ 3387.445822][T32258] fuse: Bad value for 'fd' [ 3394.247099][T32298] fuse: Bad value for 'fd' [ 3398.425193][T32324] fuse: Bad value for 'fd' [ 3401.265744][T32345] fuse: Bad value for 'fd' [ 3403.984650][T32364] fuse: Bad value for 'fd' [ 3415.846983][T32461] fuse: Bad value for 'fd' [ 3421.447745][T32506] fuse: Bad value for 'fd' [ 3422.614711][T32514] fuse: Bad value for 'fd' [ 3424.159014][T32533] fuse: Bad value for 'fd' [ 3425.363156][T32548] fuse: Bad value for 'fd' [ 3427.906247][T32569] fuse: Bad value for 'fd' [ 3429.209300][T11719] netdevsim netdevsim9 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3429.253180][T11719] netdevsim netdevsim9 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3429.303896][T11719] netdevsim netdevsim9 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3429.361874][T11719] netdevsim netdevsim9 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3429.607742][T11719] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3429.614020][T11719] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3429.616208][T11719] bond0 (unregistering): Released all slaves [ 3429.679107][T11719] hsr_slave_0: left promiscuous mode [ 3429.680848][T11719] hsr_slave_1: left promiscuous mode [ 3429.690361][T11719] veth1_macvtap: left promiscuous mode [ 3429.690731][T11719] veth0_macvtap: left promiscuous mode [ 3429.691040][T11719] veth1_vlan: left promiscuous mode [ 3429.691141][T11719] veth0_vlan: left promiscuous mode [ 3429.779613][T18052] SELinux: failure in sel_netif_sid_slow(), invalid network interface (32) [ 3429.780062][T18052] SELinux: failure in sel_netif_sid_slow(), invalid network interface (34) [ 3430.796099][T32588] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3430.800936][T32588] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3431.454668][T32588] hsr_slave_0: entered promiscuous mode [ 3431.455646][T32588] hsr_slave_1: entered promiscuous mode [ 3431.456316][T32588] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 3431.456487][T32588] Cannot create hsr debugfs directory [ 3431.665116][T32744] fuse: Bad value for 'fd' [ 3431.854612][T32588] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 3431.860201][T32588] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 3431.865869][T32588] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 3431.872729][T32588] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 3432.245771][T32588] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3434.554395][T32588] veth0_vlan: entered promiscuous mode [ 3434.566394][T32588] veth1_vlan: entered promiscuous mode [ 3434.607363][T32588] veth0_macvtap: entered promiscuous mode [ 3434.616718][T32588] veth1_macvtap: entered promiscuous mode [ 3434.662740][T32588] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3434.663818][T32588] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3434.666172][T32588] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3434.667767][T32588] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3435.217650][ T563] fuse: Bad value for 'fd' [ 3438.120345][ T595] fuse: Bad value for 'fd' [ 3443.511407][ T632] fuse: Bad value for 'fd' [ 3447.369362][ T655] fuse: Bad value for 'fd' [ 3449.049730][ T689] can0: slcan on ttyS3. [ 3449.101090][ T689] can0 (unregistered): slcan off ttyS3. [ 3450.099815][ T712] fuse: Bad value for 'fd' [ 3452.719529][ T742] fuse: Bad value for 'group_id' [ 3452.719921][ T742] fuse: Bad value for 'group_id' [ 3452.777577][ T744] fuse: Bad value for 'fd' [ 3453.518031][ T746] sctp: [Deprecated]: syz.7.6735 (pid 746) Use of int in maxseg socket option. [ 3453.518031][ T746] Use struct sctp_assoc_value instead [ 3454.551947][ T849] fuse: Bad value for 'fd' [ 3454.616585][ T853] fuse: Bad value for 'group_id' [ 3454.617740][ T853] fuse: Bad value for 'group_id' [ 3454.721377][ T858] fuse: Bad value for 'fd' [ 3455.417470][ T889] fuse: Bad value for 'fd' [ 3455.472091][ T891] fuse: Bad value for 'fd' [ 3455.537820][ T893] FAULT_INJECTION: forcing a failure. [ 3455.537820][ T893] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3455.538104][ T893] CPU: 0 UID: 0 PID: 893 Comm: syz.7.6743 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 3455.538152][ T893] Hardware name: ARM-Versatile Express [ 3455.538169][ T893] Call trace: [ 3455.538191][ T893] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 3455.538254][ T893] r7:00000000 r6:00000000 r5:60000013 r4:82257e84 [ 3455.538265][ T893] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 3455.538292][ T893] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 3455.538321][ T893] r5:85273000 r4:82951710 [ 3455.538329][ T893] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 3455.538428][ T893] [<8095f614>] (should_fail_ex) from [<8095f850>] (should_fail+0x14/0x18) [ 3455.538466][ T893] r8:00000000 r7:00000000 r6:8245e848 r5:20000080 r4:20000080 [ 3455.538477][ T893] [<8095f83c>] (should_fail) from [<8095f870>] (should_fail_usercopy+0x1c/0x20) [ 3455.538503][ T893] [<8095f854>] (should_fail_usercopy) from [<80965908>] (strncpy_from_user+0x20/0x1a0) [ 3455.538530][ T893] [<809658e8>] (strncpy_from_user) from [<80560b78>] (getname_flags.part.0+0x44/0x18c) [ 3455.538669][ T893] r10:00000010 r9:00000000 r8:00000000 r7:00000000 r6:8245e848 r5:20000080 [ 3455.538742][ T893] r4:8659c000 [ 3455.538820][ T893] [<80560b34>] (getname_flags.part.0) from [<80565c44>] (getname_flags+0x3c/0x50) [ 3455.538905][ T893] r9:00000000 r8:00000000 r7:20000080 r6:ffffff9c r5:00000000 r4:20000080 [ 3455.538956][ T893] [<80565c08>] (getname_flags) from [<805661fc>] (user_path_at+0x2c/0x64) [ 3455.539050][ T893] r5:00000000 r4:ee609f54 [ 3455.539165][ T893] [<805661d0>] (user_path_at) from [<8054dec0>] (do_fchownat+0x68/0xf0) [ 3455.539239][ T893] r6:ffffff9c r5:00000000 r4:00000000 [ 3455.539353][ T893] [<8054de58>] (do_fchownat) from [<80356e0c>] (sys_lchown16+0x50/0x58) [ 3455.539427][ T893] r9:85273000 r8:8020029c r7:00000010 r6:0012fee0 r5:00000000 r4:00000000 [ 3455.539466][ T893] [<80356dbc>] (sys_lchown16) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3455.539519][ T893] Exception stack(0xee609fa8 to 0xee609ff0) [ 3455.539540][ T893] 9fa0: 00000000 00000000 20000080 00000000 00000000 00000000 [ 3455.539649][ T893] 9fc0: 00000000 00000000 0012fee0 00000010 002d0000 00000000 00006364 76bbc0bc [ 3455.539687][ T893] 9fe0: 76bbbec0 76bbbeb0 0001939c 00131f30 [ 3455.539754][ T893] r4:00000000 [ 3455.841884][ T901] fuse: Bad value for 'fd' [ 3456.425629][ T913] fuse: Bad value for 'fd' [ 3457.503874][ T946] fuse: Unknown parameter 'fd?6îuSœD¤_äG2ϾtÏýÿ' [ 3457.842270][ T954] FAULT_INJECTION: forcing a failure. [ 3457.842270][ T954] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3457.842549][ T954] CPU: 0 UID: 0 PID: 954 Comm: syz.9.6766 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 3457.842607][ T954] Hardware name: ARM-Versatile Express [ 3457.842627][ T954] Call trace: [ 3457.842652][ T954] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 3457.842755][ T954] r7:00006364 r6:00000000 r5:60000013 r4:82257e84 [ 3457.842767][ T954] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 3457.842793][ T954] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 3457.842820][ T954] r5:85273000 r4:82951710 [ 3457.842834][ T954] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 3457.843048][ T954] [<8095f614>] (should_fail_ex) from [<8095f850>] (should_fail+0x14/0x18) [ 3457.843471][ T954] r8:00000000 r7:00006364 r6:76b3b0bc r5:85273830 r4:76b3abb8 [ 3457.843616][ T954] [<8095f83c>] (should_fail) from [<8095f870>] (should_fail_usercopy+0x1c/0x20) [ 3457.843708][ T954] [<8095f854>] (should_fail_usercopy) from [<8022b60c>] (setup_sigframe+0xe4/0x1c4) [ 3457.843926][ T954] [<8022b528>] (setup_sigframe) from [<8022bbb4>] (do_work_pending+0x3f4/0x4f8) [ 3457.844233][ T954] r10:b5403587 r9:76b3abb8 r8:00000000 r7:85273830 r6:76b3ab38 r5:ee89dfb0 [ 3457.844357][ T954] r4:85273000 [ 3457.844372][ T954] [<8022b7c0>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 3457.844585][ T954] Exception stack(0xee89dfb0 to 0xee89dff8) [ 3457.844770][ T954] dfa0: fffffffc 00000000 00000000 00000000 [ 3457.845131][ T954] dfc0: 00000000 00000000 0012fee0 0000017b 002d0000 00000000 00006364 76b3b0bc [ 3457.845154][ T954] dfe0: 76b3aec0 76b3aeb0 0001939c 00131f30 60000010 00000004 [ 3457.845338][ T954] r10:0000017b r9:85273000 r8:8020029c r7:0000017b r6:0012fee0 r5:00000000 [ 3457.845539][ T954] r4:00000000 [ 3458.087494][ T969] fuse: Bad value for 'fd' [ 3458.231471][ T983] fuse: Bad value for 'group_id' [ 3458.232167][ T983] fuse: Bad value for 'group_id' [ 3458.433012][ T989] fuse: Bad value for 'fd' [ 3458.526223][ T991] fuse: Bad value for 'fd' [ 3458.814902][ T1002] fuse: Bad value for 'fd' [ 3458.895357][ T1004] fuse: Bad value for 'group_id' [ 3458.896388][ T1004] fuse: Bad value for 'group_id' [ 3459.563666][ T1010] netlink: 36 bytes leftover after parsing attributes in process `syz.9.6784'. [ 3460.954791][ T1014] fuse: Bad value for 'fd' [ 3461.119348][ T1016] fuse: Bad value for 'group_id' [ 3461.121928][ T1016] fuse: Bad value for 'group_id' [ 3463.989005][ T1060] FAULT_INJECTION: forcing a failure. [ 3463.989005][ T1060] name failslab, interval 1, probability 0, space 0, times 0 [ 3463.989269][ T1060] CPU: 0 UID: 0 PID: 1060 Comm: syz.7.6798 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 3463.989311][ T1060] Hardware name: ARM-Versatile Express [ 3463.989326][ T1060] Call trace: [ 3463.989347][ T1060] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 3463.989463][ T1060] r7:844b4800 r6:00000000 r5:60000013 r4:82257e84 [ 3463.989478][ T1060] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 3463.989508][ T1060] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 3463.989559][ T1060] r5:844b4800 r4:8291bcc0 [ 3463.989575][ T1060] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 3463.989618][ T1060] [<8095f614>] (should_fail_ex) from [<805256c4>] (should_failslab+0x6c/0x94) [ 3463.989676][ T1060] r8:00000000 r7:844b4800 r6:00400dd0 r5:ee961f10 r4:83001900 [ 3463.989687][ T1060] [<80525658>] (should_failslab) from [<805094e8>] (__kmalloc_cache_noprof+0x4c/0x33c) [ 3463.989730][ T1060] [<8050949c>] (__kmalloc_cache_noprof) from [<8072df64>] (fuse_dentry_init+0x2c/0x40) [ 3463.989767][ T1060] r10:00000000 r9:8245e83c r8:875f5000 r7:00000000 r6:00000000 r5:ee961f10 [ 3463.989778][ T1060] r4:83765cc0 [ 3463.989786][ T1060] [<8072df38>] (fuse_dentry_init) from [<8056ffd0>] (__d_alloc+0x104/0x220) [ 3463.989815][ T1060] r5:ee961f10 r4:83765cc0 [ 3463.989823][ T1060] [<8056fecc>] (__d_alloc) from [<80570104>] (d_alloc+0x18/0x68) [ 3463.989883][ T1060] r9:00000000 r8:00000000 r7:ee961f20 r6:837c1180 r5:00000000 r4:837467f8 [ 3463.989893][ T1060] [<805700ec>] (d_alloc) from [<8055fdc4>] (lookup_one_qstr_excl_raw.part.0+0x30/0x84) [ 