last executing test programs: 8.646505633s ago: executing program 2 (id=42): r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x75, 0x1c, 0x1, 0x10, 0xfe6, 0x9800, 0xd19a, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x29, 0x2, 0x2, 0xb4, 0x8c, 0xbb, 0x0, [], [{{0x9, 0x5, 0x4, 0x2, 0x10, 0x0, 0xfa}}, {{0x9, 0x5, 0x82, 0x2, 0x40}}]}}]}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000580)={0x44, &(0x7f0000000000)={0x20, 0x24, 0x8, "4f6ad26524461d20"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 5.05631719s ago: executing program 2 (id=52): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x40, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000380), 0x10) readv(r1, &(0x7f00000000c0)=[{&(0x7f00000003c0)=""/115, 0x73}], 0x1) sendmsg$can_bcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="05000000030800"/16, @ANYRES64=0x0, @ANYRES64=0x2710], 0x80}}, 0x0) 5.05055833s ago: executing program 4 (id=53): sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c561e067f0202ff000000020000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000c0c100000000000000003a0", 0x58}], 0x1) 4.769263205s ago: executing program 2 (id=57): r0 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x7, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, 0x0, &(0x7f00000002c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) write$selinux_context(r0, 0x0, 0x0) 4.725192835s ago: executing program 2 (id=59): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x1c916, &(0x7f0000000040)={[{@nobarrier}, {@noblock_validity}, {@nombcache}, {@nouser_xattr}, {@barrier_val={'barrier', 0x3d, 0xc}}, {@noacl}, {@nodiscard}, {@noauto_da_alloc}, {@resgid, 0x32}]}, 0x9b, 0x4d8, &(0x7f0000000a40)="$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") mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000000), 0x0, 0x0) 4.518600648s ago: executing program 4 (id=61): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0x5c, 0x30, 0x1, 0x0, 0x0, {}, [{0x48, 0x1, [@m_ct={0x44, 0x2, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0xffffffff, 0x11e41e7a, 0x20000000, 0x0, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x804}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}, 0x3a}], [], 0x2f}) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000340)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@xino_on}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) chdir(&(0x7f00000003c0)='./bus\x00') r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001fc0)=""/184, 0x20002078) 4.4019265s ago: executing program 0 (id=66): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000400)='signal_generate\x00', r1}, 0x18) r2 = syz_clone(0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x4206, r2) tkill(r2, 0x12) tkill(r2, 0x12) 4.371365101s ago: executing program 3 (id=68): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000850000002300000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r0}, 0x10) setitimer(0x0, &(0x7f0000000580)={{0x0, 0xea60}, {0x0, 0x2710}}, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) mkdir(&(0x7f0000000140)='./control\x00', 0x5) close(r1) r2 = inotify_init1(0x800) fcntl$setstatus(r1, 0x4, 0x2c00) r3 = gettid() fcntl$setown(r1, 0x8, r3) fcntl$setsig(r2, 0xa, 0xe) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f0000000040)={[0xffffffffffff7ff8]}, 0x0, 0x0, 0x8) inotify_add_watch(r2, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') 4.326825432s ago: executing program 0 (id=69): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000280)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0500000004000000080000000100000000000000", @ANYRES32, @ANYBLOB="0000000000ca28000000faffffff000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_emit_ethernet(0x5e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f00000001c0)={[{@grpquota}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x800}}, {@quota}]}, 0x1, 0x4fa, &(0x7f00000005c0)="$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") quotactl$Q_SETQUOTA(0xffffffff80000801, 0x0, 0x0, 0x0) r5 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12013f00000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581"], 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) syz_usb_control_io$hid(r5, &(0x7f0000000080)={0x24, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x22, 0xf, {[@main=@item_4={0x3, 0x0, 0x8, '\t\x00'}, @local=@item_4={0x3, 0x2, 0x0, "93bf0280"}, @main=@item_4={0x3, 0x0, 0x9, "7488dffc"}]}}, 0x0}, 0x0) syz_open_dev$hiddev(&(0x7f0000000540), 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000003480)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), 0xffffffffffffffff) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000140)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) 2.48643823s ago: executing program 1 (id=70): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="0b0000000500000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r3 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000000), r2) ioctl$HIDIOCGFIELDINFO(r3, 0xc038480a, &(0x7f0000000040)={0xffffffff, 0xffffffff, 0x0, 0xfff, 0x8, 0x8, 0x10002, 0x1, 0x61, 0x7fff, 0xfffff02c, 0x401, 0x750, 0x3201}) write$selinux_load(r2, &(0x7f0000000000)=ANY=[], 0x6000) 2.486009011s ago: executing program 4 (id=71): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="620af8ffa1dc0021bfa100000000000007010000f8ffffffb702000007000000bd120000000000008500000010000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24561f1b2607995daa"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x20181, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000001200)=[@text64={0x40, 0x0}], 0x1, 0x48, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000640)=0x4) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000140)=@arm64={0x41, 0x3, 0x3, '\x00', 0x8}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2.470269661s ago: executing program 3 (id=72): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x183081, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd"], 0x280) 2.412527201s ago: executing program 2 (id=73): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a01080000000000000000020000000900020073797a310000000008000440000000000900010073797a3000"], 0x64}}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x181040, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000240)=@x86={0x10, 