last executing test programs: 3.312196138s ago: executing program 3 (id=180): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x2800715, &(0x7f0000000540)={[], [{@uid_lt}, {@dont_appraise}, {@fowner_lt}, {@dont_hash}, {@context={'context', 0x3d, 'user_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x34, 0x65, 0x33, 0x63, 0x35, 0x39, 0x64], 0x2d, [0x66, 0x34, 0x32, 0x63], 0x2d, [0x65, 0x31, 0x35, 0x37], 0x2d, [0x33, 0x33, 0x38, 0x37], 0x2d, [0x39, 0x35, 0x34, 0x39, 0x35, 0x0, 0x35, 0x31]}}}]}, 0xee, 0x43e, &(0x7f00000008c0)="$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") ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x101480, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x280000b, 0x28011, r0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000200)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r1, 0xae9a) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000140)) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) r3 = getpid() process_vm_readv(r3, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) ioprio_get$uid(0x3, 0xffffffffffffffff) syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101301) syz_open_dev$usbfs(&(0x7f00000000c0), 0x8000000004a4, 0x0) 3.047080178s ago: executing program 3 (id=184): connect$unix(0xffffffffffffffff, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000200)='\xc0\x87:*\x18\xc1k\xa7\x87[\xa0o8\xaaK\xa5\xd3\v\x86\xca<\x7f\xfd6\x8d}\xd8\xf2G\xb8\xeae)\x90\x86\xe3\x96\b\xe0\xfa\xb1\xd8N\xb2W\xcb\x8d}3lm8\xa57\xc9\x00HOA\xc8\x80kR\xfc\xcb%u3\xec\xde%\x00\xb1\x9aF\xe2\xba[\xc7%\x88 \xeeQR\x9f\x81\x8b\xdc\xc7\xdc\xdem\xbe\x7f2\x11)W\x9c\x82\x91\x17\xd8\xda@4\x9f\xc5\xe3\x8d.\xd1=\xcf\xbf\x81\xb5\x8d%K\x1d\xe7_\xde\x87\xdd\xc1\xf0\x91\x1a!\x9c\xd3\v\xc9\x95d\xe3*\xa9\xfa\x99\x9d\xb8\x89>\xc9\xf2/\x13{\x1a\x7f\x00\x00\x00\x00+$\xedX\xb7KV\x90\xc3D\x82`\xea\x16\xc6\xcef\xab\x05\x19\x96\xb9_6*-\xf3\x8c\x9a\x15\x9c\xf5\xb4O\x17@d\x81+\xf6\xe6+\xed\r\xd2\xb3\xaa\x9b\x7fC\'\xa2\xf6\x12\xa1\x15Punfo\x7f\x92G\x0e.\xce\xd8h\xb9p2\xccC\xbaH\xc4\xdc\xe2\xa1%)\x85\xc7O]\'9\x92\xad\xfbJ\x02\x1d\x91-\xc99\t&\xbdq\x06`T\xc8\x92\xaf\xad#\xd8b\x90\xeb\x05\x9f\t5\x06\xdd\xaf\x84\xf4\"\x13\xcf\xe5\x93D\xad~F\xe5\x19\xaa\xaa\xb2\xb1\x03m\x82+\x06\x1bF^\xd3n\xc4F\xc1\xc08\x94\xe6\xe5\x1f\xa7\xf6\xcaA\x90T\x1b\xe6\xb9\xe7\xff\xc5H\x04\x8d\xca\xad\x17UlY\x9a}\r4\xac\x93\xac\v2\xc6\xf9\xbe\xfeI\x8b\xd4/`\xab\x1e\xcf\x7f\b\x94 2.{\xc1\xbe\x9bth~\xcb\xb9E\x10W\xed\xed51[\xc5\xeb\xb1ux\x94\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdem\xe3+q:3\xfa*\x98o\'f\xbcY\x8e?\xf9\x84y\x89Y\x1c]\xad$\x7fp\xf1\xa3\x99[\xff\x1f\x94\xc2\xdb\xbaG\xa6UD\x88Y6\x11Y\xd4\xd1\xde\x9a{]\xe2\x98W\xb9\x13\x17<\x8b!?\x8e\xbc\xae\xf9\xcc\b\x90n\x15\x7f\xd5WS\xfbN\xec)B\xe7R\xa5\xd7O\x83\x80}\xcc5\x99\xdb\xd6\xbd\x9c\x05l\xfc.\xf4\xbbeF\xa3\xea}\xf1\x86z\xca\xad\x82\xd9IRV5\xa77\'\x1a\x1c\x89\xef:\xee\x10\xb2\xd6\xc8\xf4\xb5\xdd\xd8c!@JRY\xa3|Pjk\xdc\xa5d\xc2\xecn\xc9X\xfc\xd4D\x13\"\xb2\x06\xbd&\xf86\xddXv\xc9\x1322L\xd6\x99\xf6\t\x9d\xbeZ\x02\xc0\xa41\xf9sNG\x02\x83\xe6Bl\xd2\x02\xfb[\x82\xc0I\xb7\xf6\xe5Z\xa1}\xee}\x8b\x89\x04\x8a\'\xc7J\xca\xdf:\x8ft\xe0\xf8\a', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x11, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x800000b) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$VT_OPENQRY(r1, 0x891d, &(0x7f00000001c0)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 1.540634806s ago: executing program 3 (id=197): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x2800715, &(0x7f0000000540)={[], [{@uid_lt}, {@dont_appraise}, {@fowner_lt}, {@dont_hash}, {@context={'context', 0x3d, 'user_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x34, 0x65, 0x33, 0x63, 0x35, 0x39, 0x64], 0x2d, [0x66, 0x34, 0x32, 0x63], 0x2d, [0x65, 0x31, 0x35, 0x37], 0x2d, [0x33, 0x33, 0x38, 0x37], 0x2d, [0x39, 0x35, 0x34, 0x39, 0x35, 0x0, 0x35, 0x31]}}}]}, 0xee, 0x43e, &(0x7f00000008c0)="$eJzs281vFOUfAPDvzLbl9wOhFRGlglbR2PjS0oLKwYtGEw+amOgBj7UtpLJQQ2sipNFqDB4NiXfj0cS/wJNejHoy8ap3Q0K0MQE91czsTNku3dKXXRbZzyeZ9Hl2nunzfHfm2XnmeXYD6FpDEdEbEXdFxK8R0R8RSWOBodqfa0sLk38vLUwmsbz8xh9JXu7q0sJkWbQ8bleRGU4j0k+S2sEN5s5fOD1RrU6fK/Kj82feHZ07f+HpmTMTp6ZPTZ8dP3782NGx554df6YlcWZxXR38YPbggVfeuvTa5IlLb//4ddbe/Ydq++vjaJWhLPA/l3ON+x5rdWUdtrsunfR0sCFsSiUistOV5v2/Pypx/eT1x8sfd7RxQFtl96YdzXcvLgN3sCQ63QKgM8obffb8W263aOhxW7jyQu0BKIv7WrHV9vTkz0RRzI+0y1BEnFj854tsizbNQwAA1Ps2G/88tdb4L439deX2FGsoAxFxd0TsjYh7ImJfRNwbkZe9LyLu32T9jUtDN45/0stbCmyDsvHf88Xa1urxXzn6i4FKkdudx9+bnJypTh8p3pPh6N2R5cfWqeO7l375rNm++vFftmX1l2PBoh2Xexom6KYm5idaNSi98lHEYM9a8ScrKwFJRByIiMHN/es9ZWLmia8ONit08/jX0YJ1puUvIx6vnf/FaIi/lKy/Pjn6v6hOHxktr4ob/fTzxdeb1b+t+FsgO/87V1//DSX6/0rq12vnNl/Hxd8+bfpMs9Xrvy95M1+z7itee39ifv7cWERf8mqeX/X6+PVjy3xZPot/+PDa/X9vcUwW/wMRkV3EhyLiwYh4qGj7wxHxSEQcXif+H1589J2tx99eWfxTa37+rVz/A6vP/+YTldPff9Os/o2d/2N5arh4Jf/8u4mNNnA77x0AAAD8V6T5d/+TdGQlnaYjI7Xv8O+LnWl1dm7+yZOz752dqv1GYCB603Kmq79uPnQsWSz+Yy0/XswVl/uPFvPGn1f+n+dHJmerUx2OHbrdrib9P/N7pdOtA9rO77WgezX2/7RD7QBuPfd/6F76P3Qv/R+611r9/8OGvLUAuDO5/0P30v+he+n/0L30f+hK2/ldv0Q3JyK9LZoh0aZEpz+ZAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAWuPfAAAA//8t1+6d") ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x101480, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x280000b, 0x28011, r0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000200)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r1, 0xae9a) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000140)) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) r3 = getpid() process_vm_readv(r3, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) ioprio_get$uid(0x3, 0xffffffffffffffff) syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101301) syz_open_dev$usbfs(&(0x7f00000000c0), 0x8000000004a4, 0x0) 1.415878666s ago: executing program 0 (id=198): write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x81, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r1, &(0x7f0000000480)="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", 