3463.989949][ T1060] r7:ee961f20 r6:837c1180 r5:00000000 r4:00000000 [ 3463.989979][ T1060] [<8055fd94>] (lookup_one_qstr_excl_raw.part.0) from [<80560860>] (lookup_one_qstr_excl+0x34/0x70) [ 3463.990021][ T1060] r7:ee961f20 r6:837467f8 r5:ee961f10 r4:00000000 [ 3463.990031][ T1060] [<8056082c>] (lookup_one_qstr_excl) from [<80568aa8>] (do_renameat2+0x2d0/0x560) [ 3463.990065][ T1060] r7:ee961f20 r6:837467f8 r5:ee961f10 r4:837467f8 [ 3463.990073][ T1060] [<805687d8>] (do_renameat2) from [<80568e40>] (sys_rename+0x48/0x50) [ 3463.990111][ T1060] r10:00000026 r9:844b4800 r8:8020029c r7:00000026 r6:0012fee0 r5:200000c0 [ 3463.990121][ T1060] r4:8659d000 [ 3463.990163][ T1060] [<80568df8>] (sys_rename) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3463.990191][ T1060] Exception stack(0xee961fa8 to 0xee961ff0) [ 3463.990212][ T1060] 1fa0: 00000000 00000000 20000100 200000c0 00000000 00000000 [ 3463.990229][ T1060] 1fc0: 00000000 00000000 0012fee0 00000026 002d0000 00000000 00006364 76b7a0bc [ 3463.990273][ T1060] 1fe0: 76b79ec0 76b79eb0 0001939c 00131f30 [ 3463.990296][ T1060] r5:00000000 r4:00000000 [ 3464.232925][ T31] audit: type=1400 audit(3977.165:1641): avc: granted { setsecparam } for pid=1065 comm="syz.9.6805" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 3465.876781][ T1090] fuse: Bad value for 'fd' [ 3466.012246][ T1096] fuse: Bad value for 'fd' [ 3468.290104][ T1117] fuse: Bad value for 'fd' [ 3468.434339][ T1123] fuse: Unknown parameter 'grou00000000000000000000' [ 3468.532595][ T31] audit: type=1400 audit(3981.465:1642): avc: denied { watch watch_reads } for pid=1124 comm="syz.9.6827" path="pipe:[74816]" dev="pipefs" ino=74816 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 3468.608292][ T31] audit: type=1400 audit(3981.535:1643): avc: denied { read write } for pid=1126 comm="syz.9.6828" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3468.611172][ T31] audit: type=1400 audit(3981.545:1644): avc: denied { open } for pid=1126 comm="syz.9.6828" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3468.625911][ T31] audit: type=1400 audit(3981.555:1645): avc: denied { recv } for pid=3095 comm="syz-executor" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3468.636045][ T31] audit: type=1400 audit(3981.565:1646): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3468.670905][ T31] audit: type=1400 audit(3981.605:1647): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3468.671228][ T31] audit: type=1400 audit(3981.605:1648): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3468.675138][ T31] audit: type=1400 audit(3981.605:1649): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3468.680741][ T31] audit: type=1400 audit(3981.615:1650): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3468.745992][ T1131] fuse: Unknown parameter 'grou00000000000000000000' [ 3468.803745][ T1135] fuse: Unknown parameter 'group_i00000000000000000000' [ 3469.015842][ T1148] fuse: Unknown parameter 'group_i00000000000000000000' [ 3469.103833][ T1153] fuse: Unknown parameter 'grou00000000000000000000' [ 3469.260875][ T31] kauditd_printk_skb: 99 callbacks suppressed [ 3469.261233][ T31] audit: type=1400 audit(3982.195:1750): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3469.262753][ T31] audit: type=1400 audit(3982.195:1751): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3469.270013][ T31] audit: type=1400 audit(3982.205:1752): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3469.273694][ T31] audit: type=1400 audit(3982.205:1753): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3469.292983][ T31] audit: type=1400 audit(3982.225:1754): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3469.295971][ T31] audit: type=1400 audit(3982.225:1755): avc: denied { read write } for pid=1159 comm="syz.9.6841" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3469.302796][ T31] audit: type=1400 audit(3982.235:1756): avc: denied { open } for pid=1159 comm="syz.9.6841" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3469.307718][ T31] audit: type=1400 audit(3982.235:1757): avc: denied { module_request } for pid=1159 comm="syz.9.6841" kmod="fs-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3469.341339][ T31] audit: type=1400 audit(3982.275:1758): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3469.405491][ T31] audit: type=1400 audit(3982.335:1759): avc: denied { recv } for pid=3095 comm="syz-executor" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3469.480973][ T1163] fuse: Unknown parameter 'group_i00000000000000000000' [ 3469.596122][ T1165] fuse: Unknown parameter 'grou00000000000000000000' [ 3471.959868][ T1173] fuse: Unknown parameter 'group_id00000000000000000000' [ 3472.050526][ T1175] fuse: Bad value for 'fd' [ 3472.168283][ T1177] fuse: Bad value for 'fd' [ 3472.309233][ T1179] FAULT_INJECTION: forcing a failure. [ 3472.309233][ T1179] name failslab, interval 1, probability 0, space 0, times 0 [ 3472.311484][ T1179] CPU: 0 UID: 0 PID: 1179 Comm: syz.9.6849 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 3472.311540][ T1179] Hardware name: ARM-Versatile Express [ 3472.311564][ T1179] Call trace: [ 3472.311592][ T1179] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 3472.311649][ T1179] r7:00000820 r6:00000000 r5:60000013 r4:82257e84 [ 3472.311662][ T1179] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 3472.311689][ T1179] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 3472.311719][ T1179] r5:83a23c00 r4:8291bcc0 [ 3472.311728][ T1179] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 3472.311760][ T1179] [<8095f614>] (should_fail_ex) from [<805256c4>] (should_failslab+0x6c/0x94) [ 3472.311796][ T1179] r8:83a23c00 r7:00000820 r6:84cfac18 r5:00000017 r4:83001240 [ 3472.311808][ T1179] [<80525658>] (should_failslab) from [<8050b16c>] (__kmalloc_node_track_caller_noprof+0xa0/0x464) [ 3472.311845][ T1179] [<8050b0cc>] (__kmalloc_node_track_caller_noprof) from [<804a4d30>] (kmemdup_noprof+0x28/0x44) [ 3472.311882][ T1179] r10:85d7de40 r9:83c9e804 r8:e0111d08 r7:84124000 r6:84cfac18 r5:e0111d00 [ 3472.311893][ T1179] r4:00000017 [ 3472.311902][ T1179] [<804a4d08>] (kmemdup_noprof) from [<8079af58>] (sidtab_sid2str_get+0x54/0xa4) [ 3472.311933][ T1179] r7:84124000 r6:e0111d08 r5:e0111d00 r4:841210c0 [ 3472.311943][ T1179] [<8079af04>] (sidtab_sid2str_get) from [<807a23f8>] (sidtab_entry_to_string+0x34/0x94) [ 3472.311973][ T1179] r7:84124000 r6:841210c0 r5:e0111d00 r4:0000005f [ 3472.311983][ T1179] [<807a23c4>] (sidtab_entry_to_string) from [<807a2570>] (security_sid_to_context_core+0x118/0x17c) [ 3472.312018][ T1179] r9:e0111e44 r8:84124000 r7:83c9e804 r6:e0111d08 r5:e0111d00 r4:0000005f [ 3472.312027][ T1179] [<807a2458>] (security_sid_to_context_core) from [<807a5328>] (security_sid_to_context+0x1c/0x24) [ 3472.312065][ T1179] r8:807862b4 r7:807872b8 r6:83a23c00 r5:83333940 r4:e0111d90 [ 3472.312075][ T1179] [<807a530c>] (security_sid_to_context) from [<80787338>] (avc_audit_post_callback+0x80/0x2f4) [ 3472.312105][ T1179] [<807872b8>] (avc_audit_post_callback) from [<807ad8fc>] (common_lsm_audit+0x104/0x148) [ 3472.312140][ T1179] r10:85d7de40 r9:e0111e44 r8:807862b4 r7:807872b8 r6:e0111e44 r5:83333940 [ 3472.312160][ T1179] r4:83a243f0 [ 3472.312169][ T1179] [<807ad7f8>] (common_lsm_audit) from [<807877c4>] (slow_avc_audit+0xbc/0x114) [ 3472.312201][ T1179] r8:00000053 r7:0000005f r6:0000005f r5:0000005f r4:0000005f [ 3472.312210][ T1179] [<80787708>] (slow_avc_audit) from [<80788244>] (avc_has_perm+0xd4/0xe4) [ 3472.312239][ T1179] r5:00000000 r4:00000004 [ 3472.312248][ T1179] [<80788170>] (avc_has_perm) from [<80788754>] (inode_has_perm+0x60/0x74) [ 3472.312283][ T1179] r9:0000005f r8:824693fc r7:849a0300 r6:00000004 r5:83e3a480 r4:00000004 [ 3472.312293][ T1179] [<807886f4>] (inode_has_perm) from [<80788908>] (file_has_perm+0xf4/0xfc) [ 3472.312323][ T1179] r4:85d7de40 [ 3472.312339][ T1179] [<80788814>] (file_has_perm) from [<807915ec>] (selinux_file_permission+0xc8/0x110) [ 3472.312375][ T1179] r8:0000000c r7:83a23c00 r6:84731f6c r5:00000002 r4:85d7de40 [ 3472.312384][ T1179] [<80791524>] (selinux_file_permission) from [<80779068>] (security_file_permission+0x1b0/0x1bc) [ 3472.312421][ T1179] r9:0008a000 r8:85d7db40 r7:00000002 r6:85d7de40 r5:00000002 r4:85d7de40 [ 3472.312430][ T1179] [<80778eb8>] (security_file_permission) from [<8054f320>] (rw_verify_area+0x5c/0x1a8) [ 3472.312459][ T1179] r5:e0111f28 r4:0008a000 [ 3472.312468][ T1179] [<8054f2c4>] (rw_verify_area) from [<80550890>] (do_sendfile+0x370/0x438) [ 3472.312499][ T1179] r8:85d7db40 r7:00000000 r6:83a23c00 r5:85d7db41 r4:00000000 [ 3472.312509][ T1179] [<80550520>] (do_sendfile) from [<80552a50>] (sys_sendfile+0xec/0x100) [ 3472.312541][ T1179] r10:000000bb r9:00000006 r8:00000005 r7:00000000 r6:00000000 r5:00000000 [ 3472.312553][ T1179] r4:00000000 [ 3472.312562][ T1179] [<80552964>] (sys_sendfile) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3472.312586][ T1179] Exception stack(0xe0111fa8 to 0xe0111ff0) [ 3472.312605][ T1179] 1fa0: 00000000 00000000 00000006 00000005 00000000 0008a000 [ 3472.312623][ T1179] 1fc0: 00000000 00000000 0012fee0 000000bb 002d0000 00000000 00006364 76b3b0bc [ 3472.312644][ T1179] 1fe0: 76b3aec0 76b3aeb0 0001939c 00131f30 [ 3472.312663][ T1179] r9:83a23c00 r8:8020029c r7:000000bb r6:0012fee0 r5:00000000 r4:00000000 [ 3472.656311][ T1183] fuse: Unknown parameter 'group_id00000000000000000000' [ 3472.832438][ T1187] fuse: Bad value for 'fd' [ 3473.087103][ T1194] fuse: Bad value for 'user_id' [ 3473.087350][ T1194] fuse: Bad value for 'user_id' [ 3473.245945][ T1198] fuse: Unknown parameter 'group_i00000000000000000000' [ 3473.561406][ T1204] fuse: Bad value for 'user_id' [ 3473.561707][ T1204] fuse: Bad value for 'user_id' [ 3473.987744][ T1210] fuse: Bad value for 'group_id' [ 3473.989779][ T1210] fuse: Bad value for 'group_id' [ 3474.272367][ T31] kauditd_printk_skb: 275 callbacks suppressed [ 3474.272720][ T31] audit: type=1400 audit(3987.205:2035): avc: denied { recv } for pid=3095 comm="syz-executor" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3474.320515][ T31] audit: type=1400 audit(3987.255:2036): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3474.320931][ T31] audit: type=1400 audit(3987.255:2037): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3474.327595][ T31] audit: type=1400 audit(3987.255:2038): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3474.335275][ T31] audit: type=1400 audit(3987.265:2039): avc: denied { recv } for pid=1155 comm="syz.7.6839" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3474.355006][ T31] audit: type=1400 audit(3987.285:2040): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3474.362762][ T31] audit: type=1400 audit(3987.295:2041): avc: denied { recv } for pid=3095 comm="syz-executor" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3474.397225][ T31] audit: type=1400 audit(3987.325:2042): avc: denied { read write } for pid=1215 comm="syz.9.6867" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3474.399102][ T31] audit: type=1400 audit(3987.325:2043): avc: denied { read write open } for pid=1215 comm="syz.9.6867" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3474.404008][ T31] audit: type=1400 audit(3987.335:2044): avc: denied { mounton } for pid=1215 comm="syz.9.6867" path="/104/file0" dev="tmpfs" ino=622 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 3474.583599][ T1220] fuse: Bad value for 'group_id' [ 3474.584591][ T1220] fuse: Bad value for 'group_id' [ 3474.868137][ T1227] fuse: Bad value for 'group_id' [ 3474.869320][ T1227] fuse: Bad value for 'group_id' [ 3475.023992][ T1231] fuse: Bad value for 'group_id' [ 3475.025354][ T1231] fuse: Bad value for 'group_id' [ 3476.337773][ T1240] fuse: Bad value for 'group_id' [ 3476.338066][ T1240] fuse: Bad value for 'group_id' [ 3477.394465][ T1252] fuse: Bad value for 'group_id' [ 3477.395069][ T1252] fuse: Bad value for 'group_id' [ 3479.301144][ T31] kauditd_printk_skb: 241 callbacks suppressed [ 3479.301572][ T31] audit: type=1400 audit(3992.235:2286): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3479.301908][ T31] audit: type=1400 audit(3992.235:2287): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3479.305112][ T31] audit: type=1400 audit(3992.235:2288): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3479.310114][ T31] audit: type=1400 audit(3992.235:2289): avc: denied { recv } for pid=2821 comm="pr/ttyAMA0" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3479.317742][ T31] audit: type=1400 audit(3992.245:2290): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3479.324432][ T31] audit: type=1400 audit(3992.245:2291): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3479.366503][ T31] audit: type=1400 audit(3992.295:2292): avc: denied { read write } for pid=1282 comm="syz.9.6890" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3479.367985][ T31] audit: type=1400 audit(3992.295:2293): avc: denied { open } for pid=1282 comm="syz.9.6890" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3479.376713][ T31] audit: type=1400 audit(3992.305:2294): avc: denied { mounton } for pid=1282 comm="syz.9.6890" path="/121/file0" dev="tmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 3479.387811][ T31] audit: type=1400 audit(3992.315:2295): avc: denied { mount } for pid=1282 comm="syz.9.6890" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3480.865846][ T1291] fuse: Bad value for 'group_id' [ 3480.866078][ T1291] fuse: Bad value for 'group_id' [ 3481.320313][ T1304] fuse: Bad value for 'group_id' [ 3481.320519][ T1304] fuse: Bad value for 'group_id' [ 3481.383796][ T1305] FAULT_INJECTION: forcing a failure. [ 3481.383796][ T1305] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3481.384090][ T1305] CPU: 1 UID: 0 PID: 1305 Comm: syz.9.6898 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 3481.384139][ T1305] Hardware name: ARM-Versatile Express [ 3481.384154][ T1305] Call trace: [ 3481.384175][ T1305] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 3481.384241][ T1305] r7:00000000 r6:00000000 r5:60000013 r4:82257e84 [ 3481.384251][ T1305] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 3481.384278][ T1305] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 3481.384306][ T1305] r5:85730c00 r4:82951710 [ 3481.384315][ T1305] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 3481.384344][ T1305] [<8095f614>] (should_fail_ex) from [<8095f850>] (should_fail+0x14/0x18) [ 3481.384375][ T1305] r8:ebf80000 r7:00000000 r6:e8b45f68 r5:00000000 r4:00000000 [ 3481.384385][ T1305] [<8095f83c>] (should_fail) from [<8095f870>] (should_fail_usercopy+0x1c/0x20) [ 3481.384409][ T1305] [<8095f854>] (should_fail_usercopy) from [<809de048>] (fb_sys_read+0xa4/0x1e4) [ 3481.384611][ T1305] [<809ddfa4>] (fb_sys_read) from [<809d131c>] (fb_read+0x6c/0xd4) [ 3481.384775][ T1305] r9:809d12b0 r8:00000000 r7:e8b45f68 r6:85730c00 r5:00000000 r4:809ddfa4 [ 3481.384976][ T1305] [<809d12b0>] (fb_read) from [<805517b0>] (vfs_read+0x98/0x320) [ 3481.385069][ T1305] r4:850ff600 [ 3481.385109][ T1305] [<80551718>] (vfs_read) from [<80552450>] (ksys_read+0x74/0xe4) [ 3481.385209][ T1305] r10:00000003 r9:85730c00 r8:8020029c r7:00000000 r6:00000000 r5:850ff600 [ 3481.385465][ T1305] r4:850ff601 [ 3481.386464][ T1305] [<805523dc>] (ksys_read) from [<805524d0>] (sys_read+0x10/0x14) [ 3481.386499][ T1305] r7:00000003 r6:0012fee0 r5:00000000 r4:00000000 [ 3481.386510][ T1305] [<805524c0>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3481.386536][ T1305] Exception stack(0xe8b45fa8 to 0xe8b45ff0) [ 3481.387009][ T1305] 5fa0: 00000000 00000000 00000003 00000000 00000000 00000000 [ 3481.387136][ T1305] 5fc0: 00000000 00000000 0012fee0 00000003 002d0000 00000000 00006364 76b3b0bc [ 3481.387491][ T1305] 5fe0: 76b3aec0 76b3aeb0 0001939c 00131f30 [ 3481.555307][ T1311] fuse: Unknown parameter 'grou00000000000000000000' [ 3481.731942][ T1317] fuse: Bad value for 'group_id' [ 3481.732199][ T1317] fuse: Bad value for 'group_id' [ 3481.883085][ T1321] fuse: Bad value for 'fd' [ 3481.966059][ T1323] fuse: Unknown parameter 'grou00000000000000000000' [ 3482.258301][ T1333] fuse: Bad value for 'fd' [ 3482.406713][ T1335] fuse: Bad value for 'fd' [ 3482.550383][ T1337] fuse: Unknown parameter 'grou00000000000000000000' [ 3484.636296][ T31] kauditd_printk_skb: 247 callbacks suppressed [ 3484.636717][ T31] audit: type=1400 audit(3997.565:2543): avc: denied { recv } for pid=3095 comm="syz-executor" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3484.652404][ T31] audit: type=1400 audit(3997.585:2544): avc: denied { recv } for pid=1338 comm="syz.9.6915" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3484.681028][ T31] audit: type=1400 audit(3997.615:2545): avc: denied { recv } for pid=0 comm="swapper/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3484.681894][ T31] audit: type=1400 audit(3997.615:2546): avc: denied { recv } for pid=0 comm="swapper/1" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3484.687842][ T31] audit: type=1400 audit(3997.615:2547): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3484.705161][ T31] audit: type=1400 audit(3997.625:2548): avc: denied { recv } for pid=2912 comm="klogd" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3484.705639][ T31] audit: type=1400 audit(3997.625:2549): avc: denied { recv } for pid=2912 comm="klogd" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3484.713336][ T31] audit: type=1400 audit(3997.645:2550): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3484.713834][ T31] audit: type=1400 audit(3997.645:2551): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3484.785189][ T31] audit: type=1400 audit(3997.715:2552): avc: denied { read write } for pid=1344 comm="syz.7.6916" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3484.936609][ T1347] fuse: Bad value for 'fd' [ 3485.057371][ T1349] fuse: Bad value for 'fd' [ 3485.177691][ T1351] fuse: Unknown parameter 'group_i00000000000000000000' [ 3485.307867][ T1356] fuse: Bad value for 'group_id' [ 3485.308076][ T1356] fuse: Bad value for 'group_id' [ 3485.387350][ T1358] fuse: Bad value for 'fd' [ 3485.400926][ T1360] fuse: Invalid rootmode [ 3485.524605][ T1364] fuse: Unknown parameter 'group_i00000000000000000000' [ 3485.597190][ T1366] FAULT_INJECTION: forcing a failure. [ 3485.597190][ T1366] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3485.600437][ T1366] CPU: 1 UID: 0 PID: 1366 Comm: syz.7.6926 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 3485.600563][ T1366] Hardware name: ARM-Versatile Express [ 3485.600606][ T1366] Call trace: [ 3485.600654][ T1366] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 3485.600767][ T1366] r7:00000000 r6:00000000 r5:60000013 r4:82257e84 [ 3485.600792][ T1366] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 3485.600845][ T1366] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 3485.600896][ T1366] r5:85730c00 r4:82951710 [ 3485.600913][ T1366] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 3485.600968][ T1366] [<8095f614>] (should_fail_ex) from [<8095f850>] (should_fail+0x14/0x18) [ 3485.601028][ T1366] r8:00000000 r7:00000000 r6:8245e848 r5:200018c0 r4:200018c0 [ 3485.601046][ T1366] [<8095f83c>] (should_fail) from [<8095f870>] (should_fail_usercopy+0x1c/0x20) [ 3485.601092][ T1366] [<8095f854>] (should_fail_usercopy) from [<80965908>] (strncpy_from_user+0x20/0x1a0) [ 3485.601140][ T1366] [<809658e8>] (strncpy_from_user) from [<80560b78>] (getname_flags.part.0+0x44/0x18c) [ 3485.601203][ T1366] r10:000000e2 r9:85730c00 r8:00000000 r7:00000000 r6:8245e848 r5:200018c0 [ 3485.601222][ T1366] r4:87af3000 [ 3485.601236][ T1366] [<80560b34>] (getname_flags.part.0) from [<80565c44>] (getname_flags+0x3c/0x50) [ 3485.601293][ T1366] r9:85730c00 r8:00000000 r7:ffffff9c r6:00000000 r5:00000000 r4:200018c0 [ 3485.601312][ T1366] [<80565c08>] (getname_flags) from [<8058aa24>] (path_setxattrat+0x158/0x17c) [ 3485.601367][ T1366] r5:200018c0 r4:00000000 [ 3485.601384][ T1366] [<8058a8cc>] (path_setxattrat) from [<8058abd4>] (sys_setxattr+0x34/0x3c) [ 3485.601432][ T1366] r8:8020029c r7:000000e2 r6:0012fee0 r5:00000000 r4:20001900 [ 3485.601449][ T1366] [<8058aba0>] (sys_setxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3485.601492][ T1366] Exception stack(0xeafb5fa8 to 0xeafb5ff0) [ 3485.601536][ T1366] 5fa0: 00000000 00000000 200018c0 20001900 00000000 00000000 [ 3485.601573][ T1366] 5fc0: 00000000 00000000 0012fee0 000000e2 002d0000 00000000 00006364 76bbc0bc [ 3485.601600][ T1366] 5fe0: 76bbbec0 76bbbeb0 0001939c 00131f30 [ 3485.601619][ T1366] r4:00000000 [ 3485.687402][ T1370] fuse: Bad value for 'group_id' [ 3485.687995][ T1370] fuse: Bad value for 'group_id' [ 3485.782276][ T1373] fuse: Unknown parameter 'grou00000000000000000000' [ 3485.940288][ T1379] fuse: Bad value for 'rootmode' [ 3486.012634][ T1381] fuse: Unknown parameter 'group_i00000000000000000000' [ 3486.164784][ T1386] fuse: Unknown parameter 'grou00000000000000000000' [ 3486.274263][ T1390] fuse: Bad value for 'rootmode' [ 3486.417776][ T1395] fuse: Unknown parameter 'group_id00000000000000000000' [ 3486.421666][ T1396] fuse: Unknown parameter 'grou00000000000000000000' [ 3486.595182][ T1402] fuse: Unknown parameter 'group_i00000000000000000000' [ 3487.361534][ T1411] fuse: Unknown parameter 'grou00000000000000000000' [ 3487.467937][ T1413] fuse: Unknown parameter 'group_id00000000000000000000' [ 3487.744600][ T1417] fuse: Unknown parameter 'group_i00000000000000000000' [ 3488.027879][ T1426] fuse: Invalid rootmode [ 3488.116244][ T1428] fuse: Unknown parameter 'use00000000000000000000' [ 3488.401972][ T1433] fuse: Unknown parameter 