0x8, 0x5, 0x0, 0x3, 0x2, 0x6, 0x1, 0x0, 0xca, 0x6, 0x1, 0x0, 0x278c, 0x4, 0x3, 0x7, 0x5, 0x10, '\x00', 0x28, 0x80000001}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x4, 0x25e, 0x7, 0x4, 0x6d, 0x1, 0x2, 0xffffffff, 0xde, 0x9c7b, 0x1, 0xfff, 0x6, 0x6, 0xffffffffffffffff, 0x4], 0x1000, 0x41354}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2.321072173s ago: executing program 1 (id=74): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000002c0000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) r2 = getuid() syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x0, &(0x7f0000000580)={[], [{@euid_lt}, {@uid_gt={'uid>', r2}}, {@smackfshat}, {@euid_eq}, {@fowner_eq={'fowner', 0x3d, r2}}, {@smackfsroot={'smackfsroot', 0x3d, 'syz1\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x30, 0x34, 0x32, 0x61, 0x32, 0x63, 0x37], 0x2d, [0x34, 0x32, 0x34, 0x38], 0x2d, [0x38, 0x38, 0x31, 0x63], 0x2d, [0x63, 0x45da5408f4ef4cab, 0x37, 0x33], 0x2d, [0x33, 0x33, 0x63, 0x66, 0x63, 0x32, 0x64, 0x34]}}}, {@fsuuid={'fsuuid', 0x3d, {[0x63, 0x35, 0x62, 0x36, 0x35, 0x65, 0x35, 0x37], 0x2d, [0x32, 0x39, 0x33, 0x32], 0x2d, [0x39, 0x30, 0x39, 0x31], 0x2d, [0x38, 0x35, 0x35, 0x39], 0x2d, [0x5214928204d30051, 0x35, 0x36, 0x61, 0x32, 0x61, 0x31, 0x39]}}}, {@fsname={'fsname', 0x3d, 'er{pan0\x00'}}, {@fowner_eq}]}, 0x1, 0x787, &(0x7f0000001000)="$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") r3 = openat$uhid(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$UHID_CREATE(r3, &(0x7f00000002c0)={0x0, {'syz1\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000540)=""/32, 0x20}}, 0x120) 2.238941855s ago: executing program 3 (id=75): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) socketpair$unix(0x1, 0x2, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r4}, 0x18) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x48) close(0xffffffffffffffff) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', 0x0, 0x0, 0x0) r5 = socket(0x10, 0x3, 0x0) connect$netlink(r5, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x88e, &(0x7f0000000080)={[{@errors_remount}, {@mblk_io_submit}, {@inlinecrypt}, {@test_dummy_encryption_v1}, {@barrier}, {@mblk_io_submit}, {@nogrpid}]}, 0x3, 0x44d, &(0x7f0000000c80)="$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") link(0x0, 0x0) 2.238754934s ago: executing program 4 (id=76): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000380)='sys_enter\x00', r1}, 0x10) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, 0x6e) ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) getpgid(0xffffffffffffffff) 2.203944835s ago: executing program 4 (id=77): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xe, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x4d}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) 1.942406739s ago: executing program 2 (id=78): sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000100)=ANY=[@ANYBLOB="30000000020301020000000000000000000000000800034000000000090002000000000002000000080001"], 0x30}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='@\x00\x00', @ANYBLOB="00db00000040"], 0x40}}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.io_merged_recursive\x00', 0x275a, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000100)=ANY=[@ANYBLOB="000002f0d31209000000bc2e79e995"], 0x0) write$binfmt_script(r2, &(0x7f0000000100), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) preadv(r2, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffff23}], 0x3e, 0x0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd600a847500140600fe8000"/34, @ANYRES32=0x41424344], 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20040080}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000040)=[@text16={0x10, &(0x7f0000000180)="66b9800000c00f326635000800000f300f0f1c9a65660ff3b20618baa000ec672e660f38803d004000000f285473f61366b9800000c00f326635004000000f300f20e06635800000000f22e0f30fa6c8", 0x50}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20004000}, 0x14) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000004c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) 1.8895216s ago: executing program 4 (id=79): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x56a, 0x323, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x6}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f00000003c0)={0x2c, &(0x7f0000000100)=ANY=[@ANYBLOB="000008000000080482"], 0x0, 0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.732147783s ago: executing program 32 (id=78): sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000100)=ANY=[@ANYBLOB="30000000020301020000000000000000000000000800034000000000090002000000000002000000080001"], 0x30}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='@\x00\x00', @ANYBLOB="00db00000040"], 0x40}}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.io_merged_recursive\x00', 0x275a, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000100)=ANY=[@ANYBLOB="000002f0d31209000000bc2e79e995"], 0x0) write$binfmt_script(r2, &(0x7f0000000100), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) preadv(r2, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffff23}], 0x3e, 0x0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd600a847500140600fe8000"/34, @ANYRES32=0x41424344], 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20040080}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000040)=[@text16={0x10, &(0x7f0000000180)="66b9800000c00f326635000800000f300f0f1c9a65660ff3b20618baa000ec672e660f38803d004000000f285473f61366b9800000c00f326635004000000f300f20e06635800000000f22e0f30fa6c8", 0x50}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20004000}, 0x14) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000004c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) 1.175902731s ago: executing program 0 (id=81): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0xffff}, 0x6) 1.005455634s ago: executing program 1 (id=82): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="01000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f00000001c0), &(0x7f0000000240)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) sync() unshare(0x40000000) 905.113675ms ago: executing program 0 (id=83): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000600)='sys_enter\x00', r1}, 0x10) rt_sigpending(0x0, 0x0) 834.259957ms