0xfffffea5, 0xc000, 0x0, 0xfffffcef) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000003140)=[{&(0x7f0000000d00)=""/4104, 0x1008}], 0x1}}], 0x1, 0x0, 0x0) dup3(r1, r0, 0x0) listen(r0, 0x0) 1.125807419s ago: executing program 2 (id=201): r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x4, @tid=r0}, &(0x7f0000bbdffc)) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) read$char_usb(r1, &(0x7f0000000200)=""/180, 0xb4) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000100)=ANY=[], 0x2b) dup3(r3, r2, 0x0) write$cgroup_devices(0xffffffffffffffff, 0x0, 0x8) rt_sigreturn() futex(&(0x7f0000000700)=0x2, 0x0, 0x2, &(0x7f0000000740)={0x0, 0x3938700}, 0x0, 0x0) rt_sigreturn() timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) mlockall(0x1) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) syz_mount_image$tmpfs(&(0x7f0000004080), &(0x7f0000000000)='./file1\x00', 0x22004, 0x0, 0x0, 0x0, &(0x7f0000000140)) 1.088905495s ago: executing program 3 (id=202): r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) r1 = eventfd(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) write$FUSE_ATTR(r2, &(0x7f0000000240)={0x78, 0xfffffffffffffffe}, 0x78) write$cgroup_devices(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="01202a3a8a"], 0x8) close(r2) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{}, {0x0, 0x3938700}}, 0x0) rt_sigreturn() mknod(&(0x7f0000000040)='./file0\x00', 0x1000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 915.659921ms ago: executing program 2 (id=207): ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) 915.220031ms ago: executing program 3 (id=208): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.kill\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006d00000095"], 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1, 0x7, 0x10001, 0x8}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r2, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETNOCSUM(r5, 0xc0189436, 0x1ffffffe) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@typedef={0x4, 0x0, 0x0, 0x7}, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x0, 0x8}, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}]}, {0x0, [0x0, 0x0, 0x0, 0xda]}}, &(0x7f0000000340)=""/142, 0x52, 0x35b, 0x1}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0x6, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x2, 0x13, &(0x7f0000000300)=@raw=[@printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}, @alu={0x4, 0x1, 0x2, 0x3, 0x7, 0x10, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @jmp={0x5, 0x0, 0x3, 0x1, 0xb, 0x46, 0x4}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}], &(0x7f0000000180)='GPL\x00', 0x3, 0xf2, &(0x7f00000004c0)=""/242, 0x41000, 0x68, '\x00', r3, 0x5, r5, 0x8, &(0x7f00000003c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, r6, r1, 0x5, &(0x7f00000005c0)=[r2], &(0x7f0000000640)=[{0x3, 0x3, 0x8, 0x3}, {0x4, 0x5, 0x10, 0x6}, {0x1, 0x3, 0x2, 0xa}, {0x4, 0x1, 0xc, 0xa}, {0x0, 0x3, 0x6, 0xf}], 0x10, 0x5}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0xc44a, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2000003}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r4}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x2, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000dbefffff0000000000004d3b256626ac116a0000000018110000278d5857fac0caa0", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000600)='ext4_free_blocks\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000600)='ext4_free_blocks\x00', r9}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r10, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r10, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000009000000000000000000000018110000", @ANYRES32, @ANYRES8=0x0], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r0}, 0xd3) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r11}, 0x10) 897.834854ms ago: executing program 2 (id=209): r0 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000680)={{0x77359400}, {0x0, 0x989680}}, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_script(r2, &(0x7f0000000340), 0xffffff46) dup3(r2, r1, 0x0) sendmsg$netlink(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000380)=ANY=[], 0x10}], 0x1}, 0x0) close(r1) rt_sigreturn() poll(0x0, 0x0, 0x64) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) rt_sigreturn() mlockall(0x1) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) pipe2$watch_queue(0x0, 0xb82e336200000000) 825.689475ms ago: executing program 3 (id=210): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x458, 0x153, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0xff, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x7}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000080)={0x0, 0x0, 0x7, {0x7, 0x0, "5bf58d5a1a"}}, 0x0, 0x0, 0x0, 0x0}, 0x0) 784.493651ms ago: executing program 2 (id=211): r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) r1 = eventfd(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) write$FUSE_ATTR(r2, &(0x7f0000000240)={0x78, 0xfffffffffffffffe}, 0x78) write$cgroup_devices(r2, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x8) close(r2) rt_sigreturn() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x3938700}, {0x0, 0x9}}, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) 695.862794ms ago: executing program 2 (id=212): r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/xfrm_stat\x00') syz_mount_image$ext4(&(0x7f0000001140)='ext4\x00', &(0x7f00000007c0)='./file1\x00', 0x410c84, &(0x7f0000000340), 0x1, 0x775, &(0x7f0000001180)="$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") r1 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r1, 0x0) fallocate(r1, 0x0, 0x0, 0x1001f0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'lo\x00'}) fallocate(r1, 0x3, 0x1000, 0x10000) pread64(r0, &(0x7f0000004180)=""/4096, 0x1000, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) r2 