'group_id00000000000000000000' [ 3488.520833][ T1438] fuse: Bad value for 'rootmode' [ 3488.589186][ T1440] fuse: Bad value for 'fd' [ 3488.712315][ T1442] fuse: Bad value for 'user_id' [ 3488.712690][ T1442] fuse: Bad value for 'user_id' [ 3490.430205][ T31] kauditd_printk_skb: 408 callbacks suppressed [ 3490.430752][ T31] audit: type=1400 audit(4003.355:2961): avc: denied { recv } for pid=3095 comm="syz-executor" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3490.447460][ T31] audit: type=1400 audit(4003.375:2963): avc: denied { recv } for pid=32588 comm="syz-executor" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3490.452483][ T31] audit: type=1400 audit(4003.355:2962): avc: denied { unmount } for pid=32588 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3490.480440][ T31] audit: type=1400 audit(4003.405:2964): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3490.485572][ T31] audit: type=1400 audit(4003.415:2965): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3490.500008][ T31] audit: type=1400 audit(4003.425:2966): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3490.517007][ T31] audit: type=1400 audit(4003.435:2967): avc: denied { recv } for pid=32588 comm="syz-executor" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3490.518020][ T31] audit: type=1400 audit(4003.445:2968): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3490.518440][ T31] audit: type=1400 audit(4003.445:2969): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3490.577199][ T31] audit: type=1400 audit(4003.505:2970): avc: denied { unmount } for pid=30279 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3490.690151][ T1456] fuse: Unknown parameter 'use00000000000000000000' [ 3490.785843][ T1459] fuse: Unknown parameter 'group_id00000000000000000000' [ 3490.795994][ T1460] fuse: Unknown parameter 'user_i00000000000000000000' [ 3490.971918][ T1466] fuse: Bad value for 'fd' [ 3491.072694][ T1468] fuse: Unknown parameter 'use00000000000000000000' [ 3491.162652][ T1470] fuse: Bad value for 'fd' [ 3491.253254][ T1472] fuse: Unknown parameter 'user_i00000000000000000000' [ 3491.386110][ T1475] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3491.393820][ T1475] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3491.430238][ T1479] fuse: Unknown parameter 'group_id00000000000000000000' [ 3491.509881][ T1481] fuse: Unknown parameter 'use00000000000000000000' [ 3491.584395][ T1483] fuse: Bad value for 'fd' [ 3491.603865][ T1485] fuse: Unknown parameter 'user_id00000000000000000000' [ 3491.703913][ T1488] fuse: Unknown parameter 'group_id00000000000000000000' [ 3491.717753][ T1489] fuse: Unknown parameter 'user_i00000000000000000000' [ 3491.817991][ T1491] fuse: Unknown parameter 'user_i00000000000000000000' [ 3492.315745][ T1501] fuse: Unknown parameter 'user_i00000000000000000000' [ 3492.365936][ T1503] fuse: Bad value for 'user_id' [ 3492.372338][ T1503] fuse: Bad value for 'user_id' [ 3492.440800][ T1505] fuse: Unknown parameter 'user_i00000000000000000000' [ 3492.574299][ T1511] fuse: Unknown parameter 'group_id00000000000000000000' [ 3492.640033][ T1514] fuse: Bad value for 'user_id' [ 3492.640876][ T1514] fuse: Bad value for 'user_id' [ 3492.646620][ T1515] fuse: Unknown parameter 'user_i00000000000000000000' [ 3492.732473][ T1517] fuse: Unknown parameter 'user_i00000000000000000000' [ 3492.841116][ T1521] fuse: Bad value for 'fd' [ 3492.951709][ T1525] fuse: Bad value for 'user_id' [ 3492.951977][ T1525] fuse: Bad value for 'user_id' [ 3493.066441][ T1530] fuse: Unknown parameter 'user_id00000000000000000000' [ 3493.260964][ T1539] FAULT_INJECTION: forcing a failure. [ 3493.260964][ T1539] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3493.261260][ T1539] CPU: 0 UID: 0 PID: 1539 Comm: syz.9.7000 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 3493.261308][ T1539] Hardware name: ARM-Versatile Express [ 3493.261323][ T1539] Call trace: [ 3493.261344][ T1539] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 3493.261406][ T1539] r7:00000000 r6:00000000 r5:60000013 r4:82257e84 [ 3493.261416][ T1539] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 3493.261443][ T1539] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 3493.261469][ T1539] r5:85058c00 r4:82951710 [ 3493.261476][ T1539] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 3493.261504][ T1539] [<8095f614>] (should_fail_ex) from [<8095f850>] (should_fail+0x14/0x18) [ 3493.261624][ T1539] r8:00000000 r7:00000000 r6:8245e848 r5:20000100 r4:20000100 [ 3493.261637][ T1539] [<8095f83c>] (should_fail) from [<8095f870>] (should_fail_usercopy+0x1c/0x20) [ 3493.261676][ T1539] [<8095f854>] (should_fail_usercopy) from [<80965908>] (strncpy_from_user+0x20/0x1a0) [ 3493.261788][ T1539] [<809658e8>] (strncpy_from_user) from [<80560b78>] (getname_flags.part.0+0x44/0x18c) [ 3493.261845][ T1539] r10:000000e2 r9:85058c00 r8:00000000 r7:00000000 r6:8245e848 r5:20000100 [ 3493.261870][ T1539] r4:8659d000 [ 3493.261881][ T1539] [<80560b34>] (getname_flags.part.0) from [<80565c44>] (getname_flags+0x3c/0x50) [ 3493.262001][ T1539] r9:85058c00 r8:00000000 r7:ffffff9c r6:00000000 r5:00000000 r4:20000100 [ 3493.262104][ T1539] [<80565c08>] (getname_flags) from [<8058aa24>] (path_setxattrat+0x158/0x17c) [ 3493.262183][ T1539] r5:20000100 r4:00000000 [ 3493.262227][ T1539] [<8058a8cc>] (path_setxattrat) from [<8058abd4>] (sys_setxattr+0x34/0x3c) [ 3493.262255][ T1539] r8:8020029c r7:000000e2 r6:0012fee0 r5:00000000 r4:20000140 [ 3493.262300][ T1539] [<8058aba0>] (sys_setxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3493.262352][ T1539] Exception stack(0xebd75fa8 to 0xebd75ff0) [ 3493.262424][ T1539] 5fa0: 00000001 00000000 20000100 20000140 00000000 00000000 [ 3493.262514][ T1539] 5fc0: 00000001 00000000 0012fee0 000000e2 002d0000 00000000 00006364 76b3b0bc [ 3493.262602][ T1539] 5fe0: 76b3aec0 76b3aeb0 0001939c 00131f30 [ 3493.262618][ T1539] r4:00000001 [ 3493.306726][ T1544] fuse: Bad value for 'fd' [ 3493.363372][ T1549] fuse: Bad value for 'fd' [ 3493.387059][ T1553] fuse: Invalid rootmode [ 3493.513370][ T1559] FAULT_INJECTION: forcing a failure. [ 3493.513370][ T1559] name failslab, interval 1, probability 0, space 0, times 0 [ 3493.514409][ T1559] CPU: 1 UID: 0 PID: 1559 Comm: syz.7.7005 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 3493.514483][ T1559] Hardware name: ARM-Versatile Express [ 3493.514504][ T1559] Call trace: [ 3493.514529][ T1559] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 3493.514590][ T1559] r7:8505ec00 r6:00000000 r5:60000013 r4:82257e84 [ 3493.514604][ T1559] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 3493.514632][ T1559] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 3493.514659][ T1559] r5:8505ec00 r4:8291bcc0 [ 3493.514666][ T1559] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 3493.514730][ T1559] [<8095f614>] (should_fail_ex) from [<805256c4>] (should_failslab+0x6c/0x94) [ 3493.514765][ T1559] r8:00000000 r7:8505ec00 r6:00000dc0 r5:850ff3c0 r4:830a8540 [ 3493.514774][ T1559] [<80525658>] (should_failslab) from [<8050a134>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 3493.514808][ T1559] [<8050a0e8>] (kmem_cache_alloc_noprof) from [<80779318>] (security_file_alloc+0x30/0x1dc) [ 3493.514842][ T1559] r10:00000142 r9:87af3000 r8:82805c40 r7:853f9280 r6:00000000 r5:850ff3c0 [ 3493.514852][ T1559] r4:850ff3c0 [ 3493.514860][ T1559] [<807792e8>] (security_file_alloc) from [<80553800>] (init_file+0x48/0x110) [ 3493.514888][ T1559] r5:850ff3c0 r4:850ff3c0 [ 3493.514896][ T1559] [<805537b8>] (init_file) from [<80553f48>] (alloc_empty_file+0x68/0x13c) [ 3493.514924][ T1559] r7:853f9280 r6:00000000 r5:850ff3c0 r4:8245e828 [ 3493.514932][ T1559] [<80553ee0>] (alloc_empty_file) from [<805667a8>] (path_openat+0x40/0x11a0) [ 3493.514968][ T1559] r8:ebe1de58 r7:ebe1de58 r6:ebe1df20 r5:8505ec00 r4:ffffff9c [ 3493.514977][ T1559] [<80566768>] (path_openat) from [<805679b4>] (do_filp_open+0xac/0x148) [ 3493.515009][ T1559] r10:00000142 r9:87af3000 r8:00000001 r7:ebe1de58 r6:ebe1df20 r5:8505ec00 [ 3493.515018][ T1559] r4:ffffff9c [ 3493.515026][ T1559] [<80567908>] (do_filp_open) from [<8054e774>] (do_sys_openat2+0x90/0xe0) [ 3493.515057][ T1559] r9:8505ec00 r8:8020029c r7:ffffff9c r6:ebe1df58 r5:87af3000 r4:00000005 [ 3493.515067][ T1559] [<8054e6e4>] (do_sys_openat2) from [<8054eb9c>] (sys_openat+0x98/0xd4) [ 3493.515095][ T1559] r7:00000142 r6:00000000 r5:76bbbab0 r4:ffffff9c [ 3493.515104][ T1559] [<8054eb04>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3493.515128][ T1559] Exception stack(0xebe1dfa8 to 0xebe1dff0) [ 3493.515148][ T1559] dfa0: 00000000 76bbbab0 ffffff9c 76bbbab0 00000000 00000000 [ 3493.515165][ T1559] dfc0: 00000000 76bbbab0 00000000 00000142 00000000 00000000 00006364 76bbc0bc [ 3493.515179][ T1559] dfe0: 81010301 76bbba68 000d7d68 0012fd28 [ 3493.515192][ T1559] r5:76bbbab0 r4:00000000 [ 3493.646485][ T1567] fuse: Bad value for 'fd' [ 3494.172966][ T1590] fuse: Bad value for 'fd' [ 3494.252439][ T1593] fuse: Unknown parameter 'grou00000000000000000000' [ 3495.057132][ T1605] fuse: Bad value for 'rootmode' [ 3495.278134][ T1609] fuse: Bad value for 'fd' [ 3495.876720][ T31] kauditd_printk_skb: 566 callbacks suppressed [ 3495.879581][ T31] audit: type=1400 audit(4008.805:3537): avc: denied { create } for pid=1611 comm="syz.9.7019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 3495.885802][ T31] audit: type=1400 audit(4008.815:3538): avc: denied { setopt } for pid=1611 comm="syz.9.7019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 3495.898085][ T31] audit: type=1400 audit(4008.825:3539): avc: denied { read write } for pid=1611 comm="syz.9.7019" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3495.901073][ T31] audit: type=1400 audit(4008.835:3540): avc: denied { open } for pid=1611 comm="syz.9.7019" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3496.294103][ T31] audit: type=1400 audit(4009.225:3541): avc: denied { unmount } for pid=30279 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3496.296114][ T31] audit: type=1400 audit(4009.225:3542): avc: denied { recv } for pid=3095 comm="syz-executor" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3496.313824][ T31] audit: type=1400 audit(4009.245:3543): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3496.343695][ T31] audit: type=1400 audit(4009.275:3544): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3496.344210][ T31] audit: type=1400 audit(4009.275:3545): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3496.353325][ T31] audit: type=1400 audit(4009.285:3546): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3496.599333][ T1619] fuse: Bad value for 'rootmode' [ 3496.696559][ T1621] fuse: Bad value for 'fd' [ 3497.003107][ T1626] fuse: Bad value for 'fd' [ 3497.759132][ T1628] fuse: Unknown parameter 