ago: executing program 3 (id=84): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="0b00000005000000000400000d"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r3 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000000), r2) ioctl$HIDIOCGFIELDINFO(r3, 0xc038480a, &(0x7f0000000040)={0xffffffff, 0xffffffff, 0x0, 0xfff, 0x8, 0x8, 0x10002, 0x1, 0x61, 0x7fff, 0xfffff02c, 0x401, 0x750, 0x3201}) write$selinux_load(r2, &(0x7f0000000000)=ANY=[], 0x6000) 808.490827ms ago: executing program 0 (id=85): socket$inet6(0xa, 0x3, 0xd) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x24) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="02"], 0x38}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="020100090e"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) 769.113297ms ago: executing program 0 (id=86): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) socket$nl_route(0x10, 0x3, 0x0) syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000000)={{0x12, 0x1, 0x300, 0x0, 0x0, 0x0, 0x10, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x8, 0x60, 0xc, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x7, 0x1, 0x2, 0x0, "", {{{0x9, 0x5, 0x1, 0x2, 0x3ef, 0x4, 0x3, 0x4}}}}}]}}]}}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0}) 768.397958ms ago: executing program 3 (id=87): socket$packet(0x11, 0x2, 0x300) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=@delchain={0x24, 0x2a, 0x7d1cdc3e828018e9, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0xf}, {0x0, 0xffff}}}, 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x0, &(0x7f0000000280), 0x1, 0x787, &(0x7f0000001000)="$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") creat(&(0x7f0000000300)='./bus\x00', 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x185102, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000000)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r4}, 0x18) close(r2) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2d, 0x0, 0x0, 0x0, 0x80000010, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb01001800000000000000440000004400000002000000000000000100000d0000000000000000030000000000000000000003000000000200000003000000000000000000000001000004000000000000000002"], 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r2, 0x40047451, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r6 = socket$inet6(0xa, 0x1, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f0000000300)={'batadv_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r6, 0x890c, &(0x7f0000000640)={@remote, @loopback, @private2={0xfc, 0x2, '\x00', 0x6}, 0x40000, 0x40, 0x2, 0x100, 0x0, 0x40180043, r8}) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) syz_emit_ethernet(0x7e, &(0x7f00000003c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60fb6809001b2f00fc020000000000000000000000000000ff020000000000000000000000000001"], 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/153, 0x78, 0x99, 0x1, 0x6, 0x10000, @value}, 0x28) 663.906409ms ago: executing program 1 (id=88): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) lseek(r0, 0xc6c3, 0x500000000000000) 663.659969ms ago: executing program 1 (id=89): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r2 = socket(0x1e, 0x5, 0x0) listen(r2, 0x0) 604.42722ms ago: executing program 1 (id=90): socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x8c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x3c, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_DST={0x10, 0xd, 0x0, 0x1, [@CTA_NAT_PROTO={0xc, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}]}, 0x8c}}, 0x0) fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r4, &(0x7f0000000a80)={0x2020}, 0x2020) 0s ago: executing program 3 (id=91): syz_emit_ethernet(0x4a, &(0x7f0000000300)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "8a9646", 0x14, 0x6, 0x0, @empty, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x7}}}}}}}, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.10.39' (ED25519) to the list of known hosts. [ 21.543800][ T23] audit: type=1400 audit(1743614926.540:66): avc: denied { mounton } for pid=341 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.545337][ T341] cgroup1: Unknown subsys name 'net' [ 21.571361][ T23] audit: type=1400 audit(1743614926.540:67): avc: denied { mount } for pid=341 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.593919][ T341] cgroup1: Unknown subsys name 'net_prio' [ 21.599648][ T341] cgroup1: Unknown subsys name 'devices' [ 21.606569][ T23] audit: type=1400 audit(1743614926.600:68): avc: denied { unmount } for pid=341 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.743147][ T341] cgroup1: Unknown subsys name 'hugetlb' [ 21.748810][ T341] cgroup1: Unknown subsys name 'rlimit' [ 21.950469][ T23] audit: type=1400 audit(1743614926.950:69): avc: denied { setattr } for pid=341 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=9592 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.973568][ T23] audit: type=1400 audit(1743614926.950:70): avc: denied { mounton } for pid=341 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 21.979171][ T344] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 21.998404][ T23] audit: type=1400 audit(1743614926.950:71): avc: denied { mount } for pid=341 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 22.029652][ T23] audit: type=1400 audit(1743614927.000:72): avc: denied { relabelto } for pid=344 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.054891][ T23] audit: type=1400 audit(1743614927.000:73): avc: denied { write } for pid=344 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.080198][ T23] audit: type=1400 audit(1743614927.000:74): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 22.080218][ T341] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.101707][ T23] audit: type=1400 audit(1743614927.010:75): avc: denied { read } for pid=341 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.701417][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.708259][ T352] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.715702][ T352] device bridge_slave_0 entered promiscuous mode [ 22.729360][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.736298][ T352] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.743434][ T352] device bridge_slave_1 entered promiscuous mode [ 22.788156][ T355] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.795020][ T355] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.802401][ T355] device bridge_slave_0 entered promiscuous mode [ 22.808834][ T354] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.815806][ T354] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.823086][ T354] device bridge_slave_0 entered promiscuous mode [ 22.833032][ T354] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.839869][ T354] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.847445][ T354] device bridge_slave_1 entered promiscuous mode [ 22.870097][ T355] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.877003][ T355] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.884283][ T355] device bridge_slave_1 entered promiscuous mode [ 22.912499][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.919361][ T353] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.926789][ T353] device bridge_slave_0 entered promiscuous mode [ 22.943733][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.950649][ T353] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.957992][ T353] device bridge_slave_1 entered promiscuous mode [ 22.991844][ T356] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.998789][ T356] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.006370][ T356] device bridge_slave_0 entered promiscuous mode [ 23.016634][ T356] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.023555][ T356] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.031035][ T356] device bridge_slave_1 entered promiscuous mode [ 23.178758][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.185634][ T352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.192773][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.199516][ T352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.220410][ T355] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.227265][ T355] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.234432][ T355] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.241275][ T355] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.261343][ T354] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.268186][ T354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.275361][ T354] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.282195][ T354] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.316408][ T356] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.323277][ T356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.330497][ T356] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.337324][ T356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.366438][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.373297][ T353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.380460][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.387292][ T353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.415455][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.424750][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.432993][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.441152][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.449181][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.458023][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.465278][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.472496][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.479598][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.486656][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.493743][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.501892][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.509132][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.522484][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.539399][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.552511][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.572015][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.580944][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.587771][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.595478][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.603880][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.610759][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.617914][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.644719][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.652618][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.669196][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.677636][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.686235][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.693080][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.701735][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.709903][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.717966][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.724809][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.741241][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.748604][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.755982][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.764647][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.772862][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.779676][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.801820][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.810009][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.818196][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.825163][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.833448][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.841746][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.849817][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.857864][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.867014][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.874990][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.906226][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.914482][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.922628][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.930453][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.938306][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.946313][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.955111][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