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) pwritev2(r2, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x7c000}], 0x1, 0x33000, 0x0, 0x3) 517.262952ms ago: executing program 2 (id=216): ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) readv(r1, 0x0, 0x0) close(r1) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) rt_sigreturn() mlockall(0x1) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) statx(0xffffffffffffffff, 0x0, 0x0, 0x4, 0x0) socket$inet(0x2, 0x0, 0x2) 465.080419ms ago: executing program 0 (id=219): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="240000001a0001000000000000000000020000000000000000000000080019"], 0x24}}, 0x0) 403.970838ms ago: executing program 1 (id=220): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8}]}}}]}, 0x3c}}, 0x0) 403.352088ms ago: executing program 0 (id=222): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x9a, &(0x7f00000004c0)={@local, @empty, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x64, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x19, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @timestamp={0x8, 0xa, 0x80}, @md5sig={0x13, 0x12, "d082e275205e556149a021cc13c33d89"}, @window={0x3, 0x3}, @window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @sack_perm={0x4, 0x2}, @fastopen={0x22, 0xf, "cf6af75d5cdcf048b19c939556"}, @md5sig={0x13, 0x12, "27406263e43d5959a166a23bd1116edc"}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "df1d00", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 403.195258ms ago: executing program 1 (id=223): r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmmsg$inet(r0, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000800)="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", 0x2f5}, {&(0x7f0000000bc0)="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", 0x282}, {&(0x7f00000005c0)="05437c98b91b1455046f57b5fc913814bde2bbeac2104eaea9c9d01a7838d859007067c10aa7352abbdf98e9bf033a4784a11e84639d3b9164d9c5d729f3dd409d39ff6d5cca97", 0x47}, {&(0x7f0000001e80)="f610e61ac81cc3edc86f0500194d27a5a443f10dfd1ecda0fd0ed9a444b7fb76afe3a0002f0a5eafcd3555a6cad574af080de74a37f54ee5f10fe3f42b445293", 0x40}], 0x4, 0x0, 0x0, 0x900}}], 0x2, 0x0) 370.595304ms ago: executing program 1 (id=224): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x2000000, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="c8010000", @ANYRES16=r1, @ANYBLOB="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"], 0x1c8}}, 0x0) 353.620026ms ago: executing program 0 (id=225): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0xbe, &(0x7f0000000440)={@broadcast, @dev, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @dest_unreach={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @dev, @local, {[@rr={0x7, 0x13, 0x0, [@private, @empty, @empty, @private]}, @timestamp_prespec={0x44, 0xc, 0x0, 0x3, 0x0, [{@loopback}]}, @ssrr={0x89, 0xf, 0x0, [@private, @broadcast, @broadcast]}, @timestamp_addr={0x44, 0x4c, 0x0, 0x1, 0x0, [{@initdev={0xac, 0x1e, 0x0, 0x0}}, {@private}, {}, {@local}, {@loopback}, {@private}, {@multicast2}, {@broadcast}, {@broadcast}]}, @timestamp={0x44, 0x4}]}}}}}}}, 0x0) 303.990194ms ago: executing program 1 (id=226): socket$inet_udplite(0x2, 0x2, 0x88) syz_emit_ethernet(0xa2, &(0x7f0000000100)={@local, @multicast, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "3000bb", 0x6c, 0x2b, 0x0, @private1={0xfc, 0x1, '\x00', 0x3}, @local, {[@routing], {0x0, 0x0, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x0, "82f63de64f6ce2ee11028289aefdb3449391a823213e6336516748a7949bb108", "402fa83b1d661c18462075368a186092", {"9ddeb8f71aa23d391b8fa99e9816af2d", "040876a663a86d97f46b9665cc18492b"}}}}}}}}, 0x0) 303.671604ms ago: executing program 0 (id=227): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) sendto$packet(r0, &(0x7f0000000080)="a99c383d33c9c607b1b9d49688a8834a88a8", 0x1000e, 0x0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) 286.233076ms ago: executing program 1 (id=228): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newqdisc={0x78, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x89}}]}, 0x78}}, 0x0) 223.882196ms ago: executing program 0 (id=230): write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x81, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r1, &(0x7f0000000480)="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", 0xfffffea5, 0xc000, 0x0, 0xfffffcef) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000003140)=[{&(0x7f0000000d00)=""/4104, 0x1008}], 0x1}}], 0x1, 0x0, 0x0) dup3(r1, r0, 0x0) listen(r0, 0x0) 223.664036ms ago: executing program 1 (id=231): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r0}, 0x10) syz_clone(0x20000, 0x0, 0x0, 0x0, 0x0, 0x0) 219.369287ms ago: executing program 4 (id=232): write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x12) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0x10, &(0x7f0000000740)=@framed={{}, [@snprintf={{0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x8, 0xfe00}, {0x7, 0x0, 0x8}, {}, {0x5}, {0x7, 0x0, 0x2, 0x0}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x49}}]}, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="76389e6a65585578f830e9000000", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) 184.321452ms ago: executing program 4 (id=233): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340), 0xfffffffffffffe19, 0x0, 0xffffffffffffffff, 0x54}, 0x42) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000200)=r2, 0x4) sendmsg$sock(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 103.189504ms ago: executing program 4 (id=234): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sys_exit\x00', r0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 102.931364ms ago: executing program 4 (id=235): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x9a, &(0x7f00000004c0)={@local, @empty, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x64, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x19, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @timestamp={0x8, 