'group_id00000000000000000000' [ 3498.393509][ T1633] fuse: Bad value for 'fd' [ 3501.042201][ T31] kauditd_printk_skb: 137 callbacks suppressed [ 3501.042439][ T31] audit: type=1400 audit(4013.975:3684): avc: denied { read write } for pid=1644 comm="syz.7.7029" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3501.042670][ T31] audit: type=1400 audit(4013.975:3685): avc: denied { read write } for pid=1643 comm="syz.9.7030" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3501.046101][ T31] audit: type=1400 audit(4013.975:3686): avc: denied { read write open } for pid=1643 comm="syz.9.7030" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3501.057378][ T1645] fuse: Invalid rootmode [ 3501.057964][ T31] audit: type=1400 audit(4013.985:3687): avc: denied { mounton } for pid=1644 comm="syz.7.7029" path="/404/file0" dev="tmpfs" ino=2381 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 3501.267931][ T31] audit: type=1400 audit(4014.195:3688): avc: denied { recv } for pid=3095 comm="syz-executor" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3501.268241][ T31] audit: type=1400 audit(4014.195:3689): avc: denied { recv } for pid=3095 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3501.268901][ T31] audit: type=1400 audit(4014.195:3690): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3501.269050][ T31] audit: type=1400 audit(4014.195:3691): avc: denied { recv } for pid=3095 comm="syz-executor" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3501.286031][ T31] audit: type=1400 audit(4014.205:3692): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3501.286322][ T31] audit: type=1400 audit(4014.215:3693): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3501.606394][ T1653] fuse: Unknown parameter '0x0000000000000003' [ 3502.824177][ T1660] fuse: Bad value for 'fd' [ 3503.167849][ T1666] fuse: Unknown parameter 'fd0x0000000000000003' [ 3503.254280][ T1668] fuse: Invalid rootmode [ 3503.346033][ T1670] fuse: Bad value for 'fd' [ 3503.668261][ T1676] fuse: Unknown parameter 'fd0x0000000000000003' [ 3503.755844][ T1678] fuse: Invalid rootmode [ 3503.840705][ T1680] fuse: Bad value for 'fd' [ 3504.121907][ T1687] fuse: Unknown parameter 'fd0x0000000000000003' [ 3504.167374][ T1689] fuse: Bad value for 'rootmode' [ 3504.230719][ T1692] fuse: Bad value for 'fd' [ 3504.479412][ T1701] fuse: Bad value for 'rootmode' [ 3504.556302][ T1704] fuse: Bad value for 'fd' [ 3504.632354][ T1707] fuse: Bad value for 'rootmode' [ 3504.770032][ T1713] fuse: Bad value for 'rootmode' [ 3504.870867][ T1715] fuse: Bad value for 'fd' [ 3504.994131][ T1719] fuse: Unknown parameter '0x0000000000000003' [ 3505.057333][ T1721] fuse: Unknown parameter 'user_id00000000000000000000' [ 3505.104334][ T1723] fuse: Unknown parameter 'grou00000000000000000000' [ 3505.167006][ T1725] fuse: Bad value for 'fd' [ 3505.281192][ T1728] fuse: Invalid rootmode [ 3506.050149][ T31] kauditd_printk_skb: 421 callbacks suppressed [ 3506.054791][ T31] audit: type=1400 audit(4018.985:4115): avc: denied { read } for pid=1730 comm="syz.7.7070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3506.055282][ T31] audit: type=1400 audit(4018.985:4116): avc: denied { write } for pid=1730 comm="syz.7.7070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3506.069566][ T31] audit: type=1400 audit(4018.995:4117): avc: denied { read } for pid=1730 comm="syz.7.7070" dev="nsfs" ino=4026532798 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3506.070122][ T31] audit: type=1400 audit(4018.995:4118): avc: denied { open } for pid=1730 comm="syz.7.7070" path="net:[4026532798]" dev="nsfs" ino=4026532798 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3506.070230][ T31] audit: type=1400 audit(4018.995:4119): avc: denied { create } for pid=1730 comm="syz.7.7070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3506.070307][ T31] audit: type=1400 audit(4018.995:4120): avc: denied { write } for pid=1730 comm="syz.7.7070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3506.070413][ T31] audit: type=1400 audit(4018.995:4121): avc: denied { module_request } for pid=1730 comm="syz.7.7070" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3506.130989][ T31] audit: type=1400 audit(4019.065:4122): avc: denied { read } for pid=1730 comm="syz.7.7070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3506.133146][ T31] audit: type=1400 audit(4019.065:4123): avc: denied { write } for pid=1730 comm="syz.7.7070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3506.136814][ T31] audit: type=1400 audit(4019.065:4124): avc: denied { module_request } for pid=1730 comm="syz.7.7070" kmod=6E65742D70662D31362D70726F746F2D31362D66616D696C792D3830322E31352E34204D4143 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3506.305828][ T1742] fuse: Bad value for 'fd' [ 3506.424695][ T1745] fuse: Unknown parameter 'grou00000000000000000000' [ 3506.502676][ T1750] fuse: Bad value for 'rootmode' [ 3506.550327][ T1749] binder: 1748:1749 ioctl c00c620f 20002680 returned -22 [ 3506.574878][ T1754] fuse: Bad value for 'fd' [ 3506.653840][ T1757] fuse: Bad value for 'fd' [ 3506.678086][ T1758] fuse: Bad value for 'fd' [ 3508.504069][ T1771] fuse: Bad value for 'fd' [ 3508.600995][ T1773] fuse: Unknown parameter 'user_i00000000000000000000' [ 3509.688281][ T1782] FAULT_INJECTION: forcing a failure. [ 3509.688281][ T1782] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3509.690616][ T1782] CPU: 0 UID: 0 PID: 1782 Comm: syz.9.7087 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 3509.690758][ T1782] Hardware name: ARM-Versatile Express [ 3509.690795][ T1782] Call trace: [ 3509.690842][ T1782] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 3509.690948][ T1782] r7:e0215e20 r6:00000000 r5:60000013 r4:82257e84 [ 3509.690972][ T1782] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 3509.691027][ T1782] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 3509.691085][ T1782] r5:8505b000 r4:82951710 [ 3509.691103][ T1782] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 3509.691165][ T1782] [<8095f614>] (should_fail_ex) from [<8095f850>] (should_fail+0x14/0x18) [ 3509.691229][ T1782] r8:00008000 r7:e0215e20 r6:200003c0 r5:00000000 r4:e0215f20 [ 3509.691249][ T1782] [<8095f83c>] (should_fail) from [<8095f870>] (should_fail_usercopy+0x1c/0x20) [ 3509.691300][ T1782] [<8095f854>] (should_fail_usercopy) from [<8151c320>] (copy_msghdr_from_user+0x50/0x130) [ 3509.691359][ T1782] [<8151c2d0>] (copy_msghdr_from_user) from [<8151c478>] (___sys_sendmsg+0x78/0xd0) [ 3509.691418][ T1782] r8:00008000 r7:00000000 r6:8499d900 r5:e0215f20 r4:e0215e64 [ 3509.691438][ T1782] [<8151c400>] (___sys_sendmsg) from [<8151c92c>] (__sys_sendmsg+0x8c/0xd8) [ 3509.691498][ T1782] r10:00000128 r9:8505b000 r8:85c8f6c0 r7:00008000 r6:200003c0 r5:85c8f6c1 [ 3509.691518][ T1782] r4:00000005 [ 3509.691535][ T1782] [<8151c8a0>] (__sys_sendmsg) from [<8151c98c>] (sys_sendmsg+0x14/0x18) [ 3509.691603][ T1782] r8:8020029c r7:00000128 r6:0012fee0 r5:00000000 r4:00000000 [ 3509.691626][ T1782] [<8151c978>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3509.691674][ T1782] Exception stack(0xe0215fa8 to 0xe0215ff0) [ 3509.691708][ T1782] 5fa0: 00000000 00000000 00000005 200003c0 00008000 00000000 [ 3509.691740][ T1782] 5fc0: 00000000 00000000 0012fee0 00000128 002d0000 00000000 00006364 76b3b0bc [ 3509.691769][ T1782] 5fe0: 76b3aec0 76b3aeb0 0001939c 00131f30 [ 3509.797566][ T1786] fuse: Bad value for 'rootmode' [ 3509.882200][ T1788] fuse: Unknown parameter '0x0000000000000003' [ 3510.185161][ T1794] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=1794 comm=syz.9.7092 [ 3510.304646][ T1796] fuse: Unknown parameter 'use00000000000000000000' [ 3510.425272][ T1798] fuse: Unknown parameter '0x0000000000000003' [ 3511.170783][ T31] kauditd_printk_skb: 273 callbacks suppressed [ 3511.171185][ T31] audit: type=1400 audit(4024.105:4398): avc: denied { recv } for pid=3095 comm="syz-executor" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3511.178077][ T31] audit: type=1400 audit(4024.105:4399): avc: denied { recv } for pid=30279 comm="syz-executor" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3511.221976][ T31] audit: type=1400 audit(4024.155:4400): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3511.224980][ T31] audit: type=1400 audit(4024.155:4401): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3511.230912][ T31] audit: type=1400 audit(4024.165:4402): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3511.237170][ T31] audit: type=1400 audit(4024.165:4403): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3511.249809][ T31] audit: type=1400 audit(4024.175:4404): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3511.250541][ T31] audit: type=1400 audit(4024.185:4405): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3511.285138][ T31] audit: type=1400 audit(4024.205:4406): avc: denied { read write } for pid=1803 comm="syz.7.7096" name="dsp" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3511.286391][ T31] audit: type=1400 audit(4024.215:4407): avc: denied { open } for pid=1803 comm="syz.7.7096" path="/dev/dsp" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3511.536594][ T1810] fuse: Unknown parameter 'use00000000000000000000' [ 3511.623634][ T1812] fuse: Invalid rootmode [ 3511.726215][ T1814] fuse: Unknown parameter 'user_id00000000000000000000' [ 3512.196245][ T1823] fuse: Invalid rootmode [ 3512.291746][ T1825] fuse: Unknown parameter 'user_id00000000000000000000' [ 3512.483374][ T1829] fuse: Unknown parameter '0x0000000000000003' [ 3512.714620][ T1834] fuse: Invalid rootmode [ 3512.808272][ T1836] fuse: Unknown parameter 'user_id00000000000000000000' [ 3512.903940][ T1838] FAULT_INJECTION: forcing a failure. [ 3512.903940][ T1838] name failslab, interval 1, probability 0, space 0, times 0 [ 3512.904472][ T1838] CPU: 1 UID: 0 PID: 1838 Comm: syz.7.7111 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 3512.904558][ T1838] Hardware name: ARM-Versatile Express [ 3512.904583][ T1838] Call trace: [ 3512.904627][ T1838] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 3512.904806][ T1838] r7:00100cc0 r6:00000000 r5:60000013 r4:82257e84 [ 3512.904833][ T1838] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 3512.904962][ T1838] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 3512.905075][ T1838] r5:85059800 r4:8291bcc0 [ 3512.905135][ T1838] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 3512.905266][ T1838] [<8095f614>] (should_fail_ex) from [<805256c4>] (should_failslab+0x6c/0x94) [ 3512.905398][ T1838] r8:00100cc0 r7:00100cc0 r6:00000000 r5:83001240 r4:00000001 [ 3512.905480][ T1838] [<80525658>] (should_failslab) from [<80508c98>] (__kvmalloc_node_noprof+0xe0/0x59c) [ 3512.905715][ T1838] [<80508bb8>] (__kvmalloc_node_noprof) from [<804a5918>] (vmemdup_user+0x28/0x16c) [ 