.963186][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.970990][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.979069][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.987260][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.995063][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.002997][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.011111][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.038186][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.046444][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.054828][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.063644][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.071487][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.079675][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.088752][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.097069][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.125266][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.133511][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.141556][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.149655][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.158916][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.167263][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.176191][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.184674][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.192966][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.200828][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.208447][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.216394][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.227227][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.235442][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.255872][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.264585][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.277856][ T352] request_module fs-gadgetfs succeeded, but still no fs? [ 24.292187][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.300529][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.323956][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.332659][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.363886][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.372351][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.381818][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.390217][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.398519][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.406953][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.437606][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.461333][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.480760][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.488887][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.497414][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.506000][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.520875][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.529123][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.705450][ T391] SELinux: failed to load policy [ 24.850427][ T378] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 24.968723][ T411] netlink: 'syz.0.7': attribute type 13 has an invalid length. [ 25.024848][ T411] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.031972][ T411] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.240272][ T378] usb 4-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 25.255534][ T378] usb 4-1: config 1 has 1 interface, different from the descriptor's value: 2 [ 25.274448][ T378] usb 4-1: config 1 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 25.320258][ T13] usb 5-1: new full-speed USB device number 2 using dummy_hcd [ 25.363607][ T439] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 25.441104][ T411] syz.0.7 (411) used greatest stack depth: 21144 bytes left [ 25.470462][ T378] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 25.479433][ T378] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 25.488359][ T378] usb 4-1: Product: syz [ 25.493388][ T378] usb 4-1: Manufacturer: syz [ 25.497831][ T378] usb 4-1: SerialNumber: syz [ 25.819112][ T378] cdc_ncm 4-1:1.0: skipping garbage [ 25.825847][ T378] cdc_ncm 4-1:1.0: bind() failure [ 25.862296][ T444] EXT4-fs (loop2): Test dummy encryption mode enabled [ 25.868967][ T444] EXT4-fs (loop2): Ignoring removed orlov option [ 25.970583][ T444] EXT4-fs (loop2): mounted filesystem without journal. Opts: abort,noauto_da_alloc,dioread_nolock,test_dummy_encryption,orlov,nojournal_checksum,minixdf,debug_want_extra_isize=0x0000000000000040,,errors=continue [ 26.293668][ T13] usb 5-1: config 0 has no interfaces? [ 26.295616][ T18] usb 4-1: USB disconnect, device number 2 [ 26.585541][ T441] sched: RT throttling activated [ 26.787760][ T23] kauditd_printk_skb: 47 callbacks suppressed [ 26.787817][ T23] audit: type=1400 audit(1743614931.770:123): avc: denied { create } for pid=456 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 26.933016][ T23] audit: type=1400 audit(1743614931.780:124): avc: denied { setopt } for pid=456 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 26.960208][ T23] audit: type=1400 audit(1743614931.780:125): avc: denied { bind } for pid=456 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 26.983765][ T13] usb 5-1: New USB device found, idVendor=0499, idProduct=6bb7, bcdDevice=68.2f [ 26.993179][ T463] SELinux: failed to load policy [ 27.000323][ T13] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 27.008175][ T13] usb 5-1: Product: syz [ 27.012561][ T13] usb 5-1: Manufacturer: syz [ 27.016972][ T13] usb 5-1: SerialNumber: syz [ 27.025619][ T23] audit: type=1326 audit(1743614932.020:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=466 comm="syz.3.20" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fce685a5169 code=0x7ffc0000 [ 27.050036][ T13] usb 5-1: config 0 descriptor?? [ 27.114526][ T23] audit: type=1326 audit(1743614932.020:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=466 comm="syz.3.20" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fce685a5169 code=0x7ffc0000 [ 27.165330][ T23] audit: type=1326 audit(1743614932.060:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=466 comm="syz.3.20" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fce685a5169 