0xa, 0x80}, @md5sig={0x13, 0x12, "d082e275205e556149a021cc13c33d89"}, @window={0x3, 0x3}, @window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @sack_perm={0x4, 0x2}, @fastopen={0x22, 0xf, "cf6af75d5cdcf048b19c939556"}, @md5sig={0x13, 0x12, "27406263e43d5959a166a23bd1116edc"}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "df1d00", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 102.689654ms ago: executing program 4 (id=236): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 0s ago: executing program 4 (id=237): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0xb}, 0x48) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r0, 0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.48' (ED25519) to the list of known hosts. [ 21.264471][ T23] audit: type=1400 audit(1719659680.660:66): avc: denied { mounton } for pid=341 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.266399][ T341] cgroup1: Unknown subsys name 'net' [ 21.287045][ T23] audit: type=1400 audit(1719659680.660:67): avc: denied { mount } for pid=341 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.292651][ T341] cgroup1: Unknown subsys name 'net_prio' [ 21.320587][ T341] cgroup1: Unknown subsys name 'devices' [ 21.327011][ T23] audit: type=1400 audit(1719659680.720:68): avc: denied { unmount } for pid=341 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.500869][ T341] cgroup1: Unknown subsys name 'hugetlb' [ 21.506500][ T341] cgroup1: Unknown subsys name 'rlimit' [ 21.643063][ T23] audit: type=1400 audit(1719659681.040:69): avc: denied { setattr } for pid=341 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.666129][ T23] audit: type=1400 audit(1719659681.040:70): avc: denied { mounton } for pid=341 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 21.667102][ T342] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 21.691260][ T23] audit: type=1400 audit(1719659681.040:71): avc: denied { mount } for pid=341 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.721911][ T23] audit: type=1400 audit(1719659681.090:72): avc: denied { read } for pid=144 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 21.743693][ T23] audit: type=1400 audit(1719659681.100:73): avc: denied { relabelto } for pid=342 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.768879][ T23] audit: type=1400 audit(1719659681.100:74): avc: denied { write } for pid=342 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.794306][ T23] audit: type=1400 audit(1719659681.140:75): avc: denied { read } for pid=341 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.794336][ T341] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.167300][ T350] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.174298][ T350] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.181788][ T350] device bridge_slave_0 entered promiscuous mode [ 22.195618][ T350] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.202503][ T350] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.209795][ T350] device bridge_slave_1 entered promiscuous mode [ 22.230196][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.237029][ T352] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.244501][ T352] device bridge_slave_0 entered promiscuous mode [ 22.253554][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.260410][ T352] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.267827][ T352] device bridge_slave_1 entered promiscuous mode [ 22.309393][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.316228][ T353] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.323724][ T353] device bridge_slave_0 entered promiscuous mode [ 22.330679][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.337500][ T353] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.345001][ T353] device bridge_slave_1 entered promiscuous mode [ 22.394186][ T354] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.401083][ T354] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.408446][ T354] device bridge_slave_0 entered promiscuous mode [ 22.415333][ T354] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.422337][ T354] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.429744][ T354] device bridge_slave_1 entered promiscuous mode [ 22.538495][ T351] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.545329][ T351] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.552782][ T351] device bridge_slave_0 entered promiscuous mode [ 22.559719][ T351] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.566539][ T351] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.574040][ T351] device bridge_slave_1 entered promiscuous mode [ 22.688823][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.695661][ T352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.702818][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.709558][ T352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.725378][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.732234][ T353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.739394][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.746207][ T353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.783581][ T350] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.790440][ T350] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.797568][ T350] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.804307][ T350] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.825971][ T354] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.832837][ T354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.839976][ T354] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.846696][ T354] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.892804][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.900610][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.908404][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.915434][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.924006][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.932571][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.940171][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.947199][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.954484][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.978583][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.004688][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.013065][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.021246][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.028090][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.035737][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.043839][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.050678][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.073812][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.081607][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.090015][ T124] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.096831][ T124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.104580][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.112398][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.120533][ T124] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.127346][ T124] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.146964][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.154353][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.162189][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.170999][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.208856][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.217093][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.225895][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.232747][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.240081][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.248674][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.256625][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.263467][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.270820][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.279138][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.286900][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.294897][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.302697][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.310892][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.328482][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.336469][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.344477][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.352503][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.367665][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.375698][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.383991][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.392007][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.414071][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.421722][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.429541][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.438238][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.446254][ T372] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.453110][ T372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.460516][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.469632][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.477902][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.497757][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.506024][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.514706][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.523150][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.531819][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.539820][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.547576][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.555255][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.567741][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.575970][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.584345][ T372] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.591208][ T372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.598406][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.606129][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.641102][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.650861][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.659230][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.667241][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.675499][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.683562][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.691734][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.699759][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.718217][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.726221][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.734907][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.743484][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.775703][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.784362][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.793412][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.801472][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.809858][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.818224][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.826420][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.834546][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.842808][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.851084][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.859328][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.867400][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