3512.905792][ T1838] r10:000000e4 r9:85059800 r8:20000080 r7:20000080 r6:00001000 r5:00000000 [ 3512.905812][ T1838] r4:00000001 [ 3512.905827][ T1838] [<804a58f0>] (vmemdup_user) from [<8058a73c>] (setxattr_copy+0x58/0x90) [ 3512.905887][ T1838] r9:85059800 r8:20000080 r7:00000004 r6:00001000 r5:00000000 r4:e07fde48 [ 3512.905907][ T1838] [<8058a6e4>] (setxattr_copy) from [<8058a948>] (path_setxattrat+0x7c/0x17c) [ 3512.905955][ T1838] r5:00000000 r4:20000040 [ 3512.905998][ T1838] [<8058a8cc>] (path_setxattrat) from [<8058ac48>] (sys_fsetxattr+0x30/0x38) [ 3512.906058][ T1838] r8:8020029c r7:000000e4 r6:0012fee0 r5:00000000 r4:00000000 [ 3512.906075][ T1838] [<8058ac18>] (sys_fsetxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3512.906123][ T1838] Exception stack(0xe07fdfa8 to 0xe07fdff0) [ 3512.906208][ T1838] dfa0: 00000000 00000000 00000004 20000040 20000080 00000001 [ 3512.906301][ T1838] dfc0: 00000000 00000000 0012fee0 000000e4 002d0000 00000000 00006364 76bbc0bc [ 3512.906513][ T1838] dfe0: 76bbbec0 76bbbeb0 0001939c 00131f30 [ 3513.032498][ T1840] fuse: Unknown parameter '0x0000000000000003' [ 3513.150668][ T1845] fuse: Unknown parameter 'user_i00000000000000000000' [ 3513.254276][ T1849] fuse: Bad value for 'fd' [ 3513.330052][ T1852] fuse: Unknown parameter 'group_id00000000000000000000' [ 3513.331931][ T1853] fuse: Unknown parameter 'fdY0x0000000000000003' [ 3513.403944][ T1857] fuse: Unknown parameter 'user_i00000000000000000000' [ 3513.472413][ T1861] fuse: Bad value for 'fd' [ 3513.571063][ T1864] fuse: Unknown parameter 'group_id00000000000000000000' [ 3513.571994][ T1865] fuse: Bad value for 'rootmode' [ 3513.873515][ T1877] fuse: Bad value for 'user_id' [ 3513.874082][ T1877] fuse: Bad value for 'user_id' [ 3513.950857][ T1879] fuse: Bad value for 'rootmode' [ 3514.509528][ T1895] fuse: Bad value for 'user_id' [ 3514.509872][ T1895] fuse: Bad value for 'user_id' [ 3514.607384][ T1897] fuse: Unknown parameter 'use00000000000000000000' [ 3516.218144][ T1902] FAULT_INJECTION: forcing a failure. [ 3516.218144][ T1902] name failslab, interval 1, probability 0, space 0, times 0 [ 3516.221499][ T1902] CPU: 0 UID: 0 PID: 1902 Comm: syz.7.7136 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 3516.221625][ T1902] Hardware name: ARM-Versatile Express [ 3516.221666][ T1902] Call trace: [ 3516.221692][ T1902] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 3516.221754][ T1902] r7:00000d40 r6:00000000 r5:60000013 r4:82257e84 [ 3516.221765][ T1902] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 3516.221792][ T1902] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 3516.221824][ T1902] r5:85270000 r4:8291bcc0 [ 3516.221832][ T1902] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 3516.221861][ T1902] [<8095f614>] (should_fail_ex) from [<805256c4>] (should_failslab+0x6c/0x94) [ 3516.221896][ T1902] r8:85270000 r7:00000d40 r6:e4ae5e74 r5:0000001e r4:83001240 [ 3516.221905][ T1902] [<80525658>] (should_failslab) from [<8050a4b8>] (__kmalloc_noprof+0x9c/0x458) [ 3516.221931][ T1902] [<8050a41c>] (__kmalloc_noprof) from [<807bc244>] (tomoyo_encode2+0x64/0xf0) [ 3516.221968][ T1902] r10:00000fff r9:876f2800 r8:00000000 r7:837c6440 r6:e4ae5e74 r5:8324cffd [ 3516.221979][ T1902] r4:8324cfea [ 3516.221987][ T1902] [<807bc1e0>] (tomoyo_encode2) from [<807bc2f4>] (tomoyo_encode+0x24/0x30) [ 3516.222018][ T1902] r9:876f2800 r8:00000000 r7:837c6440 r6:e4ae5e74 r5:00001000 r4:8324cfeb [ 3516.222026][ T1902] [<807bc2d0>] (tomoyo_encode) from [<807bc380>] (tomoyo_realpath_from_path+0x80/0x17c) [ 3516.222053][ T1902] r5:00001000 r4:8324c000 [ 3516.222061][ T1902] [<807bc300>] (tomoyo_realpath_from_path) from [<807b8884>] (tomoyo_path_perm+0xe4/0x200) [ 3516.222093][ T1902] r10:00000000 r9:00000000 r8:00000001 r7:00000000 r6:00000005 r5:00000000 [ 3516.222104][ T1902] r4:00000000 r3:00000000 [ 3516.222112][ T1902] [<807b87a0>] (tomoyo_path_perm) from [<807bcb8c>] (tomoyo_inode_getattr+0x1c/0x20) [ 3516.222142][ T1902] r8:86598000 r7:ffffff9c r6:00000000 r5:00000900 r4:e4ae5e74 [ 3516.222151][ T1902] [<807bcb70>] (tomoyo_inode_getattr) from [<80776a48>] (security_inode_getattr+0x64/0x1ac) [ 3516.222177][ T1902] [<807769e4>] (security_inode_getattr) from [<80559610>] (vfs_statx+0x7c/0x154) [ 3516.222202][ T1902] r5:00000900 r4:e4ae5eb8 [ 3516.222210][ T1902] [<80559594>] (vfs_statx) from [<80559a24>] (__do_sys_newlstat+0x64/0xb0) [ 3516.222237][ T1902] r10:0000006b r9:85270000 r8:8020029c r7:0000006b r6:00000000 r5:86598000 [ 3516.222246][ T1902] r4:20000b00 [ 3516.222254][ T1902] [<805599c0>] (__do_sys_newlstat) from [<80559c9c>] (sys_newlstat+0x10/0x14) [ 3516.222278][ T1902] r6:0012fee0 r5:00000000 r4:00000000 [ 3516.222286][ T1902] [<80559c8c>] (sys_newlstat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3516.222309][ T1902] Exception stack(0xe4ae5fa8 to 0xe4ae5ff0) [ 3516.222329][ T1902] 5fa0: 00000000 00000000 20000b00 00000000 00000000 00000000 [ 3516.222346][ T1902] 5fc0: 00000000 00000000 0012fee0 0000006b 002d0000 00000000 00006364 76b9b0bc [ 3516.222359][ T1902] 5fe0: 76b9aec0 76b9aeb0 0001939c 00131f30 [ 3516.223120][ T1902] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3516.693033][ T31] kauditd_printk_skb: 409 callbacks suppressed [ 3516.693298][ T31] audit: type=1400 audit(4029.625:4817): avc: denied { unmount } for pid=32588 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3516.694761][ T31] audit: type=1400 audit(4029.625:4818): avc: denied { recv } for pid=3095 comm="syz-executor" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3516.703184][ T31] audit: type=1400 audit(4029.635:4819): avc: denied { recv } for pid=17 comm="rcu_exp_gp_kthr" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3516.741043][ T31] audit: type=1400 audit(4029.675:4820): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3516.745132][ T31] audit: type=1400 audit(4029.675:4821): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3516.747582][ T31] audit: type=1400 audit(4029.675:4822): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3516.756398][ T31] audit: type=1400 audit(4029.685:4823): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3516.756761][ T31] audit: type=1400 audit(4029.685:4824): avc: denied { recv } for pid=30279 comm="syz-executor" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3516.764624][ T31] audit: type=1400 audit(4029.695:4825): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3516.765096][ T31] audit: type=1400 audit(4029.695:4826): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3517.030400][ T1918] fuse: Bad value for 'user_id' [ 3517.031795][ T1918] fuse: Bad value for 'user_id' [ 3517.816761][ T1929] fuse: Bad value for 'fd' [ 3517.982206][ T1933] fuse: Bad value for 'fd' [ 3518.691039][ T1941] fuse: Bad value for 'group_id' [ 3518.692614][ T1941] fuse: Bad value for 'group_id' [ 3518.785309][ T1943] fuse: Unknown parameter 'fd0x0000000000000003' [ 3518.886207][ T1945] fuse: Unknown parameter 'grou00000000000000000000' [ 3518.990395][ T1947] fuse: Bad value for 'fd' [ 3519.712038][ T1954] fuse: Unknown parameter 'user_id00000000000000000000' [ 3519.796772][ T1956] fuse: Unknown parameter 'fd0x0000000000000003' [ 3519.887824][ T1958] fuse: Unknown parameter 'grou00000000000000000000' [ 3519.961321][ T1960] fuse: Bad value for 'fd' [ 3520.282128][ T1966] fuse: Bad value for 'fd' [ 3520.763271][ T1975] fuse: Unknown parameter 'grou00000000000000000000' [ 3520.857143][ T1979] fuse: Bad value for 'fd' [ 3521.033309][ T1984] fuse: Unknown parameter '0x0000000000000003' [ 3523.427806][ T31] kauditd_printk_skb: 330 callbacks suppressed [ 3523.428041][ T31] audit: type=1400 audit(4036.355:5157): avc: denied { recv } for pid=3095 comm="syz-executor" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3523.428205][ T31] audit: type=1400 audit(4036.355:5158): avc: denied { unmount } for pid=30279 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3523.437611][ T31] audit: type=1400 audit(4036.365:5159): avc: denied { recv } for pid=30279 comm="syz-executor" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3523.472631][ T31] audit: type=1400 audit(4036.405:5160): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3523.472907][ T31] audit: type=1400 audit(4036.405:5161): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3523.477188][ T31] audit: type=1400 audit(4036.405:5162): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3523.487261][ T31] audit: type=1400 audit(4036.415:5163): avc: denied { recv } for pid=1994 comm="syz-executor" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3523.495103][ T31] audit: type=1400 audit(4036.425:5164): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3523.496868][ T31] audit: type=1400 audit(4036.425:5165): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3523.512190][ T31] audit: type=1400 audit(4036.445:5166): avc: denied { read write } for pid=1994 comm="syz.7.7164" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3523.515417][ T1995] fuse: Bad value for 'fd' [ 3523.593423][ T1997] fuse: Unknown parameter 'group_i00000000000000000000' [ 3523.657542][ T1999] fuse: Unknown parameter '0x0000000000000003' [ 3524.165160][ T2012] fuse: Bad value for 'fd' [ 3524.225047][ T2014] fuse: Unknown parameter 'group_i00000000000000000000' [ 3524.293639][ T2016] fuse: Unknown parameter '0x0000000000000003' [ 3526.803607][ T2032] fuse: Unknown parameter 'fd0x0000000000000003' [ 3526.900938][ T2034] fuse: Unknown parameter 'group_i00000000000000000000' [ 3530.083769][ T31] kauditd_printk_skb: 223 callbacks suppressed [ 3530.084190][ T31] audit: type=1400 audit(4043.015:5390): avc: denied { unmount } for pid=32588 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3530.086870][ T31] audit: type=1400 audit(4043.015:5391): avc: denied { recv } for pid=3095 comm="syz-executor" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3530.097157][ T31] audit: type=1400 audit(4043.025:5392): avc: denied { recv } for pid=3095 comm="syz-executor" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3530.130907][ T31] audit: type=1400 audit(4043.065:5393): avc: denied { recv } for pid=32588 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3530.144489][ T31] audit: type=1400 audit(4043.065:5394): avc: denied { recv } for pid=32588 comm="syz-executor" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3530.147262][ T31] audit: type=1400 audit(4043.065:5395): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3530.160904][ T31] audit: type=1400 audit(4043.095:5396): avc: denied { recv } for pid=32588 comm="syz-executor" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3530.161384][ T31] audit: type=1400 audit(4043.095:5397): avc: denied { recv } for pid=32588 comm="syz-executor" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3530.176116][ T31] audit: type=1400 