code=0x7ffc0000 [ 27.211234][ T23] audit: type=1326 audit(1743614932.060:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=466 comm="syz.3.20" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fce685a5169 code=0x7ffc0000 [ 27.257005][ T23] audit: type=1326 audit(1743614932.060:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=466 comm="syz.3.20" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fce685a5169 code=0x7ffc0000 [ 27.294475][ T13] usb 5-1: USB disconnect, device number 2 [ 27.303732][ T23] audit: type=1326 audit(1743614932.060:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=466 comm="syz.3.20" exe="/root/syz-executor" sig=0 arch=c000003e syscall=155 compat=0 ip=0x7fce685a5169 code=0x7ffc0000 [ 27.312053][ T473] FAT-fs (loop3): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 27.410207][ T23] audit: type=1326 audit(1743614932.060:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=466 comm="syz.3.20" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fce685a5169 code=0x7ffc0000 [ 27.663839][ T469] F2FS-fs (loop2): Invalid log_blocksize (268), supports only 12 [ 27.672375][ T469] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 27.685960][ T469] F2FS-fs (loop2): invalid crc value [ 27.715154][ T469] F2FS-fs (loop2): Found nat_bits in checkpoint [ 27.764588][ T469] F2FS-fs (loop2): Try to recover 1th superblock, ret: 0 [ 27.771555][ T469] F2FS-fs (loop2): Mounted with checkpoint version = 48b305e5 [ 27.815385][ T459] F2FS-fs (loop1): Invalid log_blocksize (32), supports only 12 [ 27.837344][ T459] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 27.875228][ T459] F2FS-fs (loop1): Found nat_bits in checkpoint [ 27.903353][ T484] F2FS-fs (loop3): Invalid log_blocksize (268), supports only 12 [ 27.931690][ T484] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 27.953981][ T484] F2FS-fs (loop3): invalid crc value [ 27.959904][ T9] F2FS-fs (loop2): f2fs_check_nid_range: out-of-range nid=1, run fsck to fix. [ 27.968933][ T9] F2FS-fs (loop2): f2fs_check_nid_range: out-of-range nid=2, run fsck to fix. [ 27.972344][ T459] F2FS-fs (loop1): Try to recover 1th superblock, ret: 0 [ 27.985269][ T459] F2FS-fs (loop1): Mounted with checkpoint version = 48b305e5 [ 27.985282][ T484] F2FS-fs (loop3): Found nat_bits in checkpoint [ 28.114562][ T484] F2FS-fs (loop3): Try to recover 1th superblock, ret: 0 [ 28.123525][ T484] F2FS-fs (loop3): Mounted with checkpoint version = 48b305e5 [ 29.105803][ T514] SELinux: failed to load policy [ 29.311927][ T526] EXT4-fs: Warning: mounting with data=journal disables delayed allocation and O_DIRECT support! [ 29.327021][ T529] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 29.339863][ T526] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 29.355936][ T526] EXT4-fs (loop0): Unsupported blocksize for fs encryption [ 29.369620][ T529] FAT-fs (loop5): unable to read boot sector [ 30.482145][ T550] [ 30.484349][ T550] ********************************************************** [ 30.491561][ T550] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 30.498767][ T550] ** ** [ 30.505971][ T550] ** trace_printk() being used. Allocating extra memory. ** [ 30.513162][ T550] ** ** [ 30.520364][ T550] ** This means that this is a DEBUG kernel and it is ** [ 30.527562][ T550] ** unsafe for production use. ** [ 30.534783][ T550] ** ** [ 30.542007][ T550] ** If you see this message and you are not debugging ** [ 30.549177][ T550] ** the kernel, report this immediately to your vendor! ** [ 30.556393][ T550] ** ** [ 30.563594][ T550] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 30.570807][ T550] ********************************************************** [ 30.957546][ T553] SELinux: failed to load policy [ 31.041228][ T379] usb 3-1: new full-speed USB device number 2 using dummy_hcd [ 31.374763][ T561] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=561 comm=syz.4.47 [ 31.386801][ T561] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=561 comm=syz.4.47 [ 31.920170][ T568] usb usb1: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 32.176255][ T570] process 'syz.0.48' launched '/dev/fd/8' with NULL argv: empty string added [ 32.188913][ T570] bridge0: port 3(dummy0) entered blocking state [ 32.195284][ T570] bridge0: port 3(dummy0) entered disabled state [ 32.202654][ T570] device dummy0 entered promiscuous mode [ 32.310258][ T23] kauditd_printk_skb: 83 callbacks suppressed [ 32.310307][ T23] audit: type=1400 audit(1743614936.890:216): avc: denied { append } for pid=563 comm="syz.1.49" name="001" dev="devtmpfs" ino=10674 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 32.742893][ T23] audit: type=1400 audit(1743614937.170:217): avc: denied { execute } for pid=566 comm="syz.0.48" dev="tmpfs" ino=13727 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 32.777972][ T23] audit: type=1400 audit(1743614937.180:218): avc: denied { execute_no_trans } for pid=566 comm="syz.0.48" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=13727 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 32.821347][ T23] audit: type=1400 audit(1743614937.180:219): avc: denied { name_bind } for pid=566 comm="syz.0.48" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 32.869061][ T23] audit: type=1400 audit(1743614937.180:220): avc: denied { node_bind } for pid=566 comm="syz.0.48" saddr=224.0.0.1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 32.910249][ T379] usb 3-1: device descriptor read/all, error -71 [ 33.081646][ T23] audit: type=1326 audit(1743614938.070:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=575 comm="syz.2.52" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f701359c169 code=0x7ffc0000 [ 33.144345][ T23] audit: type=1326 audit(1743614938.070:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=575 comm="syz.2.52" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f701359c169 code=0x7ffc0000 [ 33.182353][ T23] audit: type=1326 audit(1743614938.080:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=575 comm="syz.2.52" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f701359c169 code=0x7ffc0000 [ 33.210771][ T23] audit: type=1326 audit(1743614938.080:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=575 comm="syz.2.52" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f701359c169 code=0x7ffc0000 [ 33.233817][ T23] audit: type=1326 audit(1743614938.080:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=575 comm="syz.2.52" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f701359c169 code=0x7ffc0000 [ 33.386670][ T593] SELinux: failed to load policy [ 33.474503][ T596] EXT4-fs (loop2): Mount option "nouser_xattr" will be removed by 3.5 [ 33.474503][ T596] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 33.474503][ T596] [ 33.568053][ T596] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 33.568053][ T596] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 33.568053][ T596] [ 33.590962][ T599] netlink: 'syz.0.56': attribute type 13 has an invalid length. [ 33.597920][ T596] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 33.737506][ T596] [EXT4 FS bs=4096, gc=1, bpg=3008, ipg=32, mo=80032019, mo2=0000] [ 33.762653][ T596] EXT4-fs (loop2): 1 truncate cleaned up [ 33.768827][ T596] EXT4-fs (loop2): mounted filesystem without journal. Opts: nobarrier,noblock_validity,nombcache,nouser_xattr,barrier=0x000000000000000c,noacl,nodiscard,noauto_da_alloc,resgid=0x00000000000000002,errors=continue [ 34.070312][ T627] overlayfs: overlapping lowerdir path [ 35.632516][ T596] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:864: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 35.665933][ T354] EXT4-fs error (device loop2): ext4_ext_check_inode:543: inode #11: comm syz-executor: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 35.715998][ T628] EXT4-fs (loop0): mounted filesystem without journal. Opts: grpquota,inode_readahead_blks=0x0000000000000800,quota,,errors=continue [ 35.729656][ T628] ext4 filesystem being mounted at /20/bus supports timestamps until (%ptR?) (0x7fffffff) [ 35.731463][ T633] SELinux: failed to load policy [ 35.753196][ T354] EXT4-fs error (device loop2): ext4_ext_check_inode:543: inode #11: comm syz-executor: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 35.800759][ T354] EXT4-fs error (device loop2): ext4_free_inode:345: comm syz-executor: bit already cleared for inode 15 [ 35.813404][ T354] EXT4-fs error (device loop2) in ext4_free_inode:352: Corrupt filesystem [ 35.896911][ T644] EXT4-fs (loop1): Unrecognized mount option "euid<00000000000000000000" or missing value [ 35.939201][ T354] syz-executor (354) used greatest stack depth: 20248 bytes left [ 36.195243][ T652] EXT4-fs (loop3): Ignoring removed mblk_io_submit option [ 36.203165][ T652] EXT4-fs (loop3): Test dummy encryption mode enabled [ 36.209833][ T652] EXT4-fs (loop3): Ignoring removed mblk_io_submit option [ 36.216902][ T652] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 36.228519][ T652] EXT4-fs (loop3): Unsupported blocksize for fs encryption [ 36.666122][ T421] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 36.699346][ T421] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 36.707335][ T105] usb 5-1: new high-speed USB device number 3 using dummy_hcd [ 36.747380][ T421] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 36.960738][ T421] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 36.968251][ T421] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 36.996395][ T421] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 37.011948][ T421] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 37.019217][ T421] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 37.026679][ T421] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 37.034104][ T421] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 37.041532][ T421] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 37.048690][ T421] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 37.056134][ T421] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 37.063530][ T105] usb 5-1: Using ep0 maxpacket: 16 [ 37.068450][ T421] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 37.075817][ T421] hid-generic 0000:0000:0000.0001: unknown main item tag 0x1 [ 37.083047][ T421] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 37.090196][ T421] hid-generic 0000:0000:0000.0001: item fetching failed at offset 20/32 [ 37.098507][ T421] hid-generic: probe of 0000:0000:0000.0001 failed with error -22 [ 37.180302][ T105] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 37.192783][ T105] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 37.202800][ T105] usb 5-1: New USB device found, idVendor=056a, idProduct=0323, bcdDevice= 0.00 [ 37.213087][ T105] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 37.238038][ T659] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.244995][ T659] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.252719][ T659] device bridge_slave_0 entered promiscuous mode [ 37.259804][ T659] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.267016][ T659] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.274968][ T659] device bridge_slave_1 entered promiscuous mode [ 37.296170][ T105] usb 5-1: config 0 descriptor?? [ 37.323960][ T673] SELinux: failed to load policy [ 37.424258][ T659] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.432001][ T659] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.439123][ T659] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.446034][ T659] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.451369][ T678] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 37.472854][ T23] kauditd_printk_skb: 36 callbacks suppressed [ 37.472866][ T23] audit: type=1326 audit(1743614942.470:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=685 comm="syz.1.89" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d60fd1169 code=0x7ffc0000 [ 37.522133][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 37.522948][ T23] audit: type=1326 audit(1743614942.470:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=685 comm="syz.1.89" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d60fd1169 code=0x7ffc0000 [ 37.554423][ T23] audit: type=1326 audit(1743614942.470:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=685 comm="syz.1.89" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f7d60fd1169 code=0x7ffc0000 [ 37.555329][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.577420][ T23] audit: type=1326 audit(1743614942.470:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=685 comm="syz.1.89" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d60fd1169 code=0x7ffc0000 [ 37.607481][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.615286][ T23] audit: type=1326 audit(1743614942.470:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=685 comm="syz.1.89" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d60fd1169 code=0x7ffc0000 [ 37.638893][ T23] audit: type=1326 audit(1743614942.470:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=685 comm="syz.1.89" exe="/root/syz-executor" sig=0 arch=c000003e syscall=50 compat=0 ip=0x7f7d60fd1169 code=0x7ffc0000 [ 37.662214][ T23] audit: type=1400 audit(1743614942.470:266): avc: denied { listen } for pid=685 comm="syz.1.