.875658][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.883747][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.922968][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.931740][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.977778][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.003044][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.021057][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.030003][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.073667][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.099792][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.130150][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.138677][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.157501][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.165993][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.940055][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Dropping request. Check SNMP counters. [ 27.108657][ T23] kauditd_printk_skb: 26 callbacks suppressed [ 27.108670][ T23] audit: type=1400 audit(1719659686.510:102): avc: denied { mounton } for pid=507 comm="syz.4.39" path="/root/syzkaller.w5rojS/9/file0" dev="sda1" ino=1970 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 27.108700][ T508] tmpfs: Unknown parameter '' [ 27.214529][ T508] Zero length message leads to an empty skb [ 27.214672][ T23] audit: type=1400 audit(1719659686.610:103): avc: denied { read } for pid=509 comm="syz.0.40" name="kvm" dev="devtmpfs" ino=95 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 27.221488][ T508] netlink: 9 bytes leftover after parsing attributes in process `syz.4.39'. [ 27.243046][ T510] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 27.266933][ T508] device gretap0 entered promiscuous mode [ 27.290513][ T508] syz.4.39 (508) used greatest stack depth: 22392 bytes left [ 27.300342][ T23] audit: type=1400 audit(1719659686.610:104): avc: denied { open } for pid=509 comm="syz.0.40" path="/dev/kvm" dev="devtmpfs" ino=95 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 27.327028][ T23] audit: type=1400 audit(1719659686.650:105): avc: denied { ioctl } for pid=509 comm="syz.0.40" path="/dev/kvm" dev="devtmpfs" ino=95 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 27.369843][ T23] audit: type=1400 audit(1719659686.700:106): avc: denied { map_create } for pid=512 comm="syz.4.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 27.390503][ T23] audit: type=1400 audit(1719659686.700:107): avc: denied { map_read map_write } for pid=512 comm="syz.4.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 27.483556][ T23] audit: type=1400 audit(1719659686.790:108): avc: denied { prog_load } for pid=516 comm="syz.4.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 27.580028][ T23] audit: type=1400 audit(1719659686.830:109): avc: denied { prog_run } for pid=516 comm="syz.4.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 27.633576][ T23] audit: type=1400 audit(1719659687.010:110): avc: denied { name_bind } for pid=528 comm="syz.1.47" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 27.654878][ T529] syz.1.47 (529) used greatest stack depth: 22008 bytes left [ 27.734830][ T542] tmpfs: Unknown parameter '' [ 27.742407][ T536] netlink: 9 bytes leftover after parsing attributes in process `syz.3.51'. [ 27.754330][ T536] device gretap0 entered promiscuous mode [ 27.771464][ T23] audit: type=1400 audit(1719659687.150:111): avc: denied { create } for pid=531 comm="syz.2.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 28.095189][ T562] IPv6: addrconf: prefix option has invalid lifetime [ 28.292355][ T121] cfg80211: failed to load regulatory.db [ 28.313234][ T572] tmpfs: Unknown parameter '' [ 28.320140][ T572] netlink: 9 bytes leftover after parsing attributes in process `syz.0.64'. [ 28.329472][ T572] device gretap0 entered promiscuous mode [ 28.491412][ T587] cgroup: syz.0.73 (587) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 28.580948][ T587] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 28.653194][ T602] tmpfs: Unknown parameter '' [ 28.676139][ T598] EXT4-fs (loop0): Ignoring removed mblk_io_submit option [ 28.705301][ T598] EXT4-fs (loop0): mounted filesystem without journal. Opts: lazytime,usrjquota=,errors=remount-ro,norecovery,auto_da_alloc,mblk_io_submit,grpquota,barrier=0x0000000000000000,grpjquota=,bsddf,bsddf,usrjquota=, [ 28.720461][ T602] netlink: 9 bytes leftover after parsing attributes in process `syz.1.77'. [ 28.748441][ T602] device gretap0 entered promiscuous mode [ 29.018741][ T624] rtc_cmos 00:00: Alarms can be up to one day in the future [ 29.570772][ T644] request_module fs-nfs succeeded, but still no fs? [ 29.808828][ T651] FAT-fs (loop4): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 29.852379][ T662] Unknown ioctl 21531 [ 29.856980][ T662] netlink: 8 bytes leftover after parsing attributes in process `syz.2.102'. [ 29.965331][ T670] FAT-fs (loop0): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 30.006381][ T669] EXT4-fs (loop2): Unsupported blocksize for fs encryption [ 30.278410][ T677] ====================================================== [ 30.278410][ T677] WARNING: the mand mount option is being deprecated and [ 30.278410][ T677] will be removed in v5.15! [ 30.278410][ T677] ====================================================== [ 30.343299][ T677] EXT4-fs (loop0): Unsupported blocksize for fs encryption [ 30.521536][ T689] Unknown ioctl 21531 [ 30.526122][ T689] netlink: 8 bytes leftover after parsing attributes in process `syz.4.111'. [ 31.039118][ T705] EXT4-fs (loop1): Quota format mount options ignored when QUOTA feature is enabled [ 31.049016][ T705] EXT4-fs (loop1): Unsupported blocksize for fs encryption [ 31.056691][ T709] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=709 comm=syz.3.120 [ 31.113491][ T715] EXT4-fs (loop4): Unsupported blocksize for fs encryption [ 31.205418][ T681] syz.2.107 (681) used greatest stack depth: 21880 bytes left [ 31.311798][ T724] EXT4-fs (loop4): Ignoring removed orlov option [ 31.329830][ T724] EXT4-fs (loop4): mounted filesystem without journal. Opts: orlov,errors=remount-ro, [ 31.426384][ T723] EXT4-fs (loop1): bad geometry: block count 3098423767073024 exceeds size of device (256 blocks) [ 31.502395][ T727] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 31.511131][ T724] EXT4-fs error (device loop4): ext4_mb_generate_buddy:748: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 31.513127][ T727] ext4 filesystem being mounted at /root/syzkaller.ssfAW0/17/w5T)`)YFnA@T<3ڂ$rcnHwC" -8 supports timestamps until 2038 (0x7fffffff) [ 31.548396][ T724] EXT4-fs (loop4): Remounting filesystem read-only [ 31.558149][ T742] EXT4-fs (loop2): Unrecognized mount option "uid<00000000000000000000" or missing value [ 31.583942][ T727] EXT4-fs error (device loop3) in ext4_do_update_inode:5534: error 27 [ 31.595441][ T727] EXT4-fs error (device loop3) in ext4_do_update_inode:5534: error 27 [ 31.817477][ T354] EXT4-fs error (device loop3): ext4_readdir:260: inode #2: block 3: comm syz-executor: path (unknown): bad entry in directory: rec_len is smaller than minimal - offset=12, inode=514, rec_len=0, size=2048 fake=0 [ 31.846345][ T354] EXT4-fs error (device loop3): ext4_readdir:260: inode #2: block 12: comm syz-executor: path (unknown): bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5066064, rec_len=1, size=2048 fake=0 [ 31.870921][ T354] EXT4-fs error (device loop3): ext4_readdir:260: inode #2: block 13: comm syz-executor: path (unknown): bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3653246737, rec_len=1, size=2048 fake=0 [ 31.894242][ T354] EXT4-fs error (device loop3): ext4_readdir:260: inode #2: block 14: comm syz-executor: path (unknown): bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3, rec_len=0, size=2048 fake=0 [ 31.998665][ T354] EXT4-fs error (device loop3): ext4_readdir:260: inode #2: block 15: comm syz-executor: path (unknown): bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5, rec_len=0, size=2048 fake=0 [ 32.055039][ T354] EXT4-fs error (device loop3): ext4_readdir:260: inode #2: block 16: comm syz-executor: path (unknown): bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3653245223, rec_len=1, size=2048 fake=0 [ 32.078096][ T354] EXT4-fs error (device loop3): ext4_readdir:260: inode #2: block 17: comm syz-executor: path (unknown): bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3, rec_len=0, size=2048 fake=0 [ 32.142433][ T354] EXT4-fs error (device loop3): ext4_map_blocks:617: inode #2: block 18: comm syz-executor: lblock 23 mapped to illegal pblock 18 (length 1) [ 32.220606][ T23] kauditd_printk_skb: 56 callbacks suppressed [ 32.220618][ T23] audit: type=1326 audit(1719659691.620:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=761 comm="syz.1.137" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f0200d36b99 code=0x0 [ 32.863936][ T762] syz.1.137 (762) used greatest stack depth: 21464 bytes left [ 32.872695][ T23] audit: type=1400 audit(1719659692.270:169): avc: denied { append } for pid=144 comm="syslogd" name="messages" dev="tmpfs" ino=843 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 32.910407][ T23] audit: type=1400 audit(1719659692.270:170): avc: denied { open } for pid=144 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=843 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 32.982286][ T23] audit: type=1400 audit(1719659692.270:171): avc: denied { getattr } for pid=144 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=843 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 33.035893][ T23] audit: type=1400 audit(1719659692.420:172): avc: denied { execute } for pid=780 comm="syz.1.145" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=13060 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 33.366060][ T23] audit: type=1400 audit(1719659692.760:173): avc: denied { create } for pid=790 comm="syz.2.148" dev="anon_inodefs" ino=13064 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 33.392095][ T794] EXT4-fs (loop0): Unrecognized mount option "uid<00000000000000000000" or missing value [ 33.417580][ T23] audit: type=1326 audit(1719659692.790:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=797 comm="syz.1.150" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0200d36b99 code=0x7ffc0000 [ 33.453979][ T23] audit: type=1326 audit(1719659692.790:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=797 comm="syz.1.150" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0200d36b99 code=0x7ffc0000 [ 33.484787][ T23] audit: type=1326 audit(1719659692.790:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=797 comm="syz.1.150" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0200d36b99 code=0x7ffc0000 [ 33.508118][ T23] audit: type=1400 audit(1719659692.800:177): avc: denied { ioctl } for pid=790 comm="syz.2.148" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=13064 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 33.857677][ T121] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 34.227692][ T121] usb 2-1: too many endpoints for config 0 interface 0 altsetting 0: 255, using maximum allowed: 30 [ 34.255876][ T121] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 34.279194][ T121] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 34.299066][ T121] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 255 [ 34.326150][ T121] usb 2-1: New USB device found, idVendor=0458, idProduct=0153, bcdDevice= 0.00 [ 34.343699][ T121] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 34.364897][ T121] usb 2-1: config 0 descriptor?? [ 34.677456][ T840] EXT4-fs (loop2): Unrecognized mount option "uid<00000000000000000000" or missing value [ 34.843170][ T121] kye 0003:0458:0153.0001: item fetching failed at offset 5/7 [ 34.855538][ T121] kye 0003:0458:0153.0001: parse failed [ 34.878083][ T121] kye: probe of 0003:0458:0153.0001 failed with error -22 [ 34.957499][ T354] syz-executor (354) used greatest stack depth: 21080 bytes left [ 35.057886][ T568] usb 2-1: USB disconnect, device number 2 [ 35.290467][ T849] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.297394][ T849] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.304900][ T849] device bridge_slave_0 entered promiscuous mode [ 35.312486][ T849] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.319378][ T849] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.326905][ T849] device bridge_slave_1 entered promiscuous mode [ 35.405260][ T849] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.412114][ T849] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.419223][ T849] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.425987][ T849] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.466431][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 35.474292][ T372] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.481696][ T372] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.507920][ T568] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 35.515870][ T568] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.522702][ T568] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.530589][ T568] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 35.538761][ T568] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.545581][ T568] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.558389][ T179] device bridge_slave_1 left promiscuous mode [ 35.565601][ T179] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.573114][ T179] device bridge_slave_0 left promiscuous mode [ 35.600595][ T179] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.678641][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 35.686627][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 35.726859][ T121] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 35.740502][ T121] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 35.789042][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 35.808718][ T121] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 35.824044][ T121] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 36.170047][ T893] EXT4-fs (loop3): Unrecognized mount option "uid<00000000000000000000" or missing value [ 36.407661][ T568] usb 5-1: new high-speed USB device number 2 using dummy_hcd [ 36.738323][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Dropping request. Check SNMP counters. [ 36.797764][ T568] usb 5-1: too many endpoints for config 0 interface 0 altsetting 0: 255, using maximum allowed: 30 [ 36.827615][ T568] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 36.855394][ T568] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 36.877671][ T568] usb 5-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 255 [ 36.897695][ T568] usb 5-1: New USB device found, idVendor=0458, idProduct=0153, bcdDevice= 0.00 [ 36.906536][ T568] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 36.936528][ T568] usb 5-1: config 0 descriptor?? [ 37.429199][ T568] kye 0003:0458:0153.0002: item fetching failed at offset 5/7 [ 37.440126][ T568] kye 0003:0458:0153.0002: parse failed [ 37.452081][ T568] kye: probe of 0003:0458:0153.0002 failed with error -22 [ 37.633149][ T355] usb 5-1: USB disconnect, device number 2 [ 37.929822][ T941] EXT4-fs (loop3): Unrecognized mount option "uid<00000000000000000000" or missing value [ 38.115709][ T945] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 38.146188][ T23] kauditd_printk_skb: 56 callbacks suppressed [ 38.146200][ T23] audit: type=1400 audit(1719659697.540:234): avc: denied { map } for pid=944 comm="syz.2.196" path="/root/syzkaller.YwJgHs/42/file1/bus" dev="loop2" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 38.225731][ T23] audit: type=1400 audit(1719659697.560:235): avc: denied { execute } for pid=944 comm="syz.2.196" path="/root/syzkaller.YwJgHs/42/file1/bus" dev="loop2" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 38.268828][ T945] syz.2.196 (945) used greatest stack depth: 19608 bytes left [ 38.863564][ T992] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 38.888417][ T355] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 39.022024][ T23] audit: type=1400 audit(1719659698.420:236): avc: denied { write } for pid=1019 comm="syz.1.223" laddr=fe80::c8a1:63ff:fe86:8fab lport=60 faddr=ff01::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 39.085993][ T23] audit: type=1400 audit(1719659698.480:237): avc: denied { bind } for pid=1023 comm="syz.0.225" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 39.158969][ T1032] netlink: 72 bytes leftover after parsing attributes in process `syz.1.228'. [ 39.167615][ T23] audit: type=1400 audit(1719659698.480:238): avc: denied { node_bind } for pid=1023 comm="syz.0.225" saddr=172.20.20.0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 39.207805][ T23] audit: type=1400 audit(1719659698.540:239): avc: denied { ioctl } for pid=1028 comm="syz.0.227" path="socket:[15553]" dev="sockfs" ino=15553 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 39.239501][ T23] audit: type=1400 audit(1719659698.590:240): avc: denied { create } for pid=1030 comm="syz.4.229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 39.257658][ T355] usb 4-1: too many endpoints for config 0 interface 0 altsetting 0: 255, using maximum allowed: 30 [ 39.274296][ T355] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 39.295296][ T355] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 39.315481][ T355] usb 4-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 255 [ 39.347707][ T355] usb 4-1: New USB device found, idVendor=0458, idProduct=0153, bcdDevice= 0.00 [ 39.356976][ T355] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 39.368161][ T355] usb 4-1: config 0 descriptor?? SYZFAIL: proc resp pipe read failed n=-1 (errno 11: Resource temporarily unavailable)