audit(4043.105:5398): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3530.176667][ T31] audit: type=1400 audit(4043.105:5399): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3530.767947][ T2064] fuse: Unknown parameter 'group_id00000000000000000000' [ 3532.852605][ T2082] fuse: Unknown parameter 'group_id00000000000000000000' [ 3533.010943][ T2088] fuse: Unknown parameter 'fd0x0000000000000003' [ 3534.054447][ T2101] cgroup2: Unknown parameter 'rdma' [ 3535.169995][ T31] kauditd_printk_skb: 201 callbacks suppressed [ 3535.170465][ T31] audit: type=1400 audit(4048.095:5601): avc: denied { recv } for pid=3095 comm="syz-executor" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3535.170823][ T31] audit: type=1400 audit(4048.105:5602): avc: denied { unmount } for pid=30279 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3535.186724][ T31] audit: type=1400 audit(4048.115:5603): avc: denied { recv } for pid=30279 comm="syz-executor" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3535.214789][ T31] audit: type=1400 audit(4048.145:5604): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3535.215048][ T31] audit: type=1400 audit(4048.145:5605): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3535.215204][ T31] audit: type=1400 audit(4048.145:5606): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3535.218898][ T31] audit: type=1400 audit(4048.145:5607): avc: denied { recv } for pid=2115 comm="syz-executor" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3535.223470][ T31] audit: type=1400 audit(4048.155:5608): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3535.223678][ T31] audit: type=1400 audit(4048.155:5609): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3535.264646][ T31] audit: type=1400 audit(4048.195:5610): avc: denied { recv } for pid=3095 comm="syz-executor" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3535.334556][ T2118] fuse: Unknown parameter 'grou00000000000000000000' [ 3535.436424][ T2120] fuse: Unknown parameter '0x0000000000000003' [ 3535.739719][ T2130] fuse: Unknown parameter 'grou00000000000000000000' [ 3535.837635][ T2132] fuse: Unknown parameter '0x0000000000000003' [ 3536.022744][ T2136] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=2136 comm=syz.9.7207 [ 3536.034198][ T2136] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=2136 comm=syz.9.7207 [ 3536.249165][ T2143] fuse: Unknown parameter 'grou00000000000000000000' [ 3536.918985][ T2151] fuse: Unknown parameter '0x0000000000000003' [ 3537.693529][ T2160] fuse: Unknown parameter 'group_i00000000000000000000' [ 3538.690407][ T2167] fuse: Unknown parameter '0x0000000000000003' [ 3539.572806][ T2177] fuse: Unknown parameter 'group_i00000000000000000000' [ 3540.280958][ T31] kauditd_printk_skb: 248 callbacks suppressed [ 3540.281174][ T31] audit: type=1400 audit(4053.215:5859): avc: denied { unmount } for pid=30279 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3540.281337][ T31] audit: type=1400 audit(4053.215:5860): avc: denied { recv } for pid=3095 comm="syz-executor" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3540.290204][ T31] audit: type=1400 audit(4053.215:5861): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3540.331297][ T31] audit: type=1400 audit(4053.265:5862): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3540.333014][ T31] audit: type=1400 audit(4053.265:5863): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3540.340532][ T31] audit: type=1400 audit(4053.265:5864): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3540.341542][ T31] audit: type=1400 audit(4053.275:5865): avc: denied { recv } for pid=30279 comm="syz-executor" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3540.350844][ T31] audit: type=1400 audit(4053.285:5866): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3540.351367][ T31] audit: type=1400 audit(4053.285:5867): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3540.389025][ T31] audit: type=1400 audit(4053.315:5868): avc: denied { read write } for pid=2183 comm="syz.7.7221" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3540.395551][ T2184] fuse: Unknown parameter '0x0000000000000003' [ 3540.637222][ T2190] fuse: Unknown parameter 'group_i00000000000000000000' [ 3542.369517][ T2198] fuse: Bad value for 'fd' [ 3542.512366][ T2200] fuse: Unknown parameter 'fd0x0000000000000003' [ 3542.794318][ T2204] fuse: Unknown parameter 'group_id00000000000000000000' [ 3543.066718][ T2209] fuse: Bad value for 'fd' [ 3543.128340][ T2211] fuse: Unknown parameter 'fd0x0000000000000003' [ 3543.322404][ T2215] fuse: Unknown parameter 'group_id00000000000000000000' [ 3543.607949][ T2222] fuse: Bad value for 'fd' [ 3543.799915][ T2226] fuse: Unknown parameter 'group_id00000000000000000000' [ 3543.884060][ T2228] fuse: Unknown parameter 'fd0x0000000000000003' [ 3544.452451][ T2232] fuse: Unknown parameter '0x0000000000000003' [ 3544.718020][ T2237] fuse: Bad value for 'user_id' [ 3544.719056][ T2237] fuse: Bad value for 'user_id' [ 3545.637687][ T31] kauditd_printk_skb: 297 callbacks suppressed [ 3545.637928][ T31] audit: type=1400 audit(4058.565:6166): avc: denied { read } for pid=2229 comm="syz.9.7241" dev="nsfs" ino=4026533044 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3545.642596][ T31] audit: type=1400 audit(4058.565:6167): avc: denied { read open } for pid=2229 comm="syz.9.7241" path="net:[4026533044]" dev="nsfs" ino=4026533044 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3545.646236][ T31] audit: type=1400 audit(4058.575:6168): avc: denied { create } for pid=2229 comm="syz.9.7241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3545.667870][ T31] audit: type=1400 audit(4058.595:6169): avc: denied { ioctl } for pid=2229 comm="syz.9.7241" path="" dev="sockfs" ino=80412 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3545.670592][ T31] audit: type=1400 audit(4058.595:6170): avc: denied { module_request } for pid=2229 comm="syz.9.7241" kmod="netdev-wpan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3545.862849][ T31] audit: type=1400 audit(4058.795:6171): avc: denied { sys_module } for pid=2229 comm="syz.9.7241" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3545.865943][ T31] audit: type=1400 audit(4058.795:6172): avc: denied { module_request } for pid=2229 comm="syz.9.7241" kmod="wpan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3547.303584][ T31] audit: type=1400 audit(4060.235:6173): avc: denied { recv } for pid=3095 comm="syz-executor" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3547.311388][ T31] audit: type=1400 audit(4060.245:6174): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3547.318007][ T31] audit: type=1400 audit(4060.245:6175): avc: denied { unmount } for pid=30279 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3550.641750][ T31] kauditd_printk_skb: 72 callbacks suppressed [ 3550.649251][ T31] audit: type=1400 audit(4063.575:6248): avc: denied { recv } for pid=3095 comm="syz-executor" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3550.649943][ T31] audit: type=1400 audit(4063.575:6249): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3550.690313][ T31] audit: type=1400 audit(4063.625:6250): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3550.692016][ T31] audit: type=1400 audit(4063.625:6251): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3550.696648][ T31] audit: type=1400 audit(4063.625:6252): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3550.702447][ T31] audit: type=1400 audit(4063.635:6253): avc: denied { recv } for pid=2270 comm="syz.7.7252" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3550.706885][ T31] audit: type=1400 audit(4063.635:6254): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3550.707118][ T31] audit: type=1400 audit(4063.635:6255): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3550.707255][ T31] audit: type=1400 audit(4063.635:6256): avc: denied { read } for pid=2270 comm="syz.7.7252" dev="nsfs" ino=4026532798 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3550.707311][ T31] audit: type=1400 audit(4063.635:6257): avc: denied { open } for pid=2270 comm="syz.7.7252" path="net:[4026532798]" dev="nsfs" ino=4026532798 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3552.968017][ T2293] fuse: Bad value for 'rootmode' [ 3555.649805][ T31] kauditd_printk_skb: 117 callbacks suppressed [ 3555.650191][ T31] audit: type=1400 audit(4068.575:6375): avc: denied { ioctl } for pid=2304 comm="syz.9.7261" path="socket:[80503]" dev="sockfs" ino=80503 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3555.656350][ T31] audit: type=1400 audit(4068.585:6376): avc: denied { bind } for pid=2304 comm="syz.9.7261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3555.666995][ T31] audit: type=1400 audit(4068.595:6377): avc: denied { write } for pid=2304 comm="syz.9.7261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3556.156512][ T31] audit: type=1400 audit(4069.085:6378): avc: denied { unmount } for pid=30279 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3556.156747][ T31] audit: type=1400 audit(4069.085:6379): avc: denied { recv } for pid=3095 comm="syz-executor" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3556.162995][ T31] audit: type=1400 audit(4069.095:6380): avc: denied { recv } for pid=2912 comm="klogd" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3556.176369][ T31] audit: type=1400 audit(4069.105:6381): avc: denied { write } for pid=2304 comm="syz.9.7261" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3556.200615][ T31] audit: type=1400 audit(4069.135:6382): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3556.200922][ T31] audit: type=1400 audit(4069.135:6383): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3556.204847][ T31] audit: type=1400 audit(4069.135:6384): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3556.275872][ T2311] fuse: Bad value for 'rootmode' [ 3558.638042][ T2329] fuse: Bad value for 'rootmode' [ 3560.855242][ T31] kauditd_printk_skb: 107 callbacks suppressed [ 3560.856042][ T31] audit: type=1400 audit(4073.785:6492): avc: denied { recv } for pid=3095 comm="syz-executor" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3560.863100][ T31] audit: type=1400 audit(4073.785:6493): avc: denied { unmount } for pid=32588 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3560.880631][ T31] audit: type=1400 audit(4073.805:6494): avc: denied { recv } for pid=2912 comm="klogd" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3560.901438][ T31] audit: type=1400 audit(4073.835:6495): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3560.901905][ T31] audit: type=1400 audit(4073.835:6496): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3560.911312][ T31] audit: type=1400 audit(4073.845:6497): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3560.927979][ T31] audit: type=1400 audit(4073.845:6498): avc: denied { recv } for pid=32588 comm="syz-executor" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3560.929160][ T31] audit: type=1400 audit(4073.855:6499): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3560.929495][ T31] audit: type=1400 audit(4073.855:6500): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3560.983049][ T31] audit: type=1400 audit(4073.915:6501): avc: denied { read write } for pid=2340 comm="syz.9.7271" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3561.319359][ T2344] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=2344 comm=syz.7.7272 [ 3561.388092][ T2346] fuse: Unknown parameter 'use00000000000000000000' [ 3561.716390][ T2362] fuse: Unknown parameter 'use00000000000000000000' [ 3562.600027][ T2377] fuse: Unknown parameter 'use00000000000000000000' [ 3564.480948][ T2390] fuse: Unknown parameter 'user_i00000000000000000000' [ 3565.860020][ T31] kauditd_printk_skb: 211 callbacks suppressed [ 3565.860245][ T31] audit: type=1400 audit(4078.795:6713): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3565.860425][ T31] audit: type=1400 audit(4078.795:6714): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3565.863853][ T31] audit: type=1400 audit(4078.795:6715): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3565.872515][ T31] audit: type=1400 audit(4078.805:6716): avc: denied { recv } for pid=30279 comm="syz-executor" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3565.876622][ T31] audit: type=1400 audit(4078.805:6717): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3565.877820][ T31] audit: type=1400 audit(4078.805:6718): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3565.940535][ T31] audit: type=1400 audit(4078.875:6719): avc: denied { create } for pid=2404 comm="syz.7.7292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3565.943981][ T31] audit: type=1400 audit(4078.875:6720): avc: denied { write } for pid=2404 comm="syz.7.7292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3565.948898][ T31] audit: type=1400 audit(4078.875:6721): avc: denied { module_request } for pid=2404 comm="syz.7.7292" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3565.951186][ T31] audit: type=1400 audit(4078.885:6722): avc: denied { module_request } for pid=2404 comm="syz.7.7292" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3566.541924][ T2418] fuse: Unknown parameter 'user_i00000000000000000000' [ 3567.585635][ T2435] fuse: Unknown parameter 'user_i00000000000000000000' [ 3570.958322][ T31] kauditd_printk_skb: 144 callbacks suppressed [ 3570.961670][ T31] audit: type=1400 audit(4083.885:6867): avc: denied { recv } for pid=3095 comm="syz-executor" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3570.966097][ T31] audit: type=1400 audit(4083.895:6868): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3571.001265][ T31] audit: type=1400 audit(4083.935:6869): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3571.009940][ T31] audit: type=1400 audit(4083.935:6870): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3571.010263][ T31] audit: type=1400 audit(4083.935:6871): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3571.010482][ T31] audit: type=1400 audit(4083.945:6872): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3571.016886][ T31] audit: type=1400 audit(4083.945:6873): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3571.017201][ T31] audit: type=1400 audit(4083.945:6874): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3571.055457][ T31] audit: type=1400 audit(4083.985:6875): avc: denied { recv } for pid=3095 comm="syz-executor" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3571.064150][ T31] audit: type=1400 audit(4083.995:6876): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3571.139700][ T2457] fuse: Unknown parameter 'user_id00000000000000000000' [ 3571.902274][ T2469] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3571.905440][ T2469] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3575.632005][ T2512] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3575.633895][ T2512] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3576.716763][ T31] kauditd_printk_skb: 204 callbacks suppressed [ 3576.716990][ T31] audit: type=1400 audit(4089.645:7081): avc: denied { prog_load } for pid=2515 comm="syz.7.7321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3576.720557][ T31] audit: type=1400 audit(4089.655:7082): avc: denied { bpf } for pid=2515 comm="syz.7.7321" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3576.723498][ T31] audit: type=1400 audit(4089.655:7083): avc: denied { perfmon } for pid=2515 comm="syz.7.7321" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3576.723706][ T31] audit: type=1400 audit(4089.655:7084): avc: denied { bpf } for pid=2515 comm="syz.7.7321" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3576.723838][ T31] audit: type=1400 audit(4089.655:7085): avc: denied { prog_run } for pid=2515 comm="syz.7.7321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3576.735493][ T31] audit: type=1400 audit(4089.665:7086): avc: denied { create } for pid=2515 comm="syz.7.7321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3576.750390][ T2518] sch_tbf: peakrate 8 is lower than or equals to rate 12 ! [ 3577.450096][ T31] audit: type=1400 audit(4090.385:7087): avc: denied { recv } for pid=3095 comm="syz-executor" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3577.454065][ T31] audit: type=1400 audit(4090.385:7088): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3577.500497][ T31] audit: type=1400 audit(4090.435:7089): avc: denied { recv } for pid=2888 comm="jbd2/vda-8" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3577.502000][ T31] audit: type=1400 audit(4090.435:7090): avc: denied { recv } for pid=2888 comm="jbd2/vda-8" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3584.661505][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 3584.661753][ T31] audit: type=1400 audit(4097.595:7107): avc: denied { recv } for pid=3095 comm="syz-executor" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3584.667423][ T31] audit: type=1400 audit(4097.595:7108): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3584.710951][ T31] audit: type=1400 audit(4097.645:7109): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3584.711229][ T31] audit: type=1400 audit(4097.645:7110): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3584.713375][ T31] audit: type=1400 audit(4097.645:7111): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3584.721310][ T31] audit: type=1400 audit(4097.655:7112): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3584.721588][ T31] audit: type=1400 audit(4097.655:7113): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=10.0.2.2 src=36028 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3584.729745][ T31] audit: type=1400 audit(4097.655:7114): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41520 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3584.731172][ T31] audit: type=1400 audit(4097.665:7115): avc: denied { recv } for pid=3094 comm="sshd-session" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3584.749635][ T31] audit: type=1400 audit(4097.685:7116): avc: denied { recv } for pid=3095 comm="syz-executor" saddr=127.0.0.1 src=41520 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3588.735122][ T2539] ------------[ cut here ]------------ [ 3588.735457][ T2539] WARNING: CPU: 1 PID: 2539 at kernel/bpf/verifier.c:20723 bpf_check+0x2d58/0x2e ** replaying previous printk message ** [ 3588.735457][ T2539] WARNING: CPU: 1 PID: 2539 at kernel/bpf/verifier.c:20723 bpf_check+0x2d58/0x2ed4 [ 3588.737875][ T2539] Modules linked in: [ 3588.738621][ T2539] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 3588.739317][ T2539] CPU: 1 UID: 0 PID: 2539 Comm: syz.9.7326 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 3588.739671][ T2539] Hardware name: ARM-Versatile Express [ 3588.739848][ T2539] Call trace: [ 3588.739958][ T2539] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 3588.740528][ T2539] r7:00000000 r6:828227fc r5:00000000 r4:82257e84 [ 3588.740663][ T2539] [<80201ac8>] (show_stack) from [<8021ff7c>] (dump_stack_lvl+0x54/0x7c) [ 3588.740997][ T2539] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 3588.741649][ T2539] r5:00000000 r4:82a70d4c [ 3588.741757][ T2539] [<8021ffa4>] (dump_stack) from [<802025f8>] (panic+0x120/0x374) [ 3588.742323][ T2539] [<802024d8>] (panic) from [<802619e8>] (get_taint+0x0/0x1c) [ 3588.742548][ T2539] r3:8280c604 r2:00000001 r1:8223ea4c r0:8224654c [ 3588.742825][ T2539] r7:804020d0 [ 3588.743174][ T2539] [<80261974>] (check_panic_on_warn) from [<80261b4c>] (__warn+0x80/0x188) [ 3588.743403][ T2539] [<80261acc>] (__warn) from [<80261dcc>] (warn_slowpath_fmt+0x178/0x1f4) [ 3588.743654][ T2539] r8:00000009 r7:8225e3a4 r6:dfb25c44 r5:85271800 r4:00000000 [ 3588.743849][ T2539] [<80261c58>] (warn_slowpath_fmt) from [<804020d0>] (bpf_check+0x2d58/0x2ed4) [ 3588.744128][ T2539] r10:00000002 r9:891c8000 r8:00000004 r7:00000002 r6:00000003 r5:000000c3 [ 3588.744364][ T2539] r4:ffffffff [ 3588.744457][ T2539] [<803ff378>] (bpf_check) from [<803d66d0>] (bpf_prog_load+0x68c/0xc20) [ 3588.744726][ T2539] r10:85271800 r9:8746a330 r8:00000048 r7:dfb25d90 r6:00000000 r5:00000000 [ 3588.744967][ T2539] r4:dfb25ec0 [ 3588.745069][ T2539] [<803d6044>] (bpf_prog_load) from [<803d7e24>] (__sys_bpf+0x578/0x1fd0) [ 3588.745296][ T2539] r10:b5403587 r9:2000e000 r8:00000000 r7:00000000 r6:00000005 r5:dfb25e90 [ 3588.745504][ T2539] r4:00000048 [ 3588.745591][ T2539] [<803d78ac>] (__sys_bpf) from [<803d9e1c>] (sys_bpf+0x2c/0x48) [ 3588.745841][ T2539] r10:00000182 r9:85271800 r8:8020029c r7:00000182 r6:002e6430 r5:00000000 [ 3588.746063][ T2539] r4:00000000 [ 3588.746170][ T2539] [<803d9df0>] (sys_bpf) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3588.746403][ T2539] Exception stack(0xdfb25fa8 to 0xdfb25ff0) [ 3588.746582][ T2539] 5fa0: 00000000 00000000 00000005 2000e000 00000048 00000000 [ 3588.746897][ T2539] 5fc0: 00000000 00000000 002e6430 00000182 002d0000 00000000 00006364 76af90bc [ 3588.747208][ T2539] 5fe0: 76af8ec0 76af8eb0 0001939c 00131f30 [ 3588.748977][ T2539] Rebooting in 86400 seconds.. VM DIAGNOSIS: 21:10:11 Registers: info registers vcpu 0 CPU#0 R00=87a18000 R01=8cbcf84e R02=7ed0e4a1 R03=a2ea7365 R04=85aec540 R05=00000002 R06=20ea99cc R07=00000000 R08=00000002 R09=85d4de00 R10=85a42d00 R11=dfc6de0c R12=dfc6dd40 R13=dfc6ddc0 R14=808ca7a8 R15=81a5c3e0 PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=84317440 R01=00000072 R02=ebe71000 R03=ebe71018 R04=82ab4104 R05=84317440 R06=80a62a28 R07=82ab410f R08=8282a2b8 R09=00000000 R10=000025bb R11=dfb258b0 R12=00000002 R13=dfb258a4 R14=8295b2ec R15=80a62a38 PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000