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 37.690829][ T23] audit: type=1326 audit(1743614942.470:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=685 comm="syz.1.89" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d60fd1169 code=0x7ffc0000 [ 37.690898][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.714048][ T23] audit: type=1326 audit(1743614942.470:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=685 comm="syz.1.89" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d60fd1169 code=0x7ffc0000 [ 37.723002][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.745185][ T23] audit: type=1400 audit(1743614942.470:269): avc: denied { write open } for pid=677 comm="syz.3.87" path="/20/file1/bus" dev="loop3" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 37.751286][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.751870][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.790018][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.797037][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.830765][ T105] wacom 0003:056A:0323.0002: item fetching failed at offset 5/6 [ 37.840038][ T105] wacom 0003:056A:0323.0002: parse failed [ 37.848098][ T105] wacom: probe of 0003:056A:0323.0002 failed with error -22 [ 38.042396][ T105] usb 5-1: USB disconnect, device number 3 [ 38.067465][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 38.077961][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 38.096334][ T355] EXT4-fs error (device loop3): ext4_readdir:260: inode #2: block 16: comm syz-executor: path /20/file1: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=2048 fake=0 [ 38.103312][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 38.127821][ T683] ------------[ cut here ]------------ [ 38.133097][ T683] kernel BUG at fs/buffer.c:3027! [ 38.138253][ T683] invalid opcode: 0000 [#1] PREEMPT SMP KASAN SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 38.144210][ T683] CPU: 0 PID: 683 Comm: kmmpd-loop3 Not tainted 5.4.290-syzkaller-00002-g41adfeb3d639 #0 [ 38.153845][ T683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 38.163754][ T683] RIP: 0010:submit_bh_wbc+0x831/0x850 [ 38.168964][ T683] Code: 10 80 e1 07 80 c1 03 38 c1 0f 8c 14 fe ff ff 48 8b 7c 24 10 e8 00 88 ea ff e9 05 fe ff ff e8 d6 9d ba ff 0f 0b e8 cf 9d ba ff <0f> 0b e8 c8 9d ba ff 0f 0b e8 c1 9d ba ff 0f 0b e8 ba 9d ba ff 0f [ 38.188498][ T683] RSP: 0018:ffff8881e2577bf0 EFLAGS: 00010293 [ 38.194381][ T683] RAX: ffffffff81a9ad31 RBX: 0000000000000000 RCX: ffff8881e2441f80 [ 38.202345][ T683] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 38.210159][ T683] RBP: 0000000000003800 R08: ffffffff81a9a5a4 R09: ffffed103d3c52be [ 38.217970][ T683] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 38.225777][ T683] R13: ffff8881e9e295e8 R14: 0000000000000001 R15: 0000000000000000 [ 38.233591][ T683] FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 38.242363][ T683] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 38.248778][ T683] CR2: 000055ebc793a248 CR3: 00000001d6a8c000 CR4: 00000000003406b0 [ 38.256585][ T683] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 38.264540][ T683] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 38.272389][ T683] Call Trace: [ 38.275519][ T683] ? __die+0xb4/0x100 [ 38.279328][ T683] ? die+0x26/0x50 [ 38.282904][ T683] ? do_trap+0x1e7/0x340 [ 38.286966][ T683] ? submit_bh_wbc+0x831/0x850 [ 38.291574][ T683] ? submit_bh_wbc+0x831/0x850 [ 38.296178][ T683] ? do_invalid_op+0xfb/0x110 [ 38.300683][ T683] ? submit_bh_wbc+0x831/0x850 [ 38.305279][ T683] ? invalid_op+0x1e/0x30 [ 38.309458][ T683] ? submit_bh_wbc+0xa4/0x850 [ 38.313965][ T683] ? submit_bh_wbc+0x831/0x850 [ 38.318651][ T683] ? submit_bh_wbc+0x831/0x850 [ 38.323248][ T683] ? debug_smp_processor_id+0x20/0x20 [ 38.328638][ T683] submit_bh+0x21/0x30 [ 38.332541][ T683] write_mmp_block+0x3ff/0x5b0 [ 38.337123][ T683] ? console_conditional_schedule+0x10/0x10 [ 38.342862][ T683] ? check_preemption_disabled+0x9f/0x320 [ 38.348403][ T683] ? read_mmp_block+0x8a0/0x8a0 [ 38.353176][ T683] kmmpd+0x7de/0xa10 [ 38.356911][ T683] ? write_mmp_block+0x5b0/0x5b0 [ 38.361676][ T683] ? __wake_up_locked+0xb7/0x110 [ 38.366449][ T683] ? __kthread_parkme+0xb0/0x1b0 [ 38.371226][ T683] kthread+0x2da/0x360 [ 38.375132][ T683] ? write_mmp_block+0x5b0/0x5b0 [ 38.379912][ T683] ? kthread_blkcg+0xd0/0xd0 [ 38.384332][ T683] ret_from_fork+0x1f/0x30 [ 38.388583][ T683] Modules linked in: [ 38.396379][ T683] ---[ end trace 1ebf948b1baa522b ]--- [ 38.401808][ T683] RIP: 0010:submit_bh_wbc+0x831/0x850 [ 38.406994][ T683] Code: 10 80 e1 07 80 c1 03 38 c1 0f 8c 14 fe ff ff 48 8b 7c 24 10 e8 00 88 ea ff e9 05 fe ff ff e8 d6 9d ba ff 0f 0b e8 cf 9d ba ff <0f> 0b e8 c8 9d ba ff 0f 0b e8 c1 9d ba ff 0f 0b e8 ba 9d ba ff 0f [ 38.427478][ T683] RSP: 0018:ffff8881e2577bf0 EFLAGS: 00010293 [ 38.433406][ T683] RAX: ffffffff81a9ad31 RBX: 0000000000000000 RCX: ffff8881e2441f80 [ 38.441611][ T683] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 38.449403][ T683] RBP: 0000000000003800 R08: ffffffff81a9a5a4 R09: ffffed103d3c52be [ 38.457432][ T683] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 38.467202][ T683] R13: ffff8881e9e295e8 R14: 0000000000000001 R15: 0000000000000000 [ 38.475197][ T683] FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 38.483989][ T683] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 38.490379][ T683] CR2: 000055ebc793a248 CR3: 0000000005e0e000 CR4: 00000000003406b0 [ 38.498177][ T683] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 38.506984][ T683] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 38.515683][ T683] Kernel panic - not syncing: Fatal exception [ 38.521765][ T683] Kernel Offset: disabled [ 38.525890][ T683] Rebooting in 86400 seconds..